Professor
Professional
- Messages
- 635
- Reaction score
- 630
- Points
- 93
Many Internet users, among whom you may be interested in how to become a hacker, mainly young people, schoolchildren, teenagers, students stand out among the connoisseurs of this profession or hobby. Although, as always, there are exceptions. Unfortunately, many of them romanticize this occupation and mistakenly imagine hackers and what they do based on their own observations, and they only had to watch the heroes of films and TV series.
It is worth understanding that a hacker in the movies and a hacker in real life are completely different people. Today I will tell you who hackers are and how to become one of them. In addition, you will learn what exactly you need to learn and do to become a hacker, and I will also tell you where you can get and learn all the necessary knowledge in a comprehensive manner. So, if you want to become a hacker, perhaps even an ethical one, more on that later, then this video will be very useful for you, so guys, read carefully, it will be entertaining.
First of all, what is hacking? It is the art of hacking all sorts of systems and bringing this process to the heights of technical elegance. A hacker is an individual who enjoys studying the details of how computer systems work and expanding their capabilities, unlike most computer users who prefer to know only the bare minimum. This is a programming enthusiast who enjoys the process of programming itself, rather than theorizing about it.
In simple terms, this is a guru of computer systems. First, let's immediately understand that the expression "career in cybersecurity" is a bit like the expression "career in banking". That is, it is an umbrella term covering dozens of niches in the industry. In cybersecurity, we can, for example, talk about digital forensics or malware detection, software, security auditing, pentesting, social engineering and many other areas. Each of these subcategories within cybersecurity deserves a separate video.
But for the purposes of this particular video, let's focus on some important general requirements that everyone needs before embarking on a successful career in IT security, or, roughly speaking, becoming a good hacker. If you don't have any experience, don't worry, we all start somewhere, no one is born with all the necessary skills. Let's first understand what types of hackers there are, i.e. their classifications.
1. White hat, or ethical hacker. The hacker everyone imagines gaining unauthorized access to compromise a system, while an ethical hacker has official permission and legally assesses the security status of a target system. The goal of ethical hacking is to identify weaknesses and vulnerabilities in a system so that the company can fix them. An ethical hacker documents everything he or she does. At the beginning of the millennium, large companies and government organizations realized that hackers should not be fought, but rather cooperated with.
This may not completely eliminate attacks, but it greatly reduces their number. The reward depends on the size of the company and its level of security. Here are some examples. Tesla is ready to pay $10,000 to anyone who finds a breach in their security. Pinterest's reward starts at $50, with a maximum of $1,500.
The one-time earnings limit for hacking Dropbox is just under $5,000. But Facebook has a fixed rate for a tank - $500. However, many companies simply cannot afford such security costs, so they have to turn not to experienced hackers, but to ordinary users. This happens with the help of special platforms. I will tell you about these platforms and the size of the fish that live there a little later in this video. As a spoiler, I will say that if you study and become a hacker, even a not very good one, then such services can be used for part-time work.
2. Black hat. This is a classic hacker. Here, I think, everything is clear. These are crackers. Professional hackers whose main task is to hack a computer system for serious purposes, be it theft or substitution of information stored there. In general, in order to hack a system, it is necessary to go through three main stages. Research of the computing system and identification of flaws in it.
Development of software implementation of the attack. And its direct implementation. Naturally, a real professional can be considered a hacker who goes through all three stages to achieve his goal.
3. Gray hat. A person who gains unauthorized access but reveals companies' weak points. Often these are just anonymous amateurs who know their business well and mean no harm.
4. Script kiddie. A person without technical skills who simply uses ready-made tools.
Most hacker videos on YouTube are aimed at such hackers. Such tools include various brute forces, parsers, and other software that is usually leaked into various thematic forms. If you use such and boldly call yourself a hacker, then you better cool your ardor. You are not considered a full-fledged hacker.
5. Hacktivist. A person who hacks a system while pursuing some idea. Usually, such hackers leave public messages and they, most often being teams, are much more famous than other hackers.
To work in the field of information security, legal or not, you need basic knowledge in IT. The good news is that you don’t have to have a specialized education for this. Studying at an ultrasound scan in your specialty does not guarantee that a person will be able to work in the profession right away; there is too little practice. You can get basic knowledge at an IT school in 6-12 months, studying without compromising your main job. An advanced course with a narrow specialization will take another 6-8 months.
The average cost of a basic course on the market is from 180 thousand rubles for 12 months. An advanced course is from 100 thousand rubles for 8 months, that is, 10-18 thousand rubles per month. This is a lot, I agree, and it does not suit us, so we will study at home, and we do not intend to pay tens or even hundreds of thousands of rubles. So what does a beginner hacker need to know and be able to do? Know the basics of programming. For example, you can choose Python and take a short course to understand the basics.
Easily pass math tests, for example, Talent Queue. This is if you want to be a normal hacker. Here, if anything, you can also pull up knowledge at any time. Be attentive. In fact, this point is suitable for almost any activity. Somewhere inattention will lead to your finger being cut off, and here you will simply get caught or fail your venture. Depending on what exactly you are going to do.
Know English. Yes, this is very desirable, since most of the literature and lessons in this area are in English. Of course, I will tell you where to get it in Russian, but in the future, English will still be required. Not only in hacking, but also in regular programming and many other specialties. Have basic knowledge of Linux, IP addressing, static routing. That is, know what Internet networks are and how they work. Now let me tell you where to get the necessary knowledge.
I have already made a video about the courses, but I will mention it here. There are many good courses that can make you a hacker. They will teach you the basic knowledge of a hacker, Internet protocols, traffic analysis tools, traffic encapsulation, the channel layer. They will teach you how to use Linux, ensure anonymity. They will teach you to identify people, including other hackers, right down to their location. They will teach social engineering, tell you how to use crypto, hack Wi-Fi, look for vulnerabilities in equipment and hardware, and so on.
Basically, everything a hacker needs to know. These courses are usually very expensive, for example, here is a well-known author of hacker courses, Plastik. We go to his website, now the price of the course is 50 thousand rubles, and this is with a discount, but after you complete it, you will probably want more courses. How much money do you need to have?
So, in this topic I mentioned that there are platforms where companies pay ordinary users to find a vulnerability in their digital product. Here are some of these services.
Bug Crude is one of the largest platforms for legal hacking. At the moment, more than 22 thousand hackers are registered on it, and the amount of payments has exceeded 1 million dollars.
Famous clients are Microsoft, Western Union, Tumblr, MasterCard, Pinterest. How does it all work? You register, go to the program page, read the terms, hack the system, write a report, receive a transfer the next Wednesday.
SignEc is the first of such platforms. It is distinguished by a serious approach to the selection of hackers. You need to register, send a resume, pass tests and interviews. Among the features is the fact of a one-time payment of 30 thousand dollars.
Famous clients are the US Department of Defense and the Internal Revenue Service. How does it work? After you sign up for the Red Team, tasks will come automatically, payments within 24 hours. HackerOne HackerOne is known for the largest number of rewards. At the moment, the amount has reached almost 20 million dollars. You will have to hack APIs and applications for iOS and Android. Famous clients are Uber, Yahoo, Starbucks, Adobe, Snapchat, the US Department of Defense.
How does it work? Register, sign up for a task, find a bug, send a report. In a maximum of 7 days, you will receive a reward via PayPal.
Cobalt is a young platform for small companies. There are no large payments here. The fixed fork is 100 thousand dollars. Famous clients are Weebly, Wix, Nexmo. How does it work? Register as a tester. After completing the task, you need to send a report in the established form and wait up to 30 days for payment. You will receive money via PayPal or cryptocurrency.
Thanks to such hacking platforms, you can test your knowledge without going to the devil of the law. In addition, it is a lot of fun. Where else can you legally hack the website of the US Department of Defense, and even get tens of thousands of dollars for it? The only thing left to do is find a security breach, and to be able to do that, you just need to learn. I think we can stop here.
And I'm leaving. I'm leaving beautifully.
It is worth understanding that a hacker in the movies and a hacker in real life are completely different people. Today I will tell you who hackers are and how to become one of them. In addition, you will learn what exactly you need to learn and do to become a hacker, and I will also tell you where you can get and learn all the necessary knowledge in a comprehensive manner. So, if you want to become a hacker, perhaps even an ethical one, more on that later, then this video will be very useful for you, so guys, read carefully, it will be entertaining.
First of all, what is hacking? It is the art of hacking all sorts of systems and bringing this process to the heights of technical elegance. A hacker is an individual who enjoys studying the details of how computer systems work and expanding their capabilities, unlike most computer users who prefer to know only the bare minimum. This is a programming enthusiast who enjoys the process of programming itself, rather than theorizing about it.
In simple terms, this is a guru of computer systems. First, let's immediately understand that the expression "career in cybersecurity" is a bit like the expression "career in banking". That is, it is an umbrella term covering dozens of niches in the industry. In cybersecurity, we can, for example, talk about digital forensics or malware detection, software, security auditing, pentesting, social engineering and many other areas. Each of these subcategories within cybersecurity deserves a separate video.
But for the purposes of this particular video, let's focus on some important general requirements that everyone needs before embarking on a successful career in IT security, or, roughly speaking, becoming a good hacker. If you don't have any experience, don't worry, we all start somewhere, no one is born with all the necessary skills. Let's first understand what types of hackers there are, i.e. their classifications.
1. White hat, or ethical hacker. The hacker everyone imagines gaining unauthorized access to compromise a system, while an ethical hacker has official permission and legally assesses the security status of a target system. The goal of ethical hacking is to identify weaknesses and vulnerabilities in a system so that the company can fix them. An ethical hacker documents everything he or she does. At the beginning of the millennium, large companies and government organizations realized that hackers should not be fought, but rather cooperated with.
This may not completely eliminate attacks, but it greatly reduces their number. The reward depends on the size of the company and its level of security. Here are some examples. Tesla is ready to pay $10,000 to anyone who finds a breach in their security. Pinterest's reward starts at $50, with a maximum of $1,500.
The one-time earnings limit for hacking Dropbox is just under $5,000. But Facebook has a fixed rate for a tank - $500. However, many companies simply cannot afford such security costs, so they have to turn not to experienced hackers, but to ordinary users. This happens with the help of special platforms. I will tell you about these platforms and the size of the fish that live there a little later in this video. As a spoiler, I will say that if you study and become a hacker, even a not very good one, then such services can be used for part-time work.
2. Black hat. This is a classic hacker. Here, I think, everything is clear. These are crackers. Professional hackers whose main task is to hack a computer system for serious purposes, be it theft or substitution of information stored there. In general, in order to hack a system, it is necessary to go through three main stages. Research of the computing system and identification of flaws in it.
Development of software implementation of the attack. And its direct implementation. Naturally, a real professional can be considered a hacker who goes through all three stages to achieve his goal.
3. Gray hat. A person who gains unauthorized access but reveals companies' weak points. Often these are just anonymous amateurs who know their business well and mean no harm.
4. Script kiddie. A person without technical skills who simply uses ready-made tools.
Most hacker videos on YouTube are aimed at such hackers. Such tools include various brute forces, parsers, and other software that is usually leaked into various thematic forms. If you use such and boldly call yourself a hacker, then you better cool your ardor. You are not considered a full-fledged hacker.
5. Hacktivist. A person who hacks a system while pursuing some idea. Usually, such hackers leave public messages and they, most often being teams, are much more famous than other hackers.
To work in the field of information security, legal or not, you need basic knowledge in IT. The good news is that you don’t have to have a specialized education for this. Studying at an ultrasound scan in your specialty does not guarantee that a person will be able to work in the profession right away; there is too little practice. You can get basic knowledge at an IT school in 6-12 months, studying without compromising your main job. An advanced course with a narrow specialization will take another 6-8 months.
The average cost of a basic course on the market is from 180 thousand rubles for 12 months. An advanced course is from 100 thousand rubles for 8 months, that is, 10-18 thousand rubles per month. This is a lot, I agree, and it does not suit us, so we will study at home, and we do not intend to pay tens or even hundreds of thousands of rubles. So what does a beginner hacker need to know and be able to do? Know the basics of programming. For example, you can choose Python and take a short course to understand the basics.
Easily pass math tests, for example, Talent Queue. This is if you want to be a normal hacker. Here, if anything, you can also pull up knowledge at any time. Be attentive. In fact, this point is suitable for almost any activity. Somewhere inattention will lead to your finger being cut off, and here you will simply get caught or fail your venture. Depending on what exactly you are going to do.
Know English. Yes, this is very desirable, since most of the literature and lessons in this area are in English. Of course, I will tell you where to get it in Russian, but in the future, English will still be required. Not only in hacking, but also in regular programming and many other specialties. Have basic knowledge of Linux, IP addressing, static routing. That is, know what Internet networks are and how they work. Now let me tell you where to get the necessary knowledge.
I have already made a video about the courses, but I will mention it here. There are many good courses that can make you a hacker. They will teach you the basic knowledge of a hacker, Internet protocols, traffic analysis tools, traffic encapsulation, the channel layer. They will teach you how to use Linux, ensure anonymity. They will teach you to identify people, including other hackers, right down to their location. They will teach social engineering, tell you how to use crypto, hack Wi-Fi, look for vulnerabilities in equipment and hardware, and so on.
Basically, everything a hacker needs to know. These courses are usually very expensive, for example, here is a well-known author of hacker courses, Plastik. We go to his website, now the price of the course is 50 thousand rubles, and this is with a discount, but after you complete it, you will probably want more courses. How much money do you need to have?
So, in this topic I mentioned that there are platforms where companies pay ordinary users to find a vulnerability in their digital product. Here are some of these services.
Bug Crude is one of the largest platforms for legal hacking. At the moment, more than 22 thousand hackers are registered on it, and the amount of payments has exceeded 1 million dollars.
Famous clients are Microsoft, Western Union, Tumblr, MasterCard, Pinterest. How does it all work? You register, go to the program page, read the terms, hack the system, write a report, receive a transfer the next Wednesday.
SignEc is the first of such platforms. It is distinguished by a serious approach to the selection of hackers. You need to register, send a resume, pass tests and interviews. Among the features is the fact of a one-time payment of 30 thousand dollars.
Famous clients are the US Department of Defense and the Internal Revenue Service. How does it work? After you sign up for the Red Team, tasks will come automatically, payments within 24 hours. HackerOne HackerOne is known for the largest number of rewards. At the moment, the amount has reached almost 20 million dollars. You will have to hack APIs and applications for iOS and Android. Famous clients are Uber, Yahoo, Starbucks, Adobe, Snapchat, the US Department of Defense.
How does it work? Register, sign up for a task, find a bug, send a report. In a maximum of 7 days, you will receive a reward via PayPal.
Cobalt is a young platform for small companies. There are no large payments here. The fixed fork is 100 thousand dollars. Famous clients are Weebly, Wix, Nexmo. How does it work? Register as a tester. After completing the task, you need to send a report in the established form and wait up to 30 days for payment. You will receive money via PayPal or cryptocurrency.
Thanks to such hacking platforms, you can test your knowledge without going to the devil of the law. In addition, it is a lot of fun. Where else can you legally hack the website of the US Department of Defense, and even get tens of thousands of dollars for it? The only thing left to do is find a security breach, and to be able to do that, you just need to learn. I think we can stop here.
And I'm leaving. I'm leaving beautifully.