So, if you are reading this, I'm dead! Lol kidding.
Seriously now, if you are reading this, it is because you are trying to become a pentester and not a stupid teenager who just wants to run a tool and tell his friends that he is a hacker.
Also, if you are concerned/complaining about the icon size on your desktop, your sound card is not working in Kali linux or you are too lazy to read it, go back to your normal life, you don’t have the pentester/hacker soul.
If you are still reading at this point, I already suppose that you have at least the basic knowledge of:
- Linux operation and management
- Windows operation and management
- Basic Network knowledge (TCP/IP, ICMP) /Network services (Proxy, VPN, Samba, AD)
- Protocols like HTTP, FTP, DNS, SSH
- SQL (DDL, DML and so on) mysql, sqlserver, postgress, oracle.
If you don't have these skills, really, don’t try to get into the security world at this moment or you will get frustrated for sure. You will need a lot a reading before you can start it.
Don’t think just installing Kali linux on your machine magically makes you a pentester, it takes time, and to be honest, a lot of time!
If you want to learn linux, don’t start with Kali for the following reasons: http://docs.kali.org/introduction/should-i-use-kali-linux. Basically these lines: “The fact of the matter is, however, that Kali is a Linux distribution specifically geared towards professional penetration testers and security specialists, and given its unique nature, it is NOT a recommended distribution if you’re unfamiliar with Linux or are looking for a general-purpose Linux desktop distribution for development, web design, gaming, etc.”
The most important thing is: Know how things work.
I know a lot of “hackers” who are able to dump entire databases but they don't even know how a SELECT or CREATE TABLE statement works, or guys who are able to take down a server but they don't even know what an icmp type 8 is. I will not discuss the guys who use SET to grab Facebook credentials, I felt sick writing this last sentence…
So, don’t be big headed, start your studies in the correct way. Just executing tools does not make you a hacker/pentester.
Don’t be a simple stupid script kiddie, these guys are jokes in the security world. Do you wanna be like these guys? I don’t think so.
And another tip: Don’t think that everything is for free, you'll need to save some money to buy books, training or certifications.
There are a lot of trainings available on the internet, I’m saving some time for you:
Some books and links to start (I put them in the order that I think is the best way to learn, feel free to choose the best way for you):
Now you have at least 6 months of studying ahead, and you can find by yourself more related trainings. Remember, google is your friend.
I ALREADY HAVE THE SKILLS (Really? Double check it)
So, if you already have the required skills, there are some good references that you can use to get into IT security, but first you should select one area and move to another one after you have mastered(my recommendation). However, sometimes you have to mix them in order to get better results. Some security areas (it’s not an exhaustive list):
Of course, you can share your focus and studies more than 1 topic simultaneously.
If you are thinking of using Kali to start your studies, you should visit the link http://docs.kali.org.
In this link there is a lot of Kali documentation that can help you before you go to the #kali-linux channel on Freenode and ask an obvious question. Also, you can use forums.kali.org, additionally as Kali is Debian based it is a good idea to check the Debian Linux documentation if you are not familiar with this distro.
Some useful links to start you pentest journey:
http://www.hackingexposed.com/ - Very nice book series that covers a lots different topics.
This is another very nice book series that covers quite an amount of topics, like Mobile, Android, Cars and others, not only Web Applications, search for it.
Also, you can google for “Pentest Kali Linux” in google, there are a lots of related books, just choose one and try.
One more link in the same style of this post:
http://www.vulnhub.com - > A lots of vulnerable machines to play.
https://www.cybrary.it -> More security videos
https://pentesterlab.com -> Various pentest exercises
https://en.wikipedia.org/wiki/Hacking:_The_Art_of_Exploitation -> Low Level exploitation
Building a pentest lab:
How To Ask Questions The Smart Way:
Thanks to <Illusional> for the help! \o/