How To Start Your Cyber Security Career

August 2, 2016 | Views: 17617

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Hello readers,

I’m w3b~r47 and I’m a hacker. In this short article, I’ll show you how you can start your cyber security/hacking career.

You can basically copy this into a text editor and work towards it. Hopefully, you’ll become a successful hacker.

Notes:

  • “If you want to be a hacker, you’ve got to keep up with this things.”
  • “Hacking is absolutely different from what you watch on TV, etc. Just live just typing and typing and then, booom you’re in! Nooo!! It’s not like that.”

It takes lot of creativity, especially in web applications. So, you have to be patient. And, don’t even think of making money in the beginning, because if you are, I’m going to have to tell you you’re wasting your time.

It’s a career, like something you do for at least 10 years to be a professional. I’m not saying during this time you won’t make money, but don’t let that be on your mind at first πŸ™‚

Not everything thing you learn in a video or book will be exactly true all the time, but it will be in most cases.

 

Let’s begin…

rule no:1

—————————————————–
** be up to date
—————————————————–

++twitterΒ  “create an account and follow security people.”

++linkedinΒ  “create an account and follow security people.”

It’s important, as a hacker, to be up to date. We can know when new things are out there, like “0 day vulnerabilities” (new vulnerabilities) and what new technologies others are developing .

 

rule no:2
β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”-
** build your lab
β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”-
++install vulnerable applications
++use VMware
β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”

** build your lab

It’s highly recommended that you build you lab. You don’t have to buy multiple systems now. There are lots of VM’s out there and I have a tutorial about this on my blog www.webrat9.blogspot.com. But, I’ve used Kali on my host machine “for a long time.”

 

β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”
** Assumption
β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”
** learn networking

** learn linux

** learn python

Now, before you start thinking of hacking anything or what certification you should get, you’re expected to know at least basics of networking, Linux and a little programming. You want to hack a network and you don’t know how it works – sorry you can’t. Or, you want to hack a website and you’re scared of source codes πŸ™Β  It just doesn’t work that way…

 

β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”
** free training resources
β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”-

++irongeek
++youtube
++cybrary

β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”
** basic certifications
——————————————————————–
++security+
++linux+

——————————————————————–
**dod 8570
——————————————————————–
++choose baseline certifications, e.g ceh, etc

 

————————————————————————–
*******************life of a pentester************************************
β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”

———————————–
** lots of failure

**you have to think creatively

** lots of research

** thinking like a attacker

** scripting

** tools

++metasploitΒ  framework
++burpsuiteΒ Β Β Β Β Β Β Β Β Β Β Β Β  “bread and butter”
++nmap Β  Β  Β  Β  Β  Β  Β  Β  Β  Β  ” hackers network mapper tools and vulns scanner”
++masscanΒ Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β  “faster network mapper”
++recon-ngΒ Β Β Β Β Β Β Β Β Β Β Β Β Β Β  “information gathering”
++linux/windowsΒ Β Β Β Β  “of course ”
++nessusΒ Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β  “vulnerability assessment ”
++acunetixΒ Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β  “web app vulnerability assessment ”
++webinspectΒ Β Β Β Β Β Β Β Β Β Β  “Web Inspector allows you to view the page source, live DOM hierarchy, script debugging, profiling…”
++mimikatzΒ Β Β Β Β Β Β Β Β Β Β Β Β Β Β  “It’s now well known how to extract plaintexts passwords”
++pythonΒ Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β  “for writing our personal scripts”
++and many more in kali

 


Conclusion: So, guys, I spent more than 4 hrs writing this article and I don’tΒ  know what I’ll get from it. But, I hope it’s not a wasted time. I hope you actually learn something. If you have have any questions, you can contact me on facebook @ https://www.facebook.com/w3brat

https://www.facebook.com/webrat9Β Β  <<page

https://twitter.com/webratsec

I apologize for any mistakes. Thanks and bye.

Share with Friends
FacebookTwitterGoogle+LinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterGoogle+LinkedInEmail
Ready to share your knowledge and expertise?
63 Comments
  1. I guess you never started your blog? Your link is dead

  2. Awesome article!

Page 12 of 12« First...«89101112
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
Β 

Support Cybrary

Donate Here to Get This Month's Donor Badge

Β 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel