HACKING For BEGINNERS - Become An Ethical Hacker With The Complete Study Guide (BooksRack - Net)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 23

HACKING FOR BEGINNERS

Become an Ethical Hacker with the


Complete Study Guide:
How to be an ethical hacker?
I Want To Be An Ethical Hacker But How?

There is no doubt that the number, scope and effects of cyber attacks
are increasing exponentially in the current period.

When we examine the sources of such attacks, we can easily see that
state-sponsored cyber gangs, sometimes hacktivist groups, and
sometimes people who are specialized in cyber attack tools, called
script-kiddie, whose number is not at all, stand out. Therefore, while the
attacker is in such a strong position, our need for ethical hackers who
use their knowledge of security systems to serve "well-intentioned"
purposes in order to protect individual and social peace in the cyber
world is now more than ever in our country and in the world. much. It
is a fact that ethical hackers should

increase in quantity;

However, it does not seem like it will be possible to stop the "bad guys"
from working as a highly qualified and professional army only by
increasing the number of ethical hackers. Another factor that is at least
as important as quantity is considered as quality.

When we examine people who have made quite a distance and achieved
success in any profession, we can easily see that their "know-how" skills
are much more advanced than their equivalents. Professionals with this
feature; In addition to fulfilling their duties and responsibilities, they
make great efforts to

examine and understand which processes are progressing in the


background of their work. For example, have you ever thought about
how the protocols and procedures work in the background when you
access the article you are currently reading?

Similarly, in the field of cyber security, which includes many different


disciplines, "know-how" capability is among the most valuable and
indispensable features; Because, in order to ensure information security,
the system that creates this

information,

Knowing and assimilating in detail how the protocols and


infrastructures work are the most basic requirements. While this is the
case, the following question immediately arises in our minds: "How can
we have the technical infrastructure and" know-how "knowledge
required to be a good cyber security expert, in other words, to be a good
ethical hacker?"

There are many certification programs for those who are at the
beginning of the road in the field of Cyber Security and want to improve
themselves technically. One of the most prominent and globally valid
certifications among these programs is the Certified Ethical Hacker
(CEH), which I have worked for a long time to obtain and which was
first announced and executed by the EC-Council organization in 2003.

The most striking purpose of CEH certification is to make the trainees


know about the basic standards in the field of information security, both
theoretically and technically. When we examine the content of CEH
education, we come across a very satisfying background that includes
the following concepts:

■ Introduction to Ethical Hacking


■ Footprinting and Reconnaissance
■ Scanning Networks
■ Enumeration
■ System Hacking
■ Malware Threats
■ Sniffing
■ Social Engineering
■ Denial of Service
■ Session Hijacking
■ Hacking Webservers
■ Hacking Web Applications
■ SQL Injection
■ Hacking Wireless Networks
■ Hacking Mobile Platforms
■ Evading IDS, Firewalls, and Honeypots ■ Cloud Computing
■ Cryptography

The language of the 312-50 CEH exam is English and consists of 120
multiple-choice questions. You are given 4 hours to answer these
questions and if you
answered at least 70% of the questions correctly, you are entitled to
receive the CEH certificate. Also exam; TOEFL takes place in computer
environment similar to Cisco or Microsoft certification exams, so don't
be surprised to see only a computer in front of you instead of paper and
pen in the exam environment. The exam fee is unfortunately a bit
expensive: 700 USD. However, this amount should be seen as an
investment in your future and of course it should be one of the factors
that stimulate you to pass the exam the first time.

With the latest regulations regarding the preparation for the official
exam of CEH certification, the option to apply for the exam without
taking a course was removed for our country, and firstly, it was
obligatory to receive CEH training from a course

center with EC-Council accreditation.

If you are quite new in this field or if you find yourself weak about
network technologies and operating systems, it will be very useful to
receive CEH training from an institution that has EC-Council
accreditation (EC-Council Authorized Training Center). In this way,
your exam preparation process will be more comfortable and efficient
with the help and advice of instructors experienced in the field of
information security. Also, if you follow the lessons regularly, your
motivation will remain high for a long time.

However, I find it useful to investigate the institution and instructor you


plan to study in detail, unfortunately some inadequate educational
institutions can cause disappointment and loss of interest in the subject.
In addition to all these, there are many resources and videos that you
can use free of charge on the internet. You can find additional resources
that I personally recommend at the end of the article.

If you have successfully completed the preparation period and you feel
ready (it is necessary to remember the exam fee once more to be sure at
this stage), you are now at the application stage for the exam.
Applications for the CEH exam can be found on the EC-Council website
(

https://store.eccouncil.org/product/ceh-vue-exam-v oucher/) or the


Pearson online exam registration platform (
http://www.pearsonvue.com/)CEH exam is purchased through eccouncil
/).

At this stage, you are free to determine the date you want to take the
exam, and the exam center you can easily find in big cities such

You studied in a disciplined way and with high concentration and


passed the exam and became a Certified Ethical Hacker approved by
the EC-Council
organization,

what about then?

As I mentioned at the beginning of the article, CEH certification has a


very comprehensive content. New areas that you met during the
preparatory phase of great interest will help you determine your future
focus. For example, if you consider the penetration field to suit your
skills and are excited about it, you can steer your career as a penetration
tester.

Same way; You can improve yourself and continue your career through
CEH-like certification programs in Computer Forensics, Voice over IP
(VoIP), Secure Software Development (Secure Coding) and even as

an instructor in training or consultancy.

Finally, I have to state that the validity period of the CEH certificate is 3
years from the date of receiving the certificate.

In this process, if you get a higher level certificate from CEH (Licensed
Penetration Tester, Computer Hacking Forensics Investigator, Certified
Secure Programmer, etc.), the validity period of the CEH will be
updated along with your new certificate.

I wish success to CEH candidates.

Hacking profession, which has become one of the most popular terms in
today's world, thanks to the movies and series we have watched, perhaps
due to our curiosity. So what is Hacking and how to become a Hacker?

Hacker's Word Meaning

A hacker is a person who logs into personal computers or computers and


networks of various institutions and organizations without permission.

In a broader and historical expression, the information that needs to be


entered in electronic or mechanical vending systems is the person who
deceives the service system by passing the filter with duplicate keys,
which is the key slot that controls the use of the correct key, such as a
coin. In the field of computer programming, a hacker is a programmer
who achieves a goal or 'breaks' it by applying a series of fixes to an
exploit or using existing codes.
To summarize, the people who exploit the vulnerabilities of the system
and intervene in the system are called Hackers.

Types of Hackers
● White Hat
● Black Hat
● It is divided into three as Gray Hats.

White Hat Hackers

Among the hacker types, the most useful hackers are the white hat ones.
Hackers classified according to their knowledge and skills gain
qualifications according to this information. Hackers with white hats
also have attack and hacking knowledge like black hat hackers.

But hackers with white hats do not use all their knowledge and skills to
attack systems or institutions. On the contrary, they use their
information to protect institutions with the system. It is also called
system security expert with another name.

Ethical Hacker Training institutions such as

Smartpro Computer Academy teach you how to explore the


vulnerabilities of the system by questioning the system. As a result of the
trainings attended by professional trainers who are experts in their
fields, you also get job opportunities in many fields as a white hat hacker.

The ideal way for those who want to be a good hacker is to have the right
training. White hat hackers usually serve a government agency or
company in order to ensure its security. The main purpose of white hat
hackers is to detect the vulnerabilities of the system beforehand and to
eliminate these vulnerabilities.

Black Hat Hackers

Using their superior computer knowledge and skills in the digital world,
black hat hackers use their abilities to infiltrate systems and damage
such as data stealing. Misuse of their abilities is considered completely
illegal.

Gray Hat Hackers

Gray-hat hackers, who generally work as a hobbyist, do not use it for


malicious purposes, although they have many features and knowledge.
Generally, hackers with gray hats who find vulnerabilities of the systems
do not damage the system or steal data from the system, even if they log
into the system. Sometimes, they report the system vulnerabilities they
find to the relevant institution or company to eliminate the vulnerability.

How To Become A Hacker?


The most important criterion of being a good hacker is to learn the
basics of the computer world with the right education.
You should take courses from institutions that provide Certified Ethical
Hacker training such as Smartpro Computer Academy, and follow the
work of experts in the field. Being aware of new trends, you need to
constantly update yourself with technology.

Here are the 10 basic steps to learn to be a good


hacker:
● By enrolling in a certified training program, you must learn the basics
of computers and networks very well.
Since the software language is English, English must be learned.

● People who want to be a hacker must know programming very well.


● A person who wants to be a good hacker needs to understand security
concepts and technologies. In order to overcome the obstacles set up by
security managers, they must be recognized. Therefore, it is necessary to
understand technologies such as PKI, SSL, Firewall and IDS.
● One of the most important steps to become a hacker is web
applications. It is a fruitful area for hackers recently. Accordingly, the
better the web applications are understood, the more successful hackers
are.
● If you want to be a professional in the hacking business, the
information obtained should be used in the right direction. Continuous
research is required to work and learn in a planned manner.
● To be a hacker, he must be familiar with the terms.
● You have to make sure that you really want to do this job, which takes
a lot of time and effort.
● The hacker training received should be used well. Otherwise, many
sanctions will be incurred.
● Current technology should be followed and it should be blended with
experience.

Ethical hacking is one of the most sought after topics to become a hacker
and showcase your skills by learning complex programming languages
or to have a career in the burgeoning cybersecurity industry. Come
together,

"How do you become a hacker?"


"What is an ethical hacker?"

Let's take a closer look at free YouTube and Udemy tutorials that
answer your questions and can help you become an ethical hacker.

Hacker concept of has been in our lives for a long time


thanks to movies, TV shows and social media, "being a
hacker" is a very complex process.
Today, many ethical hackers working in the cyber security and internet
sector go through a serious
education and self-improvement process. Ethical hackers, who show
themselves especially in the
field of ensuring the cyber security of certain
companies and organizations, are the people who find
and close the deficiencies in the cyber security network
of the companies with their knowledge and skills .
To be an ethical hacker; It is imperative that you have
high-level knowledge on topics such as networking, programming,
databases and communication systems.
Also, hacking is a profession that requires dedication
and patience to learn and master many programming
languages.
So how do you become an ethical hacker? We have
explained this in full detail for you and compiled some free ethical
hacking tutorials available on YouTube and
Udemy .
What is an ethical hacker?
Although the word "hacker" is negative nowadays a
meaning , it is possible to get rid of this negative
situation with the concept of "ethical hacker". Ethical
hackers work just like a regular hacker. However, they

have a serious individual and corporate training. They use all their
talents and learned for good purposes, not malicious intentions.

Ethical hackers are more concerned with the


cybersecurity aspect of the business, rather than
hacking and exploiting an individual's information in general. In this
context, ethical hackers take the
responsibility of identifying the security gaps of the institutions and
individuals they work with and
protecting these employers from hacker attacks.
There are also ethical hackers who work individually
and report the vulnerabilities they find to companies, hacking for good .

How to become an ethical hacker?

There are some steps you need to take and many


issues you need to specialize in in order to have a
career as an ethical hacker . Being an ethical hacker; It
requires knowledge of many areas from popular operating systems to
programming, software
languages and databases management.

These four items can generally be called the building


blocks of the digital world . Having comprehensive
knowledge and expertise in these areas will help you
master the concept of hacker and open the door to
becoming an ethical hacker.
After you have the necessary information on these
subjects, you can continue your studies according to the areas you want
to focus on.
Network technologies:
In this area; You can provide technical support to
already established network systems, you can do
networking studies, you can install security programs
on your own network systems and test the
vulnerabilities of the security systems you have created.
Programming languages:
One of the most important areas you should focus on is
programming languages. In order to act as an ethical
hacker, it is necessary to be able to use a few programming languages
effectively. By focusing on
popular and relatively easy-to-learn languages such as
C ++, Python / Ruby, HTML, and PHP at first, you can
both increase your knowledge and have several
programming languages at your disposal.
Databases management:
Being able to access various databases and collect information and data
from these databases is one of
the important features that an ethical hacker should
have. There are several popular query languages for database querying .
You can add this feature to your
reputation by specializing in popular query languages
such as MySQL and MSSQL before moving on to more advanced query
languages .
Operating systems:
To be an ethical hacker, you should not be limited to
just one operating system. Many hackers and ethical hackers use the
Linux operating system today, both in
terms of security and the tools used. Specializing on

the Linux operating system will both give you great freedom and
facilitate your education in becoming an ethical hacker.

It is also worth noting that if you view ethical hacker


training as a professional profession rather than just a
hobby, the way to master this field is through long-term studies and
patience. Following , learning and
mastering newly released programming languages is vital for those who
want to be ethical hackers.

In these courses prepared by Ahmet Birkan, which


includes information in many areas from necessary institutions, privacy
trainings and the use of Kali Linux ,
individuals who have just entered the world of ethical
hacking and who want to learn about this subject and
want to improve themselves can find courses
according to their knowledge level and area of interest. In this series of
11 episodes and 87 classrooms, Mr.
There are also exemplary narratives with scenes from
TV series and movies such as Robot and Who Am I ,
and the basics of the hacker scenes we have been
watching for years.
If you want to basically learn about the vulnerabilities
of web security policies and take a few actions on these vulnerabilities,
the Ethical Hacker Course series
becomes a fast and reliable source of information for you.
"How do you become a hacker?" For now, this is the list we have
prepared for free ethical hacker trainings that
answer the question . In these free courses, you can thoroughly
understand the basics, improve yourself and
take your skills to the next level with regular work using
internet resources. The instructors mentioned in the
list also have courses on advanced ethical hacker
training, if you are sure about progress in this field, you can also head to
advanced courses in line with your
interests and areas you want to focus on.
What is a Hack? / What Is A Hacker Who Is Called / What Does a
Hacker Do?

In this age where today's technology is used, almost everyone knows


more or less the answers to questions such as "what is hack", what is a
hacker. But not many people know what the people who are interested in
this field are actually doing, what programs and software they use while
working. In this article: “What is a Hacker?
How to Become a Hacker ?,

What is Ethical Hacker ?,


What Types of Hackers ?,
What Are Hacker Programs ?, What Do I Want To Be A Hacker ?,
What Is Black Hat Hacker ?,
What Is Ethical Hacker?

We answered all your questions like. Here's everything you need to know
about the hacker in this post. Enjoyable readings ..

Nowadays, everyone has a computer or a phone connected to the


internet. Most of us do not know enough about the safety of these
technological devices. With the introduction of technology into human
life, many innovations came with it. However, the old generations started
to tell the new generation some stories such as "If there was youtube in
our time ..". Yes, words are really inadequate sometimes to describe the
dizzying development of technology today.

Of course, the biggest impact in this change was our youth, who were
again caught up in the demands of popular culture.

In these days, which we witnessed to change rapidly, action-adventure


films and detective films are among the legends of many of us. In 2016,
the

Golden Globe "Best TV Series" award "Mr. With the "Robot"


directory, the signals that many things will change in digital life for the
last 3-4 years have already been given.

The new form people have taken to the changes experienced with a little
surprise and a little anxiety by affecting the daily life of almost everyone,
from the addicted to the passive user of the digital world, is thought-
provoking ... So much so that with the success of the attack on the
computers and phones we use, we can lose all our assets and sink into
our throat. . The same is true for small, medium and large companies.

Millions of dollars can be lost within seconds with an attack by hackers


on the computer networks of these companies.

On the other hand, the WikiLeaks documents, Anonymous, the hacker


groups such as the Redhack have made to Turkey's official site you
remember your most attacks. All of these groups have perhaps the most
talented hackers in the world and they can be on the agenda in the world
with their actions or attacks.

Who Is A Hacker Called?

Nowadays, when it comes to "Hackers", everybody usually thinks of


destructive, malicious hackers. But "goose foot" is not like that. Because
let's prove that this concept, which is formed in the minds of most people
who have a little exposure to the internet with their computers, is not
true.

Hacker literally means: "hacker". Yes, these pirates also have harmless
and harmless ones. Ready to
get to know the hackers divided into three groups?
White Hat:

Among the most harmless and most productive hacker groups are the
white hat hackers. Like other hackers, hackers with white hats are
people who have the knowledge and skills to capture any system,
network and computer in seconds. However, white hat hackers find all
the vulnerabilities they see in the system they enter and inform the
company or person who developed that software in detail, one by one,
before announcing it to the public. He tells him to shut down his system
to fix any vulnerabilities he finds.

These people then announce the details of this vulnerability in various


newsgroups and websites in order to inform the public. White hat
hackers always

make sure they stay on the defensive of vulnerable systems.


Today, these people are also called "Ethical Hackers".
Black Hat:
Black hat hackers, on the other hand, act in the opposite of white hat
hackers. They carry out damaging activities such as information theft,
fraud,

terrorism, deliberate destruction by circumventing security systems


without permission. They can do this by remotely accessing a computer
or hacking a software. Black hats that break software are called
"crackers".
Software Hacker (Cracker):

They are the people who break the copy protection of the software and
make it used without permission. They are experts in programming and
may not have knowledge of network security.

Gray Hat (Gray Hat):

They are hackers who are on the limit of legality. Sometimes they have
good intentions, other times they can engage in illegal activities specific
to black hats. Hacktivist :

They are people who engage in hacking activities to raise a social or


political problem.

Their purpose is to announce something that is "bad" or "wrong" for


them and to send a message to those concerned. Regardless, it is a crime
to access

information by accessing an unauthorized system and such activities


should not be supported.
Lamer :

They are hacker wannabe who have no knowledge of hacking, who try to
show off with a few terms learned and a few simple programs that they
got their hands on. Lamers are usually young people

and only aim to harm. Script kiddie:

Although they are not hackers and unlike lamers, these knowledgeable
people are among the most dangerous hackers in the digital world.

Script kiddie's often attack systems / individuals, damage them and


misuse the information they obtain.

For them, piercing a security system is the end, not the tool. They can be
described as anarchists of the hacker world.

Script kicks are usually responsible for attacks on many personal


computers.

These people who identify themselves as hackers in their environment


and are proud of it are script kiddie. Phreaker :

These types of hackers are also harmful. They provide free calls by
hacking phone lines rather than computers.
How To Become A Hacker?

To become a hacker, you need to know many software languages very


well. Moreover, you have to know these software languages in English.

In order to become a hacker, you must learn the necessary programming


languages very well and practice a lot.
Software and Programs Used by Hackers; C , C ++, Perl, Php, Java,
Delphi, Python

Software programs such as visual basic are among the most important
programs to be hackers.
As the operating system ;
Windows, Kali Linux, Unix

By using many systems and programs such as, you will step into this
area. You have to work hard to learn these languages, which are not as
easy as it seems.
Are Hackers Given Salary? How Much Money Do Hackers Make?

This group, known as black hat hackers, has no problem in making


money. If they are capable, they can earn as much money as they want
illegally. In America, a hacker can earn up to $ 30 million a year.

However, the salaries of hackers working in cyber defenses can differ


according to their skills and abilities. For example, a white hacker
working in a software company in cyber defense in the US earns about $
41 per hour.

In other words, hackers with white hats can earn around $ 40,000 per
year legally. However, official government agencies follow the traces of
the money they stole, not what hackers who do not want to work legally,
and sooner or later catch and penalize that hacker.

What is Growth Hacking?


Who is Growth Hacker?

Growth Hacking has worked to grow and develop a given project or


company project. The person who provides this growth is called
"Growth Hacker".
Read This Information If You Want To Be A Hacker And Have A Style!
Hackers are never ordinary people. They have their own sense of humor,
a way and a method.
The technical characteristics of these people who work in the upper head
structure are as follows:
● They know how to write well and fast in their native language,

● They read a lot of science fiction books and magazines and watch movies with the same content,
● They attach great importance to personal sports.
● Analytical music ears are very good point.
● They read a lot and do a lot of trial and error to improve their understanding of wordplay.

You might also like