Skip to main content

The daily blog of October 17

The daily blog of October 17

It's night of 9:20pm(GMT+5:30) the day was good weather was pleasant. lying on bed and just thinking that what if I would became an hacker, then how would be my day as an hacker, because I had learnt the basics of hacking from online sources. It all started in lockdown when I heard a news that "the zoom application has been hacked and the government data has been stolen "this line developed craze in me about hacking and  Araised so many questions in my mind that , what is hacking, how it's performed and how we protect ourselves from this kind of activities, I started collecting minute details about Hacking from zero, I learnt almost every thing from installing kali Linux in virtual machine to bug bounty by myself. Their some books like "web hosting101,penetration testing, etc. which helped me lot but their are so many things that remained untouched because the field is vast.

I use Kali Linux operating system for learning and performing hacking because Kali Linux provided me more than 600 tools for perform hacking, there are many other OS like Ubuntu, Parrot, Garuda etc.

About life of Hacker

When you hear the word "hacking," do you imagine someone wearing a hooded sweatshirt sitting in a dark basement and tapping like crazy on a keyboard? The image could be of a hacker - or the hacker could be a soft-spoken old woman sitting at the table in front of you in a coffee shop. She's smiling while drinking coffee because she's got access to your device because you're connected to public WiFi.

Hacking has become so common that almost anyone can do it - and many people do. By taking a look at a hacker's typical day and the most common hacks they perform, you can learn how to avoid these attacks.



understanding the environment

No two organizations are alike. An organization's technology, culture, and habits determine the various attack vectors available to a threat actor. An ethical hacker must work with a customized approach on each new simulation to investigate the customer's unique environment.

vulnerability detection

Unsurprisingly, a large portion of an ethical hacker's time is spent looking for vulnerabilities in the environment. Where there are weaknesses will depend on the scope and objectives of the investment. Sometimes it is a simple act with a clear path of compromising the entire environment with poor security of the organization. Other times it is a complex task that requires collaboration with colleagues, online searches and even additional education due to the organization's lack of strong security or experience of the technology stack used in the environment. An ethical hacker's experience plays a big role in the level of success they achieve in achieving engagement goals. The more experienced an ethical hacker is, the more time they spend on activities that achieve the goals.

Bypassing security measures

Every organization deploys different security solutions according to their needs and budget. Security measures can sometimes complicate matters for an ethical hacker, forcing them to spend time finding ways to circumvent the measures. For the most part, bypassing security measures is a game of cat and mouse between security vendors and hackers. When a security vendor pushes updates for its improvements, it affects ethical hackers in two ways. First, it excludes techniques or bypasses that have been used successfully in previous works. Furthermore, it forces them to spend their precious time with another technology that can circumvent the solution. So every association presents a surprise that an ethical hacker must contend with based on security measures.

continuous learning

Due to the wide spectrum of technology in today's world, there are cases where an ethical hacker will encounter an unfamiliar technology stack. An ethical hacker must overcome the inconvenience of exploring new territory and be able to learn and adapt quickly.

It is always better to reduce cases where ethical hackers are using unfamiliar techniques; Therefore, they should, at a minimum, have a basic understanding of the most common techniques used by organizations.

Technology can be hacked or it can be misused in many ways. With countless software platforms and technology integrations available, ethical hackers must constantly update their knowledge. They should learn the nuances of different software and business IT infrastructure and integrations. An ethical hacker will find out and learn by working with peers or through post-investment lessons.

 Off-the-job learning involves taking courses and certifications to ensure that ethical hackers are up to date with the current technologies and tactics used. This requires the ethical hacker to be actively or passively involved in the cyber security community.



Participation in the Cyber ​​Security Community

New technologies, vulnerabilities and exploits are often announced on social media platforms, and news can reach hours or days later. As an ethical hacker, time is of the essence. If an ethical hacker can get their hands on a new exploit before the defensive side reacts, it could be a game changer. That's why ethical hackers spend a lot of time on social media platforms to ensure that knowledge is quickly learned from the cyber security community.

Not all hackers are criminals. In fact, ethical hackers – security experts who infiltrate networks and computer systems with the authorization of their owners – are increasingly being hired to identify vulnerabilities in cyber security systems and help organizations prevent cybercrimes. It helps to prevent cybercrime before it helps, making ethical hacking essential to fight cyber Crime.

Hope you enjoyed The daily blog of October 17 if not correct me in comment box.

You may also like:-

1) The daily blog of October 12

2) The daily blog of October 13

3) The daily blog of October 14

4)  The daily blog of October 15

5) The daily blog of October 16

Comments

Popular posts from this blog

The daily blog of October 30

 The daily blog of October 30 This busy day's It's night time and the darkness 10:41pm,had my dinner lying on bed thinking about what to write in these busy days. yes I am too busy to make my life easy,as you know I'm of 25 years old and as a youngster this age is to run as fast as you can to achieve better future “The rules have changed, you need to brand yourself and reach out to digital worlds. else, you cannot get your dreams.” ,as I already told you that I only write when I get the time and today is Sunday taking break from the busy schedule.Busy in the sense that , first of all I had submitted the application to join the force so,I need to practice lot in the ground so,my day starts with the same in the morning running more than 5km after that I meditate around half an hour after having bath and being fresh I start with my studies which is important for clearing the competitive exam while I get bored by studying I pratice my typing speed which is also relevant to cle...

The daily Blog of April 25

The daily blog of April 25  As you know  Every day, I will be sharing my thoughts, insights, and experiences with you, in the hopes of inspiring and motivating you to be the best version of yourself. It's evening time and the sunset of 6:15pm,had my snacks completed my all stuffs of the day lying on bed thinking about what to write because not written any things since october 2022due lack of time. what i have learned one thing clicked in my mind "Learning new things " all though you know that I have passion to some thing about self about society also insrested in learning new things side by side preaparing for civil service ,I learned singing to make my mood fresh if you want to listen me follow the link . Learned much thing about Ai (artificial intelligence)and There are many emerging technologies that are currently being developed, some of which include: Artificial intelligence and machine learning: These technologies involve developing computer systems that can perform...

The daily blog of October 18

The daily blog of October 18 It the time of darkness, 11:00 pm (GMT +5:30 )the time of writing something which increase my writing skills. What if I could become a writer. I feel like a writer today. don't like Any old writer, but like me. i have So much to say. Often, it's all caught up At the same time in my throat and I choke. In that Sometimes I don't feel like myself. i don't Sounds like a writer. But today is different. I flow like a stream, Thoughts are so fluid that they Slides easily, slides down my throat Making room for each other in The flow is no longer blocked, but a A waterfall of consciousness, frictionless And Transcend can be easily recorded Pen and paper. without friction. Today I am a frictionless mental sky. i have Say now is the time. i am Ready to switch. I am ready to make. Today is my every day. And so it is. A lot of things  Like many other jobs, there really isn't a routine. I might be in the middle of a draft, completely engrossed in writ...