Getting Started


Download the following:

1. VMware Player - This will let you have more than one operating system in a single machine.
Yeah! its awesome. We will create our hacking lab using this. Because hacking  other machine might put us behind the bars.

How to install VMware Player on Windows

2. Kali Linux - A Hacker's dream come true, An operating system built especially for hacking/penetration testing. Yes! we will install this to our VMware virtual machine. This will be our attacking machine.

How to install Kali Linux in VMware Player

3. Metasploitable - This will be our target machine. We will also install this in our VMware Player. Like what I said before, hacking other machine that we are not authorize might put us behind the bars.

How to install Metasploitable in VMware Player 


Lets dig deeper:

The importance of preparing our hacking lab is that, we have our own network that we can practice our hacking skills. DO NOT try to hack into machines that you are not authorize. I'm telling you this because it will be more difficult to practice hacking in jail, I bet that there is no free wifi network there. Portability is also one of the reason because our hacking lab resides on a single machine (Computer). 

I recommend using the free version of VMware Player cause we are somehow just starting out to be a hacker. Yes! that right, I said "we" ehem!. 

OVERVIEW OF HOW HACKING IS DONE:

1. Information gathering - The most important part is information gathering, the more information  you collect about your target machine the great is your chance of success. Scanning a target system is a common method to identify what ports are open, what services is there, lastly is it vulnerable? if it is then lets move to Exploitation. 

2. Exploitation - In this phase, we are actually exploiting the vulnerability we have discovered previously to gain access and take control of the target machine. Wow! just like in the movies. Am I doing this? Hell yeah!

3. Maintaining your access - Maintaining your access to the victim (target machine) is important when you are still not done in doing nasty things to it. It will make it easier to gain access to the victim with out going back to step 1. Lazy hacker haha!

4. Clear out your tracks - As sound as it seems, stubbing somebody and leaving your finger print in the knife you use to attack a victim makes you get caught so easily. It is a good habit to leave NO evidence behind.




 

No comments:

Post a Comment

Ubuntu disk usage analyzer

What is a disk usage analyzer? Disk Usage Analyzer is a graphical application to analyse disk usage. Disk Usage Analyzer can easily scan y...