Saturday, June 27, 2015

Simple Step To Become Hacker





Steps to become a hacker



Hacking is an engaging field but it is surely not easy. To become a hacker one has to have an attitude and curiosity of learning and  new skills. You must have a deep knowledge of computer systems, programming languages, operating systems and the journey of learning goes on and on. Some people think that a hacker is always a criminal and do illegal activities but they are wrong. Actually many big companies hire hackers to protect their systems and information and are highly paid. We have prepared a list of 12 most important steps necessary to become a hacker, have a deeper look.



1. Learn UNIX/LINUX


linux operating system
UNIX/LINUX is an open source operating system which provides better security to computer systems. It was first developed by AT&T in Bell labs and contributed a lot in the world of security. You should install LINUX freely available open source versions on your desktops as without learning UNIX/LINUX, it is not possible to become a hacker.

2. Code in C language 

c programming
   C programming is the base of learning UNIX/LINUX as this operating system is coded in
 C programming which makes it the most powerful language as compared to other programming languages. C language was developed by Dennis Ritchie in late 1970’s. To become a hacker you should master C language.

3. Learn to code in more than one Programming Language

programming languages

It is important for a person in the hacking field to learn more than one programming. There are many programming languages to learn such as Python, JAVA, C++. Free eBooks, tutorials are easily available online.

4. Learn Networking Concepts

computer networking
Another important and essential step to become a hacker is to be good at networking concepts and understanding how the networks are created. You need to know thedifferences between different types of networks and must have a clear understanding of TCP/IP and UDP to exploit vulnerabilities (loop holes) in system.
Understanding what LAN, WAN, VPN, Firewall is also important.
You must have a clear understanding and use of network tools such as Wireshark, NMAP for packet analyzing, network scanning etc.

5. Learn More Than One Operating Systems 

operating system
It is essential for a hacker to learn more than one operating system. There are many other Operating systems apart from Windows, UNIX/LINUX etc. Every system has a loop hole, hacker needs it to exploit it.

6. Learn Cryptography

cryptography encryption
To become a successful hacker you need to master the art of cryptography. Encryption and Decryption are important skills in hacking. Encryption is widely done in several aspects of information system security in authentication, confidentiality and integrity of data. Information on a network is in encrypted form such as passwords. While hacking a system, these encrypted codes needs to be broken, which is called decryption.

7. Learn more and more about hacking

hacking or hackers
Go through various tutorials, eBooks written by experts in the field of hacking. In the field of hacking, learning is never ending because security changes every day with new updates in systems.


8. Experiment A Lot

experiment
After learning some concepts, sit and practice them. Setup your own lab for experimental purpose. You need a good computer system to start with as some tools may require powerful processor, RAM etc. Keep on Testing and learning until you breach a system.

9. Write Vulnerability (Loop hole program)

hacking vulnerability

Vulnerability is the weakness, loop hole or open door through which you enter the system. Look for vulnerabilities by scanning the system, network etc. Try to write your own and exploit the system.

10. Contribute To Open Source Security Projects

open source software
An open source computer security project helps you a lot in polishing and testing your hacking skills. It’s not a piece of cake to get it done. Some organizations such as MOZILLA, APACHE offer open source projects. Contribute and be a part of them even if your contribution is small, it will add a big value to your field.

11. Continue never ending Learning 

learning hacking
Learning is the key to success in the world of hacking. Continuous learning and practicing will make you the best hacker. Keep yourself updated about security changes and learn about new ways to exploit systems.

12. Join Discussions and meet hackers 

discussion
Most important for a hacker is to make a community or join forums, discussions with other hackers worldwide, so that they can exchange and share their knowledge and work as a team. Join Facebook groups related to hacking where you can get more from experts.


This Site Is Secure

 There is a widespread awareness that security is an issue for web applications.
Consult the FAQ page of a typical application, and you will be reassured that
it is in fact secure.
   
*  Most applications state that they are secure because they use SSL.

For example:
   
       This site is absolutely secure. It has been designed to use 128-bit Secure Socket
 Layer (SSL) technology to prevent unauthorized users from viewing any of your
 information. You may use this site with peace of mind that your data is safe with us.
 Users are often urged to verify the site’s certifi cate, admire the advanced cryptography
 protocols in use, and, on this basis, trust it with their personal information.

*  Increasingly, organizations also cite their compliance with Payment Card
   Industry standards to reassure users that they are secure.

For example:

We take security very seriously. Our web site is scanned daily to ensure that we
remain PCI compliant and safe from hackers. You can see the date of the latest scan
on the logo below, and you are guaranteed that our web site is safe to use.

     In fact, the majority of web applications are insecure, despite the widespread
 usage of SSL technology and the adoption of regular PCI scanning. The authors
of this book have tested hundreds of web applications in recent years. Figure 1-3
shows what percentage of applications tested during 2007 and 2011 were found
to be affected by some common categories of vulnerability:

1. Broken authentication (62%) — This category of vulnerability encompasses
various defects within the application’s login mechanism, which
may enable an attacker to guess weak passwords, launch a brute-force
attack, or bypass the login.

2. Broken access controls (71%) — This involves cases where the application
fails to properly protect access to its data and functionality, potentially
enabling an attacker to view other users’ sensitive data held on the server
or carry out privileged actions.

3. SQL injection (32%) — This vulnerability enables an attacker to submit
crafted input to interfere with the application’s interaction with back-end
databases. An attacker may be able to retrieve arbitrary data from the
application, interfere with its logic, or execute commands on the database
server itself.

4. Cross-site scripting (9 4%)— This vulnerability enables an attacker to
target other users of the application, potentially gaining access to their
data, performing unauthorized actions on their behalf, or carrying out
other attacks against them.

5. Information leakage (78%) — This involves cases where an application
divulges sensitive information that is of use to an attacker in developing
an assault against the application, through defective error handling or
other behavior.

6. Cross-site request forgery (92%) — This fl aw means that application
users can be induced to perform unintended actions on the application
within their user context and privilege level. The vulnerability allows a
malicious web site visited by the victim user to interact with the application
to perform actions that the user did not intend.

Friday, June 26, 2015

The Monsters of Education Technology


        The Monsters of Education Technology

                     A Hack Education Project

  I spent much of 2014 on the road, traveling and speaking
extensively about education technology’s histories, ideologies,
and mythologies.
The Monsters of Education Technology is a collection of
fourteen of those talks on topics ranging from teaching
 machines to convivial tools, from ed-tech mansplaining to
information justice.

Print and e-book versions are available for purchase via Amazon.
You can also purchase e-book versions via Smashwords.
                                                 Or
You can buy from me directly. (I guess it depends on who you
want to give a cut.) I’ve also made the files freely available to
download here (right click to save the file):
MOBI (BuyDownload)
EPUB (BuyDownload)
PDF (BuyDownload)
Thank you for supporting my work.