Professional Documents
Culture Documents
HOW
TO
LATEST HOT
H OW T O
MA C F OR H A CKE RS
How to Install iTerm2 Using the Terminal
Start App
Download
OCCUPYTHE
WEB
4 MONTHS AGO
M any of my aspiring hackers have written to me asking the same thing. "What
skills do I need to be a good hacker?"
H OW T O
Use UFONet
N E WS
A Siri 'Feature' Makes Personal Information
Accessible from a Locked iPhone
MA C F OR H A CKE RS
How to Create an Encrypted Disk Image
This is my overview list of required skills to enter the pantheon of this elite IT
profession. I've broken the skills into three categories to help you go from one rung to
PDF created w ith the PDFmyURL web to PDF API!
the other more easilyfundamental, intermediate, and intangible skillsand have
included links to related articles on Null Byte for you to get acquainted with.
H OW T O
Use a Miscon gured SUID Bit to Escalate
The Fundamental Skills Privileges & Get Root
These are the basics that every hacker should know before even trying to hack. Once
you have a good grasp on everything in this section, you can move into the
intermediary level.
computer skills. These skills go beyond the ability to create a Word document or Diceware Gives You Truly Random Yet Easy-
to-Memorize Passwords
cruise the Internet. You need to be able to use the command line in Windows, edit
the registry, and set up your networking parameters.
Software
Management
MA C F OR H A CKE RS
How to Enable Full Disk Encryption to
Protect Your Data
Many of these basic skills can be acquired in a basic computer skills course like A+.
N E WS
DHCP
NAT
Subnetting
IPv4
MA C F OR H A CKE RS
IPv6 How to Get Your Mac Ready for Hacking
Public v Private IP
DNS
Routers and switches
VLANs
OSI model
MAC addressing
ARP
N E WS
Mirai Botnet Source Release Threatens
As we are often exploiting these technologies, the better you understand how they Increased DDoS Attacks from Smart Home
work, the more successful you will be. Note that I did not write the two guides Devices
below, but they are very informative and cover some of the networking basics
mentioned above.
3 Linux Skills N E WS
Hello to the Null Byte Community!
It is extremely critical to develop Linux skills to become a hacker. Nearly all the tools
we use as a hacker are developed for Linux and Linux gives us capabilities that we
If you need to improve your Linux skills, or you're just getting started with Linux,
check out my Linux series for beginners below.
N E WS
Linux Basics for the Aspiring Hacker The Cheap USB Kill Stick That Destroys Any
Computer You Want
Start App
Download
N E WS
Samy's MagSpoof Hacking Device Was Just
Featured on Mr. Robot
4 Wireshark or Tcpdump
Wireshark is the most widely used sni er/protocol analyzer, while tcpdump is a
command line sni er/protocol analyzer. Both can be extraordinarily useful in
analyzing TCP/IP tra c and attacks. H OW T O
Disable WPAD on Your PC So Your HTTPS
Tra c Won't Be Vulnerable to the Latest SSL
An Intro to Wireshark and the OSI Model
Attack
Wireshark Filters for Wiretappers
5 Virtualization
You need to become pro cient in using one of the virtualization software packages
PDF created w ith the PDFmyURL web to PDF API!
such as VirtualBox or VMWare Workstation. Ideally, you need a safe environment to
practice your hacks before you take them out in real world. A virtual environment
provides you a safe environment to test and re ne your hacks before going live with N E WS
7 Wireless Technologies
In order to be able to hack wireless, you must rst understand how it works. Things
like the encryption algorithms (WEP, WPA, WPA2), the four-way handshake, and
H OW T O
WPS. In addition, understanding such as things as the protocol for connection and VBScript for DDosing Sites
authentication and the legal constraints on wireless technologies.
To get started, check out my guide below on getting started with wireless terms and
technologies, then read our collection of Wi-Fi hacking guides for further information
on each kind of encryption algorithms and for examples of how each hack works.
H OW T O
Kick People O Your Internet
ALL FEATURES
ALL FEATURES
The Intermediate Skills
2016 WonderHowTo, Inc
This is where things get interesting, and where you really start to get a feel for your
capabilities as a hacker. Knowing all of these will allow you to advance to more
intuitive hacks where you are calling all the shotsnot some other hacker.
8 Scripting
Without scripting skills, the hacker will be relegated to using other hackers' tools.
This limits your e ectiveness. Every day a new tool is in existence loses e ectiveness
as security admins come up with defenses.
To develop your own unique tools, you will need to become pro cient at least in one
of the scripting languages including the BASH shell. These should include one of Perl,
Python, or Ruby.
9 Database Skills
If you want to be able to pro ciently hack databases, you will need to understand
databases and how they work. This includes the SQL language. I would also
recommend the mastery of one of the major DBMS's such SQL Server, Oracle, or
MySQL.
The Terms & Technologies You Need to Know Before Getting Started
Hunting for Microsoft's SQL Server
Cracking SQL Server Passwords & Owning the Server
Hacking MySQL Online Databases with Sqlmap
Extracting Data from Online Databases Using Sqlmap
11 Forensics
To become good hacker, you must not be caught! You can't become a pro hacker
sitting in a prison cell for 5 years. The more you know about digital forensics, the
better you can become at avoiding and evading detection.
12 Advanced TCP/IP
The beginner hacker must understand TCP/IP basics, but to rise to the intermediate
level, you must understand in intimate details the TCP/IP protocol stack and elds.
These include how each of the elds ( ags, window, df, tos, seq, ack, etc.) in both
the TCP and IP packet can be manipulated and used against the victim system to
enable MitM attacks, among other things.
14 Reverse Engineering
Reverse engineering enables you to open a piece of malware and re-build it with
additional features and capabilities. Just like in software engineering, no one builds a
new application from scratch. Nearly every new exploit or malware uses
components from other existing malware.
In addition, reverse engineering enables the hacker to take an existing exploit and
change its signature so that it can y past IDS and AV detection.
15 Think Creatively
There is ALWAYS a way to hack a system and many ways to accomplish it. A good
hacker can think creatively of multiple approaches to the same hack.
16 Problem-Solving Skills
A hacker is always coming up against seemingly unsolvable problems. This requires
that the hacker be accustomed to thinking analytically and solving problems. This
often demands that the hacker diagnose accurately what is wrong and then break
the problem down into separate components. This is one of those abilities that comes
with many hours of practice.
17 Persistence
A hacker must be persistent. If you fail at rst, try again. If that fails, come up with a
new approach and try again. It is only with a persistence that you will be able to
hack the most secured systems.
I hope this gives you some guidelines as to what one needs to study and master to
ascend to the intermediate level of hacking. In a future article, I'll discuss what you
need to master to ascend into the advanced or master hacker level, so keep coming
back, my novice hackers!
Related
68 Comments
BAGI
2 YEARS AGO
24
It's epic, that someone with skills like you, makes tutorials for beginers just for good karma and
"thank you".
REPLY
OCCUPYTHEWEB
2 YEARS AGO
13
I'm glad you appreciate it.
REPLY
VICTOR DIAZ
8 MONTHS AGO 1
beyond awesomeness!!!! you sr absolutely ROCK!!!!
PDF created w ith the PDFmyURL web to PDF API! REPLY
REPLY
BLACKCAT
2 YEARS AGO 2
Great! Thanks otw
Can you make a tutorial about hacking pc games?
Like if i want to get a lot of money in a Facebook game.
Please
REPLY
XARKES
2 YEARS AGO 1
In my mind doing what you want means hacking Facebook databases. Facebook is one of the
most visited sites, which means it's one of the most securised. I would say it is impossible
(that's not impossible but I think there are not many people who can do this)
REPLY
VICTOR DIAZ
8 MONTHS AGO 1
Or whom want the whole FBI behind their backs because a stupid game, right?
REPLY
JON MASTERS
2 YEARS AGO - EDITED 2 YEARS AGO 2
Thank you OWT, excellent article.
If a student does not know where he is at how can he know where to go. I like that you even
broke it down to "when" you could feel con dent to hack.
PDF created w ith the PDFmyURL web to PDF API!
Oh I do want to add, a bit of knowledge of the law. And How to become totally anonymous.
REPLY
EVIL GENIOUS
2 YEARS AGO 1
OTW
EVIL GENIOUS
REPLY
BELLO OLAMILEKAN
2 YEARS AGO 2
waoh good one
REPLY
BLACKCAT
2 YEARS AGO 1
OTW
i know this not is a quistion to the "guide."
When i need some help from the master in IT, i have been banned in a facebook game "war
commander" how can i unban myself again?
REPLY
Dude just..........
srry if im rude, but thats stupid question.......
1) dont think that kali linux is developed to make cheat engines in games. its a penetration
testing system...
2) youre talking about Facebook... You cant just hack one of the biggest websites in the world.......
I dont even think that Anonymous could do that...
4) you can make a script that tries to hack facebook on windows. You dont even need kali
linux.... And at last im pretty sure it will work just as "well" #impossible
REPLY
BLACKCAT
2 YEARS AGO 1
what? It was a quistion to you occupytheweb "IT master."
did you know how to unban people that had been banned from games?
Thanks :)
REPLY
JON MASTERS
2 YEARS AGO 2
PDF created w ith the PDFmyURL web to PDF API!
He is trying to say. Yes it could be done, but it's facebook, there are thousands of hackers trying
to hack them to get the bounty that facebook o ers. So odds of you at your skill level. You see
what I mean right?
REPLY
OCCUPYTHEWEB
2 YEARS AGO 1
Good luck !
REPLY
AHMAD AHMAD
2 YEARS AGO 1
nice post
thx for the info
REPLY
ANDRE CAMPOS
2 YEARS AGO 1
Amazing post, i loved it. I've been reading your tutorials for a while now and they`re great. I
came here to congratulate you and ask for a post about ways of getting ip addresses over the
internet, i mostly nd blogs talking about sites that provide this kind of service.
REPLY
OCCUPYTHEWEB
2 YEARS AGO 1
Thanks Andre! Glad you enjoyed this post!
REPLY
ANDRE CAMPOS
2 YEARS AGO 1
I would like to know if there`s a way to monitor tra c in a website to get the visitor ip or how i
can get someone ip after establishing a connection with that person (document transference).
I`ve seen some cases of people who got ips trough forums but i dont know if this is possible
without the use of websites like iplogger.
REPLY
OCCUPYTHEWEB
2 YEARS AGO - EDITED 2 YEARS AGO 2
Any sni er on the site will give you the IP. Also, tools such as pof will give you the IP , the OS
and the browser. Check out my article on pof 3.0.
OTW
REPLY
SHAYAN MALIK
2 YEARS AGO 1
Man you are greate
REPLY
OCCUPYTHEWEB
2 YEARS AGO 1
Thanks Shayan and welcome to Null Byte!
SAID ALIR
2 YEARS AGO 1
It's probably the most intresting topic that I've ever read. Thanks a lot.
REPLY
GLANTUR
2 YEARS AGO 1
Isn't languages like PHP or C++ required as well as the script languages? I'm learning them
along side the internet security subjects.
REPLY
OCCUPYTHEWEB
2 YEARS AGO 1
Glantur:
Every language you learn will be useful to you as a hacker. Generally, hackers write scripts to
do repetitive tasks such as scanning, etc. so scripting languages are essential. Other languages
are great, but necessary.
OTW
REPLY
DRACULA MADCOBRA
2 YEARS AGO 1
i have quick Question for you buddy....IS THERE A WAY OF BYPASSING IOS ACTIVATION
SCREEN USING THIS GREAT TOOL OF OUR KALI LINUX?
REPLY
BALTHASAR COWVLAAI
2 YEARS AGO 1
I just created an account especially to say 'thank you' to you for all your articles I've read sofar.
You have special skills in explaining tech stu so not-tech people easily understand it: chapeau
:-)
REPLY
VINAY TEKI
2 YEARS AGO 1
Great page Mr.OTW it'll help me if u give a link to learn the basics of "registry" and "setting up
network parameters "
REPLY
OCCUPYTHEWEB
2 YEARS AGO 1
Vinay:
I'll be doing an article on using the registry for forensic purposes soon. I'm not certain what you
mean by setting up network parameters?
OTW
REPLY
PDF created w ith the PDFmyURL web to PDF API!
GREENLEMON
2 YEARS AGO 1
I was just wondering if you can make all your tutorials here compiled in one le so that we can
download it for o ine readings. Then for inquiries, we could just ask questions directly to your
posts
REPLY
OCCUPYTHEWEB
2 YEARS AGO 1
The answer is simple to that question, "No".
wonderhowto.com is supported by the ads you see on this and other pages. If you didn't have to
come to the website, wonderhowto.com would not be able to generate any income and would
soon be gone. In fact, I encourage you click on the ads on this and all pages here to help keep
this forum going.
REPLY
GREENLEMON
2 YEARS AGO 1
Oh. haha. it just pops out my mind. ok, sure! thanks for the response.
REPLY
CYBERHITCHHIKER
2 YEARS AGO 1
I myself hate ads but ads pay server pool bills, ads are a necessary evil. Besides that is a tall
order to ask for. =-)
REPLY
DRAKYLLA
2 YEARS AGO 1
i've been looking for this for 3 years.
thank you
REPLY
M. S. ABRAHAM
2 YEARS AGO 1
You must really be appreciated for this tutorial. Thank you very much!!
REPLY
CYBERHITCHHIKER
2 YEARS AGO 1
I appreciate the e ort he puts into his work. I appreciate people who want to learn and/or teach.
REPLY
ELDORADOSAM
2 YEARS AGO 1
Captain OTW, You never disappoint on your work...great job as usual!! thank you for once again
inspiring me to work harder...your direction is key to unlocking so much knowledge. hard to
keep up at times but with great work like this, it helps to create a strong foundation... thanks
again
D4RK3CH0
2 YEARS AGO 1
Thanks a lot for this great info. I'm new to this so i have a long way to go. Concerning the Linux
part, what Linux distribution has your preference? As I'm going to need to learn the OS, i want
to use the correct one o course. And i know there is no "best" one but maybe you have a
prefered one. Thanks a lot again.
REPLY
CYBERHITCHHIKER
2 YEARS AGO 2
Greetings, If it were me..
TCP/IP: like a second language before I learn any OS.
http://www.redbooks.ibm.com/redbooks/pdfs/gg243376.pdf
REPLY
OCCUPYTHEWEB
2 YEARS AGO 1
Of course, spend your time learning Linux. Since Kali is built on Debian, focus your e orts
there.
REPLY
D4RK3CH0
2 YEARS AGO 1
Thanks CyberHitchiker en OWT. I'll look in to it
BLACKCAT
2 YEARS AGO 1
otw
do you know how to hack/cheat in games?
can i do that with kali?
exampel if i could hack money in a game with kali.
REPLY
OCCUPYTHEWEB
2 YEARS AGO 1
Newbie:
Everything is hackable!
Hacks are dependent on aws in the application or operating system generally. Every piece of
software has a aw. You can't generalize and say that one hack works on all games. It is speci c
to the game.
The more important question is "Do you want to risk a prison term to win a game?"
OTW
REPLY
VIVEK ANAND
1 YEAR AGO 1
hey occupyt heweb
i am new to hacking and dont have even a slightest idea of how to proceed.
can you help me on how to become the best coder there is.
PDF created w ith the PDFmyURL web to PDF API!
i dont know which language will be best suited for me.
please help ,i would really appreciate.
REPLY
OCCUPYTHEWEB
1 YEAR AGO 1
Vivek:
If you are new hacking, start with my article "Hacking for Newbies". I also recently wrote an
article, "How to Train to be an IT Security Professional/Ethical Hacker".
OTW
REPLY
Cisco!
REPLY
CYBERHITCHHIKER
1 YEAR AGO 1
Cisco the drink?
REPLY
I would like to engage the services of a hacker..
REPLY
IT SAVVY
1 YEAR AGO - EDITED 1 YEAR AGO 1
Hi Null..
I intend to be one of the best and nest hacker....and ofcourse play white hat and earn huge
money but with respect ......
hence forth i delve in google and run down my eyes on numerous sites ......after protracted
amount of dense research i swear yours is best..HATSSS OFF FOR YOU....! ! !
I have saved all your suggestions and started working on the same with extreme serious
mood..... i wanna be your student....kindly can you lend your hand in reaching apex level in
hacking.....
I request you in earnest manner in letting me know as to how to hold your hand ....
Awaiting revert.
Thanks.
IT SAVVY.
REPLY
CYBERHITCHHIKER
1 YEAR AGO 1
Greetings and welcome. Can you write a NOP sled? Maybe someone might take you under their
REPLY
MAYANK KAMBOJ
1 YEAR AGO 1
Good one!!
REPLY
DAVID'STAR
1 YEAR AGO 1
This post is so inspiring.. like the rst CHAPTER of the Bible.
REPLY
IT SAVVY
1 YEAR AGO - EDITED 1 YEAR AGO 1
Dear Cyberhit Chhiker/OTW and Team,
Seasonal Greetings!!!
Firstly I tender heartfelt apologies for exercising delay in reverting to message.Reason being my
absence in country and was clutched with relieving formalities and serving notice period to
pack up from existing company and job.
I express sincere thanks to Cyberhit Chhiker for paying heed to my concern.I appreciate the
same and shall remain thankful for such supportive shoulders.
I deeply regret that I am lacking the hand of expertise of NOP sled.Presently I am a beginner
and focusing on laying strong foundation as guided by our experts step by step in article above.
The only area which I lack is programming.I am not good at this area at all hence I request you
to kindly assist me as to how to tackle.
Suggestions , advices , tips to focus any speci c area and guidance are highly appreciated and
shall be paid heed upon.I shall remain thankful in advance for the same.
REPLY
MARSHALL STONE
1 YEAR AGO 1
This is a very nice article thank you. Thinking about getting my CISSP license.
REPLY
OCCUPY4ELES
1 YEAR AGO 1
sooooooo helpful. thank you OTW!
REPLY
DIPU MONDAL
1 YEAR AGO 1
I have already started networking what are required. But every lesson is huge and full of
information. Each and every protocol has signi cance meaning. Should I make those :
DHCP
NAT
PDF created w ith the PDFmyURL web to PDF API!
Subnetting
IPv4
IPv6
Public v Private IP
DNS
Routers and switches
VLANs
OSI model
MAC addressing
ARP
REPLY
SEBASTIAN OPIYO
1 YEAR AGO 1
great job, really inspiring and focusing article....kudos!
REPLY
ABBAS KHAN
10 MONTHS AGO 1
your a hacker and i like you very much......umhhaaa....
REPLY
FERNANDO
10 MONTHS AGO 1
Perfect thanks !!!
REPLY
I think if you want to achieve these skills, you have to leave the real world and spend 24/24 of
your day time on computer, because these skills take time to build.. or maybe just forget it
hahaha
REPLY
OCCUPYTHEWEB
8 MONTHS AGO 1
Not at all! You just need to be disciplined about your study. Work at it every day and soon it will
become second nature.
You are right, though, this will not come overnight. You need to give yourself time. Nothing
worthwhile come easy.
REPLY
DARK KNIGHT
8 MONTHS AGO 1
As a beginner which course should i take CCNA or Network+?
REPLY
OCCUPYTHEWEB
8 MONTHS AGO 1
Start with Net+ and then go to CCNA.
REPLY
DARK KNIGHT
PDF created w ith the PDFmyURL web to PDF API!
DARK KNIGHT
8 MONTHS AGO 1
what are cons and pros of both of those course?
REPLY
TROL LING
6 MONTHS AGO 1
nice :)
REPLY
HRIDAYESH SHARMA
4 MONTHS AGO 1
Well you share a great piece of information.
Wonderful guide for beginners.
REPLY
RE_BOOT
4 MONTHS AGO 1
A fantastic guide for People who really want to get into the feild
REPLY
IHACKU_
4 MONTHS AGO 1
I'm old school hacker...no toolkits but from scratch. Been trapped the past 17 years in coma.
Trying Kali for the rst time. I typed msfconsole and it's saying to follow the white rabbit.
What??? Great tutorials though! Thanks!
MARKO CIRICA
19 HOURS AGO 1
How many years of studdying would you say it would take an avrege person to master all these
things you just listed?
REPLY
YOU
LOGIN TO COMMENT
F E AT U R E D O N W O N D E R H O W T O
NEXT