So I think many of you are tired by searching How to be a hacker . Is i am correct? so, don’t worry in this article i will be sharing mt tips and personal experience in front of you guys. so, keep reading this how to be a hacker article.
so, First you should know that what do i mean hacker- hacker full for is –
- H- Hide ip
- A- Aim victim
- c- crack inscription
- k- Kill firewall
- E- enter into database
- R- return anonymous
A person with all these Qualities will be Called as a certified hacker.
Now, I am sure After this many of you didn’t understand this. so don’t worry we will deeply discuss it.
1- Very important thing
If you are using ordinary os like windows then you should change you operating system . you should go for Linux operating system which is the best platform for hacking. And the Linux operating system is one of the most preferable os by the hacker.
2-Start learning The basic Linux command
3-Keep Researching on internet on Youtube To learn more
But, If you still can’t be able to learn you can join some Institute. you can find it every where just research a little bit..
And at the last you should join CEH (CERTIFIED ETHICAL HACKING COUNCIL) here you will get a great knowledge about cyber security after the course give your exam and get the Certificate of CERTIFIED ETHICAL HACKER which will be very useful for four life,then it depend Up to you wheather you go for ethical Hacking or Black hat hacking, a cyber security office or a Theif.
If you are Enjoying this article how to be hacker then comment below >
A Little bit knowledge of CEH (optional reading)
Certified Ethical Hacker (CEH) is a qualification obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system. This knowledge is assessed by answering multiple choice questions regarding various ethical hacking techniques and tools. The code for the C|EH exam is 312-50. This certification has now been made a baseline with a progression to the C|EH (Practical), launched in March 2018, a test of penetration testing skills in a lab environment where the candidate must demonstrate the ability to apply techniques and use penetration testing tools to compromise various simulated systems within a virtual environment.
1-First Digital Weapon
The worm Stuxnet infiltrated Iran’s nuclear refinement plant network—oof, that doesn’t sound safe. And it wasn’t: Hackers infected USB drives and then distributed them to five companies connected to the Iranian nuclear program. The worm eventually caused uranium centrifuges to spin out of control, destroyed thousands of uranium samples, and had leading Iranian scientists convinced that they were doing something to cause the problems. As a result, Stuxnet has been called the world’s first digital weapon.
This is the hack that just won’t die. Launched in 2008, it still affects up to a million computers every year by replicating itself and then either converting computers into bots to send out more copies of itself or reading your credit card numbers. In 2015, Conficker was believed to be responsible for 20% of all cyber attacks, and has even spread to police body cams.
3-Home Depot Credit Card Attack
It started with hackers stealing a single password from a Home Depot vendor, and it ended with the exposure of 56 million credit cards and 53 million email accounts. Hackers used a vulnerability in Microsoft to jump from the vendor to Home Depot’s database. Code lurked there undetected for five months while quietly gathering information.
Launched by a 17-year-old London teenager, this hack targeted Spamhaus, a non-profit web protection service that generates blacklists of spammers and hackers. It started with using infected computers to flood and overload the Spamhaus servers with web traffic (in what is called a distributed denial of service attack), and it quickly (and accidentally) slowed down the entireInternet.
5- Making Bank
In June 2014, (likely) Russian hackers used a list of applications and programs used by JP Morgan’s computers and crosschecked it with possible vulnerabilities to find a way into the bank’s system. Although they scooped up information from 7 million businesses and 75 million households, they didn’t move any money and didn’t take any financial information. Which, uh, is actually kind of creepier.
SO, let me know your opinion please Comment below
How to be a hacker