
NOW A DAYS HACKING IS REALLY GOOD PROFESSION AND YOU CAN MAKE YOUR CARRIER POWERFUL
BUT ITS NOT A VERY EASY IF YOU WANT TO START HACKING SO YOU HAVE TO GIVE MUCH MORE TIME OF IT
I HAVE FEW TIPS
SO LETS START
1. You have to learn few laguages
FIRST OF ALL LEARN C LANGUAGE ITS BASIC FOR COMPUTER HACKING
C IS POWERFUL LANGUAGE YOU UNDERSTAND HOW TO MEMORY WORK
IT IS UNIX BUILT IT
Python and Ruby are also high-level, powerful scripting languages that can be used to automate various tasks.
Perl is a reasonable choice in this field as well, while PHP is worth learning because the majority of web applications use PHP.
Bash scripting also is a must That is how to easily manipulate Unix/Linux systems—writing scripts, which will do most of the job for you.
Assembly language is must-know It is the basic language that your processor understands, and there are multiple variations of it. At the end of the day, all programs are eventually interpreted as assembly. You can't truly exploit a program if you don't know assembly.
2. NOW CHOOSE YOUR TARGET WHAT YOU WANT TO HACK
GET ALL INFORMATION OF IT
TAKE TIME DON'T DO FAST
3. USE NIX TERMINAL FOR COMMAND
Cygwin will help emulate a *nix for Windows users.
Nmap in particular uses WinPCap to run on Windows and does not require Cygwin.
However, Nmap works poorly on Windows systems due to a lack of raw sockets.
4. FIRST SECURE YOUR MACHINE
Make sure you've fully understood all common techniques to protect yourself.
Start with the basics — but make sure you have authorization to attack your target : either attack your own network, ask for written permission, or set up your own laboratory with virtual machines.
Attacking a system, no matter its content, is illegal and WILL get you in trouble.
5. TEST YOUR TARGET
Can you reach the remote system?
While you can use the ping utility (which is included in most operating systems) to see if the target is active, you can not always trust the results — it relies on the ICMP protocol, which can be easily shut off by paranoid system administrators.
6. UNDERSTAND THE OS
Run a scan of the ports, and try pof, or nmap to run a port scan.
This will show you the ports that are open on the machine, the OS, and can even tell you what type of firewall or router they are using so you can plan a course of action.
You can activate OS detection in nmap by using the -O switch.
7. FIND WAY OR OPEN PORT IN THE SYSTEM
Common ports such as FTP (21) and HTTP (80) are often well protected, and possibly only vulnerable to exploits yet to be discovered.
Try other TCP and UDP ports that may have been forgotten, such as Telnet and various UDP ports left open for LAN gaming.
Try other TCP and UDP ports that may have been forgotten, such as Telnet and various UDP ports left open for LAN gaming.
An open port 22 is usually evidence of an SSH (secure shell) service running on the target, which can sometimes be brute forced.
8. CRACK THE PASSWORD FOR ALTERNATE METHODS
Here many several methods to unlock or crack a password with using brute force.
Using brute force on a password is an effort to try every possible password contained within a pre-defined dictionary of brute force software
don't give up here try and find more methods for your brain help
You can use most hashing algorithms are weak and you can significantlly improve the cracking speed by exploiting these weaknesses (like you can cut the MD5 algorithm in 1/4, which will give huge speed boost).
Also for speed use graphics cards it make your speed to fast
You use Rainbow tablet it design for cracking password
Find more techniques by internet
9. VERY IMPORTANT STEP CREATE BACKDOOR
When you have a fully control for your target machine because when you want to come again so its your door too easily come inter again for hacking
WHEN YOU LEARNING THE HACKING DON;T HACK ANY BANK OR SECURE DETAIL BECAUSE IT WILL CRIME