I never knew, someone can track ip and know other people’s location.
And also I can connect Wi-fi without owne’s permissionon.
It was awesom.
I immediately started googling about everything.
I have learning about hacking , Those days I was learning about termux .
I was download tools from github like Hakku , IP GeoLocation , airgeddon , katana , ReconDog etc… And I was thinking myself hacker.
LOLThen after one month I have no any phone or internet connection so I need to stop my learning journey for one year.
I started learning about hacking again one month ago in 24th MayWhat I have learn in one month ?I want to be a pentester so I need CEH certificate.
But I saw a problem, I can’t find any group in social media or anywhere.
In facebook I come across group where people asking “How can I hack facebook?”.
Same question again again and again.
Learning About Bug BountySo , after googling I found a term Bug Bounty .
I started researching about bug bounty and I learning about many bug bounty platform like:1.
cobaltIn this platforms you can find bug exchange with money.
But remember never ever work for money.
“If you do what you love, you’ll never work a day in your life ”- Marc AnthonyMany people rush for earning without learning.
Firstly you need to focus on you learning.
Now , How to get started with bug Bounty ?There are some books for web penetration testing and how you can find vulnerability in a website.
And also this books will clear you understanding about how website and internet works.
Web Hacking 1012.
Mastering Modern Web Penetration Testing3.
The Hacker Playbook 2: Practical Guide to Penetration Testing4 .
The Web Application Hacker’s Handbook: Finding and Exploiting Security FlawThere is some youtube channel I personally like.
I suggest you don’t follow what everyone going to tell you.
Make your own path.
YouTube Channels:LiveOverflowjust a wannabe hacker.
-=[ ❤️ Support me ]=- Patreon per Video: https://www.
comSTÖKHey buddy!.Im that hacker guy that your friends told you about.
I travel the world, hack and vlog about the bountylife…www.
comIf you watch all videos of this two channel then you are pro in bug bounty.
Things You Must Read And Learn:You need to clear basic understanding about -1.
How HTTP works2.
How Networking works3.
What is TCP/IP Model4.
How LinuxCommand workNow, you have basic understanding about Networking , Bug Bounty Programs And you also can easily play with a terminal.
You also know about what is XSS, Sql injection , XEE etc.
Now, It’s Time To Learn Python:You must learn programming language and python is a great programming language to start with.
It is easy to use and also very powerful language.
There are many powerful library that will help thing to do easilyBooks:Here is some free and paid books you can read to learn python.
And The last book this my personal favorite one.
Paid book : Python CookBook, Third Edition2.
Free Book : How To Think Like A Computer Scientist: Learning With Python, by Allen Downey, Jeff Elkner and Chris Meyers3.
Beginner Book : Head First Python: A Brain-Friendly Guide4.
Cool Book : Automate The Boring Stuff With Python5.
For Hacking : Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers 1st EditionYoutube Channels:There are many youtube video available to learn about python.
In case if you don’t know you can watch this channelsTeluskoHey Aliens!!!.I make free programming tutorials from beginner to advanced level That includes Java for beginner…www.
comedureka!Thank you for Subscribing!.If you have not, Subscribe now!.We are a live & interactive e-learning platform with the…www.
FisherLearn about Web Development, Python and Machine Learning.
orgWe're an open source community of busy people who learn to code and build projects for nonprofits.
comNow , you are expert in python.
There are many website for this .
HackerRankHackerEarthSololearnCodewarsCodechefNow, you know programming you know about networking, you know about linux ,python , js programming.
It time to play a real game with real world (No you don’t ready for bug bounty in hackerone or bugcrowd ???? ????)Lets Play CTFs:If you don’t know , what CTF is I am telling it shor.
CTF(capture the flag) is like games, but it is for hacker and pentesters.
You need to find a flag (a piece of code) in website or a virtual machine.
In many CTF there is two teams one is red team(who will attack) and other is blue team(who will defence the system)Now, there are many website give you to test you skillHacktheboxHacker101RootmeHackmeXSS Game by GoogleCTF365BWAPPBackdoorThere is some website like hackthebox , vulnhub gives you to test you skill on vms.
You can download vms from vulnhub and test it in you computer.
It’s Time to Hack:Pentesting , bug bounty is a small part of hacking.
Which path you want to chose ?.It is all about you cricuty and hunger to learn.
Now, let’s talk about hacking.
For hacking you also need to learn many thing likeFootprintingScanningSystem HackingMalware ThreatsSniffingSocial EngineeringDenial of ServiceSession HijackingHacking web ServersWeb Application AttacksSQL InjectionHacking Wireless NetworksHacking Mobile DevicesBotsCryptographyReverse EngineeringYou need to learn everything And be expert in some things.
A hacker is not expert in everything.
Because it is impossible to be an expert in every field.
YouTube Channels :There are tons of thousands of videos on hacking.
But you need to be clean what you want to watch in youtube.
You want to watch videos how to use other people tools?.or You want to make your own?JackkTutorialsBlogger, Screencaster and Teacher.
My name is Jackk and this is my YouTube channel dedicated to Tutorial Production and…www.
comNull ByteThe official Null Byte channel for video content!.We focus on creating videos for aspiring ethical hackers, computer…www.
comHackerSploitAbout HackerSploit HackerSploit is a Cybersecurity training and consulting company that specializes in: Cybersecurity…www.
comHak5Put together by a band of IT ninjas, security professionals and hardcore gamers, Hak5 isn't your typical tech show.
comPentester Academy TVPentester Academy TV, the media arm of Pentester Academy, informs the cyber security community with programs focused on…www.
comPenetration Testing in LinuxDisclaimer: All information and software available on this site are for educational purposes only.
Use these at your…www.
comBooks:There are also many books on hacking but i will suggest you to read book on specific tropic.
Then it will clear to understand the concepts.
You goal should be to choose one thing about know everything about that.
Metasploit: The Penetration Tester’s GuideNmap Network Scanning: The Official Nmap Project Guide(2011)Wireshark 101: Essential Skills for Network Analysis(2013)The Shellcoder’s Handbook: Discovering and Exploiting SecurityHolesHacking Secret Ciphers with Python: A beginner’s guide to cryptography and computer programming with PythonGray Hat Hacking 3rd editionKali Linux — Assuring Security by Penetration TestingThere is also many books.
Google on you interest.
Now Let’s Be Some Social :You greatest tool is social media.
You can get tons of information through it and also for free.
Facebook is full of fake hacking group and pages.
Through it I found some good resourceFaceBook:KitPloit – PenTest And Hacking ToolsKitPloit – PenTest And Hacking Tools.
36,886 likes · 783 talking about this.
Leading source of Security Tools, Hacking…www.
comHackTheBoxHackTheBox has 7,403 memberswww.
comExploitWareLabsExploitWareLabs – Seoul, Korea – Rated 5 based on 86 Reviews "Soon more TI analysts will be following this.
226,148 likes · 2,228 talking about this.
Darknet is your best source for the latest hacking tools…www.
comAnonymousAnonymous, New York, New York.
10,485,568 likes · 1,776,626 talking about this.
We are an anonymous, internet-based…www.
comPodcast :There is very good podcast out there.
I generally use castbox to listen podcast you can also find podcasts in itune.
Darknet Diaries | Listen Free on Castbox.
Explore the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world…castbox.
fmThe CyberWire | Listen Free on Castbox.
More signal, less noise-we distill the day's critical cyber security news into a concise daily briefing.
fmRisky Business | Listen Free on Castbox.
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry…castbox.
fmHackable?.| Listen Free on Castbox.
We see lots of movies and TV shows where hackers can infiltrate our lives with just a few keystrokes.
But is it real…castbox.
fmMalicious Life | Listen Free on Castbox.
Stories about cybersecurity.
The wildest hacks you can ever imagine, told by people who were actually there.
fmExploring Information Security – Timothy De Block | Listen Free on Castbox.
The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and…castbox.
fmTwitter :In twitter you follow this tags#infosec#ddos#pentestcyber security#cyber#hacking#ctf#BugBountyTip#databreachHow Much Time It Takes To be An Expert?:Generally you need 10,000 hours to be expert in anything.
But you need to be expart in one thing.
You notice that in a hacking group every hacker are expert in there own field.
Like one hacker is best in reverse engineering and the other open is password cracking another one finding vulnerability.
So you need to be persistent in you work.
Don’t waste you time.
Just keep learning everyday.
And yes I learned this things in one month.
Thank you for your time ☺️ ☺️.. More details