Well, This is going to be funny but trust me it's amazing and even if you read this till the end you are going to say me "thank you but i'm dropping this idea To Became A Great hacker ?"
Go ahead at your own risk.
XSS, SQLI, RFI, LFI
webserver on the Linux/Unix and a IIS webserver on the winxp pro and attempt to find and code a new local reverse_tcp_shell exploit.
need for a blackbox (Security test box), make folders for fuzzers, exploits, scanners..etc Then load them up with your own scripts and other tools ( By this stage you shouldn't need to depend on other peoples scripts).
Go ahead at your own risk.
STEP 1.
Learn TCP/IP, Basic Information gathering, Proxies, Socks, SSL, VPN, VPS, RDP, FTP, POP3, SMTP, Telnet, SSH.STEP 2.
Learn Linux, Unix, Windows - You can do this using vmware or any virtual desktop utility.STEP 3.
Learn a programming language that's compatible with all OS - Perl, Python, C, ASMSTEP 4.
Learn HTML, PHP, Javascript, ASP, XML, SQL,XSS, SQLI, RFI, LFI
STEP 5.
Learn Reverse engineering and crack some programs for serials easy ones like mirc, winzip, winrar or old games.STEP 6.
Code a fuzzer for common protocols - ftp, pop3, 80, 8080 - Pick some free software like ftp server, mail server, apache or iis webserver or a webserver all-in-one pack, or teamspeak, ventrilo, mumble.STEP 7.
Code a tool that uses grep to sort out unique code in source codes.STEP 8.
Make a custom IPtable, IPsec firewall that blocks all incoming traffic and out going traffic and add filters to accept certain ports that your software or scripts use.STEP 9.
Pick a kernel in linux or unix, also pick a Microsoft OS version lets say Winxp pro sp2 put them on the virtual desktops (vmware) and find and code a new local exploit in those versions, then install a Apachewebserver on the Linux/Unix and a IIS webserver on the winxp pro and attempt to find and code a new local reverse_tcp_shell exploit.
STEP 10.
Learn Cisco Router and Switch configuration and setup.STEP 11.
Learn Checkpoint Setup and ConfigSTEP 12.
Learn Wifi scanning, cracking, sniffing.STEP 13.
Pick a person in you phonebook for the area code you live in or city then ring the person on a anonymous line like skype or a payphone or a carded sim and attempt to social engineer the person for his name, address, data of birth, city born, country born, ISP connected with, Phone company connected with, What bank he/she uses and anything else you can get. Then Attempt to ring using a spoof caller ID software with the person's phone number - call the ISP and try reset the password to his/her internet connection/web-mail, get access to bank account or ask them to send out a new *** to a new address (drop) with a new pin, reset of phone company passwords.STEP 14.
Use your information gathering skills to get all the information off a website like a shop then use the spoof caller-id software or hack your phone to show a new number of the Webserver's Tech Support number then ring the shop owner and try get the shop site password.STEP 15.
Do the same thing but attempt to use a web attack against a site or shop to gain admin access.STEP 16.
Once got access upload a shell and attempt to exploit the server to gain root using a exploit you coded not someone else s exploit.STEP 17.
Make your own Linux DistroSTEP 18.
Use your own Linux Distro or use a vanilla Linux gnome (not kde) keep itwith not much graphics so you can learn how to depend on the terminal and start from scratch install applications that you will onlyneed for a blackbox (Security test box), make folders for fuzzers, exploits, scanners..etc Then load them up with your own scripts and other tools ( By this stage you shouldn't need to depend on other peoples scripts).
Comments
Post a Comment