The daily blog of October 17
It's night of 9:20pm(GMT+5:30) the day was good weather was pleasant. lying on bed and just thinking that what if I would became an hacker, then how would be my day as an hacker, because I had learnt the basics of hacking from online sources. It all started in lockdown when I heard a news that "the zoom application has been hacked and the government data has been stolen "this line developed craze in me about hacking and Araised so many questions in my mind that , what is hacking, how it's performed and how we protect ourselves from this kind of activities, I started collecting minute details about Hacking from zero, I learnt almost every thing from installing kali Linux in virtual machine to bug bounty by myself. Their some books like "web hosting101,penetration testing, etc. which helped me lot but their are so many things that remained untouched because the field is vast.
I use Kali Linux operating system for learning and performing hacking because Kali Linux provided me more than 600 tools for perform hacking, there are many other OS like Ubuntu, Parrot, Garuda etc.
About life of Hacker
When you hear the word "hacking," do you imagine someone wearing a hooded sweatshirt sitting in a dark basement and tapping like crazy on a keyboard? The image could be of a hacker - or the hacker could be a soft-spoken old woman sitting at the table in front of you in a coffee shop. She's smiling while drinking coffee because she's got access to your device because you're connected to public WiFi.
Hacking has become so common that almost anyone can do it - and many people do. By taking a look at a hacker's typical day and the most common hacks they perform, you can learn how to avoid these attacks.
understanding the environment
No two organizations are alike. An organization's technology, culture, and habits determine the various attack vectors available to a threat actor. An ethical hacker must work with a customized approach on each new simulation to investigate the customer's unique environment.
vulnerability detection
Unsurprisingly, a large portion of an ethical hacker's time is spent looking for vulnerabilities in the environment. Where there are weaknesses will depend on the scope and objectives of the investment. Sometimes it is a simple act with a clear path of compromising the entire environment with poor security of the organization. Other times it is a complex task that requires collaboration with colleagues, online searches and even additional education due to the organization's lack of strong security or experience of the technology stack used in the environment. An ethical hacker's experience plays a big role in the level of success they achieve in achieving engagement goals. The more experienced an ethical hacker is, the more time they spend on activities that achieve the goals.
Bypassing security measures
Every organization deploys different security solutions according to their needs and budget. Security measures can sometimes complicate matters for an ethical hacker, forcing them to spend time finding ways to circumvent the measures. For the most part, bypassing security measures is a game of cat and mouse between security vendors and hackers. When a security vendor pushes updates for its improvements, it affects ethical hackers in two ways. First, it excludes techniques or bypasses that have been used successfully in previous works. Furthermore, it forces them to spend their precious time with another technology that can circumvent the solution. So every association presents a surprise that an ethical hacker must contend with based on security measures.
continuous learning
Due to the wide spectrum of technology in today's world, there are cases where an ethical hacker will encounter an unfamiliar technology stack. An ethical hacker must overcome the inconvenience of exploring new territory and be able to learn and adapt quickly.
It is always better to reduce cases where ethical hackers are using unfamiliar techniques; Therefore, they should, at a minimum, have a basic understanding of the most common techniques used by organizations.
Technology can be hacked or it can be misused in many ways. With countless software platforms and technology integrations available, ethical hackers must constantly update their knowledge. They should learn the nuances of different software and business IT infrastructure and integrations. An ethical hacker will find out and learn by working with peers or through post-investment lessons.
Off-the-job learning involves taking courses and certifications to ensure that ethical hackers are up to date with the current technologies and tactics used. This requires the ethical hacker to be actively or passively involved in the cyber security community.
Participation in the Cyber Security Community
New technologies, vulnerabilities and exploits are often announced on social media platforms, and news can reach hours or days later. As an ethical hacker, time is of the essence. If an ethical hacker can get their hands on a new exploit before the defensive side reacts, it could be a game changer. That's why ethical hackers spend a lot of time on social media platforms to ensure that knowledge is quickly learned from the cyber security community.
Not all hackers are criminals. In fact, ethical hackers – security experts who infiltrate networks and computer systems with the authorization of their owners – are increasingly being hired to identify vulnerabilities in cyber security systems and help organizations prevent cybercrimes. It helps to prevent cybercrime before it helps, making ethical hacking essential to fight cyber Crime.
Hope you enjoyed The daily blog of October 17 if not correct me in comment box.
You may also like:-
1) The daily blog of October 12
2) The daily blog of October 13
3) The daily blog of October 14
.jpg)


Comments
Post a Comment