Menu
Penetration Testing! Trust me there is more points to that word than you really think.
it is not just about bypassing grandma's or grandpa's Firewall or Fixing mum's wireless network card!, It is the power of you. the power to solve computer problems and implement security measures against the hoodie guys, i mean, the bad guys to be specific. 🤖Here are some ways i have put down, in my own opinion to get started in Penetration Testing!-: -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ✅patience: Hacking takes time to learn and it requires a lot of experience, skill and tactics to learn. i mean do not rush, you have a lot of days to explore more and develop skills. do not jump from one section to another. ✅Basic computer knowledge: you should have enough basic computer knowledge to start your career in ethical hacking. i mean, you literally don't know how to copy files from one place to another in holder system and you wanna start hacking, you will get frustrated all along the way. get a course from udemy.com now! ✅Networking skills: you should have knowledge at least of how networking works. basic knowledge of IP's, DNS, understanding REQUEST and RESPONSE of web applications/server, API's and other basic networking standard. youtube.com is a great place to start learning networking, DON'T WASTE MONEY! ✅Programming skills: you should learn programming languages like python, bash, and GOlang to put you up on track and develop yourself, rather than being a script kiddie. ✅ Scripting skills: As well as programming skills is necessary, so is scripting skills necessary, A scripting language or script language is a programming language that is used to manipulate, customize, and automate the facilities of an existing system. Scripting languages are usually interpreted at runtime rather than compiled, we have various scripting langauges like python, php, bash, C and many more. ✅Operating systems: you should have a intermediate knowledge of how OS'es like linux, ubuntu, mac and windows work. don't just sit there, play around with them!. ✅Use the power of research: learn to research for things using various search engines like google, bing, duckduckgo and other numerous search engines. if you are not getting something or you have finding it difficult to chew up some stuffs. use the power of research, A browser like brave will be good in this instance whereas after searching for a particular solution to a problem, instead of recommending blogs, it gives you a quick guide on how to fix those problems ✅cloud computing: The cloud is a metaphorical representation of the internet, and the term "cloud" is derived from the cloud symbol used to represent the internet in network diagrams!. Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction remotely. ✅ Database Management System</DBMS>: In penetration testing, DBMS skills are necessary to identify vulnerabilities in databases and understand how they work. Having this knowledge is critical to identifying weaknesses that could be exploited by attackers. Penetration testers use their DBMS expertise to exploit database vulnerabilities and gain unauthorized access to the system. In addition, knowledge of DBMS can help assess the overall security posture of an organization and provide recommendations for improving security, we have some common query languages used for DBMS, like SQL (Structured Query Language), MangoDB, Xquery, SPARQL, LINQ (Language Integrated Query), Cypher, MDX (Multidimensional Expressions), CQL (Cassandra Query Language), JPQL (Java Persistence Query Language), Gremlin, Datalog. with these few ideas of mine, if you are still finding it difficult to get started then just send me a mail👇
0 Comments
www.offensive-security.com/ : Establish & advance your career with Offensive Security's online cyber Security training, courses and certifications. Develop the Try Harder mindset today! www.itpro.tv/ : ITprotv training solutions provide professionals and enterprise organizations the education needed to help kickstart IT careers, upskill through engaging training and virtual labs, and to advance careers. ACI Learning is with you every step of the way! www.cybrary.it/ : Cybrary’s accessible, affordable platform provides guided pathways, threat-informed training, and certification preparation to fully equip Cyber Security professionals at every stage in their careers to skill up and confidently mitigate threats. www.eccouncil.org/ : Get certified from EC-Council for the best Cyber Security courses online. Enroll now to boost your career with Cyber security certifications. www.hackthebox.com : Hack The Box is a massive, online cyber Security training platform, allowing individuals, companies, universities and all kinds of organizations around the world to level up their hacking skills. www.tcm-sec.com : By learning ethical hacking within the context of TCM security, you can help protect a field that is increasingly relying on technology to improve patient care. You'll gain experience in identifying vulnerabilities, testing security measures, and recommending solutions - all while helping to safeguard patient privacy and well-being. www.tryhackme.com : TryHackMe is a free online platform for learning cyber security, using hands-on exercises and labs, all through your browser, It is almost the same with hackthebox but is very begineer friendly www.ine.com : INE provides an excellent platform for aspiring ethical hackers to gain knowledge and hands-on experience. INE offers a wide range of cybersecurity courses, including comprehensive ethical hacking courses that cover various topics such as penetration testing, network security, and malware analysis. These courses are designed to provide students with practical, real-world experience and prepare them for industry certifications. www.portswigger.net : PortSwigger also offers a range of free resources, including web security training materials and a comprehensive web security knowledge base. These resources can help you gain a solid understanding of web application security and learn how to identify and exploit common vulnerabilities. www.ibm.com : IBM provides an excellent platform for gaining knowledge and practical experience in cybersecurity. IBM offers a range of courses and resources that can help you build a strong foundation in ethical hacking and prepare you for a career in cybersecurity. |
Author"Ethical Hacking takes time, be patient, dedicated, consistent and you will grow." |