Hacking is an interesting field but it is not easy. To become a hacker one has to have an attitude and curiosity of learning and adapting new skills. You must have a deep knowledge of computer systems, programming languages and operating systems. In this article you will learning how to hack; the basics, advanced hacking and preparations before you hack.

Some people think that a hacking is always a unethical activity but they are wrong. Actually many big companies hire hackers to protect their systems and information and are highly paid.

Firstly you should know who a hacker actually is and what he does. You would have seen in movies some hackers with black terminals just enter few keywords and green fonts going up. Trust me most of the hacking scenes in movies are opposite of what actually hacking looks like. It requires a lot of dedication hours of code and research to hack.

What does Hacking mean?

There are many definitions of hacking. In this article, we will define hacking as identifying weakness in computer systems and/or networks and exploiting the weaknesses to gain access. An example of hacking is using by passing the login algorithm to gain access to a system. A hacker is a person who finds and exploits weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security.

And according to Google..

– advanced hacking

Just like there are good and bad guys in the real world with different shades of their personality, the types of hackers vary by their agenda, methodologies and skill practice.

If you wish to learn about the various types of hackers in the online world and burst the Hollywood image of a hacker in your mind, keep reading on…

Types of Hackers

A 15-year-old boy sits behind a glowing black monitor, typing furiously. The green text streams across his screen like a waterfall. His nervousness escalates dramatically as he sends rapid-fire commands to the strained computer. Suddenly, he lets out a triumphant laugh and proceeds to steal money.

Such is the stereotypical view of a hacker. Yet, there’s so much more to this fine art than Hollywood or the media describes. Hackers are varied creatures and include these types:

  1. Script Kiddie – Script Kiddies normally don’t care about hacking (if they did, they’d be Green Hats.). They copy code and use it for SQLi or something else. Script Kiddies will never hack for themselves; they’ll just download overused software and watch a YouTube video on how to use it.
  2. White Hat – Also known as ethical hackers, this type of hackers are considered the good guys of the hacker world. Most White Hat hackers hold a college degree in IT security or computer science and must be certified to pursue a career in hacking.
  3. Black Hat – These are the men and women you hear about in the news. They find banks or other companies with weak security and steal money or credit card information.
  4. Gray Hat – Gray Hat hackers don’t steal money or information (although, sometimes they deface a website or two), yet they don’t help people for good (but, they could if they wanted to).
  5. Green Hat – Unlike Script Kiddies, they care about hacking and strive to become full-blown hackers. They’re often flamed by the hacker community for asking many basic questions. When their questions are answered, they’ll listen with the intent and curiosity of a child listening to family stories.
  6. Red Hat – They’re like White Hats in that they halt Black Hats, but these folks are downright SCARY to those who have ever tried so much as PenTest. Instead of reporting the malicious hacker, they shut him/her down by uploading viruses, DoSing and accessing his/her computer to destroy it from the inside out.
  7. Blue Hat – Blue Hat hackers will seek vengeance on those who’ve them angry. Most Blue Hats are “n00bz”, but like the Script Kiddies, they have no desire to learn.

Where to Begin?

– advanced hacking

If you wish to learn how to hack you have to run a UNIX-like OS, such as Linux. UNIX and UNIX-like operating systems are the operating systems of the Internet. While you can learn to use the Internet without knowing UNIX, you can’t be an Internet hacker without understanding UNIX. For this reason, the hacker culture today is pretty strongly UNIX-centered. There are many types of UNIX-like operating systems, the most popular being Linux.

There are other UNIX-like operating systems besides Linux, such as the *BSD systems. The most popular *BSD systems are FreeBSD, NetBSD, OpenBSD and DragonFly BSD. All are open source just like Linux. However, it’s important to remember that they are BSD and not Linux.

It is probably a good idea to use a good starting platform such as Backtrack 5 R3, Kali or Ubuntu 12.04LTS.

Learn HTML

The reason behind learning HTML is that each and everything that you see and use on the internet is nothing but code. For Example: when you hold Ctrl and press the button “U” on your keyboard you will see a combination of HTML, CSS and Javascript code.

– advanced hacking

HTML and CSS are the most basic and primary languages you will see in every website… when you visit your favourite sites like Facebook, Twitter, Instagram, etc.

You can write HTML in a basic word processing program like Notepad or Simple text and save your files as “yourCoolFileName.HTML” so you can upload them to a browser and see your work translated.

Before you start writing poems, you have to learn basic grammar. Before you break the rules, you have to learn the rules. If your goal is to become a hacker, you’re going to need more than basic English to write your masterpiece. Here is a list of some programming language you can start with:

  1. HTML5 (Somewhat Easy)
  2. CSS3 (Somewhat Easy)
  3. JavaScript (Somewhat Easy – Average)
  4. PHP (Somewhat Average – Hard)
  5. mySQL (Somewhat Average – Hard)

Think creatively

– advanced hacking

Hackers are like artists, philosophers, and engineers all rolled up into one. Creative brains are a valuable, limited resource. They shouldn’t be wasted on re-inventing the wheel when there are so many fascinating new problems waiting out there.

To learn hacking, you have to believe that the thinking time of other hackers is precious — so much so that it’s almost a moral duty for you to share information, solve problems and then give the solutions away just so other hackers can solve new problems instead of having to perpetually re-address old ones.

You don’t have to believe that you’re obligated to give all your creative product away, though the hackers that do are the ones that get most respect from other hackers. It’s consistent with hacker values to sell enough of it to keep you in food and rent and computers.

Solve Problems

– advanced hacking

Successful athletes get their motivation from a kind of physical delight in making their bodies perform, in pushing themselves past their own physical limits. Similarly, to be a hacker you have to get a basic thrill from solving problems, sharpening your skills, and exercising your intelligence.

You also have to develop a kind of faith in your own learning capacity — a belief that even though you may not know all of what you need to solve a problem, if you tackle just a piece of it and learn from that, you’ll learn enough to solve the next piece.

No problem should ever have to be solved twice. Think of it as a community in which the time of everyone is hackers is precious. Hackers believe sharing information is a moral responsibility. When you solve problems, make the information public to help everyone solve the same issue.

  • Read older pieces, such as the “Jargon File” or “Hacker Manifesto” by The Mentor. They may be out of date regarding technical issues, but the attitude and spirit are just as timely.

Fight for Freedom

– advanced hacking

Anyone who can give you orders can stop you from solving whatever problem you’re being fascinated by — and, given the way authoritarian minds work, will generally find some appallingly stupid reason to do so. So the authoritarian attitude has to be fought wherever you find it, lest it smother you and other hackers.

The enemy of the hacker is boredom, drudgery, and authoritarian figures who use censorship and secrecy to strangle the freedom of information. Embracing hacking as a way of life is to reject so-called “normal” concepts of work and property, choosing instead to fight for equality and common knowledge.

If you think you are safe from government hacking, think again. The U.S. National Security Agency used a hack of Google’s data centers to spy on the Gmail messages of peaceful pro-democracy activists in New Zealand who were campaigning against the military regime of the island nation of Fiji.

Be Competent

– advanced hacking

You have to learn to distrust attitude and respect competence of every kind. Hackers won’t let posers waste their time, but they worship competence — especially competence at hacking, but competence at anything is valued. Competence at demanding skills that few can master is especially good, and competence at demanding skills that involve mental acuteness, craft, and concentration is best.

Anyone on Reddit can write up a ridiculous cyberpunk username and pose as a hacker. But the Internet is a great equaliser and values competence over ego and posture. Spend time working on your craft and not your image, and you’ll more quickly gain respect than modelling yourself on the superficial things we think of “hacking” in popular culture.

Have something to say about this article? Comment below or share it with us on Facebook, Twitter or our LinkedIn Group.