How should I start to learn hacking and what are the prerequisites, like programming languages, networking, OS, etc.? Is it a must to have knowledge of Java, PHP, or some others of these types?

Asked by Last Modified  

Follow 1
Answer

Please enter your answer

Certified Ethical Hacker / Corporate Trainer / System Analyst / MIS Expert

Learning Hacking the days is no big deal. All you need is Dedication, Time and Patience. Hacking is not entirely based on coding. the main thing you have to keep in mind is, Think out of Box". Because, there were some major vulnerabilities on internet which were exploited just with basics of hacking...
read more
Learning Hacking the days is no big deal. All you need is Dedication, Time and Patience. Hacking is not entirely based on coding. the main thing you have to keep in mind is, Think out of Box". Because, there were some major vulnerabilities on internet which were exploited just with basics of hacking Ex: Basic SQLI (no need to learn coding to perform this attack). So, Start from the basics first Operating Systems (Start with Win 7,10) later you can go for Kali Linux or Ubuntu Batch Programming Networking (Protocols, TCP/IP) Virtual Machines Email Hacking & Security Trojans Web Security Learn basics of all the above concepts, you can find the materials in many online forums. Then you will get an idea how to perform the same attacks using coding, so that you can design your own code accordingly in the language which you know better. ALL THE BEST read less
Comments

Related Questions

What is the qualification to study ethical hacking?
Qualification is not necessary for learning ethical hacking, but web programming and networking background are quite enough for learning ethical hacking. But if you want to become a professional in this...
Venkata

What is the first step in hacking?

Footprinting is the first step in ethical hacking.
Micheal
How many hours
40hrs training on real time modules.
Arunprasath
0 0
8
I am fresher and want to work in cyber security. how do I have to start?
That would be great start shiva. Security professionals are high in demand and has good market value. Apart from that you will have the ability to dig into u Explorer ed area of network and OS. Start...
Shiva
2 0
7
im from mechanical field can i get in to cyber security??what are the courses i have to learn
Ethical hacking you should learn. They give you complete overview on cyber security.
Saikrishna

Now ask question in any of the 1000+ Categories, and get Answers from Tutors and Trainers on UrbanPro.com

Ask a Question

Related Lessons

Union Based SQL Injection Live Website (Legal)
Start Performing SQL Injection and get database from backend. Website is : http://testphp.vulnweb.com/ For any doubt and queries contact me, will share complete walkhrough and Solutions

The Art of Phishing
Similar to real-life fishing, phishing scams aren’t always best when they rely on advanced tactics, but there are many new techniques motivated by social networks. So what is phishing, and what should...
R

Ramakrishnan Nataraj

0 0
0

Ethical hacking : Important points for beginners
Dear passionate learners, I am posting below lesson to create enthusiasm among you all for learning ethical hacking . A beginner in Ethical Hacking is always in dilemma. Below are some misconceptions,...

Malware Analysis: Analyzing Macros For Payload
Hello There ! last night I got a mail from an Unknown source regarding a Credit card which include a Document attachment. I was Curious that it may be Social engineering attack One of the Popular Attacking...

Assessment Methodology
Basically assessment starts with few septs And gradually reach the final stage of testing and reporting 1.) Information gathering 2.) Fuzzing 3.) Known vulnerabilities 4.) Testing for known vulnerabilities 5.) Output / Reporting

Recommended Articles

Whether it was the Internet Era of 90s or the Big Data Era of today, Information Technology (IT) has given birth to several lucrative career options for many. Though there will not be a “significant" increase in demand for IT professionals in 2014 as compared to 2013, a “steady” demand for IT professionals is rest assured...

Read full article >

Applications engineering is a hot trend in the current IT market.  An applications engineer is responsible for designing and application of technology products relating to various aspects of computing. To accomplish this, he/she has to work collaboratively with the company’s manufacturing, marketing, sales, and customer...

Read full article >

Hadoop is a framework which has been developed for organizing and analysing big chunks of data for a business. Suppose you have a file larger than your system’s storage capacity and you can’t store it. Hadoop helps in storing bigger files than what could be stored on one particular server. You can therefore store very,...

Read full article >

Business Process outsourcing (BPO) services can be considered as a kind of outsourcing which involves subletting of specific functions associated with any business to a third party service provider. BPO is usually administered as a cost-saving procedure for functions which an organization needs but does not rely upon to...

Read full article >

Looking for Ethical Hacking Training?

Learn from the Best Tutors on UrbanPro

Are you a Tutor or Training Institute?

Join UrbanPro Today to find students near you