Submit Search
Upload
20180120 hacking the art of learning
•
3 likes
•
508 views
Yi-Lang Tsai
Follow
RAT Community - 20180120
Read less
Read more
Education
Slideshow view
Report
Share
Slideshow view
Report
Share
1 of 19
Download now
Download to read offline
Recommended
Evolution of Malware and Attempts to Prevent by Michael Angelo Vien
Evolution of Malware and Attempts to Prevent by Michael Angelo Vien
EC-Council
Ulfah
Ulfah
ulfah
Introduction to Cybersecurity | IIT(BHU)CyberSec
Introduction to Cybersecurity | IIT(BHU)CyberSec
YashSomalkar
Hacking 09 2010
Hacking 09 2010
Felipe Prado
Smalltalk and Business
Smalltalk and Business
Mariano Martínez Peck
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
Tom Eston
Architecture for a Extended/Virtual Enterprise
Architecture for a Extended/Virtual Enterprise
phermar
ICE2009 - An Architecture for a Extended/Virtual Enterprise
ICE2009 - An Architecture for a Extended/Virtual Enterprise
phermar
Recommended
Evolution of Malware and Attempts to Prevent by Michael Angelo Vien
Evolution of Malware and Attempts to Prevent by Michael Angelo Vien
EC-Council
Ulfah
Ulfah
ulfah
Introduction to Cybersecurity | IIT(BHU)CyberSec
Introduction to Cybersecurity | IIT(BHU)CyberSec
YashSomalkar
Hacking 09 2010
Hacking 09 2010
Felipe Prado
Smalltalk and Business
Smalltalk and Business
Mariano Martínez Peck
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
Tom Eston
Architecture for a Extended/Virtual Enterprise
Architecture for a Extended/Virtual Enterprise
phermar
ICE2009 - An Architecture for a Extended/Virtual Enterprise
ICE2009 - An Architecture for a Extended/Virtual Enterprise
phermar
Hacking Exposed: The Mac Attack
Hacking Exposed: The Mac Attack
Priyanka Aash
Hacking Exposed: The Mac Attack
Hacking Exposed: The Mac Attack
Priyanka Aash
Clair Tolan - Passwords for the clouds
Clair Tolan - Passwords for the clouds
Open Labs Albania
Pardus Linux English Presentation
Pardus Linux English Presentation
Emrah Tokalak
OLPC presentation in a class on Information Systems Strategy
OLPC presentation in a class on Information Systems Strategy
Sameer Verma
Dev and Blind - Attacking the weakest Link in IT Security
Dev and Blind - Attacking the weakest Link in IT Security
Mario Heiderich
How to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laos
Outhai SAIOUDOM
Fabric for Deep Learning
Fabric for Deep Learning
Animesh Singh
Tsunami of Technologies. Are we prepared?
Tsunami of Technologies. Are we prepared?
msyukor
Cyber Security Workshop Presentation.pptx
Cyber Security Workshop Presentation.pptx
YashSomalkar
What is Python? (Silicon Valley CodeCamp 2015)
What is Python? (Silicon Valley CodeCamp 2015)
wesley chun
Hacking
Hacking
syahila
Get started with hacking
Get started with hacking
Ham'zzah Mir-zza
Introduction to coding and Python
Introduction to coding and Python
Haris NP
Open-source, how we survive with it?
Open-source, how we survive with it?
Hermet Park
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
Cyber Security Alliance
Peerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter Meet
Abhinav Mishra
Emerging Threats to Infrastructure
Emerging Threats to Infrastructure
Jorge Orchilles
RSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of Things
Daniel Miessler
It planet gigabyte gr 7 textbook
It planet gigabyte gr 7 textbook
Nityant Singhal
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
Sayali Powar
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
ssuser54595a
More Related Content
Similar to 20180120 hacking the art of learning
Hacking Exposed: The Mac Attack
Hacking Exposed: The Mac Attack
Priyanka Aash
Hacking Exposed: The Mac Attack
Hacking Exposed: The Mac Attack
Priyanka Aash
Clair Tolan - Passwords for the clouds
Clair Tolan - Passwords for the clouds
Open Labs Albania
Pardus Linux English Presentation
Pardus Linux English Presentation
Emrah Tokalak
OLPC presentation in a class on Information Systems Strategy
OLPC presentation in a class on Information Systems Strategy
Sameer Verma
Dev and Blind - Attacking the weakest Link in IT Security
Dev and Blind - Attacking the weakest Link in IT Security
Mario Heiderich
How to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laos
Outhai SAIOUDOM
Fabric for Deep Learning
Fabric for Deep Learning
Animesh Singh
Tsunami of Technologies. Are we prepared?
Tsunami of Technologies. Are we prepared?
msyukor
Cyber Security Workshop Presentation.pptx
Cyber Security Workshop Presentation.pptx
YashSomalkar
What is Python? (Silicon Valley CodeCamp 2015)
What is Python? (Silicon Valley CodeCamp 2015)
wesley chun
Hacking
Hacking
syahila
Get started with hacking
Get started with hacking
Ham'zzah Mir-zza
Introduction to coding and Python
Introduction to coding and Python
Haris NP
Open-source, how we survive with it?
Open-source, how we survive with it?
Hermet Park
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
Cyber Security Alliance
Peerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter Meet
Abhinav Mishra
Emerging Threats to Infrastructure
Emerging Threats to Infrastructure
Jorge Orchilles
RSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of Things
Daniel Miessler
It planet gigabyte gr 7 textbook
It planet gigabyte gr 7 textbook
Nityant Singhal
Similar to 20180120 hacking the art of learning
(20)
Hacking Exposed: The Mac Attack
Hacking Exposed: The Mac Attack
Hacking Exposed: The Mac Attack
Hacking Exposed: The Mac Attack
Clair Tolan - Passwords for the clouds
Clair Tolan - Passwords for the clouds
Pardus Linux English Presentation
Pardus Linux English Presentation
OLPC presentation in a class on Information Systems Strategy
OLPC presentation in a class on Information Systems Strategy
Dev and Blind - Attacking the weakest Link in IT Security
Dev and Blind - Attacking the weakest Link in IT Security
How to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laos
Fabric for Deep Learning
Fabric for Deep Learning
Tsunami of Technologies. Are we prepared?
Tsunami of Technologies. Are we prepared?
Cyber Security Workshop Presentation.pptx
Cyber Security Workshop Presentation.pptx
What is Python? (Silicon Valley CodeCamp 2015)
What is Python? (Silicon Valley CodeCamp 2015)
Hacking
Hacking
Get started with hacking
Get started with hacking
Introduction to coding and Python
Introduction to coding and Python
Open-source, how we survive with it?
Open-source, how we survive with it?
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
Peerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter Meet
Emerging Threats to Infrastructure
Emerging Threats to Infrastructure
RSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of Things
It planet gigabyte gr 7 textbook
It planet gigabyte gr 7 textbook
Recently uploaded
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
Sayali Powar
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
ssuser54595a
Full Stack Web Development Course for Beginners
Full Stack Web Development Course for Beginners
Sabitha Banu
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
M56BOOKSTORE PRODUCT/SERVICE
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
Eyham Joco
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
YousafMalik24
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
unnathinaik
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
Celine George
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
eniolaolutunde
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
adityarao40181
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
NirmalaLoungPoorunde1
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
UjwalaBharambe
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
GaneshChakor2
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
VS Mahajan Coaching Centre
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
anshu789521
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
pboyjonauth
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
InMediaRes1
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
manuelaromero2013
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
UnboundStockton
Recently uploaded
(20)
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
Full Stack Web Development Course for Beginners
Full Stack Web Development Course for Beginners
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
20180120 hacking the art of learning
1.
Hacking the art
of learning Yi-Lang Tsai 20180120@RAT Community
2.
Hacker are ready.
Are you? Google me. Yi-Lang Tsai Chapter @ The Honeynet Project / Cloud Security Alliance / OWASP Lead @ TWCSIRT / Cyber Security Team / Cybersecurity Program Attendee @ BlackHat / DEFCon / H.P. Workshop / RSAC / FIRST / IoT / AppSec / .Conf / CES etc. Director @ TWCSA / ISDA / AFDA / CDPA / DTA(itSMA) / AICSP Chairman @ HoneyCon / CSA Taiwan Summit / OWASP Taiwan Days / IRCON Teach @ Government / University / Campus / Non-Profit Org. / Enterprise etc. Speak @ International and Regional Cybersecurity Conference Write @ 35 Books about IT / Hacking / Software / Tools / D.I.Y. / O.S. Find @ blog.yilang.org Connect @ Email / Line / FB / Linked in etc. 2
3.
Hacker are ready.
Are you? How long ? 3
4.
Hacker are ready.
Are you? EE years … 4
5.
Hacker are ready.
Are you? My First Computer. 5 •Microprofessor II (MPF II) •since 1982 •CPU: MOS 6502 •RAM: 64KB •ROM: 16KB(12KB for BASIC) •Color: 8
6.
Hacker are ready.
Are you? Mouse vs Maze 6 8051
7.
Hacker are ready.
Are you? BBS Era Modem connect the cyber world. Host BBS station by telephone - only one line Telix everyday 7
8.
Hacker are ready.
Are you? How to conversation with machine ? programming language Assembly 4GL C Clipper Fox Pro VB etc. 8 solve the problem
9.
Hacker are ready.
Are you? How to learning ? Hands-on 9
10.
Hacker are ready.
Are you? How to become a Hacker? 10
11.
Hacker are ready.
Are you? SANS Training Roadmap 11Source: https://www.sans.org/media/security-training/roadmap.pdf
12.
Hacker are ready.
Are you? Conference 12 more and more…
13.
Hacker are ready.
Are you? Workshop & Hands-on Training HITCON / HoneyCon Workshop TWNIC Network Security Courses https://dns-security.twnic.net.tw/ White Hacker Campus https://www.isda.org.tw/ AIS3 https://ais3.org/ Hacker Collage https://hackercollege.nctu.edu.tw/ 13
14.
Hacker are ready.
Are you? Search…
15.
Hacker are ready.
Are you? Tools 15 http://sectools.org/
16.
Hacker are ready.
Are you? News 16 https://thehackernews.com/
17.
Hacker are ready.
Are you? Information 17 https://pastebin.com
18.
Hacker are ready.
Are you? Tor Project 18 https://www.torproject.org/
19.
Hacker are ready.
Are you? ~ Th@nks ~ 19
Download now