BASIC NEEDS FOR
1. Learn about hardware - basicly how your computer works.
2. Learn about different types of software.
3. Learn DOS.(learn everything possible)
4. Learn how to make a few batch files.
5. Port scanning. ( download blues port scanner if it's your first time)
6. Learn a few programming languages
HTML,C++,Python,Perl.... (i'd recommend learning html as your first lang)
7. How to secure yourself (proxy,hiding ip etc)
9. TCP/Ip , UDP , DHCP ,
10. Get your hands dirty with networking
11. Learn diassembler language (its the most basic language for understanding machine language and ...view middle of the document...
An ethical hacker is sometimes called a white hat, a term that comes from old Western movies, where the "good guy" wore a white hat and the "bad guy" wore a black hat.
One of the first examples of ethical hackers at work was in the 1970s, when the United States government used groups of experts called red teams to hack its own computer systems. According to Ed Skoudis, Vice President of Security Strategy for Predictive Systems' Global Integrity consulting practice, ethical hacking has continued to grow in an otherwise lackluster IT industry, and is becoming increasingly common outside the government and technology sectors where it began. Many large companies, such as IBM, maintain employee teams of ethical hackers.
GENERAL HACHING METHOD
A typical attacker works in the following manner:
1. Identify the target system.
2. Gathering Information on the target system.
3. Finding a possible loophole in the target system.
4. Exploiting this loophole using exploit code.
5. Removing all traces from the log files and escaping without a trace.
CONCEPT OF ETHICAL HACKING
The Art of exploring various security breaches is termed as Hacking.
Computer Hackers have been around for so many years. Since the Internet became widely used in the World, We have started to hear more and more about hacking. Only a few Hackers, such as Kevin Mitnick, are well known.
In a world of Black and White, it’s easy to describe the typical Hacker. A general outline of a typical Hacker is an Antisocial, Pimple-faced Teenage boy. But the Digital world has many types of Hackers.
Hackers are human like the rest of us and are, therefore, unique individuals, so an exact profile is hard to outline.
The best broad description of Hackers is that all Hackers aren’t equal. Each Hacker has Motives, Methods and
Skills. But some general characteristics can help you understand them. Not all Hackers are Antisocial, Pimplefaced Teenagers. Regardless, Hackers are curious about Knowing new things, Brave to take steps and they are often very Sharp Minded
Hacker vs. Cracker
A Hacker is a person who is interested in the working of any computer Operating system. Most often,
Hackers are programmers. Hackers obtain advanced knowledge of operating systems and programming
languages. They may know various security holes within systems and the reasons for such holes.
Hackers constantly seek further knowledge, share what they have discovered, and they never have intentions about damaging or stealing data.
A Cracker is a person who breaks into other people systems, with malicious intentions. Crackers gain
unauthorized access, destroy important data, stop services provided by the server, or basically cause problems for their targets. Crackers can easily be identified because their actions are malicious.
The basic difference is hackers do not hacking with malicious intention I do anything disastrous.
Cracking yield more...