The Full Roadmap to become an Ethical Hacker
Who is an Ethical Hacker ?
A hacker is an individual who uses computer, networking or other skills to overcome a technical problem. The term also may refer to anyone who uses their abilities to gain access to systems or networks in order to protect it.
Prerequisite Knowledge Required
1) Networking
Networking skills are very important in hacking field . Almost all the devices are connected to the internet. Suppose if a hacker is able to gain access to victims network then he/she can do anything thing with the victims computer.
2) Programming
Hackers are the problem solvers and tool builders, learning how to program will help you implement your own tools. It will also differentiate you from script kiddies. And Writing programs can also help you in identifying errors in applications that you are testing.
i’ve talked about the best programming languages for hackers here.
3) Databases
As most web-based software stores valuable information like users credentials in some form of databases . So when you have good knowledge of databases and languages like SQL then you will be able to secure it and will be able to counteract any databases attack.
4) Operating systems (Linux and Windows)
having good knowledge of different Operating Systems like linux and windows will help you accomplish your purpose of hacking them.
5) Cryptography
In order to become a successful ethical hacker you need to master the art of cryptography. Encryption and Decryption are important skills in hacking. Sensitive Information on internet are in encrypted form and while hacking a system, these encrypted codes need to be broken, which is called decryption.
Ethical Hacking Certifications
- CEH — (Certified Ethical Hacker)
- CHFI — (Computer Hacking and Forensic investigator)
- OSCP — (Offensive Security Certified Professional)
- OSCE — (Offensive Security Certified Certified Expert)
- OSWP — (Offensive Security Wireless Professional)
- CISM — (Certified Information Security Manager)
- CISSP — (Certified Information Systems Security Professional)
- CompTIA Security+
Best websites to learn hacking :
Some of the sites that you can try are:
- https://hacking-lab.com/index.html
- https://defendtheweb.net/
- https://www.hellboundhackers.org/
- https://www.hackthissite.org/
- https://overthewire.org/wargames/
- https://www.root-me.org/
- https://www.cybrary.it/
- https://cyberstart.com
- https://www.offensive-security.com
- https://www.pentesteracademy.com
- https://tryhackme.com
- https://hackersacademy.com
- https://www.udacity.com/school-of-cybersecurity
- https://my.ine.com/learning-paths
- https://portswigger.net/web-security
Linux distro for hacking purposes
- Kali Linux
- Parrot Security OS
- BackBox
- BlackArch Linux
- Fedora
- Tails and Qubes OS for anonymity
If you love reading books then here are some suggestions
- The Basics of Hacking and Penetration Testing
- The Hacker Playbook 2
- The Hacker Playbook 3
- Metasploit: The Penetration Tester’s Guide
- CEH Certified Ethical Hacker
- CompTIA Security+
- Hacking: The Art of Exploitation
- Penetration Testing: A Hands-On Introduction to Hacking
- The Web Application Hacker’s Handbook
- Advanced Penetration Testing
- Gray Hat Hacking The Ethical Hacker’s Handbook
Qualities you should have to be a Good Ethical Hackers:
- You should follow strong work ethic.
- You should be good at Problem Solving approach.
- You should be good at communication skills.
- You should always stay motivated.
- You should be good at cracking problems.
- You should be mentally prepared to handle the worst cases.
- You should be good at Social Engineering.
If you don’t have some of these skills you need to invest time and learn it because these soft skill will not help you just in hacking but also in your entire life
some beginners friendly courses:
1) Learn Ethical Hacking From Scratch
2) Practical Ethical Hacking — The Complete Course
3) Learn Python & Ethical Hacking From Scratch
4) Website Hacking / Penetration Testing & Bug Bounty Hunting
5) Network Hacking Continued — Intermediate to Advanced
6) The Complete Cyber Security Course
If you think is missed any point or think anything is wrong then lets me know in comments i will update it .