I need to ask this

Hardware is typically the same thing you have, it's personal preference. For software? That list is extremely long. Depends on the job.
 
Well that's a simple question with a really not simple answer. Usually they're using laptops like thinkpads or custom pcs that they have built for the occasion. As for software, there is a lot of basic software with limitless implications that can be found on many platforms but mainly they are built and compiled in Linux. So, you have a PC with linux, and the ability to use a lot of prewritten software provided you install it. Oh but wait, you're gonna have to seek out and install all of that yourself? If only there was an easier way, if only someone else did this and packaged it up into a hack package and gave it to people with the ability to customize it just as you can any Linux distro. Oh wait another minute, there already is one! It's called Kali Linux. For years, it was called Backtrack, but then after v5, they changed it to Kali. So pretty much Kali 1.0 was backtrack v6. It was unstable but now it's not bad. So, I'm assuming you want to be a hacker and that's why you're asking. Well let me tell you it's not a cakewalk. In fact, it's the opposite. It's like this: imaging you are given the task of building a house, but are given the tools to build a car, a building, and a spaceship if you're smart enough to use those tools correctly. And you have to build a house. Figuring that out is what it means to hack. Contrary to how hollywood may portray it, you don't type for 3 seconds and say the words "I'm in" and there is no button that says "Hack this email account!" As you may imagine, hacking ain't easy. That's why everyone isn't a hacker, but everyone, at some point in their lives googles "How to hack" as if google is going to give you access to such a button. Anyway, there was a basic rundown, and if you want to learn more, actually learn more and keep going. The easy way is usually the worst way.
 
Contrary to how hollywood may portray it, you don't type for 3 seconds and say the words "I'm in" and there is no button that says "Hack this email account!" As you may imagine, hacking ain't easy. That's why everyone isn't a hacker, but everyone, at some point in their lives googles "How to hack" as if google is going to give you access to such a button. Anyway, there was a basic rundown, and if you want to learn more, actually learn more and keep going. The easy way is usually the worst way.

The show Mr. Robot actually portrays hacking in a real way, and demonstrates them utilizing tactics such as social engineering, and using various tools in Kali. Just thought you should know in case you didn't that there is indeed a mainstream show that portrays hacking in a true-to-life way :).
 
Do you intend to use your skills to explore the dark side of your morality?
Or do you intend to use your skills to benefit us all?
 
You can learn to be an ethical hacker. Corporations do hire ethical hackers to see if there network is secure. I think one of the largest weakness's of any network security is social engineering.
Informationweek's Dark Reading is a security web site that covers such things.
Dark Reading | Security | Protect The Business - Enable Access

I read an article a while back where a bank hired a company to hack them to check their security (can't recall the name) What they did, was to drop a couple usb drives on the ground before the bank opened. An employee found one and you guessed it... they put it in their pc at the bank and this usb was designed to install a rootkit and a back door to penetrate the banks security.
Another story where someone dressed up as an IT person to access the network of another business and there's also the malicious email that attempts to get the recipient to open it for a reason of some kind of urgent importance. Something from UPS, or a disguised .pdf from another corp, or mostly a link to a malicious web site, designed to inject a malicious program
 
Last edited:
^ Notice a pattern with those penetration tests? They all exploit the weakest point of the network: the employees. That's why social engineering is so successful.
 
^ Notice a pattern with those penetration tests? They all exploit the weakest point of the network: the employees. That's why social engineering is so successful.

Yes, you dont need fancy tools really, any of us with good social engineering skills can hack a network e.g. with just building a relationship with a employee and finding out there password, or get access to there laptop and take the password - simple, of course you want an employee with elevated privileges :cool:...

Not hard at all lol :cool:

Its only when your attacking remotely that you need tools, mostly to research the soft spots, once you found it, there are normally dozens of tools that can breach it.. unless you can make your own!
 
Yes, you dont need fancy tools really, any of us with good social engineering skills can hack a network e.g. with just building a relationship with a employee and finding out there password, or get access to there laptop and take the password - simple, of course you want an employee with elevated privileges :cool:...

Not hard at all lol :cool:

Its only when your attacking remotely that you need tools, mostly to research the soft spots, once you found it, there are normally dozens of tools that can breach it.. unless you can make your own!

Hacking remotely is also where things like Spear Phishing comes into play. Targeting 1 specific person or group of people, and sending out specially crafted messages for them that looks like it's even coming from inside the company.
 
Back
Top Bottom