If you are reading this then you must be interested in hacking and probably confused about how you can start learning hacking. Well hacking is an art. Its not about learning what a hacking tool does or how to hack this or how to hack that. Hacking is all about how things work and how we can use them according to our needs like a God. So we started this website to teach people hacking with the explanation of how things work.
You should start by reading this article:
How To Become A Hacker?
Then you should clear networking basics by reading these articles in the order as they are in here:
How data travels over Internet? TCP/UDP
Domain Name System (DNS) , IP & MAC Address
A Beginner’s Guide To Ports
Networking Terms You Really Need To Know
What Is A Proxy? How To Use Proxies? Are They Safe?
TCP Header and 3-Way Handshake
Networks and Port Forwarding
Firewall Explained For Absolute Beginners
VPN : What is it? How it works? Is it safe to use?
LAN : Topologies, Ethernet, Hub, Switches Explained
Networks and Port Forwarding
Open Systems Interconnection model (OSI model)
TCP/IP Model Explained
And read these awesome articles before starting your journey in hacking world.
Basic Working Of Computers
Why Hackers Use Linux And How To Get Started With It?
Exploit, Vulnerability, Payload : Explained For Beginners
Do You Need To Learn Programming To Become A Hacker?
After covering the networking basics you may find it easy to follow hacking articles because hacking is all about breaking into networks. You can start reading these articles to understand basics concepts of hacking.
Port Scanning : First Step Of Exploitation
Interacting With Ports And Exploitation
CPU, Memory and Buffer Overflow
A Beginner’s Guide To Cryptography/Encryption
Hash : Explained For Beginners
How To Identify Hashes?
Basic Principles Of Password & Hash Cracking
Salting And Salted Hashes Explained
A Sniffing Tutorial That Was Missing From The Internet
WAF, IPS and IDS : Working Explained
Introduction to Shells and Web Shells
Let’s spend some time with SQL Injection now
SQL Injection Explained From Scratch
Login Bypass With SQL Injection
Breaching Databases With Error Based SQL Injection
Breaching Databases In Minutes With SQLMap
And some HTML Injection too
HTML Injection : The Introduction
HTML Injection : Reflected (GET), Reflect (POST) And Stored
Now let’s learn XSS with fun
Cross Site Scripting (XSS) : Getting Started
Bypassing XSS Filters : Part 1
Bypassing XSS Filters : Part 2
Persistent, Reflected, DOM-based and Self XSS attacks
Reflected XSS on JSON, AJAX, XML based web apps
Bypass any WAF for XSS easily
Bypassing WAF with Shortest XSS Payload
Solution of Google’s XSS Challenge [Explained]
XSS Filter Bypass Cheat Sheet
Enjoyed learning XSS? Then you will enjoy our tool XSStrike too.
XSStrike : XSS Fuzzer and Smart Bruteforcer
Now let’s take a look at Information Gathering so you can know your target better before attacking
Information Gathering : Knowing Your Target
Gathering Information About A Domain
Using Zone Transfer Vulnerability
Banner Grabbing Explained For Beginners
OS Fingerprinting With NMap, XProbe2 And p0f
And some more dose for your knowledge
Malware : Definition, Types and Examples
The Denial Of Service (DOS) Attack
Phishing Explained For Those Who Think They Know Enough
How I Hacked Someone With Phishing Who Was Aware About Phishing
Hacking Facebook Accounts With IDN Homograph Attack
Local File Inclusion (LFI) and Remote File Inclusion (RFI)
Local File Inclusion (LFI) : Complete Tutorial
Remote File Inclusion (RFI) : Complete Tutorial
Full Path Disclosure Attack – Explained Tutorial
Path/Directory Transversal Attack
Cross Site Request Forgery (CSRF) Explained For Beginners
Cross Site Request Forgery (CSRF) Explained – 2
Remote Command Execution (RCE) Explained Tutorial
Cross Site Port Attack (XSPA) : Detection and Exploitation
Well there are some other articles too on our website but I excluded them. Why? Because I wanted to.
Anyway we are continuously writing quality articles and will be adding them in here. So stay tuned.