books on hacking

Being an Ethical Hacker I can say that the books are the real property of us. So, Try to Read These 10 Books On Hacking to Be An Expert Hacker.

Hacking is a type of method. It’s a way to do research. Have you ever tried something again and again in different ways to get it to do what you wanted? Have you ever opened up a machine or a device to see how it works, read up on what the components are, and then make adjustments to see what now worked differently? That’s hacking. You are hacking when you deeply look at how something really works to manipulate it, often creatively, into doing what you want.

A hacker is a type of hands-on, experimenting scientist, although perhaps sometimes the term “mad scientist” fits better, because unlike professional scientists they dive right in, following a feeling than a formal hypothesis. That’s not necessarily a bad thing. Many interesting things have been designed or invented by people who didn’t follow standard conventions of what was known or believed to be true then.

Also Read: Hiding IP Address In PC And Smartphone

Read These 10 Books On Hacking to Be An Expert Hacker:

1. Cyber Crime: Concepts, Methodologies, Tools and Applications

Cyber Crime - Concepts, Methodologies, Tools and ApplicationsBuy Now

The reason behind recommendation:

  • It is a three-volume reference that explores all aspects of computer-based crime and threats.
  • Offering solutions and best practices from experts in software development, information security, and law.
  • As cyber crime continues to change and new types of threats emerge, research focuses on developing a critical understanding of different types of attacks and how they can best be managed and eliminated.
  • Studying this continually evolving discipline involves not only understanding different types of attacks, which range from identity theft to cyber warfare but also identifying methods for their prevention.

2. Certified Ethical Hacker (CEH) Video Course

Certified Ethical Hacker (CEH) Video Course

Buy Now

The reason behind recommendation:

  • Certified Ethical Hacker (CEH) Video Course provides a comprehensive learning experience from a leading topical expert.
  • The dozens of hours of classroom instruction is enhanced with flash animations, screencasts, scenario-based case studies, and labs designed to work together to give both foundational learnings on the topic as well as exam preparation skills.
  • The DVD video tackles each CEH topical area with in-depth learning that teaches you what you need to understand, not only to pass the exam but to apply it in the workplace.
  • The classroom instruction is enhanced with the multimedia learning tools to help the expert instructor teach you these topics so that you grasp them for real world application and exam success.
  • This service prepares the user for the Certified Ethical Hacker exam.

3. Intellectual Property and Computer Crimes

Intellectual Property and Computer Crimes

Buy Now

The reason behind recommendation:

  • This three-volume reference work provides broad coverage of the subject. Along with details about specific technologies and issues.
  • Divided into eight topical sections ranging from fundamental concepts and current tools to organizational, social, and managerial impacts to emerging trends.
  • The 102 chapters are all written by academic experts.
  • Technical illustrations augment the chapters, which often include a glossary of key terms along with recommended reading. Thus supporting the research needs of both undergraduate and graduate students.

4. Wi-Foo II: The Secrets of Wireless Hacking

Wi-Foo II: The Secrets of Wireless HackingBuy Now

The reason behind recommendation:

  • Teaches penetration testers how to test the security of a wireless network.
  • Show administrators how to fortify their networks, going beyond just 802. 11.
  • This newly updated and revised edition of the hit first edition will help administrators know of, prepare for, and defend against these threats.

5. Hacking Exposed – Network Security Secrets & Solutions (Hacking Exposed)

Hacking Exposed - Network Security Secrets & Solutions (Hacking Exposed)Buy Now

The reason behind recommendation:

HACKAGON recommends this book because Systems administrators are often unaware of the dangers presented by anything beyond the most trivial attacks. Because of the day-to-day tasks, Y2K projects, and increasingly complex technology, administrators have perpetually back-burners security issues out of necessity. However, recent high-profile viruses and events like the White House website being closed down by hackers have brought the issue back to the forefront. With Hacking Exposed: Network Security Secrets and Solutions, Osborne will give administrators with a modular and approachable reference so they can select the most pertinent information, rapidly digest it, and apply it immediately.


6. Digital Crime & Digital Terrorism

Digital Crime & Digital TerrorismBuy Now

The reason behind recommendation:

  • This book focuses on both the technical aspects of digital crime as well as behavioral aspects of computer hackers, virus writers, terrorists and other offenders.
  • Using real-life examples and case studies, the book examines the history, development, extent and types of digital crime and digital terrorism as well as current legislation and law enforcement practices designed to prevent, investigate and prosecute these crimes.
  • Recommended for professionals in the technical field as well as forensic investigators and other criminal justice professionals.

7. Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)

Programming Linux Hacker Tools Uncovered - Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)Buy Now

The reason behind recommendation:

  • Uncovers the development of the hacking tool set under Linux.
  • This book teaches programmers the method behind hacker programming techniques. So that they can think like an attacker when developing a defense.
  • Analyses and cutting-edge programming are provided for aspects of each hacking item and its source code—including ping and traceroute utilities, viruses, worms, Trojans, backdoor, exploits (locals and remotes), scanners (CGI and port), smurf and Fraggle attacks, and brute-force attacks.
  • In addition to information on how to exploit buffer overflow errors in the stack, heap and BSS, and how to exploit format string errors and other less common errors. This guide includes the source code of all the described utilities on the accompanying CD-ROM.

8. Bullying Beyond the Schoolyard: Preventing and Responding to Cyberbullying

Bullying Beyond the Schoolyard: Preventing and Responding to CyberbullyingBuy Now

The reason behind recommendation:

HACKAGON found this book to be a powerful read as it’s organized and indexed proficiently. Bullying Beyond the Schoolyard is eye-opening to the huge concern of Cyberbullying – from the basics to prevention, as well as important legal issues.

  • The last section of the book has awesome resources. That include activities not only for students but also for staff development.
  • The book has the research data and exhaustive research that one expects from a scholarly work.
  • It includes an important element that is too often lacking: compassion.
  • The authors genuinely care about the victims. Most of them young people who are unprepared for the rigors that cyberspace can bring.
  • In addition, they clearly care about parents and educators who wrestle with the problems of cyberspace.
  • Provides all parties methods and strategies to deal with everything over the internet.

9. Bundle: Ethical Hacking and Countermeasures: Attack Phases + Ethical Hacking and Countermeasures

Bundle - Ethical Hacking and Countermeasures - Attack Phases + Ethical Hacking and CountermeasuresBuy Now

The reason behind recommendation:

The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies people in various e-business and security skills. It is the owner and developer of the:

  • World famous Certified Ethical Hacker course
  • Computer Hacking Forensics Investigator program
  • License Penetration Tester program
  • And various other programs offered in over 60 countries around the globe.
  • These certifications are recognized worldwide and have received endorsements from various government agencies, including the US Federal Government via the Montgomery GI Bill. And the US Government National Security Agency (NSA) and the Committee on National Security Systems (CNSS) certifying EC-Council Network Security Administrator (ENSA) program for meeting the 4011 training standard for information security professionals.

10. Hack Attacks Revealed: A Complete Reference With Custom Security Hacking Toolkit

Hack Attacks Revealed - A Complete Reference With Custom Security Hacking ToolkitBuy Now

The reason behind recommendation:

  • This book is an excellent reference for networking/protocols etc, with a few scant comments of how these protocols are vulnerable.
  • Most of the appendix info can be found in RFC’s and has been pulled straight out. The extensive list of port references as an example.
  • The tiger toolkit looked promising for the out of the box hackers. But I was surprised to see that there was only a limited edition included (limited by functionality).
  • I’ve read some interesting scripts and a different approach than other books and the experience was nice.
  • Made me brush up on the network stuff but nothing you can learn from a good TCP/IP book.
  • All in all interesting, well written. But it seems the only way you are ever going to hack anything is to build your own lab and learn it yourself.

CONCLUSION:

Always start from the world around you. Everything is worth tinkering with, taking control over, and making your own ideal. If you’re looking for some expert guidance, try all these above-given books and comment your worth reading experiences below.

Note: – These Books are only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

HACKAGON recommends to Read These 10 Books On Hacking to Be An Expert Hacker only after using it on own. Believe us! all these books are worth reading for Hackers as we already read it. So, don’t forget to share these amazing intellectual books with your friends, family and on your social networks. And always feel free to drop a comment below if you have any query or feedback.

10 Best Websites To Visit If You Want To Be A Hacker

10 Best Websites To Visit If You Want To Be A Hacker – Everybody wants to learn to hack in today’s age. However, this is not an easy task until you have basic knowledge about computers and network security. For beginners to know, there are two types of Hacking Ethical (White Hat) and Unethical (Black Hat). Unethical hacking is considered illegal while ethical hacking may be regarded as legal.

Also Read: Best ways to Hack Facebook

Where Can You Go For Being Taught How To Hack Like an Expert?

Hacking isn’t an individual subject that anyone can pick up overnight. This can’t be accomplished after reading one article and visiting a few of those websites – the phrase is used to show that in time and with a lot of practice, you’ll be able to, in fact, learn to hack like a pro.

For our many readers that are already at that expert-hacker level, a few of those sites may not be for you. They might feel too easy and necessary – for “Script-Kiddies” as some would possibly say. All of us needed to begin someplace, and these websites offered the starting point for these people just embarking down the wrote toward hackerdom.

Your intention for learning how to hack is completely your own. We don’t judge. , Though, note that there are two types of hacking – “white hat” and “black hat.” White hat hackers call themselves “ethical hackers,” during that they find vulnerabilities only to make systems and applications more secure for everyone. However, there’s an entire other community of hackers – the black hats – who find vulnerabilities only to exploit them as a lot as possible. Now you understand that what kind of community you may be entering.

Also Read: SMS Spoofing

So here HACKAGON will give you a list of websites that offers you white hat content. However, it is important to note that as a beginner to not do any hacking & cracking tactics that breach any cyber law.

10 Best Websites To Visit If You Want To Be A Hacker:

1# Hackaday

Hackaday is one of the best sites to learn hacking news and all kinds of tutorials for hacking and networks. It also publishes several latest articles each day with detailed description about hardware and software hacks so that beginners and hackers are aware of it. Hackaday also has a YouTube channel where it posts projects and how-to videos. It provides users mixed content like hardware hacking, signals, computer networks and etc. This site is helpful for hackers as well as for the people who are in the field of Digital Forensics and Security Research.

Also Read: Create Rogue Access Point For Attack In Kali Linux

2# Evilzone Forum

This hacking forum allows you see the discussion on hacking and cracking. However, you need to be a member on this site to check out queries and answers about ethical hacking. All you need to do is register to get your ID to get an answer for your queries there. Professional hackers will solve your queries. The Remember not to ask simple hacking tricks, the community people here are very serious.

Also Read: Uprooting Virus

3# HackThisSite

HackThisSite.org, commonly called HTS, is an online hacking and security website that gives you hacking news as well as hacking tutorials. It aims to give users with a way to learn and practice basic and advanced “hacking” skills through a series of challenges, in a safe and legal environment.

Also Read: Hashes

4# Break The Security

Name itself tells the motive of this website. Break The Security provides all kind of hacking stuff such as hacking news, hacking attacks and hacking tutorials. It also has a different kind of useful courses that can make you a certified hacker. This site is very helpful if you are looking to choose the security and field of hacking and cracking.

Also Read: XSS Attack

5# EC-Council – CEH Ethical Hacking Course

The International Council of Electronic Commerce Consultants (EC-Council) is a member-supported professional organization. The EC-Council is known primarily as a professional certification body. Its best-known certification is the Certified Ethical Hacker. CEH, which stands for Comprehensive Ethical Hacker provides complete ethical hacking and network security training courses to learn white hat hacking. To become a professional ethical hacker you just need to select the hacking course package and join to get trained. This site helps you to get all kinds of courses that make you a certified ethical hacker.

Also Read: How to do SIM Cloning

6# Hack In The Box

This is a popular website that provides security news and activities from the hacker underground. You can get huge hacking articles about Microsoft, Apple, Linux, Programming and much more. This site also has a forum community that allows users to discuss hacking tips.

Also Read: Latest Carding Dorks 2017

7# SecTools

As the name suggests, SecTools means security tools. This site is devoted to providing significant tricks about network security that you could learn to fight against the network security threats. It also offers security tools with detailed description about it.

8# Hacking Loops

Hacking Loops is one of the ethical hacking websites where you will get many articles on white hat hacking. Each article on this site seems to be absorbing, and I’m sure you too will. Some of the great posts on this site are “How to stop the virus or trojan attacks”, “Game Ranger hack for the range of Empires”, “Facebook smart status update tool”, and so on.

9# Explore Hacking

Explore Hacking is a site which wants the users to know the importance of information security. I think this website is great for the beginners. Because this site is very keen on providing the lower level to higher level hacking tutorials with fine screenshots. So, that’s the most useful key for the first level hackers to learn complicated hacking methods quickly.

10# Hacking Tutorial

Perfect English isn’t all the things. Hacking Tutorial is an example of when these writing skills of an author do not much relate to the quality of his/her technical information. That is the case over at Hacking Tutorial. Where the author offers an article related to “Client Side Attack Using the Adobe PDF Escape EXE Social Engineering”, “Exploiting MS11_003 Web Explorer Vulnerability”, and “Hacking Using BeeF XSS Framework”.

Also Read: Hack WPA2-PSK WiFi Password Using Linux

.

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

We hope that HACKAGON matched our readers’ expectations about 10 Best Websites To Visit If You Want To Be A Hacker. So, if you like this article then don’t forget to share it with your friends. And always feel free to drop a comment below if you have any query or feedback.

hashes

Hashes


There are a lot of hurdles you will have to cross before you get to a point where you can call yourself a “Hacker” and so is Hashes. For one, everyone expects you to know everything to know about everything related to computers – Software, Hardware, networking and everything you can do with these three things (i.e. everything).

Speaking from experience, as one sets out for newer and bigger and more complicated hacks, often the biggest problems arises due to a weak foundation – lack of knowledge about a particular field. Hence, not only are you expected to know everything about Hacking and computers, but you are required for calling yourself a “Hacker”. Reason being, you might hit a roadblock, overcoming which could be quite simple but you wouldn’t know that since you’re not familiar with that field and end up spending hours on it. Forget thinking outside the box, start thinking in a whole new dimension.

With all that in mind, Here we discuss “Hashes”

A cryptographic hash function or algorithm is one that takes an arbitrary block of data and returns a fixed-length string (the hash), such that any (accidental or intentional) change to the data will (with very high probability) change the hash value. The data to be encoded are often called the message, and the hash value is sometimes called the ‘Message Digest’ or simply ‘Digest’.

In a nutshell, say we have this string “Hello”. We run it through a Hashing function and we get something like “kjadhs4as187d9dgh332g35g4”
This is the basic use of Hashing – Hiding Data. Obviously, no sane and sober person can decipher the original “Hello” from that weird string up above (Or can they? Read on…)

Ideal hash functions make it very difficult to get the original message back from the digest. It should be reasonably easy to compute a hash for a given message, infeasible to generate a message with a given hash or to change a message without changing the resultant hash. For practical reasons, we should never find two messages with the same hash. (Read that again)

While no completely ideal function exists, functions which aim for these properties can prove very useful. A classic example of cryptographic hash use is in the storage of passwords. When you sign up for a website, your data is usually stored in a database on servers. The issue is that if your password is stored on the server as regular text and if somebody hacks into the server, your password and everything it gave access to is gone. If your password is hashed on the server, however, an attacker shouldn’t be able to formulate your password from the stored value.

This concept may leave some wondering how a password entered at a later date could then be compared to the stored value to check if the login information is correct, but in fact, this is quite simple. You create an account, type in a password, the server hashes it and stores the digest. On the next login, the inputted password is simply hashed using the same function again, and this new digest is compared to that in the database – if they match, the inputs were the same and the user is allowed access to his/her account. Definitely, a more CPU intensive way to go, but it is what’s keeping our accounts safe.

Situations like this are also where the function property being “infeasible to find two messages with the same hash” becomes very important. If two values generate the same hash (these situations are called collisions, and are something that pretty much all hash functions are vulnerable to), somebody could input an incorrect password yet it could confirm as correct. Yes, you read that correctly!

And now! The million dollar question – How is it even possible to have an algorithm that can give a result which cannot be worked back from?

This really is the cornerstone of hash functions – especially as most secure algorithms are open source and available to the public. The most popular ones are called SHA1 and MD5 if you’re into programming go ahead and google them up to know more about them.

For those who don’t mind a little math, here’s a small example:

**[Math]**
Take ‘4’ , Square it.
»16 , Take natural log.
»2.7725 , Multiply by pi.
»8.7103 , Take factorial (gamma function).
»189843.119 ***

Now ask a friend how is 189843.119 related to 4 and watch them laugh at your face. Chances are, even if s/he actually attempts to figure it out they may never get the answer. Meaning, you (the server) have successfully fooled your friend (the hacker). Only a metaphor. Of course, you (the server) can do the same with no problem because you know the exact functions. Just for a comparison, real Hashing functions are so complex even massive supercomputers may not be able to rework the original message from the digest.

The irreversibility isn’t actually as impossible as it might first sound – the tough bit comes in compromising this with all the other ideal properties. The trick is to split the message into a number of blocks, and then jumble them up and interact with each other to get some last seemingly random value pop out. Plus, they may contain not only apparent chaos but the real loss of information, say by cutting off decimal places or approximating large factorials. Meaning, there literally may not be anything related to the original message, not even enough information to actually trace back the message, even by the server hashing it in the first place. Further, a good hash function should produce totally different results if even a single character is changed. So, chop off one decimal place and the hash of “123password” might seem to become the one from “ladygaga” for example. Weird, right? (The function, not Lady Gaga XD) (P.S. – Alphabets or any characters can be literally converted into fixed numbers by taking their respective ASCII codes- which are simply some numbers assigned to every character on your keyboard.)

Rainbow Tables and Salting:

Hash functions are generally pretty strong, however, as always, a brute force attack is a way around the security. You may have heard of things called Rainbow Tables – These are essentially massive tables of Message-Digest pairs for a certain algorithm. Indirectly, a trade-off between time taking CPU power and memory storage. (Message-Digest the pair simply means, in this case, a possible password and the weird string it gives when to running through a hashing function)

For example, say a bunch of powerful computers has worked at generating message-digest pairs for an algorithm for a fair amount of time (a lot of combinations), and they’ve managed to list all the character combinations and associated hashes for up to 5 characters in message length with a known hashing function. If you’re running a website which simply hashes users passwords in a database with this popular (and presumably secure) algorithm, this means that if your users’ passwords aren’t very complex, they may already be listed in the rainbow table. So if an attacker breaks in, they could simply run all the hashes against the rainbow table, hence getting the original passwords for users with weaker passwords.

For example, say your database shows the association

user: JBsux
password: 9d4e1e23bd5b72

However, an entry for “9d4e1e23bd5b72” is found in the rainbow table through a quick search through, and the hash is translated back into the original password, say: “IsecretlyluvJB” and now, you’re screwed, in more than one way.

This is a pretty big problem – not only can users not really be trusted to come up with secure passwords a lot of the time, but popular algorithms are usually the more secure ones, however, this, in turn, means that more people will be interested in putting their CPU horsepower towards bettering the rainbow tables to break more hashes in that algorithm.

(Note: Rainbow tables are just a method to brute force and they suffer from the same weakness: Exponential growth. While most passwords up to 8 characters can be crammed into a reasonable 4 Terabyte hard disk, take it up to 12 characters and you’re looking at over 10 freaking Exabytes or 10 million Terabytes. Further, I got this figure by using the charset: {A-Z, a-z, 0-9} = I didn’t even consider symbols. Count those in and you literally cannot store the possible combinations on every storage device on the planet, combined. Oh, and did I mention that it might actually take even a supercomputer possibly hundreds of thousands of years to actually create that much data? And still, Rainbow tables are practical enough to deserve a mention here and they actually do work, Amazing isn’t it? The main reason being – Weak Passwords. (Surprisingly, “IsecretlyluvJB” at 14 characters long is actually pretty strong and the above example would be technically and practically correct only for a smaller password like “pass”))

Luckily, this problem isn’t too difficult to solve. Generating rainbow tables are only really practical for an amount of characters as the possible combinations of characters simply gets too high for a rainbow table to be generated for all the combinations practically. So to combat rainbow tables, all we really have to do is add a bunch of characters to the end of the password before we hash it, and we have a totally different hash which won’t be in the rainbow table. These extra characters are called salts. These are usually pretty big, around 10-20 or more characters and protect the naïve users who put in a 4 character password. The server may simply append the salt to the user inputted password and then hash it.

There’s one more important precaution that should be taken. Another example: Say, we own a site with millions of users. If we use the same salt for each user password, it’s probably worthwhile for attackers to go out of their way to actually generate a custom rainbow table for values with our salt attached to them! The solution to this is also very simple – use random salts. If salts are different for each user, there’s no way that an attacker can try to get all the passwords in the database, even with a lot of time and a lot of storage memory whereas for the server, it can simply store the username and password hash along with the randomly generated salt and use it again when the user enters the password for logging in.

If attackers wanted to target a specific user, of course, they could waste a whole bunch of time trying to generate a rainbow table specifically for that salt, however, if the user has a strong password it will simply take too long as there are way too many character combinations that the password could contain.

In conclusion, Hashes are today’s way of encrypting (mostly) passwords. A great invention, they are here to stay for a while but like every security system, they are flawed. There’s only so much a company and their servers can do to make sure their users are kept safe, in the end, it’s up to the users to look out for themselves. The annoying websites which keep the passwords to contain say, A capital letter + A number + A symbol, are in fact the most secure. Whereas the ones who accept 4 character length passwords, although convenient are also the most insecure, Hence it’s up to the user to keep themselves safe.

A peek into the world to come tells us passwords themselves will become obsolete in the not so distant future. With BioMetrics already rising up in the world of security. Fingerprint and Retina Scanners, Handwriting and Facial Recognition software etc. mark the beginning of the next big step in the field of cyber safety. Further with the advent of the so-called “Quantum Computers” just beyond the horizon, each of us will have access to CPU’s dozens, perhaps hundreds of times faster than the ones on the market. The billion year long brute force attacks might soon take as little as a few seconds. Breathe a sigh of relief, quantum computing is mostly theoretical for the time being and is just about as real as light sabers in star wars (They are at little glow sticks as compared to light sabers). Right now, we can let them be our grandchildren’s headache

Rewinding to the present, passwords are here to stay (for the near future at least), and so are Hashes. Luckily for us, the hackers, this provides us with just another loophole to exploit.

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

Hope HACKAGON have provided a healthy knowledge about Hashes. So, stay secure and keep learning and if you like this article then don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.


Programming Languages For Hacking: Every hacking beginner can have plenty of doubts like: “Which programming language should I learn for Hacking ?”, “How to become A professional Pentester / Hacker ?” etc.

Programming Languages For Hacking

When we talk about COMPUTERS then everything related to them depends on programming because, without SOFTWARE, any piece of HARDWARE is nothing but a collection of scrap. But with a beautiful stream of 1’s and 0’s which is also known as BINARY, it can almost literally be pumped full of life. Whatever we see and do on our mobiles and computers and every new gadget as well as applications these days were created by someone, somewhere who night after night tirelessly written the code to create something wonderful for the world.

The users often don’t fully comprehend exactly what goes on behind the scenes of any decent piece of software. For this reason, here’s a little reality check before we get to the main topic. A line of code (LoC) is a single average line in a program and usually contains around 40-50 characters.

  • The Unix 1.0 OS (1970) contained about 10,000 lines of code.
  • An average iOS or android app has approximately 50,000. That is 50,000 lines typed word by word by some coder, and we’re just getting started.
  • Photoshop CS6 clocks in at a freaky 5 million LoC.
  • Firefox browser is of around 10 million.
  • We’ve got Windows 7 at 40 million and guess what? Microsoft office is actually bigger than the parent OS itself (about 45 million LoC).

What’s The Point Of Notifying All This ??

Programming is not actually as we pictured above. we know it takes effort but not that much. The truth is, Lines of Code is a poor way to measure the difficulty of coding. It’s like measuring a person’s success by counting the number of words they’ve spoken, ridiculous and not really related.

The point to state all of the above is to prove wrong all of them who overstate and exaggerate the difficulty of learning how to program. It’s almost always pictured as something unbelievably boring, dry, dull and geeky. As we see in movies, we pictured a programmer as a nerdy guy with huge spectacles sitting in front of the computer tirelessly typing away while all that s/he accomplishes is something wonderful. Undoubtedly, the programming can only be done by someone who thoroughly enjoys it. It’s different for everyone which is why you should actually find out if the programming is for you or not, you need to try it out for yourself.

How Exactly The Programming & Hacker Is Related ??

Programming teaches you the logics and the way to think. It develops the problem-solving capability and most importantly, it is what differentiates you from the SCRIPT KIDDIES. If the hacks are carried out through the tools developed by others, then that person has no rights to be known as a “Hacker”. If you ever tried googling about hacking and gave up soon without finding an answer, you’re not alone. The main reason most hackers are not big on helping others is because they start getting bombarded by noobs asking them to hack FB/Whatsapp/Twitter accounts and explain something so basic and silly that they just give up and start ignoring them. Programming helps you understand how everything in your smarter idiot box comes together. It gives you better knowledge about how to identify and solve any problems by yourself. By knowing programming, you get a better understanding of how vulnerabilities and exploits work.

Most importantly a hacker can code their own tools, scripts, exploits, shell codes, entire applications and modify existing ones according to their own needs. In programming, Hackers can be expected to identify the problems and find the way through them with logical thinking.

Why Programming ??

The first question, many people will ask, is why should I learn any programming language when there are so many tools and Frameworks such as MSF (Metasploit framework) to do my job. All I need to know is how the tool works and what is the purpose of it. The Answer to the question is both yes and no. You can become a Pentester/Hacker without knowing any programming, however, you are not going to become a GOOD pentester/Hacker.

So Knowing Programming Will:

  • Differentiate you from Script Kiddies and Tool Lovers.
  • Help You in Understanding About Vulnerabilities.
  • Help You in writing Your own tools, scripts.
  • Help You in writing exploits, Shell codes etc.
  • Help You modifying Existing scripts, tools according to your needs.

Where To Start ??

All you have to do is to pick a Programming Language and dive in but the question is still there “Which one ?”. There’s simply no right or wrong answer to this question. But the truth is, you have to learn quite a few languages for hacking, preferably as many as possible. Even if you will not need to code in every language, but you should understand how to read it at least. No language is perfect as each one has its pros and cons. You can do the same thing in a million different ways with a dozen programming languages. The time spent analyzing these useless facts could better be spent actually learning something. There is nothing to gain from comparing languages. Actually, the difference between languages is almost like the difference between “Hello”, “Hi” and “Hey”. Although languages like HTML, SQL, Java are used for different things, it really doesn’t matter where you start since you should learn as many languages as you can.

So now that you have understood the importance of knowing programming, the next question in your mind is which programming language should I learn – the answer to this question depends on your interests and goals.

Programming Languages For Hacking:

1# For Web App / Pentesting / Hacking:

HTML: Hypertext Markup Language (HTML) is the basics for creating web pages and other information that can be displayed in a web browser. So if you don’t know HTML you should first learn it.

JavaScript: Learning JavaScript. It will help you to understand the basics of Cross Site Scripting.

PHP / SQL: The majority of web applications are written using PHP and MySQL. So it is a must to learn PHP.

2# For Writing/Understanding Exploits, Shell Codes, Rootkits etc:

C & C++: More than 60 % of the exploits you will find on the web are written in C & C ++. Learning C & C++ will help you to understand about Buffer overflows, Stack overflow etc – so learning C and C ++ is a must for every Hacker/Pentester.

Assembly: Learning assembly will help you in Writing/understanding Shell codes, it will also help you in Reverse Engineering applications and software’s.

3# For Building Tools And Scripts:

Python: Python is a very powerful high-level language, it’s easy to learn and code, most of the tools and scripts for automation are written in Python. Knowing Python socket programming will help you a lot in Exploit writing.

Ruby: Ruby is an another language which is used to write scripts, tools. Metasploit Framework is written in Ruby. Learning ruby will help you understand the in and outs of MSF.

Bash: Learning Bash is very useful in writing small scripts for automation.

So, we hope that we provided some useful knowledge about Programming Languages used for Hacking so that readers can begin their Hacking career with an ease. And if you like this article then don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.


Traditionally, a hacker is someone who likes to tinker with software or electronic systems. Hackers enjoy exploring and learning how computer systems operate. They love discovering new ways to work electronically. So Here in HACKAGON, we’ll tell you What Is Hacking and the misconceptions about it.

What Is Hacking

What Is Hacking ?

Technically, Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator’s original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a Hacker. In the cyber security world, the person who is able to discover a weakness in the system and manages to exploit it to accomplish his goal (Good or Bad) is referred as a Hacker, and the process is referred as Hacking.

Computer hacking is the most popular form of hacking nowadays, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and it’s not limited to either of them. Nowadays, People think that hacking is only hijacking Facebook accounts or defacing websites. Yes, it is also part of the hacking field but it doesn’t mean that it is all there is. This is not even the tip of the iceberg.

What does the term Hacking exactly means and what should you do to become a Hacker? That is exactly what we are going to discuss here in HACKAGON.

Ethical Hacking (Also known as Penetration Testing or White-Hat Hacking) Involves the same tools, tricks, and techniques that Black Hat Hackers use, but with one major difference: Ethical hacking is legal. Ethical hacking is performed with the target’s permission. The intent of ethical hacking is to discover vulnerabilities from a hacker’s viewpoint so systems can be better secured. It’s part of an overall information risk management program that allows for ongoing security improvements. Ethical hacking can also ensure that vendors’ claims about the security of their products are legitimate. The only thing you need to become a hacker is interest and dedication. You should always be ready to learn something new and learn to create something newer.

Hacking is the practice of modifying the features of a system or finding a loophole, in order to accomplish a goal outside of the creator’s original purpose but due to the mass attention given to the so-called “Blackhats” or “Crackers” from the media, the reputation of all hackers, even the good ones is damaged. This is what HACKAGON is for – To turn this image around. Hacking is always viewed as something illegal and shrewd. This is almost never the case. A few bad guys doing a few bad things have put a bad name on an entire community.

So, we hope that we provided some healthy and hygienic knowledge about Hacking so that readers can begin their Hacking career with proper ethics. And if you like this article then don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.