The easy first steps for learning to hack

Broken Containment
6 min readMay 9, 2021

Have you ever wanted to learn to hack, because it’s a great skill to have and this article will help you with your first steps of hacking. This article will teach you the great basics of hacking. But before you start Learning, why would you want to learn to hack?

People usually learn to hack for that extra protection or to become a ethical hacker. An ethical hacker’s job is to do good things for the community like figuring out weaknesses for websites or for finding un-ethical hacker’s also known as a Black Hat. We recommend that you use hacking for legal purposes only.

What are the types of hacker’s?

There are four types of hacker’s, some are good, some are horrible and before you start hacking, it’s best if you learn the four types of hacker’s that you might even come across in your hacking career.

White Hats:

White hats are the good hacker’s who hack as a job. White hats have a job to try to hack into things such as website or companies and get paid by the company themselves. White hats are generally great at hacking and are known as the most helpful type of hacker’s.

Grey Hats:

Grey hats are in between good and bad hacker’s. They don’t hack for a job, but they do things for the community that can be both nice and bad. This is the most common type of hacker.

Black Hats:

Black Hats are known as evil hacker’s who either do evil jobs for money or evil things for their entertainment. White hacker’s don’t usually get along with black hacker’s.

Green Hats:

Green Hats are people who are learning to hack and haven’t yet chosen a hat path yet. If you come across a green hacker, help them out and teach them some stuff they don’t know yet.

There are other types of hacker’s like script kiddies but I wouldn’t category these types as the main type of hacker’s. Now that you’ve read about the types of hacker’s, you’ll need to know the risks of being a hacker and how to avoid them.

Risks:

If you come across anything suspicious like a website or email, Do NOT click on it, close or delete it because anything could happen.

Cyber Security Professionals say that everything you are signed into should have a different password which is completely true, this would make hacker’s trying to steal your passwords a lot harder, but don’t make your passwords too easy.

If you want extra protection, use a VPN. VPNs that cost money are more secure but free VPNs are very secure as well. Proton VPN is a free VPN which heaps of people use as well and is highly recommended.

Grab a computer:

Get ready and grab a Computer or Laptop because we are about to start your hacking career.

Setting up the OS needed:

For hacking, windows or Mac won't do, you’ll need Kali Linux. Kali Linux is an Operating system for hackers by hacker’s. You won’t need to get rid of the OS you have now, as you can have multiple operating systems using virtual box. Virtual box lets you have multiple operating systems at the same time as it is completely safe to use and to download. You can download virtual box here:

https://www.virtualbox.org/

Download and install the virtual box application for your OS and set it up. I recommend installing this app on your local drive but anything works fine. Once you’ve set virtual box up, you’ll need to download Kali Linux as a .ova file. You can download it here:

https://www.kali.org/

Once both files are downloaded, you should be able to open the .ova with virtual box, if it does try starting the Kali Linux OS through virtual box, your good to go. If it doesn’t work try downloading the ova. File again and make sure in the latest release.

If opening Kali Linux is unsuccessful, check the problems you have through virtual box settings. If a problem is “hardware acceleration” you will have to find your BIOS settings in your computer and enable “virtual acceleration” and you can find multiple videos on how to do this.

If opening Kali Linux is successful, it should come up with a login and password, if you have a Kali Linux account use that. If you do not which is completely fine type this:

Username: kali

Password: kali

Once you have done this you should be on the Kali Linux desktop, if the username and password don’t work check for any mistakes like spelling or grammar.

How to use Kali Linux:

When you’ve logged into Kali Linux, it should look something like the image above. Let's start with the tab on the top of the screen. The right side of the screen. Has time and a few other options like “lock screen". The left side has 5 options.

the first left option shows a search bar and all the applications pre-installed into Kali Linux.

The second option clears the desktop from opened applications. It doesn’t close them but clears them to another desktop, you can switch back by clicking the same button again.

The third option is a file manager which is kind of like file explorer. When clicked, it will show all the files in Kali Linux.

The fourth option opens a command prompt that you will use most as a hacker. Most applications on Kali Linux use the command prompt.

The fifth option is a record tab that can screenshot or record your screen. This is usually used for creating tutorials for YouTube and such.

There are a few options on the right side of the tab which you might not use so you can explore them yourself if you want to.

There are three icons on the desktop which are trash which is a bin, home which is a directory in the file manager and file system which is kind of like settings.

How to download and use apps on Kali Linux:

Kali Linux has multiple ways to download and use apps. The first way is the most common way.

We will be downloading shellphish. Shellphish is an app used to fish people’s passwords using fake websites made to trick someone into thinking it’s the real website. This would result in the victim typing in their information. The information would then be sent back to the sender. Do NOT use this app illegally and only use it on people with their permission.

Open the command prompt in Kali Linux and paste this in:

git clone https://GitHub.com/AbirHasan2005/ShellPhish

Once the download is complete, paste this:

cd ShellPhish

After that, paste this:

bash shellphish.sh

Then ShellPhish should have started. If not try the original ShellPhish on GitHub:

https://GitHub.com/suljot/shellphish

And now you should have shellphish on Kali Linux.

Some great tools to have on Kali Linux:

Kali Linux is great with the pre-installed tools, but there are some great ones not on Kali Linux which you can install.

Stegosuite:

Stegosuite is a great app for hacking as you can put hidden messages into multiple images or even videos. You can put texts, files and even a password. You can do any image as long as it’s downloaded onto Kali Linux.

Bettercap:

Bettercap is a key stalking tool that lets hacker’s spectate another computer’s keyboard and screen. This is a very complex tool and should be used for more experienced hackers. Do NOT use this tool illegally.

Nemesy:

Nemesy is more of a windows application but can be Kali Linux as well. Nemesy is a tool that can help bring down websites. It is a very powerful tool that lets you overload a website and crash it. You should NEVER use this tool illegally against someone without their full permission.

Conclusion:

In conclusion, you should have learnt the types of hacker’s, the risks of hacking, setting up Kali Linux and learning how to install applications and tools on Kali Linux. Remember, become and a ethical hacker not a Black Hat hacker.

If you enjoyed reading my article and this helped you out. Send this to your friends and give me a shoutout.

-Broken Containment

--

--

Broken Containment

"Dr Bright, why do you have a chainsaw cannon in 682's contaiment cell" -Doctor Containment.