Loading
How do you become a white hat hacker?
In this post we will discuss the strategies and ways that will put you on the right path to become a professional and successful person in the field of ethical hacking and cyber security, as well as the most important tools used by experts in this field.
First, you need to know the principles of data and information and how they work, which has three branches:
- Systems
- Networks
- Programming
Each of these three branches is directly related to the other two. For example, programming and networking are complementary to systems.
You must know and be fully proficient in at least three programming languages. What I know best are python, perl, ruby because most of the security vulnerabilities and programs found in systems such as Kali Linux and Parrot are written in these languages.
You must also know JavaScript and php, I'm not saying you're very proficient in them, but you must be able to write scripts, read and understand them because it will help you to use the gaps you find.
If you want to hack a site you have to read and understand JavaScript scripts. For example, you find a cross XSS vulnerability with the information you have about MySql and Oracle.
After talking about programming we come to talk about network management. You should know how to manage servers on Linux and Windows because it is closely related to network management. And the most important resource for learning is to get CCNA certificate with C|EH certificate as well as security plus certificate
After that, we will look at the systems that are most commonly used in the field of cyber security. In general, all Linux-based systems are suitable for this purpose, but what is most specific to this area:
Kali Linux - Black Arch - Parot OS - Backbox Linux
You must be familiar with all Linux commands and have a Linux Plus certificate. You must also be proficient in Macintosh and Windows.
If you are proficient in the above, you will become a very successful and professional hacker. Now let’s move on to the most commonly used tools in this area:
To test the strength of a wireless network and find gaps in it, the following are used:
Aircrack-ng
Airogedon
Wifiphisher
Wifite
kismet
insider
kismac
lenses
These other tools are used to find bugs in the system and are used by all hackers from beginners to professional hackers to find security vulnerabilities
snort
netcop
To hack any system, you need to check its open ports. In this process, we have these tools
superscan
Nmap
angry IP scanner
Another important point that is the issue of security and safety of information is decryption and the most important tools used in this process:
Truecrypt
Tor
openSSh
openssL
openvpn
stunnel
keeppass
Another important technique that we have and we don't need to go into too much depth because it is very popular is brute force attacks
Tools used in this section:
Crunch
ophacrack
Medusa
Rainbowcrack
wfuzz
brutus
lophtcrack free download
fgdump
THC Hydra
John the Ripper
Cain and Abel
For sniffing attacks, which are one of the most powerful attacks and only on a local network, we have the following tools:
wireshark
tcpdump
Ettercap
Dsnnif
EtherApe
And in addition to these tools, we have several other tools that are no less powerful than the above
Metasploit
sqlmap
sqlninja
set
NetSparke
BeFf
We have several other tools used to find vulnerabilities in web applications including
Burp suite
webscarab
websecurify
Nikto
W3af
The following tools are also used for digital analysis and forensics, which involves extracting data stored in electronic fragments:
Sleuth kit
Helix
meltego
Encase
Copyright © 2024 Cybernero | Powered by Alienus.tech