This level is for people that;
- Expand their hacking knowledge
- Become a hacker
- Improve cyber awareness
- Overcome the script kiddie status
In programming and hacking culture, a script kiddie, skiddie, or skid is an unskilled individual who uses scripts or programs developed by others to attack computer systems and networks and deface websites.
Everyone needs to start somewhere and there will be a time where you will be a script kiddie, but that’s where you have to set yourself apart from other “wannabe hackers”. This is probably the most important, as most hackers never get out of this phase as they believe they already reached the “hacker” status. Little do they know by launching a few pre-made scripts and programs to gain access to a device, is only one chapter in becoming a hacker.
Ask yourself the following three questions:
Do you speak code, fluently?
Do you identify with the goals and values of the hacker community?
Has a well-established member of the hacker community ever called you a hacker?
At this stage, you should now know which type of hacker you will become. Ask yourself, what is your intentions, where do you see yourself after learning all of this? Are you doing it for the good? the bad? or just for fun? Will you become a …
Also known as ethical hackers, White Hat hackers are the good guys of the hacker world. They’ll help you remove a virus or PenTest a company. Most White Hat hackers hold a college degree in IT security or computer science and must be certified to pursue a career in hacking. The most popular certification is the CEH (Certified Ethical Hacker) from the EC-Council.
Also known as crackers, these are the men and women you hear about in the news. They find banks or other companies with weak security and steal money or credit card information. The surprising truth about their methods of attack is that they often use common hacking practices they learned early on.
Nothing is ever just black or white; the same is true in the world of hacking. Gray Hat hackers don’t steal money or information (although, sometimes they deface a website or two), yet they don’t help people for good (but, they could if they wanted to). These hackers comprise most of the hacking world, even though Black Hat hackers garner most (if not all) of the media’s attention.
If you’ve ever come across social activists propagandizing a social, political or religious agenda, then you might as well meet hacktivist, the online version of an activist. Hacktivist is a hacker or a group of anonymous hackers who think they can bring about social changes and often hack government and organizations to gain attention or share their displeasure over opposing their line of thought.
Script Kiddies normally don’t care about hacking. They copy code and use it for a virus or an SQLi or something else. Script Kiddies will never hack for themselves; they’ll just download overused software (LOIC or Metasploit, for example) and watch a YouTube video on how to use it. A common Script Kiddie attack is DoSing or DDoSing (Denial of Service and Distributed Denial of Service), in which they flood an IP with so much information it collapses under the strain.
Getting your mindset ready
Repeat the following until you believe them:
1. The World is full of fascinating problems waiting to be solved.
Being a hacker is lots of fun, but it’s a kind of fun that takes lots of effort. The effort takes motivation. Successful athletes get their motivation from a kind of physical delight in making their bodies perform, in pushing themselves past their own physical limits. Similarly, to be a hacker you have to get a basic thrill from solving problems, sharpening your skills, and exercising your intelligence.
If you aren’t the kind of person that feels this way naturally, you’ll need to become one in order to make it as a hacker. Otherwise you’ll find your hacking energy is sapped by distractions like sex, money, and social approval.
(You also have to develop a kind of faith in your own learning capacity — a belief that even though you may not know all of what you need to solve a problem, if you tackle just a piece of it and learn from that, you’ll learn enough to solve the next piece — and so on, until you’re done.)
Creative brains are a valuable, limited resource. They shouldn’t be wasted on re-inventing the wheel when there are so many fascinating new problems waiting out there.
To behave like a hacker, you have to believe that the thinking time of other hackers is precious — so much so that it’s almost a moral duty for you to share information, solve problems and then give the solutions away just so other hackers can solve new problems instead of having to perpetually re-address old ones.
Note, however, that “No problem should ever have to be solved twice.” does not imply that you have to consider all existing solutions sacred, or that there is only one right solution to any given problem. Often, we learn a lot about the problem that we didn’t know before by studying the first cut at a solution. It’s OK, and often necessary, to decide that we can do better. What’s not OK is artificial technical, legal, or institutional barriers (like closed-source code) that prevent a good solution from being re-used and force people to re-invent wheels.
(You don’t have to believe that you’re obligated to give all your creative product away, though the hackers that do are the ones that get most respect from other hackers. It’s consistent with hacker values to sell enough of it to keep you in food and rent and computers. It’s fine to use your hacking skills to support a family or even get rich, as long as you don’t forget your loyalty to your art and your fellow hackers while doing it.)
Hackers (and creative people in general) should never be bored or have to drudge at stupid repetitive work, because when this happens it means they aren’t doing what only they can do — solve new problems. This wastefulness hurts everybody. Therefore boredom and drudgery are not just unpleasant but actually evil.
To behave like a hacker, you have to believe this enough to want to automate away the boring bits as much as possible, not just for yourself but for everybody else (especially other hackers).
(There is one apparent exception to this. Hackers will sometimes do things that may seem repetitive or boring to an observer as a mind-clearing exercise, or in order to acquire a skill or have some particular kind of experience you can’t have otherwise. But this is by choice — nobody who can think should ever be forced into a situation that bores them.)
Hackers are naturally anti-authoritarian. Anyone who can give you orders can stop you from solving whatever problem you’re being fascinated by — and, given the way authoritarian minds work, will generally find some appallingly stupid reason to do so. So the authoritarian attitude has to be fought wherever you find it, lest it smother you and other hackers.
(This isn’t the same as fighting all authority. Children need to be guided and criminals restrained. A hacker may agree to accept some kinds of authority in order to get something he wants more than the time he spends following orders. But that’s a limited, conscious bargain; the kind of personal surrender authoritarians want is not on offer.)
Authoritarians thrive on censorship and secrecy. And they distrust voluntary cooperation and information-sharing — they only like ‘cooperation’ that they control. So to behave like a hacker, you have to develop an instinctive hostility to censorship, secrecy, and the use of force or deception to compel responsible adults. And you have to be willing to act on that belief.
To be a hacker, you have to develop some of these attitudes. But copping an attitude alone won’t make you a hacker, any more than it will make you a champion athlete or a rock star. Becoming a hacker will take intelligence, practice, dedication, and hard work.
Therefore, you have to learn to distrust attitude and respect competence of every kind. Hackers won’t let posers waste their time, but they worship competence — especially competence at hacking, but competence at anything is valued. Competence at demanding skills that few can master is especially good, and competence at demanding skills that involve mental acuteness, craft, and concentration is best.
If you revere competence, you’ll enjoy developing it in yourself — the hard work and dedication will become a kind of intense play rather than drudgery. That attitude is vital to becoming a hacker.
Being a hacker you should acquaint yourself with the techniques, technologies and tools they use. We have made a subcategory of each term/method currently being used. And within the category, a detailed explanation will be foreseen as well as the most popular tools.
Learn each category, view these tools, use them for your arsenal and see how current Hackers do it.
Whether you are defending your nation, company or trying to bruteforce a social media account. You must understand that not every tool each hacker uses are unique.Able to write your own exploit or scanner to quickly complete your goal is vital, but some tools are essential to your daily hacking needs. Learn, use these tools and make sure to read their documentation. Just by knowing how to use these tools, can gradually make you a better hacker.
List of courses to take after completing level 1 – Click here to view level 1 courses. Make sure you have read through the whole section and completed at least 80% of the curriculum before moving forward.
Welcome to the fun stuff, this is where you will actually start to use your skills to hack, penetrate and pivot your way through systems. This is where you will learn the practical experience, on how to actually hack.
Level 2 Courses to take;
- CEH – Certified Ethical Hacker ( More theory than practical )
- OSCP – Offensive Security Certified Professional (24hour exam to penetrate a network and document all findings)
- CISSP – Certified Information Systems Security Professional
- Cybrary Advanced Courses
Extra Training to take before getting the certifications – Hack capture the flag (CTF) boxes
They can be a little hard, you definitely won’t be spoonfed. You’ll probably get stuck at some point, but if you stick with it, you’ll learn more about computers than you ever thought possible.
There’s no better way to learn something than to experience it for yourself.And in the computer security world, Capture The Flag is the best way to learn by doing.
Overthewire.org’s wargames ( Useful for learning linux and commands )
Read, read and read some more!
- A hands on Introduction to Penetration Testing
- Mastering Kali Linux for Advanced Penetration Testing
- The Hacker Playbook series (1 – 3)
- Red Team Field Manual
As to our previous level, if you have no experience with programming, make sure to visit our previous level on which languages to take.
Also, you can find valuable coding books to up your game in our ebook section, from scanner scripts, web scraping and many more.