I have seen lots of new people who have absolutely 0 clue on what they are doing try to come here and ask questions about hacking thinking that what we do is type super fast on a keyboard and "bring the mainframe down" and suddenly we get the data
Let me guide you on how to execute your first ever hack.
BEFORE YOU START
Please read up on the /d/OpSec subdread to know what to do to stay protected online. Best advice i could give you, before you even start setting your hardware up and installing programmes, is to SHUT THE FUCK UP.
Do not tell anyone what you are doing, do not use usernames that can be linked to you in the real world, don't pollute your clearnet search history. Only you know what you are and what you do, nobody should ever find out. Not your parents, girlfriend, wife, friends etc.
There is also good courses online on how to get a cybersecurity job, i suggest you read up on them to learn how to do basic scripts and use the basic pentest tools.
Please remember: Distrust is the father of OpSec
Now that that is out of the way, let's get to the meat
RECONNAISSANCE
Every attack, on any type of company, always starts out with Reconnaisance. You need to gather all the information you can about your target. Use tools like nmap to scan for ports, enumerate DNS using nslookup and dig, Shodan for exposed servers. Look into the company employees, see if there is somebody who you can get in contact with to phish for credentials or social engineer your way into accessing the network
ACCESS
Once you have as much information as possible about the target, you have a couple of options.
You can:
-Exploit vulnerabilities by either targetting weak credentials or bruteforcing your way in (rarely works on big companies but still give it a try using a tool like medusa).
-Look into known vulnerabilities such as CVEs or Zero day exploits. You can also exploit misconfigured services (such as an exposed SSH on port 80).
Remember when i talked about looking into employees' info? You can try to phish them into giving you credential access.
MOVE LATERALLY TROUGH THE NETWORK.
Once you have gained access, your job isn't done. Sniff through the network using tools like wireshark to see if you can get other credentials, use python scripts or directly powershell to move through the network, pivot to internal systems by using metasploit or cobalt strike.
GET THE DATA OUT
Once you have gained access to as much data as possible, use SFTP or HTTP to get the data you need out. Avoid being detected by using encrypted channels like TLS, use DNS or HTTP tunneling to get out large amounts of data.
MAINTAIN YOUR PRESENCE
Once you get the data, your job isn't done. Use RATs to maintain access to the network, set up cron jobs or schedule tasks in order to keep access to the system, and use rootkits to hide your presence.
CLEAN UP AFTER YOURSELF
ALWAYS clean up after yourself. Delete logs using logrotate or syslog, erase data and don't leave any trace of your presence.
Learn how to use nmap, masscan, metasploit, cobalt strike, hydra, nc, curl, wgen, scp inside and out, practice on small targets at first.
Read the documentation on how to use rootkit and cron.
Please don't think that this is an easy job. There is countless details i have omitted simply because it's impossible to explain HOW to hack in a post. But this should get you started. Please be careful and don't be stupid.