description |
---|
How to enter the Security field or more appropriately How to start "Hacking" |
{% hint style="info" %} If you're reading this and don't understand a term or an acronym try your best to google it, coz there will be a lot of googling when you get into security. {% endhint %}
Everyone asks for prerequisites when starting in Security, so let's get to it first.
No matter how much you avoid it you'll end up writing scripts, it may either be modifying existing scripting tools or making your own. But as you are just starting you won't be doing it that much at the beginning.
But the ability to read code will be very helpful at the start, you should also be able to adapt to different programming languages. The major ones I would recommend you to look over would be Python, Ruby, Bash, C/C++
, in no way I mean to become an expert in these languages before you start, but have a basic understanding of how they work. The amount of code you'll be looking at for exploits and vulnerabilities while pentesting, you'll pretty much learn it from there. If you're willing to learn from tutorials, any YouTube channel that you can understand the best is more than enough because they all explain most of the same things but in different ways.
To be frank, any Linux Distro will do the job, Kali gets all the tools required for pentesting pre-installed which makes it a bit easier. For starters try Ubuntu and get familiar with it.
You can use windows for pentesting, but it's hard to use some tools so I would recommend either using WSL(Windows Subsystem for Linux) or a VM(Virtual machine). If you're feeling adventurous you can dual-boot your system but I highly recommend not to do it without someone to help you with it.
As for me, I use Kali Linux as my main machine which is a pretty dumb move from my side but I invested too much time in it now to switch.
You need to know the basics of it and most terms and what they mean. You can try and learn it from different books or try to learn it from pentesting writeups.
For books, I would recommend Comptia Network+ but it gets a bit boring without any practical application, so I would recommend learning it through pentesting. When I say pentesting I don't mean real-world pentesting but in solving machines and challenges in practice sites.
{% hint style="info" %} What is a CTF? {% endhint %}
Hacking is much more than "I'm in" but sometimes it boils down to it 😋 . It's a really vast field with different topics and these topics are inter-connected with each other in more than one way, So it's pretty hard to isolate each topic and learn it as they almost always go hand-in-hand. You can read about the major topics you would find in CTF's and pentests below.
{% tabs %} {% tab title=" Crypto" %}
I don't think I need to explain this, it's encrypting stuff but oh boy believe me when I say it's pretty hard and interesting. There's a ton of things you can actually encrypt not just text and in so many different and amazing ways.
I couldn't find a good site fully dedicated to this but CyberChef is a good site for cryptography in CTF's.
The math may be a bit scary at first but the understanding of basic principles used to implement it will help you crack it. {% endtab %}
{% tab title="Rev Eng" %}
This is about converting compiled/machine code back to a more human-readable format to understand the functionality of a given program and if possible find ways to exploit it.
It mostly includes Assembly/Machine code, compiled C programs. There are specific tools you use to achieve this, don't worry you don't have to do it manually. These tools will help you in a lot more other things than just Reverse Engineering.
RevEng101 is a site by MalwareUnicorn, explore other parts of her site too for more Reverse Engineering stuff. {% endtab %}
{% tab title="Forensics" %}
It is recovering the digital trail left on a computer for finding clues of a footprint left by a malicious hacker or someone who tried to seemingly delete data or send it somewhere else.
It includes file format analysis, steganography, memory dump analysis, or network packet capture analysis. It's not exactly hacking but chasing after the hacker or searching for clues to hack something.
There's not much of a good site I would recommend dedicated to this, explore different challenges and problems in CTF's to understand the wide range covered in this. {% endtab %}
{% tab title="OSINT" %}
OSINT refers to gathering data and information through publicly available sources(like googling, yup that is also considered as OSINT). Don't underestimate it just because it is gathering information, a lot of companies and people tend to leave a lot of information publicly than they think and information is power in hacking.
It is pretty important while conducting a real-world pentest to properly plan out attack strategies and also in CTF's.
Trace Labs is a site dedicated to helping people in real life using OSINT. {% endtab %}
{% tab title="Web" %}
It is exactly what it sounds like, exploiting websites or applications on the internet. These are pretty common in the real world and have bug bounty programs hosted to find vulnerabilities.
Web Security Academy is a site fully dedicated to learning Web Exploitation.
Some pretty big bug bounty platforms
- Bugcrowd
- HackerOne
- Intigriti
- Synack (This one is exclusive but covers more than just web exploitation)
Some companies have their own private bug bounty programs on their sites, you can check them out directly too. {% endtab %}
{% tab title="Pwn" %}
This is a pretty broad topic which in short can be explained as finding a vulnerability in a program and exploiting it. It includes Buffer overflows, Heap exploitation, Stack smashing and a lot more. It is to have full control of how a program/system works in short pwning(owning) it.
pwnable.kr is a site fully dedicated to this.
Interesting Fact: It is called pwning instead of owning because of a typo made by a game developer in WarCraft and it stuck. {% endtab %} {% endtabs %}
I didn't mention Hardware, Mobile and IoT, coz I didn't do much of anything over there.
It's short for Penetration Testing. It includes more or less of everything mentioned above and a little bit more. It doesn't fully focus on one single topic, different machines and labs choose to focus on different kinds of vulnerabilities and exploits of different software and systems to replicate the diversity of vulnerabilities you may find in real life.
-
You can learn a lot of basic to intermediate stuff here from Linux to Web Application Security
-
This is the most beginner-friendly site, it has a lot of resources to learn from and experiment on legally.
-
This contains archives of previous picoCTF's, you can practice them it's very helpful when trying to test your basic knowledge. They also hold yearly CTF's in Feb-Mar.
-
This is not exactly a site for hacking but you can practice your scripting skills in different languages, it also contains some cryptography challenges.
-
This one's a pretty hardcore site, I would highly suggest beginners steer clear of this site until you think you're at least an intermediate level coz the challenges are pretty hard for beginners and don't wanna chase you away with it (at least that's what I feel).
-
This one is purely penetration testing and has very good and interesting machines.
-
This website is not exactly a site for practice but keeps track of all ongoing live CTF's so that you can participate in them at your convenience.
When practicing in any of the above sites do not hesitate to look at solutions because you're in the learning phase, you don't know a lot of stuff in the beginning, learn from the solutions and note them down.
Twitter, Reddit, and YouTube play a huge role in keeping up with everything going on currently in the community. LinkedIn is a bit stagnant but it's pretty helpful in following what the security companies are doing.
Keeping up in this community is pretty vital so make sure you're up-to-date with whatever is going on.
Here are some profiles you can follow to start, you can find other good ones through their retweets and mentions.
{% tabs %} {% tab title="Youtube" %}
- John Hammond
- LiveOverflow
- InsiderPhd
- Stok Frederik
- HackerSploit
- ippsec
- Nahamsec
- DEFCONconference
- The Linux Foundation {% endtab %}
{% tab title="Twitter" %}
- Pawan Sohlot
- CybersecMeg
- PwnFunction
- Kevin Beaumont
- oooverflow
- TheCyberMentor {% endtab %}
{% tab title="LinkedIn" %}
- CloudSEK
- Intigriti
- FireEye
- OWASP Foundation
- Offensive Security
- Synack
- CrowdStrike {% endtab %}
{% tab title="Reddit" %}
- r/netsec
- r/cybersecurity
- r/hacking
- r/bugbounty
- r/SecurityCreators
- r/oscp
- r/securityCTF
- r/Defcon {% endtab %} {% endtabs %}
I tried not to repeat people from YouTube on Twitter so that I can mention more people. Do follow their YouTube, Twitter, and LinkedIn, coz remember this always More Information is always Good
.
A lot of Certification exams you apply for come bundled with a course. There aren't many good courses out there either most of them either feel like scams or are scams.
The courses I would recommend are pretty few, rather than courses I would recommend reading blogs and articles, GitHub repos will be a real huge help if you're looking for some course-like modeled content.
Here are some good GitHub repos and courses I followed/took.
{% tabs %} {% tab title="Courses" %}
- From TheCyberMentor
- From Tib3rius (do not take as a complete beginner)
- Windows Privilege Escalation
- Linux Privilege Escalation {% endtab %}
{% tab title="GitHub Repos" %}
- Bugcrowd University
- Nahamsec Resources
- TrailofBits
- Awesome-pentest {% endtab %} {% endtabs %}
{% hint style="warning" %} Do not just watch the courses or only study from guides, use it practically on the practice sites simultaneously as you're learning them. {% endhint %}
Security certifications are really expensive so you have to be pretty careful and well prepared while taking them. They range from $199 - you can't even afford them, so be careful when you choose what to get certified for.
The Offensive Security certifications are quite good and are respected in the community, elearnsecurity ones are really good too. This is how I would recommend you to go through for certifications.
I highly suggest not to take the OSCP until you've explored at least 2 years in this field.
Use this OSCP prep guide if you're preparing for eJPT, eCPPTv2, and OSCP. After OSCP you'll be in this field for enough time to know what to do next.
{% hint style="danger" %} Do not waste money on certifications that are valid for only 2-3 years or ones with MCQs. Apply for ones that have a practical exam. {% endhint %}
First and foremost I would tell you to read the Hacker Manifesto and then start the journey.
Before diving in, get familiar with common terms and tools used, through HackerSploit and Hacksplaining. Watch some videos of JohnHammond and LiveOverflow and then dive into the practice sites mentioned above.
Definitely watch this video of LiveOverflow where he explains why there is no set path in learning about hacking. Everything you do, everything you stumble upon will factor in the larger picture.
You'll be navigating through a lot of Linux systems because even though it's not a very widely used desktop OS, 95% of the web use some kind of Linux OS for their servers.
So get yourself as familiar as possible with Linux, it'll be pretty different from windows at the start and a bit annoying and hard to use for someone who never used it but trust me you'll start loving and enjoying it more than windows unless you're a hardcore gamer (steam is trying to make gaming possible for Linux gonna take some time tho).
Try to practice daily in TryHackMe because if you lose touch it's gonna be pretty bad in a beginner phase, be as consecutive as possible.
After getting familiar with most of the TryHackMe labs take the INE starter pass which contains the course content and labs for eJPT for free and when you think you've prepared enough you can take the eJPT exam and get your first certification and then start preparing for OSCP.
After that, I'm pretty sure you would have a pretty strong foothold to decide what to do from that point on.
I made this blog because when I started there were not many people who could have helped me or guided me and I made this in a way such that it answers most of the questions I had when I started.
May the source be with you in this journey, young padawan. Hack The Planet
.