Best OS for HACKING…..
Best Article for Beginners for choosing the perfect Operating Systems
This story’s title is somewhere a click-bait because If you searched for the story’s title on Google, you would have seen a lot of results with loads of Linux Operating System recommendations for hacking. Whoever is searching this topic on the Internet because they are curious and excited about learning something new and exciting like computers and network security or finding vulnerabilities, which sounds cool and deep down we all know that so many people are excited about hacking or programming because of movies where 90% of hacking or programming is fake and incorrectly presented because the actors are only good at acting, not hacking or programming. They’re just tinkering with the keyboard, and they’re not even typing on it; they’re just fiddling about with it. Movies and TV programmes provided the greatest excitement, and if you truly want to follow this as a career, you understand that it is a little more complicated. You must have a thorough understanding of each topic and subject, as well as ample practice. Consider the cinematic method to uncovering true vulnerabilities and having your name listed as a pioneer of the CVE report.
So my question is: Why do you Need Any specific OS for Hacking or Programming?
If someone wants to learn something new and exciting, the best place to begin is with the fundamentals. When you study the fundamentals and put them into practice, you’ll see that you don’t need a specific operating system to hack or programme.
I’ve seen a lot of videos on YouTube where someone claims to be a hacker and demonstrates their hacking credentials by creating a Metasploit Payload APK for Android Phone Manipulation, and the most intriguing aspect is that the commands are in the same order as on the Internet Articles. Although there are several Pentesting Tools and Operating Systems available, this does not imply that you must use them all. Many expert hackers claim that they do not employ a large number of pentesting tools when they hack.
Tommy DeVoss (Bloomberg’s titled Million Dollar Hacker) explains in this video that he doesn’t use many tools and prefers to perform most of his hacking manually, which entails writing scripts and using the Burp Suite Repeater Tool. There’s a description that says “Tools Results are not Accepted or Ineligible for the Bounty” when you try to uncover vulnerabilities in any company’s website, app, or API. I’m not saying that using tools to find bugs is bad; I’m saying that if you use a tool to find a bug, you’ve demonstrated that the bug exists or not; you’ve to trigger the bug, or if it exists, is it executable or not, and how does it damage the organisation.
So, there are a lot of “hackers” on YouTube who just want to impress their buddies by demonstrating them how to hack an Android phone. If you don’t believe me, go to YouTube and search for Android hacking; you’ll find a lot of results, with the majority of them demonstrating the Metasploit Tool’s auto-generated payload hack. That isn’t to say that this is the sole method of hacking an Android phone. We’re all aware that there are a plethora of techniques to influence an Android device. I just want to remind individuals who hack android phones to give Windows Phone and iOS phones a go.
For hacking, programming, or anything else, there are a plethora of operating systems to choose from. Computers can accomplish anything, such as sending a man into space or downloading tunes from your computer to your phone (Bad Example…). If you’re serious about learning cyber security, read some decent books, articles, and reports, as well as watch some professional hacker methodology videos. Try to learn at least one programming language and have a basic understanding of the web; it will come in handy when it comes to cyber security.
Learning from others will also help you to reach your destination in any profession.
Many skilled hackers use simple Linux operating systems like Ubuntu, and I prefer Arch Linux, the lightest Linux operating system, since I appreciate the minimalistic approach, and it also provides me complete control and extensive customizability over the machine. Linux distributions are recognised for their simplicity and ease of use, but Arch Linux defies this stereotype by allowing users to customise everything while maintaining functionality. This freedom of choice may make Arch Linux more intimidating for newcomers, but it’s the frosting on the cake for experienced Linux users. Arch Linux is extremely popular among Linux users for a variety of reasons. I’ve been using Arch Linux for three and a half years and am fairly knowledgeable about its capabilities, as well as the capabilities of any Linux operating system.
CONCLUSION
Learning and creating code & attacking other machines aren’t the only aspects of programming and hacking. “How will I learn more and do the best?” would be the approach. You must first grasp how these systems operate before deciding which operating system to install. There are many operating systems to choose from; install one where you believe you know everything there is to know about the operating system and give it a try. When you learn and practise on a certain operating system, you gain hands-on experience. When you’ve had enough of that Operating System, move to another. I know there are a lot of folks who say you should install Kali first, but why not start with a basic Linux system with the tools you’ll really use? Approach and Influence are crucial factors in learning anything new, with a good approach consisting of resources such as books, articles, reports, methodology, and influence consisting of professional experiences. There is also one thing to remember: observe and learn.
Thank You.