jueves, 1 de junio de 2023

How To Start | How To Become An Ethical Hacker

Are you tired of reading endless news stories about ethical hacking and not really knowing what that means? Let's change that!
This Post is for the people that:

  • Have No Experience With Cybersecurity (Ethical Hacking)
  • Have Limited Experience.
  • Those That Just Can't Get A Break


OK, let's dive into the post and suggest some ways that you can get ahead in Cybersecurity.
I receive many messages on how to become a hacker. "I'm a beginner in hacking, how should I start?" or "I want to be able to hack my friend's Facebook account" are some of the more frequent queries. Hacking is a skill. And you must remember that if you want to learn hacking solely for the fun of hacking into your friend's Facebook account or email, things will not work out for you. You should decide to learn hacking because of your fascination for technology and your desire to be an expert in computer systems. Its time to change the color of your hat 😀

 I've had my good share of Hats. Black, white or sometimes a blackish shade of grey. The darker it gets, the more fun you have.

If you have no experience don't worry. We ALL had to start somewhere, and we ALL needed help to get where we are today. No one is an island and no one is born with all the necessary skills. Period.OK, so you have zero experience and limited skills…my advice in this instance is that you teach yourself some absolute fundamentals.
Let's get this party started.
  •  What is hacking?
Hacking is identifying weakness and vulnerabilities of some system and gaining access with it.
Hacker gets unauthorized access by targeting system while ethical hacker have an official permission in a lawful and legitimate manner to assess the security posture of a target system(s)

 There's some types of hackers, a bit of "terminology".
White hat — ethical hacker.
Black hat — classical hacker, get unauthorized access.
Grey hat — person who gets unauthorized access but reveals the weaknesses to the company.
Script kiddie — person with no technical skills just used pre-made tools.
Hacktivist — person who hacks for some idea and leaves some messages. For example strike against copyright.
  •  Skills required to become ethical hacker.
  1. Curosity anf exploration
  2. Operating System
  3. Fundamentals of Networking
*Note this sites





Related word


  1. Pentest Tools Kali Linux
  2. Install Pentest Tools Ubuntu
  3. Hacking Tools Usb
  4. Hack Tools Mac
  5. Pentest Tools Nmap
  6. Pentest Tools Download
  7. Hacker Tools
  8. Tools Used For Hacking
  9. Nsa Hack Tools
  10. How To Make Hacking Tools
  11. Hacker
  12. Hacking Tools Download
  13. Hacker Tools Windows
  14. Pentest Tools Bluekeep
  15. Hack Tools For Games
  16. Pentest Tools Free
  17. Pentest Tools List
  18. Hackers Toolbox
  19. Hacker Tools Apk Download
  20. Hack Tools
  21. Pentest Tools Alternative
  22. Pentest Tools Subdomain
  23. Hack Tool Apk No Root
  24. Hacker Tools For Ios
  25. Install Pentest Tools Ubuntu
  26. Hack Tools Online
  27. Install Pentest Tools Ubuntu
  28. Hacking Tools For Windows
  29. Pentest Tools Nmap
  30. Hacker Tools Mac
  31. Pentest Tools For Mac
  32. Pentest Tools Nmap
  33. Pentest Recon Tools
  34. Blackhat Hacker Tools
  35. Hack Tools For Ubuntu
  36. Hacking Tools Github
  37. Hacker Tools Free Download
  38. Hacking Tools Pc
  39. New Hack Tools
  40. Hacking Tools 2020
  41. Pentest Tools
  42. Hacker Tools
  43. Hack Tools Github
  44. Pentest Tools Download
  45. Pentest Tools For Ubuntu
  46. Hack Tools
  47. Nsa Hacker Tools
  48. New Hacker Tools
  49. What Is Hacking Tools
  50. Best Hacking Tools 2020
  51. Hacking Tools For Windows 7
  52. Best Hacking Tools 2019
  53. Hacker Tools Hardware
  54. Hacker Tools Software
  55. Pentest Tools List
  56. Hack Tools Online
  57. Pentest Tools Tcp Port Scanner
  58. Hacker Tools For Mac
  59. Pentest Tools Port Scanner
  60. Hacking Tools For Kali Linux
  61. Underground Hacker Sites
  62. Pentest Tools Windows
  63. Pentest Tools Free
  64. Hacking Tools Online
  65. Hack Tools Online
  66. Hack Tools Online
  67. Hacker Tools Free
  68. Hacker Tools Apk Download
  69. What Is Hacking Tools
  70. Best Pentesting Tools 2018
  71. What Is Hacking Tools
  72. Pentest Tools Github
  73. Usb Pentest Tools
  74. Hacker Tools Hardware
  75. Hacker Tools For Windows
  76. Hacker Tools For Pc
  77. Pentest Tools Port Scanner
  78. Hacker Tools 2020
  79. Pentest Tools Website
  80. Underground Hacker Sites
  81. Best Hacking Tools 2019
  82. Kik Hack Tools
  83. Hacking Tools 2019
  84. Hacking Tools 2019
  85. Hacker Tools Free Download
  86. Hacker Tools Free Download
  87. Hackrf Tools
  88. Install Pentest Tools Ubuntu
  89. Nsa Hack Tools
  90. Nsa Hacker Tools
  91. Pentest Tools Online
  92. Game Hacking
  93. Pentest Tools Github
  94. Best Hacking Tools 2019
  95. Pentest Tools Framework
  96. Pentest Tools Free
  97. Hacking Tools For Windows Free Download
  98. Beginner Hacker Tools
  99. Hacking Tools Windows 10
  100. Hack Tools Github
  101. Growth Hacker Tools
  102. Hacking Tools For Kali Linux
  103. Pentest Tools Download
  104. Hacker Tools Software
  105. Hack And Tools
  106. Free Pentest Tools For Windows
  107. Hack Tools For Pc
  108. How To Make Hacking Tools
  109. Pentest Tools Linux
  110. Hack Tools Mac
  111. Hack Tool Apk No Root
  112. Pentest Tools For Ubuntu
  113. Hacker Tools
  114. Hacking Tools 2019
  115. Hack Tools For Windows
  116. Hack Tools Pc
  117. Hacking Tools Software
  118. Hacker Tool Kit
  119. Hacking Tools Free Download
  120. Hackrf Tools
  121. Pentest Tools Android
  122. Growth Hacker Tools
  123. Hack Tools
  124. Hackrf Tools
  125. Hack Tools Mac
  126. Pentest Tools Windows
  127. Best Hacking Tools 2019
  128. Pentest Tools Github

Emulating Shellcodes - Chapter 2

 Lets check different  Cobalt Strike shellcodes and stages in the shellcodes emulator SCEMU.




This stages are fully emulated well and can get the IOC and the behavior of the shellcode.

But lets see another first stage big shellcode with c runtime embedded in a second stage.


In this case is loading tons of API using GetProcAddress at the beginning, then some encode/decode pointer and tls get/set values to store an address. And ends up crashing because is jumping an address that seems more code than address 0x9090f1eb.

Here there are two types of allocations:


Lets spawn a console on -c 3307548 and see if some of this allocations has the next stage.

The "m" command show all the memory maps but the "ma" show only the allocations done by the shellcode.



Dumping memory with "md" we see that there is data, and dissasembling this address with "d" we see the prolog of a function.

So we have second stage unpacked in alloc_e40064


With "mdd" we do a memory dump to disk we found the size in previous screenshot,  and we can do  some static reversing of stage2 in radare/ghidra/ida

In radare we can verify that the extracted is the next stage:


I usually do correlation between the emulation and ghidra, to understand the algorithms.

If wee look further we can realize that the emulator called a function on the stage2, we can see the change of code base address and  is calling the allocated buffer in 0x4f...



And this  stage2 perform several API calls let's check it in ghidra.


We can see in the emulator that enters in the IF block, and what are the (*DAT_...)() calls

Before a crash lets continue to the SEH pointer, in this case is the way, and the exception routine checks IsDebuggerPresent() which is not any debugger pressent for sure, so eax = 0;



So lets say yes and continue the emulation.


Both IsDebuggerPresent() and UnHandledExceptionFilter() can be used to detect a debugger, but the emulator return what has to return to not be detected. 

Nevertheless the shellcode detects something and terminates the process.

Lets trace the branches to understand the logic:


target/release/scemu -f shellcodes/unsuported_cs.bin -vv | egrep '(\*\*|j|cmp|test)'



Continuing the emulation it's setting the SEH  pointer to previous stage:


Lets see from the console where is pointing the SEH chain item:


to be continued ...


https://github.com/sha0coder/scemu






Read more
  1. Hacker Tools 2020
  2. Hacking Tools Usb
  3. Hacking Tools Online
  4. Android Hack Tools Github
  5. Hack Tools For Windows
  6. Hacking Tools For Windows 7
  7. Pentest Tools For Mac
  8. Hacker Tools Online
  9. Hacking Tools Name
  10. Hacking Tools Download
  11. Pentest Tools Website
  12. Nsa Hack Tools Download
  13. Hack Tools Mac
  14. Pentest Tools Github
  15. Pentest Tools Android
  16. Hacking Tools For Beginners
  17. Android Hack Tools Github
  18. How To Hack
  19. Best Pentesting Tools 2018
  20. Pentest Recon Tools
  21. Pentest Tools Bluekeep
  22. Hacker Tools Apk Download
  23. Hacking Tools 2020
  24. How To Hack
  25. Hacker Tools For Windows
  26. Pentest Tools Nmap
  27. Hacking Tools For Pc
  28. Hacking Tools Windows
  29. Hacker Tools Online
  30. Best Hacking Tools 2019
  31. Wifi Hacker Tools For Windows
  32. Nsa Hack Tools Download
  33. Hacking Tools For Kali Linux
  34. Hacker Tools Apk Download
  35. Hack Tools For Pc
  36. Hackrf Tools
  37. Growth Hacker Tools
  38. Hacking Tools For Kali Linux
  39. Usb Pentest Tools
  40. Best Pentesting Tools 2018
  41. Pentest Tools Tcp Port Scanner
  42. Hacker Tools Free
  43. Hackers Toolbox
  44. Hacks And Tools
  45. Hacking Tools Github
  46. Hacker Tools Hardware
  47. Hacking Tools For Beginners
  48. How To Hack
  49. Nsa Hack Tools Download
  50. Free Pentest Tools For Windows
  51. Hacker Tools Linux
  52. Hacking Tools For Beginners
  53. Tools 4 Hack
  54. Hacker Tools Apk Download
  55. Pentest Tools Free
  56. Pentest Tools Kali Linux
  57. Hacker Tools 2019
  58. Hacking Tools Kit
  59. Hacking Tools For Games
  60. Hacking Tools For Kali Linux
  61. How To Install Pentest Tools In Ubuntu
  62. Hacking Tools For Mac
  63. Hacking Tools Free Download
  64. Tools For Hacker
  65. Pentest Box Tools Download
  66. Hacking Tools For Pc
  67. Hacking Tools Hardware
  68. Hacking Tools For Windows 7
  69. Hack App
  70. Ethical Hacker Tools
  71. Hacking Tools Usb
  72. Ethical Hacker Tools
  73. Hacking Tools For Windows Free Download
  74. Ethical Hacker Tools
  75. Hacker Hardware Tools
  76. Hacking Tools Usb
  77. Hacking Tools For Games
  78. Hacking Tools For Mac
  79. Pentest Tools Download
  80. Hacker Tools Windows
  81. Hack Tools For Ubuntu
  82. Install Pentest Tools Ubuntu
  83. Physical Pentest Tools
  84. Pentest Tools Nmap
  85. Hacker Tools For Ios
  86. New Hacker Tools
  87. Pentest Tools Apk
  88. Pentest Tools Online
  89. Hacker Techniques Tools And Incident Handling
  90. Hacker Tools 2019
  91. Hack Tools
  92. Pentest Automation Tools
  93. Hacker Techniques Tools And Incident Handling
  94. Hacking Tools Usb
  95. Best Hacking Tools 2020
  96. Pentest Tools Open Source
  97. Hack Tools Download
  98. Blackhat Hacker Tools
  99. Pentest Tools Free
  100. Easy Hack Tools
  101. Hacking Tools For Windows
  102. Hacker Tools 2019
  103. Hack Tools For Mac
  104. Hack Tools For Pc
  105. Game Hacking
  106. Hacking Tools For Pc
  107. Hacking Tools Mac
  108. Bluetooth Hacking Tools Kali
  109. Hack Tools For Windows
  110. Hack Tools For Games
  111. Hack Tools For Mac
  112. Pentest Tools List
  113. Hacking Tools 2019
  114. Hacking Tools Windows 10
  115. Termux Hacking Tools 2019
  116. Hackers Toolbox
  117. Hacker Tools
  118. Hacking Tools And Software
  119. Hack Tools For Pc
  120. Hacker Tools Online
  121. Hack Website Online Tool
  122. Pentest Tools Online
  123. What Are Hacking Tools
  124. Pentest Tools For Mac

How Do I Get Started With Bug Bounty ?

How do I get started with bug bounty hunting? How do I improve my skills?



These are some simple steps that every bug bounty hunter can use to get started and improve their skills:

Learn to make it; then break it!
A major chunk of the hacker's mindset consists of wanting to learn more. In order to really exploit issues and discover further potential vulnerabilities, hackers are encouraged to learn to build what they are targeting. By doing this, there is a greater likelihood that hacker will understand the component being targeted and where most issues appear. For example, when people ask me how to take over a sub-domain, I make sure they understand the Domain Name System (DNS) first and let them set up their own website to play around attempting to "claim" that domain.

Read books. Lots of books.
One way to get better is by reading fellow hunters' and hackers' write-ups. Follow /r/netsec and Twitter for fantastic write-ups ranging from a variety of security-related topics that will not only motivate you but help you improve. For a list of good books to read, please refer to "What books should I read?".

Join discussions and ask questions.
As you may be aware, the information security community is full of interesting discussions ranging from breaches to surveillance, and further. The bug bounty community consists of hunters, security analysts, and platform staff helping one and another get better at what they do. There are two very popular bug bounty forums: Bug Bounty Forum and Bug Bounty World.

Participate in open source projects; learn to code.
Go to https://github.com/explore or https://gitlab.com/explore/projects and pick a project to contribute to. By doing so you will improve your general coding and communication skills. On top of that, read https://learnpythonthehardway.org/ and https://linuxjourney.com/.

Help others. If you can teach it, you have mastered it.
Once you discover something new and believe others would benefit from learning about your discovery, publish a write-up about it. Not only will you help others, you will learn to really master the topic because you can actually explain it properly.

Smile when you get feedback and use it to your advantage.
The bug bounty community is full of people wanting to help others so do not be surprised if someone gives you some constructive feedback about your work. Learn from your mistakes and in doing so use it to your advantage. I have a little physical notebook where I keep track of the little things that I learnt during the day and the feedback that people gave me.


Learn to approach a target.
The first step when approaching a target is always going to be reconnaissance — preliminary gathering of information about the target. If the target is a web application, start by browsing around like a normal user and get to know the website's purpose. Then you can start enumerating endpoints such as sub-domains, ports and web paths.

A woodsman was once asked, "What would you do if you had just five minutes to chop down a tree?" He answered, "I would spend the first two and a half minutes sharpening my axe."
As you progress, you will start to notice patterns and find yourself refining your hunting methodology. You will probably also start automating a lot of the repetitive tasks.

Related links