Becoming a Master Hacker

ARTICLES

W.Ighodaro

12/5/20256 min read

A lot of people wonder the same thing: "What skills do I need to become a skilled hacker?"

Hacking is one of the most advanced fields within IT, demanding not only broad knowledge but also a mastery of numerous techniques and technologies. Achieving success as a hacker requires building a diverse skill set. Don’t worry if you don’t yet possess every skill on this list—think of it as a roadmap to guide your learning and development.

Before we dive in, I want to give a big shoutout to Master OccupytheWeb. Most of the knowledge shared in this article were gotten from him.

With that being said, lets dive in. I’ve outlined the essential skills needed to excel in this field, organized into three levels—fundamental, intermediate, and advanced.

The Fundamental Skills

This is where everyone starts. Before you dive into complex hacks, you need to understand the basics inside and out.

1. Basic Computer Skills

Let’s be real: you won’t get far if you don’t know how to handle a command line. You’ll need to know your way around Windows commands, registry tweaks, and network settings. Start with the basics (an A+ course can help if you’re brand new) and build from there.

CompTIA A+ Certification Course: Search up "CompTIA A+ by Professor Messer" on YouTube (it's a play list of about 68 videos)

Video: “Windows Command Line Basics: [https://youtu.be/QBWX_4ho8D4?si=knGHgABrcCNegcvb](https://youtu.be/QBWX_4ho8D4?si=knGHgABrcCNegcvb)

Book: [https://drive.google.com/file/d/1cO4K2OZYjWKplgdiBezyGST-m1-ECdUm/view?usp=drive_link](https://drive.google.com/file/d/1cO4K2OZYjWKplgdiBezyGST-m1-ECdUm/view?usp=drive_link)

2. Networking Skills

Hacking and networks go hand-in-hand. Get familiar with DHCP, NAT, subnets, IPv4/IPv6, DNS, routers, the OSI model, MAC addresses, ARP, VLANs… the works. Every network concept you master brings you one step closer to understanding how to manipulate it. Check these resources to get started:

Article: Hacker Fundamentals: A Tale of Two Standards : https://null-byte.wonderhowto.com/how-to/hacker-fundamentals-tale-two-standards-0133727/

Article: How Network Packets Are Routed: https://null-byte.wonderhowto.com/how-to/hacker-fundamentals-everymans-guide-network-packets-are-routed-across-web-0134491/

Video Series: https://youtu.be/tNWj5uGIqok?si=whbmvE4UCbCaYWqo

Book: Computer Networking: A Top-Down Approach (Gold standard) : https://drive.google.com/file/d/1kvrdu8B-5lOPCQsd89M5U0xn-NDiY0tD/view?usp=drive_link

3. Linux Skills

It is extremely critical to develop Linux skills to become a hacker. Nearly all the tools we use as a hacker are developed for Linux and Linux gives us capabilities that we don't have using Windows.

If you need to improve your Linux skills, or you're just getting started with Linux, check out 👇

Linux Basics for Hackers — OccupyTheWeb : https://drive.google.com/file/d/13RvGofCwFSVEv4wlxgGmPJopsV44zM9M/view?usp=drive_link

Video: https://youtu.be/sWbUDq4S6Y8?si=8qgc57O2KKJYazNK

4. Packet Analysis

Tools like Wireshark and tcpdump help you dig deep into network traffic, letting you see everything moving through a network in real time. It’s essential for tracking down vulnerabilities and understanding attacks.

Video: https://youtu.be/a_4MjV_-7Sw?si=kB5dzuweWoi90r9w

Book: Practical Packet Analysis by Chris Sanders: https://drive.google.com/file/d/1yIdbF04kFRqVOQdyerEE9OGdXDNIz9q8/view?usp=drive_link

5. Virtualization

You need to become proficient in using one of the virtualization software packages such as

[VirtualBox](https://www.virtualbox.org/)

or

[VMWare Workstation](http://www.vmware.com/products/workstation)

https://youtu.be/izmCJlJEvQw?si=qyV3ABZzOu4BxbvF

Ideally, you need a safe environment to practice your hacks before you take them out in real world. A virtual environment provides you a safe environment to test and refine your hacks before going live with them.

6. Security Concepts & Technologies

A good hacker understands security concepts and technologies. The only way to overcome the roadblocks established by the security admins is to be familiar with them. The hacker must understand such things as PKI (public key infrastructure), SSL (secure sockets layer), IDS (intrusion detection system), firewalls, etc.

The beginner hacker can acquire many of these skills in a basic security course such as Security+.

Video: Lookup "security+ training course" by Professor Messer on YouTube (it's a playlist of 121 lessons)

Book: The Web Application Hacker’s Handbook - https://drive.google.com/file/d/1flSxc5q0mha8JYVCrfSiBaxOfUSpKmjw/view?usp=drive_link

7. Wireless Technologies

In order to be able to hack wireless, you must first understand how it works. Things like the encryption algorithms (WEP, WPA, WPA2), the four-way handshake, and WPS. In addition, understanding such as things as the protocol for connection and authentication and the legal constraints on wireless technologies.

To get started, check out my guide below on getting started with wireless terms and technologies, then read our collection of Wi-Fi hacking guides for further information on each kind of encryption algorithms and for examples of how each hack works.

Book: The Web Application Hacker’s Handbook (must-read)- https://drive.google.com/file/d/1h90n5NKzWZBJqwXmBwLi_KGs3x5XHcbl/view?usp=drive_link

https://youtu.be/uJv_e8pYFY4?si=7puAlou-dy4NHV9u

Article: https://eyenetworks.no/en/wireless-terms-wi-fi-terminology-and-acronyms-explained/

The Intermediate Skills

This is where you start to get some serious skills under your belt. It’s also where hacking gets a lot more creative. Knowing all of these will allow you to advance to more intuitive hacks where you are calling all the shots—not some other hacker.

8. Scripting

Want to stop relying on other hackers’ tools? Then start writing your own scripts. Learn BASH, Python, Perl, or Ruby. The goal is to code something unique and effective, making your hacks harder to spot and counter.

Video: Python for Cybersecurity – Full Course - https://youtu.be/K5KVEU3aaeQ?si=IL7SPY7C3wVfMgme

Book: Black Hat Python - https://drive.google.com/file/d/1D9YTepQMgdyRvvoBY5s3Jg8ieQJmC2RO/view?usp=drive_link

9. Database Skills

If you want to be able to proficiently hack databases, you will need to understand databases and how they work. This includes the SQL language. I would also recommend the mastery of one of the major DBMS's such SQL Server, Oracle, or MySQL.

Video: SQL Crash Course for Beginners - https://youtu.be/xiUTqnI6xk8?si=bheIR40fEe2wQU1r

Book: SQL for Data Analysis- https://drive.google.com/file/d/159462A0IfBswTwJTsHyaoARdfnzzeMJ2/view?usp=drive_link

10. Web Applications

Web apps are everywhere, and they’re loaded with vulnerabilities. Learn how they work and how to exploit them. Whether it’s building a phishing site or cracking a login, the knowledge pays off.

OWASP Top 10 (must-learn) - (https://www.splunk.com/en_us/blog/learn/owasp-top-10.html)

YouTube: Web Application Security Crash Course - https://youtu.be/Qnl2BjxXpkk?si=9GBlgwqNsePd38q3

- Book: The Web Application Hacker’s Handbook -https://drive.google.com/file/d/1flSxc5q0mha8JYVCrfSiBaxOfUSpKmjw/view?usp=drive_link

11. Forensics

Getting in is only half the battle; staying undetected is just as crucial. Understanding digital forensics helps you cover your tracks and stay ahead of anyone trying to trace you.

Video: https://www.youtube.com/watch?v=giv0DQDSsjQ&list=PLJu2iQtpGvv-2LtysuTTka7dHt9GKUbxD (it's a playlist of 44 videos)

Book: Digital Forensics and Incident Response - https://drive.google.com/file/d/1co23sXdWN62fRys27ogKW8DL_Ib4A8LG/view?usp=drive_link

12. Advanced TCP/IP

The beginner hacker must understand TCP/IP basics, but to rise to the intermediate level, you must understand in intimate details the TCP/IP protocol stack and fields. These include how each of the fields (flags, window, df, tos, seq, ack, etc.) in both the TCP and IP packet can be manipulated and used against the victim system to enable MitM attacks, among other things.

Video: https://youtu.be/rmFX1V49K8U?si=mdxQSbFWYL5YB2zl

13. Cryptography

Although one doesn't need to be a cryptographer to be a good hacker, the more you understand the strengths and weaknesses of each cryptographic algorithm, the better the chances of defeating it. In addition, cryptography can used by the hacker to hide their activities and evade detection.

Video: Cryptography Crash Course - https://www.youtube.com/live/C7vmouDOJYM?si=rCVTXr72ftsGxBOE

Book: Serious Cryptography - https://drive.google.com/file/d/1jujd9KZGRyzqapU1B1wtvZGEiqsx5a_E/view?usp=drive_link

14. Reverse Engineering

Reverse engineering enables you to open a piece of malware and re-build it with additional features and capabilities. Just like in software engineering, no one builds a new application from scratch. Nearly every new exploit or malware uses components from other existing malware.

In addition, reverse engineering enables the hacker to take an existing exploit and change its signature so that it can fly past IDS and AV detection.

Video1: (watch this first) - https://www.youtube.com/playlist?list=PLMB3ddm5Yvh3gf_iev78YP5EPzkA3nPdL (this is a playlist of 16 videos)

Video2: Reverse Engineering for Beginners - https://youtu.be/5FXrCHLAJZM?si=bgRyfgz_eqiJhEHB

Book: Practical Malware Analysis - https://drive.google.com/file/d/1MA11klymygTC77pQxklB7saRaSLQlsVB/view?usp=drive_link

Advanced Skills

Along with all these computer skills, the successful hacker must have some advanced skills. These include the following.

15. Creative Thinking

There’s always a way in; you just need to find it. A good hacker sees multiple paths to a goal. Creative thinking is what separates a decent hacker from a great one.

16. Problem-Solving Skills

In hacking, roadblocks are everywhere. Problem-solving means breaking down complex issues and finding solutions. It’s a skill that gets sharper with time.

17. Persistence

A hacker must be persistent. If you fail at first, try again. If that fails, come up with a new approach and try again. It is only with a persistence that you will be able to hack the most secured systems.

So, there you have it. These skills are the foundation, but remember, hacking is always evolving. Keep pushing, keep learning, and maybe someday you’ll hit that advanced level.