#Thread
How_To_Became a Great #hacker

1. Learn TCP/IP, Basic Information
gathering, Proxies, Socks, SSL, VPN, VPS, RDP,
FTP, POP3, SMTP, Telnet, SSH.
2. Learn Linux, Unix, Windows - You can do
this using vmware or any virtual desktop
utility.
#CybersecurityAwarenessMonth
3. Learn a programming language that's
compatible with all OS - Perl, Python, C, ASM
4. Learn HTML, PHP, Javascript, ASP, XML, SQL,
XSS, SQLI, RFI, LFI
5. Learn Reverse engineering and crack
some programs for serials easy ones like
mirc, winzip, winrar or old games.
6. Code a fuzzer for common protocols - ftp,
pop3, 80, 8080 - Pick some free software
like ftp server, mail server, apache or iis
webserver or a webserver all-in-one pack,
or teamspeak, ventrilo, mumble.
7. Code a tool that uses grep to sort out
unique code in source codes.
8. Make a custom IPtable, IPsec firewall that
blocks all incoming traffic and out going
traffic and add filters to accept certain ports
that your software or scripts use.
9. Pick a kernel in linux or unix, also pick a
Microsoft OS version lets say Winxp pro sp2
put them on the virtual desktops (vmware)
and find and code a new local exploit in
those versions, then install a Apache
webserver on the Linux/Unix and a IIS
webserver on the winxp pro and attempt to
find and code a new local reverse_tcp_shell
exploit.
11. Learn Checkpoint Setup and Config
12. Learn Wifi scanning, cracking, sniffing.
13. Pick a person in you phonebook for the
area code you live in or city then ring the
person on a anonymous line like skype or a
payphone or a carded sim and attempt to
social engineer the person for his name,
address, data of birth, city
born, country
born, ISP connected with, Phone company
connected with, What bank he/she uses
and anything else you can get. Then
Attempt to ring using a spoof caller ID
software with the person's phone number -
call the ISP and try reset the password to
his/her internet connection/web-mail, get
access to bank account or ask them to send
out a new *** to a new address (drop)
with a new pin, reset of phone company
passwords.
14. Use your information gathering skills to
get all the information off a website like a
shop then use the spoof caller-id software
or hack your phone to show a new number
of the Webserver's Tech Support number
then ring the shop owner and try get the
shop site password.
15. Do the same thing but attempt to use a
web attack against a site or shop to gain
admin access.
16. Once got access upload a shell and
attempt to exploit the server to gain root
using a exploit you coded not someone else
s exploit.
17. Make your own Linux Distro
18. Use your own Linux Distro or use a
vanilla Linux gnome (not kde) keep itwith
not much graphics so you can learn how to
depend on the terminal and start from
scratch install applications that you will only
need for a blackbox (Security test box),
own scripts and other tools ( By this stage
you shouldn't need to depend on other
peoples scripts).
19. Learn macosx and attempt to gain
access to a Macosx box whether it be your
own or someone's else.
20. Create a secure home network and
secure your own systems with your own
Security policies and firewall settings.
Source : Cyber Army

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Cypher (Ciphar 1337)

Cypher (Ciphar 1337) Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @ciphar_TheViper

Oct 10
#Thread
Kali Linux Sections Explained

Information Gathering

These are Reconnaissance tools used to gather data on your target network and devices. Tools range from identifying devices to
protocols used.

(1/n)
#KaliLinux #CyberSecurity #Hacking
Vulnerability Analysis

Tools from this section focus on evaluating systems for vulnerabilities. Typically, these are run against systems found using the
Information Gathering Reconnaissance tools.

(2/n)
Web Applications

These are tools used to audit and exploit vulnerabilities in web servers. Many of the audit tools we will refer to in this book come
directly from this category.

(3a/n)
Read 20 tweets
Jul 23, 2020
#PTMExposed ...! (Thread)
So we finally uncovering the social media cells of so called parties.. we have honey trapped one of social media handle responsible for trending hashtags,viral videos, anti state ,anti government content .
Worked on him from Month ..
#PTMBehindTerrorism
To gain his trust .he is from #PTM_QUETTA International relations student working with various political parties including #PTM ,#PPP #PMLN and some #PTI Minsters . He claims takes 100s of thousands of from them to make #Propaganda I also got his number from one of
High political person also paid him just 10,000 due to that references. as I'm attaching Screenshots below you can see how they work (sorry for hiding all info due to involvement of high profile political people to get him)
Read 13 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(