(1/?) How to become an ethical hacker, without spending a dollar. A short novel:

If you're new to the field of ethical hacking, you must first understand that you need a good set of foundational skills. These include understanding Linux, Networking, and a language like Python.
(2/?) On top of a technical foundation, you'll likely need to be well rounded in other areas. You should be well-written, as we write tons of reports. You should be personable and able to talk in front of people. Note: you don't have to be an extrovert. Many of us fake this :)
(3/?) With that out of the way, let's talk the foundations:

Linux:

OverTheWire's wargames , such as Bandit ( http://overthewire.org/wargames/bandit/), and Linux Journey ( https://linuxjourney.com/ ) are a great place to start. Self plug, I have a Linux for Hackers course too
(5/?) For networking, I would consider starting with Professor Messer's Network+ course ( https://www.professormesser.com/network-plus/n10-007/n10-007-training-course/). You can expand upon this and learn Cisco related command line by using tools like Packet Tracer ( https://www.netacad.com/courses/packet-tracer) and taking netacad courses from that link
(6/?) On to the hacking. Again, you need a good foundation to start. I'm going to be biased here and recommend my 15 hour course on network pentesting to start with your foundations: . This will brush up on Linux, Python, and guide you slowly through it.
(7/?) Once you're understanding the foundations, it's best to get some practice in. By practice, I mean attack known vulnerable machines and try to exploit them. We call this capture the flag (CTF)

hackthebox - https://www.hackthebox.eu/ 
vulnhub - https://www.vulnhub.com/ 
(8/?) Additionally, you might want to participate in CTFs for fun and learning. A great website to find out about upcoming CTFs is CTF Time ( https://ctftime.org/ ). For hackthebox, start with easy rated boxes. For vulnhub, try working this list: https://www.abatchy.com/2017/02/oscp-like-vulnhub-vms
(10/?) Once you're getting comfortable, it's time to start rounding yourself out. To be a good pentester, your skillset should include basic hacking methodology, active directory exploitation, web application pentesting, and wireless pentesting...amongst other things
(12/?) Some of the great content creators for AD pentesting include:

@PyroTek3 - https://adsecurity.org/ 
@harmj0y - https://blog.harmj0y.net/ 
@_dirkjan - https://dirkjanm.io/ 
@Haus3c - https://hausec.com/ 

Do your research and you'll find plenty more.
(15/?) Once you start to get the basics down, it's best to explore public bug bounty programs and try to enumerate and attack. You might not find anything right away, but you can focus methodology. Those include @Hacker0x01, @Bugcrowd, @intigriti, @SynackRedTeam, and others.
(17/?) Lastly, learn wireless pentesting. WPA2 personal is pretty straight forward and can be learned via a blog post ( https://www.aircrack-ng.org/doku.php?id=cracking_wpa).

WPA2 enterprise can be a little trickier, but again, some blog posts to the rescue:

https://n0where.net/targeted-wpa2-enterprise-evil-twin-attacks-eaphammer
https://teckk2.github.io/wifi%20pentesting/2018/08/09/Cracking-WPA-WPA2-Enterprise.html
(18/?) Now, this list is not all-inclusive, but a good start. You can learn all of this stuff for free and not spend tons of money on college/certifications, especially if you lack the means to do so.

Also, you're welcome to post the resources that helped you w/ these topics.
(19/?) TCM out.
You can follow @thecybermentor.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled:

By continuing to use the site, you are consenting to the use of cookies as explained in our Cookie Policy to improve your experience.