How to become a Hacker? Start Here. Hacking for Beginners

For those who want to learn more about the world of Ethical Hacking, Information Security, and the techniques cyber-criminals use to breach IT infrastructures. If this is your first experience, or you need a refresher, you've come to the right place!

Starting from scratch.

One of the first questions asked by the newcomer is: where do I start?

We’ve all asked ourselves the same question, and the result has always been the same: hours and hours of useless videos, very expensive courses, and damn difficult manuals.

If you’ve already tried (and failed) it’s because you’ve gotten to the point of asking yourself, _But why don’t I get it?

You need a method.

Another piece of advice I can give you is: practice, practice, practice.

I myself read and study dozens of tutorials and books on computer science every day, yet until I take the subject matter by the horns — by getting my hands dirty — I can’t make it my own.

Have you ever tried to read an entire book on programming and not splash a line of code? Do that, then open the editor and, if you’re lucky, you’ll only be able to write the first function of void main().

It is well known that learning mechanisms rely as much on theory as on practice. Studying a solfeggio book will not make you the new Beethoven. Watching a soccer tutorial will not make you Maradona. Studying a book on Security will not make you the new Kevin Mitnick.

Hacking != Linux.

The first thing that comes to mind when we talk about Computer Security is: what the heck do I have to install Linux! In reality, no one is forcing you to use (GNU)/Linux, let alone format your home pico and smash the partition of your family’s much-loved Windows. Many “hacks” are often done serenely even from Microsoft’s OS, as well as from a macOS.

“Hacking” is a far more important activity than preferring an Operating System, and indeed it is often essential to know how to juggle all development environments. With the right skills, we could hack even operating from a toaster.

However, it is important to know that:

  • It is ubiquitous: from web hosting to bank servers, there is almost always a penguin’s hand in it (I rhymed!).
  • It is opensource: which doesn’t just mean free. And okay, you can modify it any way you want (if you are capable). But most importantly: you can trust its code.
  • It’s simple: sure, if you’ve only ever driven a car using a moped may seem complicated at first, but it doesn’t have to be any harder!

In Hacklog: Volume 1 for example, we almost always use GNU/Linux since we are dealing with Anonymity, so it is essential to have the assurance that the software being used.

In Hacklog: Volume 2 on the other hand we will use it since it is already provided (through a distribution) with all the software needed to do some targeted pentesting.

Hacking != Pull

The term pull comes from git and means:

Pull: to “pull down” from a repository (repository) code written by someone else.

The axiom of the true hacker is that code/command should not be copied, but understood.

On the comments of our videos it is not uncommon to come across phrases like, “I wrote ip link set pincopallo up” and it tells me that “pincopallo doesn’t exist! Scarsi!1!11!” Okay, too bad then underneath is a mural-sized alert that says “PUT YOUR INTERFACE ID”.

Okay, I digressed, but the bottom line is: copy-paste is useless.

Besides not really learning anything, you risk:

  • Demoralizing yourself
  • Make a mistake in performing something
  • Not learning anything (did I already say that?).

99% of the time an error emerges, it is the fault of the user who hasn’t understood a thing about what he is doing. The error, if it ever appears, is always specified. There is always something wrong and it is written in English. Sure, maybe there’s an error log a mile long, but in there in the middle, it’s always spelled out why something is wrong. Just read. Is it in English? Whatever, there are translators. READ.

Hacking != Programming

Recovering from the previous rant, here’s another big hurdle for those who want to get started in the world of IT Security. And no, you have never programmed in your life.

The good news is that you don’t need to know how to program. The bad news is that you will be a terrible “hacker,” and I’ll explain why.

Having the mindset—as well as the skills—of a programmer allows you to be more efficient in your digital raids. In particular you can:

  • Automatize: Tired of doing the same things over and over again? As a programmer you will be the puppet master of your software and can command it as you wish.
  • Bypass: much of the malware written by programmers is proprietary code and therefore harder to intercept by defense mechanisms.
  • Exploit: how can you expect to breach a piece of software, delving into its source code, if you don’t know how to program?

Clearly these are just examples, however I would like to reiterate that knowing how to program is not essential but highly recommended.

In Hacklog: Volume 2 for example, we teach violations against Web Applications. To do so, we also integrate a “Crash Course” that allows you to learn Web programming fundamentals directly from hacking sessions.

Hacking != Crime

Hacking does not mean being a cyber-criminal. Being a Hacker is not about breaking the law, get that through your head.

We at Hacklog strive to promote Ethical Hacking through two basic principles:

  • Legality: what we teach applies in controlled environments (testing machines) and do not affect, nor promote to do so, uninvolved figures.
  • Opensource: much of the project is released for free on the web.

The Hacker Manifesto 2.0 video perfectly sums up what we believe to be the true essence of hacking.

What is Hacklog?

Hacklog is a set of guides, videos and educational material completely free and opensource.

We don’t ask you for anything, not even an email address. You can subscribe to the newsletter if you want but you are totally free not to. There are no advertisements. We don’t even want your visits (analytics or otherwise), we don’t do anything with them. There are no viruses/malware/adware or other crap.

We aim to release only quality, professional, no-frills material.

Why Hacklog?

Hacklog was born in 2015 as a free project by Stefano Novelli, creator of the first free Italian course designed for those who want to embark on the path of IT Security and Ethical Hacking.

The basic idea was to create a series of videos that would tie together the enormous amount of information underlying IT Security, while providing a simple explanation suitable for anyone, whether the skilled programmer or the novice neophyte.

Over the years, Hacklog has been redesigned several times until it has taken on a highly professional form, so much so that it has been produced not only as a web series but also as a collection of volumes, distributed free of charge in .PDF format and later printed and sold at low cost.

The true essence of the Hacklog is thus this: to provide educational materials that are accessible to anyone and totally free of charge, funded by the hundreds of supporters who from time to time time to time collaborate in any amount to achieve this important milestone in the Information Security and Ethical Hacking landscape.

Start now!

If you really want to get started in earnest, you can start with one of the two training paths we offer. In any case, *good luck!

Hanno parlato di noi

Hacker Journal Logo
Lega Nerd Logo
Tom's Hardware Logo
Logo Techradar
Questo sito non utilizza cookie o sistemi di tracciamento.