Hatimaye nimekata tamaa ya kujifunza Hacking. Ninachoki-experience sio nilichokidhania

Hatimaye nimekata tamaa ya kujifunza Hacking. Ninachoki-experience sio nilichokidhania

Mkuu unaweza Ila watu wengi tutorial zinawaharibu mtu ana copy na ku paste command kibaya zaidi ukimuuliza kila flag zinafanyaje kazi hauji na Wala hajui kitu gani kinafanyika at background na ikitokea ameipata error yeyote jua kazi ndo imeishia hapo

Niliwahi hudhuria training kazaa za SANS
Kuna expert mmoja alisema kabla ya kuanza kufanya penetration tengeneza flow chart yako vzr Kisha angalia sehemu gani Ina weakness ambayo inaweza kuacha trace ifanyie kaz
Mfano unaweza kutumia payload lakin Kuna nyingine zinaweza kusababisha misbehave yani system inakuwa haiko stable mpaka inapelekea victim wako kustuka ukimaliza angalia katika hiyo attacking flow inaweza kufanya kazi kwa aina gani ya victim...! Ikiwezekana ananza kujifanyia testing mwenyew

Flow inaweza kuwa Kama ivi mfano unachagua kutumia payload au software weakness kupata access then baadaya ya hapo kam unakuwa na command server Kisha sehem ya kuhifadhia data mfano ftp server kwa ajili ya kuweka data au taarifa ukazo kuwa unazichukua kwa victim wako

Mi naamini unaweza na unayo talent mkuu inahitajika commitment tu Ila usifanye jambo ambalo Hauna faida nalo
"usifanye jambo ambalo hauna faida nalo"-point ya msingi
 
Kwa Tanzania kuna vichwa viwili.....au vitatu....na vyote vishawahi kuwa...ma instructor UDSM.........na moja ya matunda yao ni kuanzishwa UCC.....Hawa wana hack net yoyote duniani.....ndo mana wameapishwa na Taasisi mbalimbali....
Mmoja ni chain smoker......akikaa kwenye PC....mpaka watu wamshtue we bwana nenda kalale....huyu wa 3 labda karudi kwao Uholanzi.....
 
It's all abt passion.
Wewe kuna a motive behind ambayo inaku-stress ufanye hiyo hacking. After all unapaswa kuwa very smart unapotaka kuwa hacker. Sio kila mtu anaweza kuwa hacker. It takes a dedication and commitment kuwa hacker. Pia unapaswa kuwa na resources za kufanyia hizo hacking and it's a bit expensive.

Wapo vijana wanaweza hata kuhack system za matokeo hapo chuoni mara kadhaa tumesikia huo ni mfano mdogo tu ambao unaonesha inawezekana.
Hao vijana wanaofanya hacking kwenye mfumo wa matokeo chuoni wala sio real hackers, huo ni mchongo unatokea ndani ya wahusika wenyewe wa chuo. Wanafunzi wanatoa mpunga, wanapewa hints na codes za kufungua mfumo na kufanya mabadilika. It is nothing new&special.
 
[emoji1787][emoji1787][emoji1787] kwa iyo mpaka muwe kwenye network Moja daah maisha haya...! Nyie ndio mwasababisha ma IT wanadharaulika wallahi
I'm just a novice kwenye hacking na mimi siyo mtaalamu wa IT. Kama kweli unaielewa IT, ulitakiwa unipe credits za kutosha
 
Wakuu
Nilipokuwa nasikia kuhusu hackers na case zao za kuvuta mpunga kwenye bank mbalimbali ilinivutia Sana nikatamani kufanya hacking my career.

Nikaanza kufuatilia nitaanzaje?

Niliambiwa nijifunze programming nikajifunza python, namaliza python nikajifunza html, Bado cc na java duh!

Nikawa najifunza kwa kuangalia video tutorials za you tube.
Then nikajaribu kufuatilia nikaambiwa siwezi kuwa hacker bila kujifunza networking, nikajifunza mwenyewe Mambo ya PAN, WAN, na LAN na jinsi network inavyofanta kazi, lakini haikuishia hapo nikaambiwa nijifunze kutumia kali Linux nikajifunza.

Nilistop kujifunza theoretically baada ya kuambiwa "

don't learn to hack , hack to learn"​

any way nilichokuja kugundua ni kwamba hacking sio vile nilidhani kilichonikatisha tamaa

Hacking sio maajabu Kama nilivyodhani , hata kupata password kwa kutumia Red Hawk kwa mfano inatumia njia ya ku guess Kila password yaani una run crack kwa mda mrefu hata wiki kabisa mpaka pale itakapopatia password ya kweli.

Kumbe huwezi kuhack laini ya mtu na kuvuta mpunga m pesa Ila kwa njia moja tu inayoitwa sim card cloning ambayo inahitajika physical access hivyo huwezi kufanya Hilo Jambo remotely labda umshawishi mtu akupe baadhi ya taarifa.

Kumbe huwezi kuhack account ya bank ya mtu kwa siku moja au mbili , ni Jambo la mwezi au miezi na inahitaji uwe angalau na taarifa za mwanzo ambazo ili kuzipata lazima uwe tapeli kwanza.

Bahati mbaya zaidi hamna sehemu ya kujifunza Hacking ukaelewa, utapata knowledge za juu juu tu kupitia videos za you tube au online courses.

Finally naweza sema kwamba

Stop living in the world of imagination, come to reality and make great​

learning hacking is nothing but wastage of time , vinginevyo labda uwe na kipaji.
Mkuu Ulifanikiwa kujifunza Database au SQL injection kama bado....Ulikuwa hujjfunzi hacking ulikuwa unajifunza programing...
Na hicho ulichojifunze ilikuwa Basic knowledge yaani hata Amateur level hukufika...
Wenzetu wanaita Dummies level.....

Soma kozi hizi hapa chini ukiwa na passion na upunguze papara Usitarajie kitu kwanza mpaka umalize kuzisoma zote baadae ukishamaliza Sasa jifunze kuinject Buggs kweny Database (SQL injection)
Ukimaliza zote hizi ndo utskuwa angalau umefika Basic level ya hacking
Screenshot_20230905-082600_1.jpg
 
Wakuu
Nilipokuwa nasikia kuhusu hackers na case zao za kuvuta mpunga kwenye bank mbalimbali ilinivutia Sana nikatamani kufanya hacking my career.

Nikaanza kufuatilia nitaanzaje?

Niliambiwa nijifunze programming nikajifunza python, namaliza python nikajifunza html, Bado cc na java duh!

Nikawa najifunza kwa kuangalia video tutorials za you tube.
Then nikajaribu kufuatilia nikaambiwa siwezi kuwa hacker bila kujifunza networking, nikajifunza mwenyewe Mambo ya PAN, WAN, na LAN na jinsi network inavyofanta kazi, lakini haikuishia hapo nikaambiwa nijifunze kutumia kali Linux nikajifunza.

Nilistop kujifunza theoretically baada ya kuambiwa "

don't learn to hack , hack to learn"​

any way nilichokuja kugundua ni kwamba hacking sio vile nilidhani kilichonikatisha tamaa

Hacking sio maajabu Kama nilivyodhani , hata kupata password kwa kutumia Red Hawk kwa mfano inatumia njia ya ku guess Kila password yaani una run crack kwa mda mrefu hata wiki kabisa mpaka pale itakapopatia password ya kweli.

Kumbe huwezi kuhack laini ya mtu na kuvuta mpunga m pesa Ila kwa njia moja tu inayoitwa sim card cloning ambayo inahitajika physical access hivyo huwezi kufanya Hilo Jambo remotely labda umshawishi mtu akupe baadhi ya taarifa.

Kumbe huwezi kuhack account ya bank ya mtu kwa siku moja au mbili , ni Jambo la mwezi au miezi na inahitaji uwe angalau na taarifa za mwanzo ambazo ili kuzipata lazima uwe tapeli kwanza.

Bahati mbaya zaidi hamna sehemu ya kujifunza Hacking ukaelewa, utapata knowledge za juu juu tu kupitia videos za you tube au online courses.

Finally naweza sema kwamba

Stop living in the world of imagination, come to reality and make great​

learning hacking is nothing but wastage of time , vinginevyo labda uwe na kipaji.

Best Linux Distributions for Hacking and Penetration Testing

Last updated May 11, 2019 By Munif Tanjim 25 Comments

Looking for best Linux to learn hacking?
Whether you want to pursue a career in Information Security or you are already working as a security professional or if you are just interested in this specific field of knowledge, a decent Linux distro that suits your purpose is a must.
There are countless Linux distros for various purposes. Some are designed for specific tasks in mind and others are for different interfaces.
We have seen weird Ubuntu distributions in an older article. But, today we are going to have a look at a list of some of the best Linux distro to learn hacking and Penetration Testing.
Before we see the best Linux distros for hackers, I would recommend you to check for online hacking courses at our shop.

Best Linux hacking distributions

I have basically listed out various Linux distributions focusing on security. These Linux distros provide various tools that are needed for assessing networking security and other similar tasks. List is in no particular order.

1. Kali Linux

Kali Linux is the most widely known Linux distro for ethical hacking and penetration testing. Kali Linux was developed by Offensive Security taking on the mantle of BackTrack.
Kali Linux


Kali Linux
Kali Linux is based on Debian. It comes with a large amount of penetration testing tools from various fields of security and forensics. And now it follows the rolling release model, meaning every tool of your collection will always be up-to-date.
It is the most advanced penetration testing platform out there. It supports a wide range of devices and hardware platforms. Moreover, Kali Linux provides decent documentation and a large & active community.
You can easily install Kali Linux in VirtualBox inside Windows and start your hacking practice right away.

2. BackBox

BackBox is a Ubuntu-based distro developed for penetration testing and security assessment purpose. It is one of the best distro in its field.
BackBox Linux
BackBox has its own software repository providing latest stable versions of various system & network analysis toolkits and the best known ethical hacking tools. It is designed with minimalism in mind and uses XFCE desktop environment. It delivers a fast, effective, customizable and complete experience. It also has a very helpful community behind it.

3. Parrot Security OS

Parrot Security OS is relatively new in the game. Frozenbox Network is behind the development of this distro. The target users of Parrot Security OS are penetration testers who need cloud friendly environment with online anonymity and encrypted system.
Parrot Security OS
Parrot Security OS
Parrot Security OS is also based on Debian and uses MATE as its desktop environment. Almost every recognized tool for penetration testing is available here, along with some exclusive custom tools from Frozenbox Network. And yes, it is available as Rolling Release.

4. BlackArch

BlackArch is a penetration testing and security researching distro built on top of Arch Linux.
BlackArch
BlackArch
BlackArch has its own repository containing thousands of tools organized in various groups. And the list is growing over time.
If you are already an Arch Linux user, you can setup BlackArch tools collection on top of it.

5. Bugtraq

Bugtraq is a Linux distro with a huge range of penetration, forensic and laboratory tools.
Bugtraq
Bugtraq
Bugtraq is available with XFCE, GNOME and KDE desktop environments based on Ubuntu, Debian and OpenSUSE. It is also available in 11 different languages.
Bugtraq packs a huge arsenal of penetration testing tools – mobile forensics, malware testing laboratories along with tools specifically designed by the Bugtraq-Community.

6. DEFT Linux

DEFT, short for Digital Evidence & Forensics Toolkit, Linux is a distribution made for Computer Forensics, with the purpose of running live system without corrupting or tampering devices connected to the PC where the booting takes place.
DEFT Linux
DEFT Linux
DEFT is paired with DART (Digital Advanced Response Toolkit), a Forensics system for Windows. It uses LXDE desktop environment and WINE for running Windows tools.

7. Samurai Web Testing Framework

Samurai Web Testing Framework is developed with the sole purpose of penetration testing on web in mind. Another difference is that it comes as a Virtual Machine, supported by Virtualbox & VMWare.
Samurai Web Testing Framework
Samurai Web Testing Framework
Samurai Web Testing Framework is based on Ubuntu and contains the best free and open source tools focusing on testing and attacking websites.
It also includes a pre-configured Wiki set up to store information during your penetration tests.

8. Pentoo Linux

Pentoo is based on Gentoo Linux. It is a distro focused on security and penetration testing and is available as LiveCD with persistence support (means any changes made in the Live environment will be available on the next boot if you use a USB stick).
Pentoo
Pentoo
Pentoo is basically a Gentoo installation with lots of customized tools, kernel features and much more. It uses XFCE desktop environment.
If you are already a Gentoo user, you can install Pentoo as an overlay on it.

9. Caine

CAINE stand for Computer Aided Investigative Environment. It is created as a project of Digital Forensics and is completely focused on it.
Caine
Caine
Caine comes with a wide variety of tools developed for system forensics and analysis purpose.

10. Network Security Toolkit

Network Security Toolkit is a bootable Live ISO based on Fedora. It provides security professionals and network administrators with a wide range of open source network security tools.
Network Security Toolkit
Network Security Toolkit
Network Security Toolkit has an advanced Web User Interface for system/network administration, navigation, automation, network monitoring & analysis and configuration of many applications found in Network Security Toolkit distro.

11. Fedora Security Spin

Fedora Security Spin is a variation of Fedora designed for security auditing and testing and it can also be used for teaching purpose.
Fedora Security Spin
Fedora Security Spin
The purpose of this distro is to support students and teachers while they are practicing or learning security methodologies on information security, web application security, forensics analysis and so on.

12. ArchStrike

ArchStrike (previously known as ArchAssault) is a project based on Arch Linux for penetration testers and security professionals.
ArchAssault
ArchStrike (previously ArchAssault)
It comes with all the best things of Arch Linux with additional tools for penetration testing and cyber security. ArchStrike includes thousands of tools and applications, all categorized into modular package groups.

Others​

There are plenty others for you to choose from. We are going to mention some more of them:
· Cyborg Linux
· Matriux
· Weakerth4n
Which of the above listed hacking Linux distros have you tried? Want to suggest any distro that we missed? Share what you think in the comment section.


10 Best Linux Distributions for Hacking & Pen Testing [2023]
 

Best Linux Distributions for Hacking and Penetration Testing

Last updated May 11, 2019 By Munif Tanjim 25 Comments

Looking for best Linux to learn hacking?
Whether you want to pursue a career in Information Security or you are already working as a security professional or if you are just interested in this specific field of knowledge, a decent Linux distro that suits your purpose is a must.
There are countless Linux distros for various purposes. Some are designed for specific tasks in mind and others are for different interfaces.
We have seen weird Ubuntu distributions in an older article. But, today we are going to have a look at a list of some of the best Linux distro to learn hacking and Penetration Testing.
Before we see the best Linux distros for hackers, I would recommend you to check for online hacking courses at our shop.

Best Linux hacking distributions

I have basically listed out various Linux distributions focusing on security. These Linux distros provide various tools that are needed for assessing networking security and other similar tasks. List is in no particular order.

1. Kali Linux

Kali Linux is the most widely known Linux distro for ethical hacking and penetration testing. Kali Linux was developed by Offensive Security taking on the mantle of BackTrack.
View attachment 2739430

Kali Linux
Kali Linux is based on Debian. It comes with a large amount of penetration testing tools from various fields of security and forensics. And now it follows the rolling release model, meaning every tool of your collection will always be up-to-date.
It is the most advanced penetration testing platform out there. It supports a wide range of devices and hardware platforms. Moreover, Kali Linux provides decent documentation and a large & active community.
You can easily install Kali Linux in VirtualBox inside Windows and start your hacking practice right away.

2. BackBox

BackBox is a Ubuntu-based distro developed for penetration testing and security assessment purpose. It is one of the best distro in its field.
View attachment 2739431
BackBox has its own software repository providing latest stable versions of various system & network analysis toolkits and the best known ethical hacking tools. It is designed with minimalism in mind and uses XFCE desktop environment. It delivers a fast, effective, customizable and complete experience. It also has a very helpful community behind it.

3. Parrot Security OS

Parrot Security OS is relatively new in the game. Frozenbox Network is behind the development of this distro. The target users of Parrot Security OS are penetration testers who need cloud friendly environment with online anonymity and encrypted system.
View attachment 2739442Parrot Security OS
Parrot Security OS is also based on Debian and uses MATE as its desktop environment. Almost every recognized tool for penetration testing is available here, along with some exclusive custom tools from Frozenbox Network. And yes, it is available as Rolling Release.

4. BlackArch

BlackArch is a penetration testing and security researching distro built on top of Arch Linux.
View attachment 2739440BlackArch
BlackArch has its own repository containing thousands of tools organized in various groups. And the list is growing over time.
If you are already an Arch Linux user, you can setup BlackArch tools collection on top of it.

5. Bugtraq

Bugtraq is a Linux distro with a huge range of penetration, forensic and laboratory tools.
View attachment 2739438Bugtraq
Bugtraq is available with XFCE, GNOME and KDE desktop environments based on Ubuntu, Debian and OpenSUSE. It is also available in 11 different languages.
Bugtraq packs a huge arsenal of penetration testing tools – mobile forensics, malware testing laboratories along with tools specifically designed by the Bugtraq-Community.

6. DEFT Linux

DEFT, short for Digital Evidence & Forensics Toolkit, Linux is a distribution made for Computer Forensics, with the purpose of running live system without corrupting or tampering devices connected to the PC where the booting takes place.
View attachment 2739434DEFT Linux
DEFT is paired with DART (Digital Advanced Response Toolkit), a Forensics system for Windows. It uses LXDE desktop environment and WINE for running Windows tools.

7. Samurai Web Testing Framework

Samurai Web Testing Framework is developed with the sole purpose of penetration testing on web in mind. Another difference is that it comes as a Virtual Machine, supported by Virtualbox & VMWare.
View attachment 2739432Samurai Web Testing Framework
Samurai Web Testing Framework is based on Ubuntu and contains the best free and open source tools focusing on testing and attacking websites.
It also includes a pre-configured Wiki set up to store information during your penetration tests.

8. Pentoo Linux

Pentoo is based on Gentoo Linux. It is a distro focused on security and penetration testing and is available as LiveCD with persistence support (means any changes made in the Live environment will be available on the next boot if you use a USB stick).
View attachment 2739441Pentoo
Pentoo is basically a Gentoo installation with lots of customized tools, kernel features and much more. It uses XFCE desktop environment.
If you are already a Gentoo user, you can install Pentoo as an overlay on it.

9. Caine

CAINE stand for Computer Aided Investigative Environment. It is created as a project of Digital Forensics and is completely focused on it.
View attachment 2739439Caine
Caine comes with a wide variety of tools developed for system forensics and analysis purpose.

10. Network Security Toolkit

Network Security Toolkit is a bootable Live ISO based on Fedora. It provides security professionals and network administrators with a wide range of open source network security tools.
View attachment 2739437Network Security Toolkit
Network Security Toolkit has an advanced Web User Interface for system/network administration, navigation, automation, network monitoring & analysis and configuration of many applications found in Network Security Toolkit distro.

11. Fedora Security Spin

Fedora Security Spin is a variation of Fedora designed for security auditing and testing and it can also be used for teaching purpose.
View attachment 2739435Fedora Security Spin
The purpose of this distro is to support students and teachers while they are practicing or learning security methodologies on information security, web application security, forensics analysis and so on.

12. ArchStrike

ArchStrike (previously known as ArchAssault) is a project based on Arch Linux for penetration testers and security professionals.
View attachment 2739436ArchStrike (previously ArchAssault)
It comes with all the best things of Arch Linux with additional tools for penetration testing and cyber security. ArchStrike includes thousands of tools and applications, all categorized into modular package groups.

Others​

There are plenty others for you to choose from. We are going to mention some more of them:
· Cyborg Linux
· Matriux
· Weakerth4n
Which of the above listed hacking Linux distros have you tried? Want to suggest any distro that we missed? Share what you think in the comment section.


10 Best Linux Distributions for Hacking & Pen Testing [2023]
Mkuu Ulifanikiwa kujifunza Database au SQL injection kama bado....Ulikuwa hujjfunzi hacking ulikuwa unajifunza programing...
Na hicho ulichojifunze ilikuwa Basic knowledge yaani hata Amateur level hukufika...
Wenzetu wanaita Dummies level.....

Soma kozi hizi hapa chini ukiwa na passion na upunguze papara Usitarajie kitu kwanza mpaka umalize kuzisoma zote baadae ukishamaliza Sasa jifunze kuinject Buggs kweny Database (SQL injection)
Ukimaliza zote hizi ndo utskuwa angalau umefika Basic level ya hacking
View attachment 2739421
Haya nimeyasoma sana mkuu
 
Haya nimeyasoma sana mkuu
Kama umesoma vyote hivyo mkuu n bado ukashindwa hata kukatungua ka blog kamoja kwa majaribio kuna vit7 vichache una-lack..
  • Cha kwanza ni passion as hacker "Ethical ones"
  • Cha pili ni will power ya kuwa hacker kwako ilikuwa kwa ajili ya Pride na sio talent
  • Cha Tatu unakosa Linkage...Yaani kulink vyote ulivyosoma ili vikupatie output moja yaani kutumia vyote ili Vilete Good Debugging
 
Back
Top Bottom