0
What Programming Languages Must A Ethical Hacker Know?
👍
5 Respostas
+ 4
I would like to say Shell Scripting language is required for script automation. After that, if you wanna go for system level hacking then you will need to know some lower level language like C and assembly.
You also nerd to know some scripting language like Python or Perl to create your own scripts.
Knowledge on Windows Powershell or Command Prompt or maybe .Net framework is needed if you want to ethically hacking on Microsoft Windows.
These are just few examples that I could think of during the time. You may search on internet for more information.
+ 4
If you use Kali Linux, there are lot's of tools there, most of them open source and daily updated by Ethical hackers and Developers all over the world, you just need to know which tool and which exploit should be used where,
So if programming language is concerned, It should be Linux Shell Scripting
+ 3
Not required for all. If you want to be an Ethical Hacker, you should be good at Network field. If you are familiar with Linux it becomes easy but still not necessary. After all it depends on your tricks and deep understanding of breaches in network
+ 1
Like For Managing Data And Writing Exploits. Don't We need To At least Have A Basic Idea bout programming?
0
It takes years of practice and dedication, its not only programming that you need to know, play around with networking and system architecture, learn about different Web services/protocols and how to setup a Web server or application before you learn how to exploit one. You can't just hack things without knowing how they're made first. People learn HTML and think they can hack the world.
For starters learn Ruby and python, they're the prime languages for writing exploits.
Then install kali Linux and play around with the metasploit scripts to see how they work.
As a bonus I recommend you learn how Databases work and are structured. Best way is to run an apache server and make a local Database. Then learn before you learn how to hack it learn how to secure it, that will give you a preview of how the security works so you'll know how to get around it.
If you need any help contact me at admin@zefir.cu.ma I run an exploit blog and run a software company that is currently making mining software.
Best of luck!