Practicing

There are many skills that you need to acquire in order to be a great hacker. Similar to how if you ever want to be a locksmith in Homestead, you need to practice and know your tools. But you are never going to be a master hacker unless you are able to have all of your tools. So here is a list of tools and next we will talk about the characteristics required.

Also, we are highly recommending this article for a great follow up

VPN

“The service is built for users who just want secure, private access when connected from public or untrusted networks. The app gives you an offshore IP address and connects you to an anonymizing server to mask your real IP address and location, and then encrypts all of the internet traffic between you and the VPN service. It may sound like overkill, but if you use public Wi-Fi networks on a regular basis, using a VPN is the best way to protect yourself from applications or web sites that transmit sensitive information like usernames and passwords in clear text.”

VirtualBox

“A VirtualBox or VB is a software virtualization package that installs on an operating system as an application. VirtualBox allows additional operating systems to be installed on it, as a Guest OS, and run in a virtual environment. In 2010, VirtualBox was the most popular virtualization software application. Supported operating systems include Windows XP, Windows Vista, Windows 7, Mac OS X, Linux, Solaris, and OpenSolaris.”

WireShark

“Wireshark is cross-platform, using the Qt widget toolkit in current releases to implement its user interface, and using pcap to capture packets; it runs on Linux, macOS, BSD, Solaris, some other Unix-like operating systems, and Microsoft Windows. There is also a terminal-based (non-GUI) version called TShark. Wireshark, and the other programs distributed with it such as TShark, are free software, released under the terms of the GNU General Public License.”

Several Browsers

“Similar to Metasploit, BeEF is a framework for launching attacks. Unlike Metasploit, it is specific to launching attacks against web browsers. In some cases, we will be able to use BeEF in conjunction with Metasploit to launch particular attacks, so I think its time for us to become familiar with it.
BeEF was developed by a group of developers led by Wade Alcorn. Built on the familiar Ruby on Rails platform, BeEF was developed to explore the vulnerabilities in browsers and test them. In particular, BeEF is an excellent platform for testing a browser’s vulnerability to cross-site scripting (XSS) and other injection attacks.”

Conclusion

You want to get the VPN first. Having private online searches is great for ensuring your movements aren’t being tracked and put on a list somewhere which can cripple your fledgling career. You don’t want to end up being locked out in Homestead and the hacking world.