473,378 Members | 1,518 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,378 software developers and data experts.

How to build a career as an ethical hacker?

Hi this is Dk and I'm seeking for some great help...
If somebody could help me becoming an ethical hacker plz post related to it...
I want to know how to start my career as a hacker...
What are the basics steps i should take and which languages should i learn and for further expertise what should i do.?
I am very much comfortable with c/c++ and currently learning java advance..
plz help me.
May 8 '13 #1
2 3316
Nepomuk
3,112 Expert 2GB
OK, just to make sure: With ethical hacker you mean someone who tests the security of systems to help rather than to steal data, correct?
I myself am no expert in that field and also discussing this kind of topic is rather difficult as while you may have only the best intentions, the skills needed to be an ethical hacker can also be misused for evil (which would then go against our posting guidelines). But here's some general advice:
  • Read the jargon file. While not absolutely essential, it helps understanding the hacker culture. Some of my personal recommendations are Cracker, The Story of Mel and A Portrait of J. Random Hacker: Personality Characteristics.
  • Many security risks are connected to networks, so learn about network protocols such als ip, tcp, udp, http, ftp, smtp,... You can find a lot of information on those via the w3c sites.
  • Learn how to use UNIX/Linux as a lot of services somehow rely on these systems. I wrote a beginners article to Linux years ago, that should be a good starting point. Once you've chosen a distribution look for tutorials and articles, try creating your own problems and solving them and please, please, please: Read man pages!
  • Then continue with learning about shell programming (bash is widely used, but it's not the only one) and scripting (perl and python are both very popular and widespread). Both concepts are very important for having a deep understanding of both how the systems you will be working with function and how to manipulate them. Also, Assembler is probably a good idea.
  • Encryption is a big issue in hacking, so learn about that too. There are many different encryption methods and I must admit that I don't know much about them, but I'm sure Wikipedia can give you a good general overview and there are other resources for the more in-depth stuff.
OK, that's all I can think of off the top of my head. There are many books that may help you in becoming an ethical hacker, though which exactly would be the best for you depend on what you want to focus on. (Also, I'm no expert in that area so I'm in no position to recommend any specific books.)
May 8 '13 #2
Thank you so much for helping, as i was looking forward to such an informative reply... I will try my level best to implement the instructions.
Thank you
May 11 '13 #3

Sign in to post your reply or Sign up for a free account.

Similar topics

2
by: pancho | last post by:
Greetings, I need help configuring/building PHP3 with MySQL as a DSO on a Solaris 8 box - this module is needed to host some existing sites I will be migrating Note. I built PHP4 from source and...
3
by: serge calderara | last post by:
Dear all, I need to determine the available disk space on a certain drive for that I have used the following mngObj = "win32_logicaldisk.deviceid=""E:""" m_diskMngt = New...
18
by: Jeremy Weiss | last post by:
I'm trying to build a database that will handle the monthly billing needs of a small company. I'm charting everything out and here's what I see: table for customers sub table to track payments...
3
by: Robert Hanson | last post by:
Hi All, I have a CAD application that uses Active X controls but I also need to utilize web services so I am asking for help if I can build the Active X in C++.NET and the web service classes in...
0
by: Jeff Boes | last post by:
I'm hoping there's someone here with experience in building the Visual Explain tool from Red Hat. I downloaded it and the J2 SDK, but when I attempt to follow the build instructions, I get messages...
4
by: Shane D. | last post by:
I have tried contacting the list owner, but nobody responds so I am knowingly sending administrative mail to the list. Sorry folks. For months, particularly since February, I have been...
1
by: KraftDiner | last post by:
Could someone point me to step by step instructions on building boost python on mac os x? I have bjam running.. I have the boost source... but the tests are failing.. Probably something to do...
1
by: lipsa | last post by:
hello all, i need help from u regarding my career move.actually i hd training in .NET when i joined my company.bt right nw i m working in ASP/SQL Server.and i m enjoying it.and i feel there z lots n...
2
by: joshusdog | last post by:
The installation of Python 2.5 comes with a bunch of built-in extension modules (.pyd files) under the DLLs directory. I've downloaded the Python source code and am trying to build the debug...
1
by: RubyNovice | last post by:
User Community, I just registered on TheScripts.com and I'm looking for help building an intranet for my employer using Ruby on Rails running on RedHat Linux. I'm new to Ruby; I just purchased my...
0
by: ryjfgjl | last post by:
In our work, we often need to import Excel data into databases (such as MySQL, SQL Server, Oracle) for data analysis and processing. Usually, we use database tools like Navicat or the Excel import...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.