Here are the links to the most popular series. You can find the links to all of the series by clicking on the " How-To" button at the top of the page in the Null Byte world. Among the most popular is the aforementioned " Linux Basics for the Aspiring Hacker," but I have series on reconnaissance, password cracking, Wi-Fi hacking, forensics, Metasploit, scripting, and more. I have developed several series on specific hacking subjects that you can follow to build your knowledge and skills. If you only want articles from Null Byte, first make sure that you're in the Null Byte world, then enter something such as "DoS Wi-Fi" into the text field, similar to how you would search using Google on the Internet. If you are interested in a specific subject, such as, say, "how to DoS a Wi-Fi access point," you can use the search function at the top of the page. In addition, if you are wondering what skills you need to become a hacker, check out " The Essential Skills to Becoming a Master Hacker" for more info. After mastering those skills, you are ready to begin to study hacking. To gain a minimal mastery of Linux, you should read my 23-part " Linux Basics for the Aspiring Hacker" series. If you are wondering why we need to use Linux rather than Windows, read this article on why every hacker should know and use Linux. Nearly all of the hacks are using Linux and for good reason.
See how to install Kali on your computer or portable device for further help. You can install Kali either as a dual boot system (you can choose to boot into Windows or Kali) or as a Virtual Machine. Probably first and foremost, you must install Kali Linux, a Linux distribution designed specifically for hacking. I'd like to dedicate this tutorial on how to use Null Byte to systematically study hacking, so that you too can "Hack Like a Pro." Getting Started
Many newbie hackers, new to both hacking and Null Byte, have written me in recent weeks asking where and how they should begin their hacking studies here.