This Beginner’s Hacking Guide will defiantly help you in learning hacking.

The first and the primary thing is that you have to learn “Programming“.
The reason behind learning programming is that each and everything that you see and use on the internet is nothing but programming.
For Example:when you press Ctrl+U of your keyboard then you will see some script popping up,that is nothing but programming!

hacking Guide

HTML and CSS are the most basic and primary languages you will see in every site… even when you visit your favorite site like Techtechnik(*cough*), Facebook, or any other site!

There is also”a negative side” of programming as well,you can end up in jail!

Before starting this ‘awesome’ stuff, you have to learn at least some of the listed programming.

Personally i’ill refer you to some mind blowing and cool programming languages that you must learn and also source or place from which you can learn them and get the best out of this hacking guide.

Programming languages:

  • Web-Desing :/Developing:
  • HTML5 (Somewhat Easy)
  • CSS3 (Somewhat Easy)
  • JavaScript (Somewhat Easy – Average)
  • PHP (Somewhat Average – Hard)
  • mySQL (Somewhat Average – Hard)

Computer programming:

  • Batch (Easy)
  • C++ (Average)
  • Python (Easy)
  • Visual Basics (Easy with Visual Studio)

Let me throw some light on these Languages:

HTML5 is the newest version of HTML, every paragraph,sentence or images that you see on internet are made all in HTML, and the appearance or look, size, etc etc… are made in CSS.
So in short, HTML is the content and CSS is the layout (how it is designed).

Javascript is another most powerful and popular scripting languages used on the web… and is the oldest as the web is. And you can do some cool things with it such as making a slideshows with it, or open hundreds of tabs at once, with a simple easy trick.

PHP and mySQL are used for databases. Most of the chats/forums are based on PHP.
It will be really good if you understand those languages, they plays very vital part in website security (especially mySQL).

If you get  a small idea about computer programming it will be good for you..although you can’t make websites with them, but of course you can make other nice things like apps, little programs, games and viruses.. too 😉

Let’s discuss computer languages more:

Batch is a much common languages that is used worldwide, not for professional things, but for small fun and effective things.

Batch enables you to create small viruses or can make PC crash, however this is not the primary purpose of Batch.

With C++ you can literally make anything and everything!
The only disadvantage about it is that, you have to make a separate GUI for it, (Graphic User Interface)

Visual Basics is also a great language, but it’s not that much easy.Visual Basics enables you to make your own professional app, a lot of RATs are made in Visual Basics, and you can make your own small browsers with it!

Good websites to learn from:

  • Hackforums.net <of course! 
  • Webdeveloper.com <Good for HTML & CSS
  • stackoverflow.com <’HQ’ forum
  • codecademy.com <interactive fun courses, good way to learn

and of course you can Google them to learn!

Programs that will help you in Hacking:

You don’t have to do each and everything by yourself..it will be too lengthy and confusing, so there are people who have created and contributed …isn’t nice?
There are a lot of free programs available on net as well as in the market which will aid you in your journey.

I have listed some programs that you’ll definitely need for hacking.

PROGRAMS                                                     EXAMPLES
Key-logger                                                        REFOG (Key-logger)
RAT (Remote Administration Tool)          Darkcomet (RAT)
Booter                                                               Rage Booter (Booter)
Brute-Force                                                     Hydra (Brute-force)
VPN                                                                   Cyberghost5 (VPN)[/su_table] 

Lets throw some light on each program:

Remote Administration Tool (RAT) is a program that enables hackers to control the PC of there victim.
The hacker gets victims (or better known as slaves) by spreading a Trojan,Trojan can be defined as a Malware(malicious software) that is made by a hacker Hackers spread there Trojan by mostly presented it as a helpful handy program so that other downloads it..!! But instead that program became handy they gives the hackers access to your computer. By this i mean that they have access to all your important files, keyboard, cam, mouse, edit your folders! To complete there objective hackers must make an undetectable Trojan so that antiviruses can’t detect it, hackers do that by crypting it.
At present Darkcomet is a good free RAT and easy to use.

A key-logger is much easier than rat, all it does is it will records victims keys pressed from keyboard and obviously can be used to find the password of your victim. An example of a key-logger is REFOG…

A brute-force program,forces a password to be right brute.
To work with a brute-force program first of all you need some things: A Brute force program of course, a password list, a username list (optional).
Hydra is an example of a brute-force program .
A password list is just a list of passwords…
The program will match and try every combination of word in that list until he has find the good one.

A Booter is a tool to DDoS! Well let me tell you DDoS’ing is not Hacking!
Distributed Denial of Service(DDoS) is used to take a sites servers down.
Whenever you open’s or visit a site you actually ping it with 32 bytes, then the site accepts that request and answer it. Each and every site or server wants to answer on every request it receives.
A DDoS is considered good if it contains 65000GB/second…and of course the site or server can’t answer at all those requests and it gets excited and finally taken of the internet. (Server becomes Down!).
A Botnet can help you to perform DDos, you just let each and every PC on your botnet pings that site. 😉
DoS (Denial of Service) is a sister of DDoS it isn’t distributed means that it is only performed from one PC, one network. You can do it simply with CMD  > Ping example.com –t –l 65000) you can only take down small sites with it who has a low bandwidth (amount of visitors a site can take).

Virtual Private Network(VPN) is a very nice tool to hide your IP,so that you can remain anonymous as an IP can be used to trace your physical location. Cyberghost5 is an example of a Free VPN .
But Be careful while choosing your VPN as there are some VPN’s that keep logs. That means that they keep your info and real location.

Staying Anonymous is also Important(Thinking like hackers):

hacking

 The most important thing for a hacker is to remain “anonymous” i.e when you will do any illegal activities or even any ethical stuff you won’t be caught by cops.

As i have already told you about a tool to hide your IP, a VPN and Proxy as we have discussed above.
A VPN like I already explained hides your IP by connecting you to another server, a proxy actually does the same! 😀
You only have to use a VPN or Proxy when you’re doing your activities, after them, you turn it off.

Let me explain it a bit. People will do everything to find you, so even a little mistake can lead you to cops or you can be found! You have to put people on a dead track.

Whenever planning to do some hacking stuff you start your PC on with a proxy, and then do you work and then turn off the proxy after completing the work and don’t use internet for 20-30 mins after that, you start it up without any proxy, and do your legal normal things.

How to Do Hacking:

You can hack with number of methods, I have listed some of them

  • Wi-Fi hacking
  • RAT-infecting
  • Key-logging
  • SQLi
  • E-whoring
  • Brute-Forcing

We have already discussed some of these methods but we have also included some new thing like SQLi, Wi-Fi hacking and e-whoring.

SQL injection in short is called SQLi, and actually means hacking of the database of a website.
All you need to do it is just a Browser that’s it!
It also not that hard at all. You play with the URL of the website so the result are the content of the database.
Wi-Fi is actually a wireless router.And you can hack it by using any brute-force program like Hydra but there are also special programs for it like Reaver.

E-whoring is another thing that i will not consider as hacking method but you should learn it.
Most of the time hackers act like they are girls or women in chat rooms,they got fake and hot  videos,pictures and web-cam videos of girls too.Now, as men will be men,they pays a lot of money for more pictures and videos, or even sometimes send money to the hacker (fake girl).

Make your Decision Wisely(Hackers style):

hackerWell, You must have gained some knowledge about hacking from his hacking guide, but the point is where you  are going to use this knowledge is most important?
Will you use this knowledge for good ethical purposes?
Or by doing harm to innocent people?
It’s entirely your choice what hat to wear “Black hat” or “White hat”
If you choose to wear black hat you will be involved in  all illegal activities related with hacking and of course you could get mess with governments or security agencies or cops
If you choose to wear white hat, this include all legal authorized activities.
But of course your choice is really important and can be life-changing.
But if you choose to be a White Hat and use your knowledge for ethical purposes, cops of course won’t be after you.
Even when you do un-authorized things for good, your punishment would be really small or even none. 😉

I hope you found my Beginners hacking guide a bit interesting and helped you! 😀

Any suggestions are appreciated! 😉

Thanks for reading.

Subscribe For more Updates
Don’t forget to subscribe for free update in your inbox and if you have any queries or doubts then feel free to comment below or contact us..!!

19 COMMENTS

  1. The future prospect of ethical hackers is bright as more and more companies are taking all possible steps to
    ensure security of various data and networks.
    For those with loosely structured accounting departments,
    this is detrimental to a company. Smartphone’s video chats, business video conferencing, 3G services for better quality, data connectivity using Bluetooth & internet, corporate or
    personal emails, telephonic calls, cloud services, and so are the lists of
    few services among several that are used and required frequently.

  2. Nowadays it has become easier for people to
    become an ethical hacker as there are many
    private institutions and colleges, who are offering full-time ethical hacking training, embedded system training, network security training and many more courses.
    The criminal offense resulted in nude photos of Hilton uploaded to several different websites.
    The real hacker (who was eventually charged for his role
    in it) explained that he didn’t do much.

  3. Oh my goodness! Awesome article dude! Thank you, However I
    am going through issues with your RSS. I don’t understand why I cannot join it.
    Is there anybody getting identical RSS issues? Anyone who knows the solution will you kindly
    respond? Thanx!!

  4. You made some really good points there. I checked on the internet for
    additional information about the issue and found most individuals will
    go along with your views on this site.

  5. Hello
    Your Work is really appreciable.
    But can you give me a complete guide for where should I start now?
    Consider Me A Beginner.
    I know some C++.

    • Hi,
      As you know C++ it will be great if you try making certain nice program in C++, as the more you explore the more you will know. Also start learning PHP and CSS side by side!
      Best of luck.

  6. I also write articlWS on hacking and I totally agree with you. BTW, nice article. Thanks for posting

  7. Hello, i’m just a beginner
    Today is my first time to visit this site..I want to be a hacker but i don’t how and where to start.
    I have 2 computers with windows 7 and 8.
    I wanna know what software should i use for programming.
    Help me please!
    Thanks in advance..

LEAVE A REPLY