How to Become a Hacker


HACKING : 

"Art of finding vulnerabilities in system, apps or websites known as hacking." It is also known as Ethical Hacking, Pen Testing, Cyber Security, etc. 

Mainly there are three types of hackers:


White Hat

Black Hat

Grey Hat

Do legal hacking earn money through it. A hacker with good purpose and helpful for companies. A hacker with bad purpose
do hacking illegally with bad purpose to take revenge or to damage the companies.
Grey hat is mixture of black and white he do hacking for fun or to show off.
Hacks with written permission and prevents the hacks of the companies. Hacks without permissions and don't care about companies loss. Hacks for fun or without permissions don't wanna damage the companies .


Skills required:

  • Hacking includes penetrating the computer systems to find the vulnerabilties/bugs.
  • Working mechanism of computerts and basic use of the computers in day to day to life.
  • Basic use softwares and knowledge about them and information about OS(Opearting Systems).
  • Having basic computer skills can help an ethical hacking aspirant be a successful ethical hacker.


  • Knowlege of how the internet works. Layers of network and OSI model.
  • You have to learn what are clients, servers, ports, IP's, netmask, routers,Transmission Media, access points,
  • Shared Data and Network Interface Card, etc.
  • Having a networking skills will help to exploit servers, routers, wifi's.


  • "Programming is a process of performing specific computation, usually by designing computer programs."
  • Designing of computer programs, building website and apps. Reading and writing block of codes, giving instructions to computers using programming languages such as Python, PHP, JavaScript, Java, C, C++ etc.
  • Knowing how the to code or create programs will be helpful to know how the programs, apps, websites works and how exploit them.


  • "Cryptography is the art of writing or creating codes."
  • Plain text is converted in to secret code or it is encrypted so normal human beings can't understand it.
  • Password are stored in encrypted way, so basically you have to learn decrypting and encrypting of texts.
  • Passwords are encrypted using some hashing algorithms such as MD5, SHA-256, etc.


  • Know how the computers work.
  • Know how the computers are built and try to build it by yourself.
  • Information about Motherboard, CPU(Central Processing Unit, RAM(Random Access Memory),ROM(Read Only Memory), etc.


  • "Reverse engineering is diassembling programs or softwares to know the functionality of that program."
  • After knowing the functionality you can find some vulnerabilities in programs and you will be able exploit them.
  • Reverse engineering can be used to bypass some authentication forms.
  • By reverse engineering techniques you manipulate apps/softwares or you can paid softwares for free. But it depends on the security of that app.


  • "Linux is an open source operating system (OS) like Android, Windows. An operating system is the software that directly manages a system’s hardware and resources, like CPU, memory, and storage."
  • The OS creates communication between softwares and hardwares.
  • Use of linux is necessary for hacker because it is widely used in Web hosting, even Android is powered by linux.
  • Command Line Interface (CLI) is needed to be learned.


  • "A database is an organized collection of data,, so that it can be easily accessed and managed." organize data into tables, rows, columns.
  • Passwords and usernames and others details such as email, phone numbers are stored in Database of the website or app.
  • There are so man DBMS(Database Management System) softwares are available free on the internet, such as Mysql, Sqlite, Mongodb, Postgresql, etc.
  • After knowing how the Database works and how the data is stored in it, it will be helpful to exlpoit some Database vulnerabilities.


  • Comments

    Post a Comment