How To Become A Hacker

Posted on

If you're a hacker who's an information security analyst, your day-to-day tasks might include: Monitoring computer networks and systems for security breaches. Making security recommendations. Creating security policies for a company, such as a disaster recovery plan. Researching cyberthreats. This is the one thing I hate about Quora. Someone redirected my answer/changed the question to how someone becomes a hacker. The original question was how does one learn hacking. How to Become a Hacker Run a UNIX-like OS, such as Linux. Learn the language of programming. Think creatively. Learn to love solving problems. Learn to recognize and fight authority. Be competent. Write open-source software. Help test and debug open-source software.

You've read about the exploits of groups such as LulzSec, Anonymous and AntiSec. You've read my Kevin Mitnick interview with great interest. You've followed such famous programmers as Richard Stallman, Linus Torvalds, Marc Andreesen and Dennis Ritchie. And, now you want to become a hacker. But, how does one become a hacker? Is there some secret society with blood rites that tests your willingness to exploit and deliver malicious payloads to unsuspecting computer users? Or, do you have to sell your soul and pledge allegiance to an organized crime boss to break into this mysterious field?

It's much easier than that, but it isn't an overnight process.

It takes dedication, intelligence and an analytic mind. You must have a desire to solve problems, a knack for verbal and written communication and a persistence to try new approaches when solutions don't come easily.

To become a hacker, you first must have a keen interest in computers, how they work, their components and how computers communicate at the lowest level. If you aren't a programmer, you need programming skills.

Eric Raymond suggests that you learn Python first. After becoming comfortable with Python, you should learn C/C++, Java, Perl and LISP. Python, Java and Perl are all C-based languages but Python is an easier first language to grasp. LISP is an ancient language (in computer terms) but its approach will give you a different perspective on programming and will make you a better programmer and hacker.

You also need to obtain an open source operating system such as Linux, FreeBSD or OpenSolaris to use to hone your skills. Using existing code as a guide helps you learn to program.

Other than programming, what other skills do you need as a hacker?

Look back at the list of attributes given earlier: dedication, intelligence, analytic, problem-solving, communications and persistence.

These are less tangible points but no less important.

You'll need dedication because becoming a competent hacker doesn't happen quickly. Like any job, you need to start small, grow and set personal goals. You need to have at least average intelligence.

You do not have to have a genius-level IQ or be a MENSA member. You should possess a natural curiosity for solving problems and have an analytic or logical mind. You'll look at taking programs apart as often as you will look at how to build them so the ability to analyze a situation or a program is a very valuable skill.

Believe it or not, the ability to communicate verbally and in writing is extremely valuable and is an essential tool in your skillset. And, Eric Raymond further suggests that you need at least a functional grasp of English, the language of hacking.

Have you ever heard that 'Persistence pays off'? It does. Especially in dealing with computers and programming. You'll learn more if you can be persistent with your work. A bit of an obsessive personality is actually a positive trait for hackers.

To become known in the field, you need to get involved.

How To Become A Hacker In Minecraft

Get involved in an open source project. Help with debugging code, assist with documentation and contribute to the project in positive ways. Project managers actively solicit assistance, so you won't have any trouble finding a project that needs your help. Start with SourceForge and search for projects for which you have an interest. You'll find developer contact information on the Summary page.

Having your name associated with a project gives you the street cred that you'll need going forward in your career.

You also should get some formal training. Yes, training is available. You can often find courses at community colleges, universities or online for ethical hacking or security.

Get involved with a local 2600 chapter or other hacking enthusiast group. Check online in your area or ask around at other user groups. It took me about ten minutes to find all the meetings and groups in my city and state. Remember to be respectful, humble and silent at the meetings. If you come on too strong or self-aggrandize, you'll not make any friends or allies and you could alienate yourself for a long time. You're a newbie. Listen and learn.

Now, for the difficult issues associated with becoming a hacker.

Don't enter into this field if your purpose or desire is to illegally hack or compromise computer systems. You'll get caught and possibly serve prison time for it or have to pay damages to your target. Can you really afford either one? Make positive choices for yourself. Becoming a hacker or security expert can bring financial rewards instead of negativity and problems. Use your powers for good.

And, don't be discouraged if your results aren't immediate. Learning any skill takes a long time--years perhaps. Don't try to rush things. Remember the fate of Anakin Skywalker who wanted to gain power and prominence too quickly.

It doesn't matter how old you are when you decide to discover hacking and programming. There's no minimum or maximum age for entering the field. Many hackers start out at a very young age (teen or even preteen) and progress through their lifetimes. Gray hair isn't shunned, it's revered as experience. So, don't worry about appearances.

Finally, read all that you can about computer security, hacking and programming.

And, as Richard Stallman would say, 'Happy Hacking!'

If you have any resources that you'd like to share for newbies trying to learn the art, please post them in the Comments.

See Also:

Related Topics:

Security TV Data Management CXO Data Centers

“Hacker” didn't start out as a bad word, but it's evolved into one, thanks to hackers of the malicious kind. Despite how oxymoronic the term “ethical hacker” may seem, the Certified Ethical Hacker credential is no joke.

Certified Ethical Hacker (CEH) is a computer certification that indicates proficiency in network security, especially in thwarting malicious hacking attacks through pre-emptive countermeasures.

How To Become A Hacker

Malicious hacking is a felony in the U.S. and most other countries, but catching criminals requires the same technical skills that hackers possess.

About the CEH

The CEH credential is a vendor-neutral certification for information technology professionals who wish to specialize in stopping and identifying malicious hackers by using the same knowledge and tools the criminals use.

Even before the credential was introduced, private firms and government agencies were hiring reformed malicious hackers because they believed that was the best method for securing their networks. The CEH credential takes this a step further by requiring those who earn it to agree in writing to abide by the law and honor a code of ethics.

The credential is sponsored by the International Council of E-Commerce Consultants (EC-Council), a member-supported professional organization. Its goal, according to its website, is to establish and maintain standards and credentials for ethical hacking as a profession and to educate IT professionals and the public on the role and value of such specialists.

In addition to CEH certification, the EC-Council offers several other certifications relevant for network security jobs, as well as those for secure programming, e-business, and computer forensics jobs. Certification proficiency levels range from entry-level to consultant (independent contractor).

How to Become a CEH

How To Become A Hacker

Students who have a minimum of two years of security-related job experience can apply for approval to take the EC-Council exam. Those without two years of experience will be required to attend training at an accredited training center, through an approved online program, or at an approved academic institution. These requirements prepare applicants for the exam and help screen out malicious hackers and hobbyists.

As of 2018, the courseware price for the five-day certification course was $850. The application fee for those seeking to bypass the training course was $100, and the exam voucher price was $950.

The Course

The CEH Training Program prepares students to take the CEH 312-50 exam. It consists of 18 modules covering 270 attack technologies and mimics real-life scenarios in 140 labs. The course is run on an intensive five-day schedule with training eight hours per day.

In the end, the goal is for students to be ready for the exam in addition to being ready to handle whatever penetration testing or ethical hacking scenarios come their way in their IT security careers.

The Exam

The 312-50 exam lasts four hours, comprises 125 multiple-choice questions, and tests CEH candidates on the following 18 areas:

  • Introduction to ethical hacking
  • Footprinting and reconnaissance
  • Scanning networks
  • Enumeration
  • System hacking
  • Malware threats
  • Sniffing
  • Social engineering
  • Denial of service
  • Session hijacking
  • Hacking web servers
  • Hacking web applications
  • SQL injection
  • Hacking wireless networks
  • Hacking mobile platforms
  • Evading IDS, firewalls, and honeypots
  • Cloud computing
  • Cryptography

Job Outlook

IT security is a fast-growing field, and the U.S. Bureau of Labor Statistics (BLS) projects job growth at a rate of 28 percent for the decade ending in 2026. This is far greater than job growth of 7 percent projected for all professions combined. The median annual wage for IT security analysts, as of 2017, was about $95,000, according to the BLS.

A quick search on Indeed shows that many security jobs require or recommend a CEH credential, so candidates who possess one will be more marketable.

Most jobs that CEH-credentialed professionals pursue put candidates through background checks or more rigid personnel security investigations (PSIs). Security clearances likely will be required at government agencies or private firms with government contracts.

Success Stories

Many of the high-profile stories about ethical hackers involve the biggest companies in technology. Companies like Apple, Google, and others will challenge ethical hackers to break their security measures in order to help them find weaknesses and to make their products safer. They often offer a lot of money to anyone who can find a weakness.

In 2016, Nimbus Hosting listed some of the more famous success stories of ethical hackers. Among them are examples of a security team offering a reward to anyone who could take over an iPhone or iPad, and an anonymous hacker who went by the name Pinkie Pie who helped identify a bug in Google Chrome. Not all of these examples involve professionals following the CEH-certification route, but they show the value companies place on hiring hackers to help shore up network security.