pezdispenser
Member
1. Learn Opsec and develop good habits. (operational security) first. The DNB darknet bible is a great resource to learn about opsec regardless of who or what you are.
2. Learn passive Reconnaissance/OSINT.
This is a great starting point because it's perfectly legal to do, especially on one self. This will help identity your own vulnerabilities and develop the primary skills involved in a exploit. And it helps to find holes or limitations within your own opsec measures.
3. Learn to cover your tracks. CYA/CYT. Before you do any "hacking" it's a pretty good idea to have contingency plans. Most pen testers on YouTube do not cover much about this part of things because many of them do penetration tests in a professional/ white hat capacity and this is a good thing! But even for them, these skills and habits are important for many different reasons.
4. Learn active recon. But only after a mastery of the first three things, and create private home labs to practice on.
5. Learn post exploit first. Seems backwards, but the end goal determines what exploit is used and how the exploit itself is performed. (From my limited understanding)
6. Learn the tools needed to perform the exploit, and if needed, create a lab on a private network that mimics the target network and it's topology as closely as possible.
7. Develop cloud computing skills and take full advantage of AI post haste.
So to sum it up, the hat you wear really decides much of what you do and how you do it, although everyone I think could benefit from this blueprint.
A black hat, as an example would need to place much more emphasis on not getting caught, that would be the primary goal and time wouldn't be too much of a factor.
For a pentester though, having the ability to quickly identify vulnerabilities and get paid for their findings and fixes is the goal. For them, a bare metal install of Kali is the only way to go because reliability of the system can't get in the way.
However, they don't need to worry about data forensics etc because they are not actually committing any crime. But, neither a hobbyist-beginner or full fledged black hat probably needs a bare metal install of Kali in the case of the beginner, and is probably detrimental in the case of the black hat, data forensics and CYT skills being what they are.
Id love to hear what I missed and what I was wrong about and why for my own knowledge, and am looking forward to those critiques...
Thanks!
Edit: Spelling and grammar. Probably still not great.
2. Learn passive Reconnaissance/OSINT.
This is a great starting point because it's perfectly legal to do, especially on one self. This will help identity your own vulnerabilities and develop the primary skills involved in a exploit. And it helps to find holes or limitations within your own opsec measures.
3. Learn to cover your tracks. CYA/CYT. Before you do any "hacking" it's a pretty good idea to have contingency plans. Most pen testers on YouTube do not cover much about this part of things because many of them do penetration tests in a professional/ white hat capacity and this is a good thing! But even for them, these skills and habits are important for many different reasons.
4. Learn active recon. But only after a mastery of the first three things, and create private home labs to practice on.
5. Learn post exploit first. Seems backwards, but the end goal determines what exploit is used and how the exploit itself is performed. (From my limited understanding)
6. Learn the tools needed to perform the exploit, and if needed, create a lab on a private network that mimics the target network and it's topology as closely as possible.
7. Develop cloud computing skills and take full advantage of AI post haste.
So to sum it up, the hat you wear really decides much of what you do and how you do it, although everyone I think could benefit from this blueprint.
A black hat, as an example would need to place much more emphasis on not getting caught, that would be the primary goal and time wouldn't be too much of a factor.
For a pentester though, having the ability to quickly identify vulnerabilities and get paid for their findings and fixes is the goal. For them, a bare metal install of Kali is the only way to go because reliability of the system can't get in the way.
However, they don't need to worry about data forensics etc because they are not actually committing any crime. But, neither a hobbyist-beginner or full fledged black hat probably needs a bare metal install of Kali in the case of the beginner, and is probably detrimental in the case of the black hat, data forensics and CYT skills being what they are.
Id love to hear what I missed and what I was wrong about and why for my own knowledge, and am looking forward to those critiques...
Thanks!
Edit: Spelling and grammar. Probably still not great.
Last edited: