Todayโs article is going to focus on what defines a SKILLED hacker. I spoke before on โHow to become a Hackerโ, but never really elaborated on what defines a SKILLED one on a fundamental level! Be mindful, and I KNOW this might scratch a few heads, I AM ONLY TALKING ABOUT HACKERS! NOW CYBER SECURITY PROFESSIONALS! HOWEVER, you can take what you will from this and apply it to being a GOOD Cyber Security professional for example.
๐ Article ๐ Glossary ๐ Catalog ๐ Home ๐ Search ModeTodayโs article is going to focus on what defines a SKILLED hacker. I spoke before on โHow to become a Hackerโ, but never really elaborated on what defines a SKILLED one on a fundamental level! Be mindful, and I KNOW this might scratch a few heads, I AM ONLY TALKING ABOUT HACKERS! NOW CYBER SECURITY PROFESSIONALS! HOWEVER, you can take what you will from this and apply it to being a GOOD Cyber Security professional for example. For the sake of this article, to prevent bickering, Iโm going to focus neither on โtoolsโ nor โmanualโ technical skills, focusing more on the overall aptitude of a hacker, skill sets and traits they overall possess.
I'll be discussing the following topics in order: ๐ Their IQ ๐ Theyโre Ingenious ๐ Theyโre Persistent! ๐ They Understand Hacking is a SCIENCE! ๐ They Understand Social Engineering You can click on any of the topics to simply check that one out if it interests you! NOTE: Articles are read from LEFT to RIGHT via 2 columns! Read the first column all the way down and then move to the next one!
Here's a quick run down on all the main links that are in the article in case you want to check them out first. ๐ LinkedIn Version
You hear this term thrown around a lot: General IQ, Emotional IQ, even stuff like Visual Spatial IQ which is EXTREMELY rare and so happens to be the one that I possess, allowing me to solve EXTREMELY complex problems and visualize everything on a low level in my head BEFORE I solve it PHYSICALLY. Butโฆ What EXACTLY does oneโs IQ mean definitively?
Oneโs IQ relates to how well one applies what they know, and of course, how quickly they can pick stuff up.
For example, letโs say I taught each one of you how to write a backdoor exploit in Python, THE EXACT SAME ONE, and then asked all of you to show me how you would pull off the exploit and how you would upgrade the code for it? The person that uses it better and applies it with more finesse is obviously the smarter hacker.
Part of being a good hacker is relying on your overall smarts and strategy to exploit systems or learn them.
VERY skilled hackers are ingenious! Theyโre always thinking outside of the box which allows them to stay several steps ahead of their adversary, maintaining the element of surprise, which is important when youโre trying to breach complex systems with security in place.
A good example of what I mean would be some of my insights on Hacking/Cyber related matters, where I explain the various flaws of a system and how they can be exploited on a fundamental level.
For example, my previous article where I talked about the dangers of the Claude AI that emulates keystrokes on a system to pretend itโs a real user.
On a basic level, you can write a simple keylogger with itโฆ HOWEVER.. Itโs possible to formulate metamorphic malware and a lot more if you got really crafty under the hood. All you need to do is get a bit more ingenious and youโll go far as a hacker!
Hackers are PERSISTENT! Part of the fun of hacking is the THRILL of the hunt!
As someone that has breached a lot of systems, Itโs fun spending hours and hours, even weeks if need be to breach a system. Hackers love a challenge and love testing the capabilities of their intellectual capacity!
MANY folks donโt understand thisโฆ BUT HACKING IS A SCIENCE!
For example, the typical ping command, wouldnโt even think you could get much out of it right? WRONG! ICMP data packets return a value that is known as a TTL, which is the number of hops a data packet can take before itโs dropped! HOWEVER, under the hood, the return value for it is also another means to spot which OS archetype the end user is running which is a form of OS fingerprinting!. If you see a TTL value of 64, even without nmap, you can tell itโs running linux! This is useful on a fundamental level since A LOT of security systems block probes that come from nmap. Youโd have to use your overall smarts and formulate a hypothesis based on that information such as: what are the most commonly used Linux OSโs(debian ubuntu for example). From there you can blindly probe and test exploits to see if any of them click. See how โingeniousโ and 1000 IQ I got with that analogy? THIS IS HACKING!
Social engineering is one of, if not, one of THE main skills EVERY hacker should know. Itโs commonly used and when it connectsโฆ the damage that can be doneโฆ. DEVASTATING!
Being able to understand how your opponent thinks allows you to know their every move, which in return, allows you to craft a beautiful exploit. You can know what someone else will do before they even do it!
If you enjoyed this post give it a thumbs up! Iโll be keeping track of whose reacting from now on as there is a โspecialโ reason for it. Just know the more you support my content the more there is in stored!
- The Hacker Who Laughs ๐ธ๐ธ๐๐ธ๐ธ