Skip to content

it content free resources including courses that help you to learn ethical hacking for beginners to advanced

Notifications You must be signed in to change notification settings

lisus18ikrak/be-a-hacker

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 

Repository files navigation

What is ethical hacking

Ethical hacking, also known as white hat hacking, is the practice of using hacking techniques for the purpose of identifying and fixing vulnerabilities in computer systems and networks. Ethical hackers use their skills to improve the security of systems and protect them from malicious attacks, rather than exploiting vulnerabilities for personal gain or causing harm.

what are the types of hackers?

There are several types of hackers:

White hat hackers: These are ethical hackers who use their skills for defensive purposes, such as identifying and fixing vulnerabilities in systems.

black hat hackers: These are malicious hackers who use their skills to gain unauthorized access to systems or to steal sensitive information.

Grey hat hackers: These hackers may sometimes act ethically and at other times may cross ethical boundaries, depending on their motivations.

Script kiddies: These are individuals who use pre-written scripts or tools to attack systems without fully understanding how they work.

what are the step of ethical hacking?

Here are the steps involved in ethical hacking:

Planning and preparation: Before starting an ethical hacking project, it is important to plan and prepare. This includes identifying the target system, obtaining permission to perform the hack, and creating a report to document the process.

Reconnaissance: In this step, the ethical hacker gathers as much information as possible about the target system, including IP addresses, open ports, and system vulnerabilities.

Scanning: The ethical hacker uses tools and techniques to scan the target system for vulnerabilities.

Gaining access: Once vulnerabilities have been identified, the ethical hacker attempts to gain access to the system using various techniques.

Maintaining access: Once access has been gained, the ethical hacker may try to maintain access to the system in order to continue testing and identifying vulnerabilities.

Covering tracks: In this step, the ethical hacker makes sure to cover their tracks and remove any evidence of their presence on the system.

Reporting: Finally, the ethical hacker creates a report detailing the vulnerabilities identified and the steps taken to fix them.

why to learn ethical hacking?

here are several reasons to learn ethical hacking:

To improve the security of systems: By identifying and fixing vulnerabilities, ethical hackers can help prevent malicious attacks on systems.

To pursue a career in cybersecurity: Ethical hacking is a highly sought-after skill in the field of cybersecurity, and learning ethical hacking can open up career opportunities in this field.

To understand how to protect oneself online: Learning about ethical hacking can also help individuals protect their own personal and financial information online.

how to learn ethical hacking

There are several ways to learn ethical hacking:

Online courses: There are many online courses available that teach ethical hacking skills. These courses can be self-paced and often include videos, tutorials, and hands-on exercises to help students learn the skills.

Books: There are also many books available on ethical hacking, ranging from beginner to advanced levels. These books can be a good resource for learning the fundamentals and expanding your knowledge.

Boot camps: Ethical hacking boot camps are intensive, in-person training programs that provide hands-on experience with hacking tools and techniques. These programs are typically more expensive than online courses but can provide a more immersive learning experience.

Practical experience: The best way to learn ethical hacking is through hands-on experience. This can be achieved by setting up your own test lab and practicing on vulnerable systems, participating in online hacking challenges or Capture the Flag (CTF) events, or joining a hacking group and learning from more experienced hackers.

It's important to note that learning ethical hacking requires a strong foundation in computer science and a deep understanding of computer systems and networks. Therefore, it's a good idea to start by building these foundational skills before diving into more advanced topics.

however follow my resources and become a hacker

Requirements: A clear Mindset

Most Important 1 - 4 = Important Don’t skip anything, Everything is in order and download the courses in small parts in order

Step - 1

Tryhackme: Beginner Level Link - https://tryhackme.com/hacktivities

Pre Security only -

  • Cyber Security
  • How The WebWorks
  • Windows Fundamentals

Step - 2

Networking - Networking is the most important thing in this field. You should know how the internet works, Wifi, IPV4, IPV6, Modem & Routers, TCPIP

TOTAL CompTIA A+ Certification (220-1002): Mega Link - https://mega.nz/folder/zSpnzKKD#UPhqD2NZBoM3ImhvMsx9qA

Step - 3

CompTIA Network+ Cert. (N10-007) The Total Course part: Mega Link - https://mega.nz/folder/fC5njSyR#NMw88ZzRaYhDTSmYewodXA

Step - 4

Linux Essentials For Hackers: Mega Link - https://mega.nz/folder/mSZm0ToD#eHVXlQEZqjvy7wtOjr6bsQ

oR

Linux Fundamentals (only if you have much time) Mega Link - https://mega.nz/folder/bWAzhIpK#75a7aku_sRt6xELqZx4Rtw

Step - 5:

Programming Languages

C/C++ - (don’t need to do both … only 1 of these) [C++ recommend because it can be used for other purposes also and its has OOPs also]

C++ Programming For Beginners- From Beginner to Beyond Mega Link - https://mega.nz/folder/mHojiKDQ#3Elcoz07kRO_wHNsqGSSyg

C Programming For Beginners - Master the C Language Mega Link - https://mega.nz/folder/Hep3WCyL#edxDM0t-hLe56aXVJMb1Zg

NOTE - First learn C/c++ Language before start hacking. You can learn other languages while learning hacking at the same time/day.

Python courses are given at the bottom (you can do python now or after learning Basic ethical hacking.

SQL - Sql is one of the important languages in this field because there are many attacks. If we have good knowledge about SQL we can exploit databases with more ease.

The Ultimate MySQL Bootcamp Go from SQL Beginner to Expert: Mega Link - https://mega.nz/folder/LS4FBKwI#2JKm18_PJngL8Fc4MP7mcw

The next one is Javascript-

Javascript for Pentesters 1:

Mega Link - https://mega.nz/folder/ya5W0Lxa#Ocx3Gbtkv8PqSzzSpG6PfA

Javascript for Pentesters 2:

Mega Link - https://mega.nz/folder/ub40ARZD#TmsUGA1MK4_-lVbRvJG-QQ

Step - 6

Start Learn Hacking now (courses are arranged in order)

1 Hacking in Practice Intensive Ethical Hacking MEGA Course:

Mega Link - https://mega.nz/folder/STp0RTgI#9evucI3TuA4ovRHwIzkZjw

2 Learn Ethical Hacking From Scratch:

Mega Link - https://mega.nz/folder/uOhmlJDK#XurLsSfc4Q_2lqir8__7xQ

3 Network Hacking Continued - Intermediate to Advanced:

Mega Link - https://mega.nz/folder/rDwizT6T#cfvtFj1U5NSML8A9e9WKKg

4 Website Hacking Penetration Testing & Bug Bounty Hunting:

Mega Link - https://mega.nz/folder/rLwGFBqL#fypM_Tl6_PqMLDllXPhdhw

5 Intro to Bug Bounty Hunting and Web Application Hacking:

Mega Link - https://mega.nz/folder/HD5kFLIb#0GL5H-vCZ97egfYQDgGHOg

6 Practical Ethical Hacking - The Complete Course

Mega Link - https://mega.nz/folder/CKwkRTgD#eyLfo_HAvRIDZ7hJO_1N7w

7 Learn Python & Ethical Hacking From Scratch:

Mega Link - https://mega.nz/folder/vTgRBCBQ#-NcoMXnPAoQ1YnT7ywpwWw

8 Complete Hacking Tools in Kali Linux:

Mega Link - https://mega.nz/folder/OShBhKQa#AsIpstxQ_B3At405IbhsfA

9 The Complete Ethical Hacking Course Beginner to Advanced:

Mega Link - https://mega.nz/folder/TXpXUSbI#5vS2-RUclbt-kqRumNjyXg

10 Recon for Ethical Hacking Penetration Testing & Bug Bounty:

Mega Link - https://mega.nz/folder/CDphRCJB#eBZqSmleyW6Thld_8RbZwQ

Mega Link - https://mega.nz/folder/CDphRCJB#eBZqSmleyW6Thld_8RbZwQ

You can learn More Languages these are optional but you can try. These will improve your skills. Do not give more time to these languages (Important are C, Python, SQL, js)

1 Bash Mastery The Complete Guide to Bash Shell Scripting:

Mega Link - https://mega.nz/folder/CGBj3S5S#UT2y_zzEcV8MybIEHvhpGQ

2 Python For Pentesters:

Mega Link - https://mega.nz/folder/DCRhGKoA#wpRiRdPwtTNeK1cYXYnRQQ

3 Python 101 for Hackers:

Mega Link- https://mega.nz/folder/qLBFTaDJ#V3FjAQQdBp7flYKrrF8r3g

4Learn Python Programming Masterclass: (Its generic Python classes for programmers)

Mega Link - https://mega.nz/folder/OKJTFKqa#9txi45qrFK_OgoefYatLPw

Step - 7

Practice your skills here:

Portswigger:(Try to solve all the labs without solutions) Link - https://portswigger.net/web-security/all-labs

Pentesterlab: Solve all the free labs(want to gain more knowledge, paid is the best option) https://pentesterlab.com/exercises

Ctfchallenge: https://ctfchallenge.com/

Over the wire: Best for to understand and to learn more advanced Linux https://overthewire.org/wargames/

Tryhackme: Try to solve the free labs https://tryhackme.com/

About

it content free resources including courses that help you to learn ethical hacking for beginners to advanced

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published