How To Become a Hacker - EPIC HOW TO - Summary

Summary

Here is a concise summary of the provided text:

**Title:** How to Become a Computer Hacker (Ethically)

**Key Points:**

1. **Debunking myths**: Hacking is not just about breaking into systems; it's about passion for computers and innovation.
2. **Types of Hackers**:
* **White Hat**: Break into systems to improve security.
* **Black Hat**: Break in for malicious purposes.
3. **Becoming a Hacker**:
* **Learn to program** (e.g., Python, Perl).
* **Learn Linux** (used by 96.5% of web servers).
* **Work on open-source projects** to gain experience and connections.
4. **Common Hacking Techniques**:
* Distributed Denial of Service (DDoS) attacks.
* DNS cache poisoning.
* Buffer overflow attacks.
* **Social Engineering**: exploiting human weaknesses.
5. **Protecting Computers**:
* Career path: **Penetration Tester** (breaking and securing systems).
* Requires: hacking experience, college degree, and security certifications.
6. **Final Note**: Follow these steps to become an expert computer hacker, and always keep your activities legal.

Facts

Here are the key facts extracted from the text, numbered and in short sentences, excluding opinions:

**General Information**

1. There are two types of hackers: White Hat and Black Hat hackers.
2. White Hat hackers break into systems to identify vulnerabilities and improve security.
3. Black Hat hackers break into computers for malicious purposes (e.g., stealing, vandalism).

**Hacking Principles and Education**

4. Eric Raymond defined five principles of hackers in "The New Hacker's Dictionary".
5. To become a hacker, one needs to learn programming.
6. Popular programming languages for hacking include Python and Perl.
7. Linux is an operating system used on 96.55% of web servers worldwide.
8. Learning Linux is essential for navigating the internet's inner workings.

**Open Source and Community**

9. Open source software has publicly available code for viewing and modification.
10. Examples of open source software include Firefox, WordPress, and Linux.
11. Contributing to open source projects can help beginners gain experience and connections.
12. DEFCON is a hacker convention held annually in Las Vegas, attended by top hackers and security experts.

**Hacking Techniques**

13. Distributed Denial of Service (DDoS) attacks overwhelm a web server with requests to take it offline.
14. DDoS attacks do not provide system access to the attacker.
15. DNS cache poisoning (DNS spoofing) tricks computers into connecting to a hacker's computer instead of the intended website.
16. Buffer overflow attacks exploit buggy programs to crash or gain system access.
17. Social engineering targets human weaknesses in computer security (e.g., phishing, password guessing).

**Security and Protection**

18. A 2003 study found 90% of office workers shared their passwords in exchange for a pen.
19. Penetration testers are hired to break into systems and secure weaknesses, with salaries ranging from $50,000 to $100,000/year.
20. Becoming a pen tester often requires a college degree and security certifications, in addition to hacking experience.