How can I learn to start hacking

Learning to hack for beginners:

This article turns you into a dreaded hacker

Hackers are feared, especially among large companies and website operators, which are increasingly falling victim to criminal hackers. Almost every computer savvy user can learn the craft of a hacker with enough time. And the future hacker's intentions don't even necessarily have to have a criminal background. What hacking is all about and what these people can do with your skills, we reveal in the following.

What is a "hacker" anyway?

Most understand a hacker to be a person who makes use of various security gaps in order to be able to break into computer systems.
The term hacker generally refers to people who deal with technology with dedication and creativity. Experimentation often plays a major role here and things are often misused as part of the hacking process. Heating toast in a coffee machine would be an example of a hack, albeit a very fancy one.

It wasn't until the beginning of the 1980s that the term “hacker” appeared for the first time in the field of computer security. Many hackers support companies and companies by uncovering existing security gaps in their systems and subsequently helping to eliminate them.

In the course of the 1980s, the term “hacker” was increasingly used to refer to people who gain unauthorized access to computer systems. These use security gaps or bypass them in order to gain a personal advantage or to cause damage to the operator of the respective system.

White hat, gray hat, black hat hackers ?!

Following the first effective media attacks by hackers, the United States in 1983 and Germany in 1986 passed the first draft laws in the area of ​​computer crime. Among other things, the criminal offense of "unauthorized manipulation of data", as a form of property damage, found its way into the German Criminal Code (StGB).

As a result, the different types of hackers began to be differentiated from one another in the form of white hat, gray hat and black hat. These different groups of hackers pursue completely different goals with their actions.

In most cases it is extremely difficult to tell which group a real hacker really belongs to. Therefore, the subdivision of different groups of hackers serves the general public.

White hat hackers

White hat hackers take great care to act within the law and use their knowledge according to the hacker ethics. They support companies by uncovering security gaps for them or by carrying out professional penetration tests for these companies. This is a comprehensive security test of an existing computer or network.

Gray hat hackers

As the name suggests, gray hat hackers operate in a gray area. Such hackers may also use your skills to circumvent or compromise security systems. In doing so, these violate laws or the hacker ethics, which, however, usually serves a "higher goal". Companies can no longer deny existing security gaps in front of their customers after a hack, but are forced to close them. The intentions pursued by these hackers can be classified as positive, but they violate existing laws in order to achieve their goals. It is often not possible to say with absolute certainty whether gray hat hackers act with good or bad intent, which is why this group of hackers moves in a gray area.

Black hat hackers

In addition to white hat and gray hat, there are also so-called black hat hackers. In contrast to the other two groups of hackers, they have criminal ulterior motives in their actions. Black hat hackers mostly use their skills to damage computer or network systems or to gain access to sensitive data. These hackers are also prepared to break the existing laws and bypass any security systems.


If you want to start hacking yourself, you should first learn the basics of programming.
A large number of these programming languages ​​exist and of course it is by no means necessary to master all of them.

However, you should, among other things, familiarize yourself with the basic functionality of computers, websites, networks and the Internet in advance and also have knowledge of PHP. This is a scripting language that is used on over 75% of the websites on the Internet on the server side. There are tons of instructions and tutorials for PHP on the Internet that help beginners to familiarize themselves with the language.

For hacking programs that run under Windows, you should also deal with Visual Basic. In cooperation with the .NET framework, Visual Basic is used for programming under Windows. Various tutorials and instructions for both beginners and advanced users can also be found on the Internet for Visual Basic.

Attack Types & Popular Techniques

Now you already know what basics it takes to start hacking yourself. In the following, we would like to show you what the most popular types of attack hackers are and which techniques they use during their attacks.

Social engineering

Social engineering describes a method that allows hackers to gain access to sensitive data or information through social contacts.

Trojan horse

A Trojan horse means that a program disguised as an application sends information in the background without the user noticing.


An exploit is a program that uses security holes or errors in another program to spy on a system with extended rights or to carry out a DoS attack.


With a sniffer, hackers are able to record and display the data traffic on a computer or in a network. Sniffers are used, for example, to spy on passwords.


A virus can be both a program and a script that has the ability to reproduce itself and thus get onto other computers or into networks, which is known as infecting. In this way, hackers can paralyze entire networks or gain control over them.


A worm already requires an installed program, which is installed on the target system. This is then used so that the worm can copy itself to other systems and spread there. This could be, for example, a program for receiving e-mails that the worm takes possession of in order to distribute address data. Some worms can even execute themselves after spreading to a system, in which case it does not even require any user interaction for the worm to spread further from here.

Book recommendations:

We would like to warmly recommend the following books to anyone who would like to deal with the subject of “hacking” in more detail. Interested parties will find more detailed information on the art of hacking and also on how to properly carry out the techniques presented above.

Hacking: The Art of Exploiting

The book “Hacking: The Art of Exploit” by Jon Erickson is considered a kind of hacker's bible. It contains technical basics, programming approaches and aids for understanding hardware, also prepared in a way that is understandable for beginners.

However, the book is not a pure theoretical guide, but is primarily devoted to programming concepts and control structures, without overwhelming inexperienced readers. Chapters on topics such as exploits, networks, shellcodes and cryptography round off this complete work.

Hacking with Metaspoit

Metasploit is a tool for penetrating computer systems and networks. In this book, the framework is presented in detail by the author Michael Messner, who works as an IT security consultant in the Corporate Technology department at Siemens AG. It shows the reader in an understandable way how Metasploit can be used in the context of various penetration tests.

Network hacking

The protection of personal data is a top priority for many users today. However, in order to be able to protect yourself and your data in the best possible way, you have to familiarize yourself with the tools and methods that hackers use. Because those who know their finer things and their means are usually still best protected.

In this book, readers will learn how hackers operate and what tools they use. You will also find out how you can protect yourself most effectively against attacks by hackers and how you can effectively secure your computer and your home network.

Hacking manual

Also in the hacking manual by the author Dr. Patrick Engebretson, it's all about understanding the hackers and their methods. Techniques and tools such as Metasploit, Armitage, Wireshark and others are considered in this book and are presented to the reader here.

The author also explains how to install and run these programs on your own computer in order to get an overview of the existing security gaps on a system.

The Hacking Handbook is dedicated to hacking computer systems and networks as well as hacking websites or email addresses. This book also deals with spying on data and the targeted use of penetration tests.

Hacking the Web

The book “Hacking im Web”, by the author Tim Schäfers, is particularly suitable for the operators of websites and online shops. In this book, they learn about the methods used by hackers to attack these websites. Among them attacks the SQL injection, UI redressing, file inclusion and many more. The attacks are clearly explained by source code and diagrams, so that the information is usually easy to understand even for inexperienced users.

In addition to the attacks, readers also get to know 35 tools in the book, which can be used, among other things, to detect security gaps.