SlideShare a Scribd company logo
1 of 58
Download to read offline
HOW TO BECOME A HACKER IN REAL LIFE
Outhai SAIOUDOM
Nick: Os, (LoungOS)
Codename: Os555
Skills: ຂີ້ໂມ້, Linux, Network, CyberSec.
Position: Co-Founder / C.T.O - LaoITDev Co., Ltd.
Os555 ລຸງໂອ້ດ Os555
WHAT IS 2600LAOS?
IF CYBER SECURITY
IS A WAR
https://govinsider.asia/digital-gov/cyber-talent-crunch-a-big-threat/?utm_content=buffer78bb7&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
Cyber Weapon
HACKER FROM MOVIES
HACKERS FROM MOVIES
HACKERS FROM MOVIES
HACKERS FROM MOVIES
HACKERS FROM MOVIES
HACKERS FROM MOVIES
HACKER IN REAL LIFE
WHAT IS HACKING ?
[ Hacking is the HACKER’s action.]
WHO IS HACKER?
WHO IS HACKER?
[A computer hacker is any skilled computer expert that uses their technical
knowledge to overcome a problem. While "hacker" can refer to any skilled
computer programmer, the term has become associated in popular culture with a
"security hacker", someone who, with their technical knowledge, uses bugs or
exploits to break into computer systems. ]
TYPE OF HACKER?
TYPE OF HACKER?
White hat — ethical hacker.
TYPE OF HACKER?
Black hat — classical hacker, get unauthorized access.
TYPE OF HACKER?
Grey hat — a person who gets unauthorized access but reveals the weaknesses to
the company.
TYPE OF HACKER?
Script kiddie — a person with no technical skills just used pre-made tools.
TYPE OF HACKER?
Hacktivist — a person who hacks for some idea and leaves some messages. For
example strike against copyright.
THINK LIKE A HACKER
[]
THINK LIKE A HACKER
THINK LIKE A HACKER
Case 2: [Buy SIM Card with free Credit]
SKILLS REQUIRED
TO BECOME A HACKER.
[---***---]
BASIC COMPUTER SKILLS.
It probably goes without saying that to become a hacker you need some basic computer
skills. These skills go beyond the ability to create a Word document or cruise the Internet.
You need to be able to use the command line in Windows, edit the registry, and set up
your networking parameters.
NETWORKING SKILLS
You need to understand the basics of networking, such as the following.
● DHCP
● NAT
● Subnetting
● IPv4 / IPv6
● Public v Private IP
● DNS
● Routers and switches
● VLANs
● OSI model
● MAC addressing
● ARP
As we are often exploiting these technologies, the better you understand how they work, the more successful you will
be. Note that I did not write the two guides below, but they are very informative and cover some of the networking
basics mentioned above.
LINUX/UNIX SKILLS
It is extremely critical to develop Linux skills to become a hacker. Nearly all the tools we use as a hacker are developed
for Linux and Linux gives us capabilities that we don't have using Windows.
If you need to improve your Linux skills, or you're just getting started with Linux, check out my Linux series for
beginners below.
WIRESHARK OR TCPDUMP
Wireshark is the most widely used sniffer/protocol analyzer, while tcpdump is a command line sniffer/protocol analyzer.
Both can be extraordinarily useful in analyzing TCP/IP traffic and attacks.
VIRTUALIZATION / CONTAINER
You need to become proficient in using one of the virtualization software packages such as VirtualBox or VMWare Workstation. Ideally, you
need a safe environment to practice your hacks before you take them out in real world. A virtual environment provides you a safe environment
to test and refine your hacks before going live with them.
SECURITY CONCEPTS & TECHNOLOGIES
A good hacker understands security concepts and technologies. The only way to
overcome the roadblocks established by the security admins is to be familiar with them.
The hacker must understand such things as PKI (public key infrastructure), SSL (secure
sockets layer), IDS (intrusion detection system), firewalls, etc.
WIRELESS TECHNOLOGIES
In order to be able to hack wireless, you must first understand how it works. Things like
the encryption algorithms (WEP, WPA, WPA2), the four-way handshake, and WPS. In
addition, understanding such as things as the protocol for connection and authentication
and the legal constraints on wireless technologies.
To get started, check out my guide below on getting started with wireless terms and
technologies, then read our collection of Wi-Fi hacking guides for further information on
each kind of encryption algorithms and for examples of how each hack works.
SCRIPTING / PROGRAMMING
Without scripting skills, the hacker will be relegated to using other hackers' tools.
This limits your effectiveness. Every day a new tool is in existence loses
effectiveness as security admins come up with defenses.
To develop your own unique tools, you will need to become proficient at least in
one of the scripting languages including the BASH shell. These should include one
of Perl, Python, or Ruby.
DATABASE SKILLS
If you want to be able to proficiently hack databases, you will need to understand
databases and how they work. This includes the SQL language. I would also recommend
the mastery of one of the major DBMS's such SQL Server, Oracle, or MySQL.
WEB APPLICATIONS
Web applications are probably the most fertile ground for hackers in recent years. The
more you understand about how web applications work and the databases behind them,
the more successful you will be. In addition, you will likely need to build your own website
for phishing and other nefarious purposes.
FORENSICS
To become good hacker, you must not be caught! You can't become a pro hacker sitting
in a prison cell for 5 years. The more you know about digital forensics, the better you can
become at avoiding and evading detection.
ADVANCED TCP/IP
The beginner hacker must understand TCP/IP basics, but to rise to the intermediate level,
you must understand in intimate details the TCP/IP protocol stack and fields. These
include how each of the fields (flags, window, df, tos, seq, ack, etc.) in both the TCP and IP
packet can be manipulated and used against the victim system to enable MitM attacks,
among other things.
CRYPTOGRAPHY
Although one doesn't need to be a cryptographer to be a good hacker, the more you
understand the strengths and weaknesses of each cryptographic algorithm, the better the
chances of defeating it. In addition, cryptography can used by the hacker to hide their
activities and evade detection.
REVERSE ENGINEERING
Reverse engineering enables you to open a piece of malware and re-build it with additional
features and capabilities. Just like in software engineering, no one builds a new application
from scratch. Nearly every new exploit or malware uses components from other existing
malware.
In addition, reverse engineering enables the hacker to take an existing exploit and change
its signature so that it can fly past IDS and AV detection.
THINK CREATIVELY
There is ALWAYS a way to hack a system and many ways to accomplish it. A good hacker
can think creatively of multiple approaches to the same hack.
PROBLEM-SOLVING SKILLS
A hacker is always coming up against seemingly unsolvable problems. This requires that the
hacker be accustomed to thinking analytically and solving problems. This often demands
that the hacker diagnose accurately what is wrong and then break the problem down into
separate components. This is one of those abilities that comes with many hours of
practice.
PERSISTENCE
A hacker must be persistent. If you fail at first, try again. If that fails, come up with a new
approach and try again. It is only with a persistence that you will be able to hack the most
secured systems.
PATH WAY TO CYBER SECURITY
PROFESSOR
PENETRATION TEST
- External Network Penetration Testing
- Internal Network Penetration Testing
- Application Penetration Testing
- Mobile Application Penetration Testing
- Wireless Penetration Testing
SECURITY ASSESSMENT
- Physical Security
- Vulnerability Assessment (VA)
- Social Engineering
- Network Architecture
- ICS/SCADA (Industrial Control Systems)
INCIDENT HANDLING
- Malware Analysis
- Intrusion Analysis
- Computer Forensics
HOW TO START ???
- Start Learning, Reading, Watching, Doing, Joining.
- Start Playing, Practicing (CTF)
- Making do something, write some code,
- Sharing , Publishing, Blogging, Vlogging, Speaking.
- Trying Try Harder
- Thinking in reverse way.
-
Question?
Credit:
- https://null-byte.wonderhowto.com/how-to/essential-skills-becoming-
master-hacker-0154509/
- Slide Themes from Snoopbeees team.

More Related Content

What's hot

Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeHacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeEC-Council
 
Offensive Security basics part 2
Offensive Security basics  part 2Offensive Security basics  part 2
Offensive Security basics part 2wharpreet
 
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011shawn_merdinger
 
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksChema Alonso
 
A Brief History of Cryptographic Failures
A Brief History of Cryptographic FailuresA Brief History of Cryptographic Failures
A Brief History of Cryptographic FailuresNothing Nowhere
 
Bruteforce basic presentation_file - linx
Bruteforce basic presentation_file - linxBruteforce basic presentation_file - linx
Bruteforce basic presentation_file - linxidsecconf
 
IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?RIPE NCC
 
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблюNFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблюPositive Hack Days
 
Capture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception DefenseCapture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception DefenseFidelis Cybersecurity
 
Crypto failures every developer should avoid
Crypto failures every developer should avoidCrypto failures every developer should avoid
Crypto failures every developer should avoidFilip Šebesta
 
DEF CON 23 - Wesley McGrew - i hunt penetration testers
DEF CON 23 - Wesley McGrew - i hunt penetration testersDEF CON 23 - Wesley McGrew - i hunt penetration testers
DEF CON 23 - Wesley McGrew - i hunt penetration testersFelipe Prado
 
Click and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobileClick and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobilegrugq
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking RedefinedPawan Patil
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoJohn Bambenek
 
Introduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivismIntroduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivismGlobal Micro Solutions
 
ShadyRAT: Anatomy of targeted attack
ShadyRAT: Anatomy of targeted attackShadyRAT: Anatomy of targeted attack
ShadyRAT: Anatomy of targeted attackVladyslav Radetsky
 
LonestarPHP 2014 Security Keynote
LonestarPHP 2014 Security KeynoteLonestarPHP 2014 Security Keynote
LonestarPHP 2014 Security KeynoteAlison Gianotto
 

What's hot (20)

Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeHacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
 
Offensive Security basics part 2
Offensive Security basics  part 2Offensive Security basics  part 2
Offensive Security basics part 2
 
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
 
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
 
A Brief History of Cryptographic Failures
A Brief History of Cryptographic FailuresA Brief History of Cryptographic Failures
A Brief History of Cryptographic Failures
 
Malware for Red Team
Malware for Red TeamMalware for Red Team
Malware for Red Team
 
Bruteforce basic presentation_file - linx
Bruteforce basic presentation_file - linxBruteforce basic presentation_file - linx
Bruteforce basic presentation_file - linx
 
IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?
 
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблюNFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
 
Capture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception DefenseCapture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception Defense
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Crypto failures every developer should avoid
Crypto failures every developer should avoidCrypto failures every developer should avoid
Crypto failures every developer should avoid
 
DEF CON 23 - Wesley McGrew - i hunt penetration testers
DEF CON 23 - Wesley McGrew - i hunt penetration testersDEF CON 23 - Wesley McGrew - i hunt penetration testers
DEF CON 23 - Wesley McGrew - i hunt penetration testers
 
Click and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobileClick and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobile
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using Crypto
 
Introduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivismIntroduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivism
 
Super1
Super1Super1
Super1
 
ShadyRAT: Anatomy of targeted attack
ShadyRAT: Anatomy of targeted attackShadyRAT: Anatomy of targeted attack
ShadyRAT: Anatomy of targeted attack
 
LonestarPHP 2014 Security Keynote
LonestarPHP 2014 Security KeynoteLonestarPHP 2014 Security Keynote
LonestarPHP 2014 Security Keynote
 

Similar to How to be come a hacker slide for 2600 laos

Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Mobodexter
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.pptshreyng
 
What Is Ethical Hacking and How Does It Work?
What Is Ethical Hacking and How Does It Work?What Is Ethical Hacking and How Does It Work?
What Is Ethical Hacking and How Does It Work?Careervira
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAnumadil1
 
Recognizing security threats
Recognizing security threatsRecognizing security threats
Recognizing security threatsKishore Kumar
 
Security & Cryptography In Linux
Security & Cryptography In LinuxSecurity & Cryptography In Linux
Security & Cryptography In LinuxAhmed Mekkawy
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With GflixacademyGaurav Mishra
 
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...AgileNetwork
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force toolszeus7856
 
HackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware AnalysisHackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware AnalysisAntonio Parata
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxMaheshDhope1
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfxererenhosdominaram
 
Overview on hacking tools
Overview on hacking toolsOverview on hacking tools
Overview on hacking toolsZituSahu
 

Similar to How to be come a hacker slide for 2600 laos (20)

Get started with hacking
Get started with hackingGet started with hacking
Get started with hacking
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
 
Sectools
SectoolsSectools
Sectools
 
aaa
aaaaaa
aaa
 
What Is Ethical Hacking and How Does It Work?
What Is Ethical Hacking and How Does It Work?What Is Ethical Hacking and How Does It Work?
What Is Ethical Hacking and How Does It Work?
 
Hacking intro
Hacking introHacking intro
Hacking intro
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Recognizing security threats
Recognizing security threatsRecognizing security threats
Recognizing security threats
 
Security & Cryptography In Linux
Security & Cryptography In LinuxSecurity & Cryptography In Linux
Security & Cryptography In Linux
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
 
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
 
EthicalHacking.pptx
EthicalHacking.pptxEthicalHacking.pptx
EthicalHacking.pptx
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force tools
 
HackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware AnalysisHackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware Analysis
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Overview on hacking tools
Overview on hacking toolsOverview on hacking tools
Overview on hacking tools
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Recently uploaded

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 

Recently uploaded (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 

How to be come a hacker slide for 2600 laos

  • 1. HOW TO BECOME A HACKER IN REAL LIFE
  • 2. Outhai SAIOUDOM Nick: Os, (LoungOS) Codename: Os555 Skills: ຂີ້ໂມ້, Linux, Network, CyberSec. Position: Co-Founder / C.T.O - LaoITDev Co., Ltd. Os555 ລຸງໂອ້ດ Os555
  • 5.
  • 6.
  • 8.
  • 9.
  • 18.
  • 19.
  • 20.
  • 21. WHAT IS HACKING ? [ Hacking is the HACKER’s action.]
  • 22.
  • 24. WHO IS HACKER? [A computer hacker is any skilled computer expert that uses their technical knowledge to overcome a problem. While "hacker" can refer to any skilled computer programmer, the term has become associated in popular culture with a "security hacker", someone who, with their technical knowledge, uses bugs or exploits to break into computer systems. ]
  • 26. TYPE OF HACKER? White hat — ethical hacker.
  • 27. TYPE OF HACKER? Black hat — classical hacker, get unauthorized access.
  • 28. TYPE OF HACKER? Grey hat — a person who gets unauthorized access but reveals the weaknesses to the company.
  • 29. TYPE OF HACKER? Script kiddie — a person with no technical skills just used pre-made tools.
  • 30. TYPE OF HACKER? Hacktivist — a person who hacks for some idea and leaves some messages. For example strike against copyright.
  • 31. THINK LIKE A HACKER []
  • 32. THINK LIKE A HACKER
  • 33. THINK LIKE A HACKER Case 2: [Buy SIM Card with free Credit]
  • 34. SKILLS REQUIRED TO BECOME A HACKER. [---***---]
  • 35. BASIC COMPUTER SKILLS. It probably goes without saying that to become a hacker you need some basic computer skills. These skills go beyond the ability to create a Word document or cruise the Internet. You need to be able to use the command line in Windows, edit the registry, and set up your networking parameters.
  • 36. NETWORKING SKILLS You need to understand the basics of networking, such as the following. ● DHCP ● NAT ● Subnetting ● IPv4 / IPv6 ● Public v Private IP ● DNS ● Routers and switches ● VLANs ● OSI model ● MAC addressing ● ARP As we are often exploiting these technologies, the better you understand how they work, the more successful you will be. Note that I did not write the two guides below, but they are very informative and cover some of the networking basics mentioned above.
  • 37. LINUX/UNIX SKILLS It is extremely critical to develop Linux skills to become a hacker. Nearly all the tools we use as a hacker are developed for Linux and Linux gives us capabilities that we don't have using Windows. If you need to improve your Linux skills, or you're just getting started with Linux, check out my Linux series for beginners below.
  • 38. WIRESHARK OR TCPDUMP Wireshark is the most widely used sniffer/protocol analyzer, while tcpdump is a command line sniffer/protocol analyzer. Both can be extraordinarily useful in analyzing TCP/IP traffic and attacks.
  • 39. VIRTUALIZATION / CONTAINER You need to become proficient in using one of the virtualization software packages such as VirtualBox or VMWare Workstation. Ideally, you need a safe environment to practice your hacks before you take them out in real world. A virtual environment provides you a safe environment to test and refine your hacks before going live with them.
  • 40. SECURITY CONCEPTS & TECHNOLOGIES A good hacker understands security concepts and technologies. The only way to overcome the roadblocks established by the security admins is to be familiar with them. The hacker must understand such things as PKI (public key infrastructure), SSL (secure sockets layer), IDS (intrusion detection system), firewalls, etc.
  • 41. WIRELESS TECHNOLOGIES In order to be able to hack wireless, you must first understand how it works. Things like the encryption algorithms (WEP, WPA, WPA2), the four-way handshake, and WPS. In addition, understanding such as things as the protocol for connection and authentication and the legal constraints on wireless technologies. To get started, check out my guide below on getting started with wireless terms and technologies, then read our collection of Wi-Fi hacking guides for further information on each kind of encryption algorithms and for examples of how each hack works.
  • 42. SCRIPTING / PROGRAMMING Without scripting skills, the hacker will be relegated to using other hackers' tools. This limits your effectiveness. Every day a new tool is in existence loses effectiveness as security admins come up with defenses. To develop your own unique tools, you will need to become proficient at least in one of the scripting languages including the BASH shell. These should include one of Perl, Python, or Ruby.
  • 43. DATABASE SKILLS If you want to be able to proficiently hack databases, you will need to understand databases and how they work. This includes the SQL language. I would also recommend the mastery of one of the major DBMS's such SQL Server, Oracle, or MySQL.
  • 44. WEB APPLICATIONS Web applications are probably the most fertile ground for hackers in recent years. The more you understand about how web applications work and the databases behind them, the more successful you will be. In addition, you will likely need to build your own website for phishing and other nefarious purposes.
  • 45. FORENSICS To become good hacker, you must not be caught! You can't become a pro hacker sitting in a prison cell for 5 years. The more you know about digital forensics, the better you can become at avoiding and evading detection.
  • 46. ADVANCED TCP/IP The beginner hacker must understand TCP/IP basics, but to rise to the intermediate level, you must understand in intimate details the TCP/IP protocol stack and fields. These include how each of the fields (flags, window, df, tos, seq, ack, etc.) in both the TCP and IP packet can be manipulated and used against the victim system to enable MitM attacks, among other things.
  • 47. CRYPTOGRAPHY Although one doesn't need to be a cryptographer to be a good hacker, the more you understand the strengths and weaknesses of each cryptographic algorithm, the better the chances of defeating it. In addition, cryptography can used by the hacker to hide their activities and evade detection.
  • 48. REVERSE ENGINEERING Reverse engineering enables you to open a piece of malware and re-build it with additional features and capabilities. Just like in software engineering, no one builds a new application from scratch. Nearly every new exploit or malware uses components from other existing malware. In addition, reverse engineering enables the hacker to take an existing exploit and change its signature so that it can fly past IDS and AV detection.
  • 49. THINK CREATIVELY There is ALWAYS a way to hack a system and many ways to accomplish it. A good hacker can think creatively of multiple approaches to the same hack.
  • 50. PROBLEM-SOLVING SKILLS A hacker is always coming up against seemingly unsolvable problems. This requires that the hacker be accustomed to thinking analytically and solving problems. This often demands that the hacker diagnose accurately what is wrong and then break the problem down into separate components. This is one of those abilities that comes with many hours of practice.
  • 51. PERSISTENCE A hacker must be persistent. If you fail at first, try again. If that fails, come up with a new approach and try again. It is only with a persistence that you will be able to hack the most secured systems.
  • 52. PATH WAY TO CYBER SECURITY PROFESSOR
  • 53. PENETRATION TEST - External Network Penetration Testing - Internal Network Penetration Testing - Application Penetration Testing - Mobile Application Penetration Testing - Wireless Penetration Testing
  • 54. SECURITY ASSESSMENT - Physical Security - Vulnerability Assessment (VA) - Social Engineering - Network Architecture - ICS/SCADA (Industrial Control Systems)
  • 55. INCIDENT HANDLING - Malware Analysis - Intrusion Analysis - Computer Forensics
  • 56. HOW TO START ??? - Start Learning, Reading, Watching, Doing, Joining. - Start Playing, Practicing (CTF) - Making do something, write some code, - Sharing , Publishing, Blogging, Vlogging, Speaking. - Trying Try Harder - Thinking in reverse way. -