20180120 hacking the art of learning

Yi-Lang Tsai
Yi-Lang TsaiResearch Fellow at Taiwan Computer Security Incident Response Team
Hacking the art of learning
Yi-Lang Tsai
20180120@RAT Community
Hacker are ready. Are you?
Google me.
Yi-Lang Tsai
Chapter @ The Honeynet Project / Cloud Security Alliance / OWASP
Lead @ TWCSIRT / Cyber Security Team / Cybersecurity Program
Attendee @ BlackHat / DEFCon / H.P. Workshop / RSAC / FIRST / IoT / AppSec / .Conf / CES etc.
Director @ TWCSA / ISDA / AFDA / CDPA / DTA(itSMA) / AICSP
Chairman @ HoneyCon / CSA Taiwan Summit / OWASP Taiwan Days / IRCON
Teach @ Government / University / Campus / Non-Profit Org. / Enterprise etc.
Speak @ International and Regional Cybersecurity Conference
Write @ 35 Books about IT / Hacking / Software / Tools / D.I.Y. / O.S.
Find @ blog.yilang.org
Connect @ Email / Line / FB / Linked in etc.
2
Hacker are ready. Are you?
How long ?
3
Hacker are ready. Are you?
EE years …
4
Hacker are ready. Are you?
My First Computer.
5
•Microprofessor II (MPF II)
•since 1982
•CPU: MOS 6502
•RAM: 64KB
•ROM: 16KB(12KB for BASIC)
•Color: 8
Hacker are ready. Are you?
Mouse vs Maze
6
8051
Hacker are ready. Are you?
BBS Era
Modem connect the cyber world.
Host BBS station by telephone - only one line
Telix everyday
7
Hacker are ready. Are you?
How to conversation with machine ?
programming language
Assembly
4GL
C
Clipper
Fox Pro
VB
etc.
8
solve the problem
Hacker are ready. Are you?
How to learning ?
Hands-on
9
Hacker are ready. Are you?
How to become a Hacker?
10
Hacker are ready. Are you?
SANS Training Roadmap
11Source: https://www.sans.org/media/security-training/roadmap.pdf
Hacker are ready. Are you?
Conference
12
more and more…
Hacker are ready. Are you?
Workshop & Hands-on Training
HITCON / HoneyCon Workshop
TWNIC Network Security Courses
https://dns-security.twnic.net.tw/
White Hacker Campus
https://www.isda.org.tw/
AIS3
https://ais3.org/
Hacker Collage
https://hackercollege.nctu.edu.tw/
13
Hacker are ready. Are you?
Search…
Hacker are ready. Are you?
Tools
15
http://sectools.org/
Hacker are ready. Are you?
News
16
https://thehackernews.com/
Hacker are ready. Are you?
Information
17
https://pastebin.com
Hacker are ready. Are you?
Tor Project
18
https://www.torproject.org/
Hacker are ready. Are you?
~ Th@nks ~
19
1 of 19

Recommended

Evolution of Malware and Attempts to Prevent by Michael Angelo Vien by
Evolution of Malware and Attempts to Prevent by Michael Angelo VienEvolution of Malware and Attempts to Prevent by Michael Angelo Vien
Evolution of Malware and Attempts to Prevent by Michael Angelo VienEC-Council
475 views15 slides
Ulfah by
UlfahUlfah
Ulfahulfah
702 views11 slides
Iot Devices Essay by
Iot Devices EssayIot Devices Essay
Iot Devices EssayHeather Love
2 views16 slides
Hacking 09 2010 by
Hacking 09 2010Hacking 09 2010
Hacking 09 2010Felipe Prado
37 views51 slides
Nt1310 Unit 5 Term Paper by
Nt1310 Unit 5 Term PaperNt1310 Unit 5 Term Paper
Nt1310 Unit 5 Term PaperAmanda Gray
2 views157 slides
Smalltalk and Business by
Smalltalk and BusinessSmalltalk and Business
Smalltalk and BusinessMariano Martínez Peck
1.9K views53 slides

More Related Content

Similar to 20180120 hacking the art of learning

ICE2009 - An Architecture for a Extended/Virtual Enterprise by
ICE2009 - An Architecture for a Extended/Virtual EnterpriseICE2009 - An Architecture for a Extended/Virtual Enterprise
ICE2009 - An Architecture for a Extended/Virtual Enterprisephermar
223 views18 slides
Architecture for a Extended/Virtual Enterprise by
Architecture for a Extended/Virtual EnterpriseArchitecture for a Extended/Virtual Enterprise
Architecture for a Extended/Virtual Enterprisephermar
172 views18 slides
Hacking Exposed: The Mac Attack by
Hacking Exposed: The Mac AttackHacking Exposed: The Mac Attack
Hacking Exposed: The Mac AttackPriyanka Aash
824 views26 slides
Hacking Exposed: The Mac Attack by
Hacking Exposed: The Mac AttackHacking Exposed: The Mac Attack
Hacking Exposed: The Mac AttackPriyanka Aash
357 views26 slides
Advantages And Disadvantages Of Open Source Web Development by
Advantages And Disadvantages Of Open Source Web DevelopmentAdvantages And Disadvantages Of Open Source Web Development
Advantages And Disadvantages Of Open Source Web DevelopmentRachel Davis
4 views81 slides
Clair Tolan - Passwords for the clouds by
Clair Tolan - Passwords for the cloudsClair Tolan - Passwords for the clouds
Clair Tolan - Passwords for the cloudsOpen Labs Albania
451 views36 slides

Similar to 20180120 hacking the art of learning(20)

ICE2009 - An Architecture for a Extended/Virtual Enterprise by phermar
ICE2009 - An Architecture for a Extended/Virtual EnterpriseICE2009 - An Architecture for a Extended/Virtual Enterprise
ICE2009 - An Architecture for a Extended/Virtual Enterprise
phermar223 views
Architecture for a Extended/Virtual Enterprise by phermar
Architecture for a Extended/Virtual EnterpriseArchitecture for a Extended/Virtual Enterprise
Architecture for a Extended/Virtual Enterprise
phermar172 views
Hacking Exposed: The Mac Attack by Priyanka Aash
Hacking Exposed: The Mac AttackHacking Exposed: The Mac Attack
Hacking Exposed: The Mac Attack
Priyanka Aash824 views
Hacking Exposed: The Mac Attack by Priyanka Aash
Hacking Exposed: The Mac AttackHacking Exposed: The Mac Attack
Hacking Exposed: The Mac Attack
Priyanka Aash357 views
Advantages And Disadvantages Of Open Source Web Development by Rachel Davis
Advantages And Disadvantages Of Open Source Web DevelopmentAdvantages And Disadvantages Of Open Source Web Development
Advantages And Disadvantages Of Open Source Web Development
Rachel Davis4 views
Pardus Linux English Presentation by Emrah Tokalak
Pardus Linux English PresentationPardus Linux English Presentation
Pardus Linux English Presentation
Emrah Tokalak772 views
OLPC presentation in a class on Information Systems Strategy by Sameer Verma
OLPC presentation in a class on Information Systems StrategyOLPC presentation in a class on Information Systems Strategy
OLPC presentation in a class on Information Systems Strategy
Sameer Verma615 views
Dev and Blind - Attacking the weakest Link in IT Security by Mario Heiderich
Dev and Blind - Attacking the weakest Link in IT SecurityDev and Blind - Attacking the weakest Link in IT Security
Dev and Blind - Attacking the weakest Link in IT Security
Mario Heiderich5.6K views
How to be come a hacker slide for 2600 laos by Outhai SAIOUDOM
How to be come a hacker slide for 2600 laosHow to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laos
Outhai SAIOUDOM217 views
Fabric for Deep Learning by Animesh Singh
Fabric for Deep LearningFabric for Deep Learning
Fabric for Deep Learning
Animesh Singh3.5K views
Tsunami of Technologies. Are we prepared? by msyukor
Tsunami of Technologies. Are we prepared?Tsunami of Technologies. Are we prepared?
Tsunami of Technologies. Are we prepared?
msyukor132 views
Cyber Security Workshop Presentation.pptx by YashSomalkar
Cyber Security Workshop Presentation.pptxCyber Security Workshop Presentation.pptx
Cyber Security Workshop Presentation.pptx
YashSomalkar328 views
What is Python? (Silicon Valley CodeCamp 2015) by wesley chun
What is Python? (Silicon Valley CodeCamp 2015)What is Python? (Silicon Valley CodeCamp 2015)
What is Python? (Silicon Valley CodeCamp 2015)
wesley chun1.1K views
Hacking by syahila
HackingHacking
Hacking
syahila1.2K views
Introduction to coding and Python by Haris NP
Introduction to coding and PythonIntroduction to coding and Python
Introduction to coding and Python
Haris NP104 views
Open-source, how we survive with it? by Hermet Park
Open-source, how we survive with it?Open-source, how we survive with it?
Open-source, how we survive with it?
Hermet Park791 views
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile... by Cyber Security Alliance
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
Peerlyst Delhi NCR Chapter Meet by Abhinav Mishra
Peerlyst Delhi NCR Chapter MeetPeerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter Meet
Abhinav Mishra1.3K views

Recently uploaded

11.30.23 Poverty and Inequality in America.pptx by
11.30.23 Poverty and Inequality in America.pptx11.30.23 Poverty and Inequality in America.pptx
11.30.23 Poverty and Inequality in America.pptxmary850239
160 views33 slides
Drama KS5 Breakdown by
Drama KS5 BreakdownDrama KS5 Breakdown
Drama KS5 BreakdownWestHatch
79 views2 slides
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdf by
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdfCWP_23995_2013_17_11_2023_FINAL_ORDER.pdf
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdfSukhwinderSingh895865
527 views6 slides
AI Tools for Business and Startups by
AI Tools for Business and StartupsAI Tools for Business and Startups
AI Tools for Business and StartupsSvetlin Nakov
107 views39 slides
PLASMA PROTEIN (2).pptx by
PLASMA PROTEIN (2).pptxPLASMA PROTEIN (2).pptx
PLASMA PROTEIN (2).pptxMEGHANA C
68 views34 slides
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1} by
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}DR .PALLAVI PATHANIA
249 views195 slides

Recently uploaded(20)

11.30.23 Poverty and Inequality in America.pptx by mary850239
11.30.23 Poverty and Inequality in America.pptx11.30.23 Poverty and Inequality in America.pptx
11.30.23 Poverty and Inequality in America.pptx
mary850239160 views
Drama KS5 Breakdown by WestHatch
Drama KS5 BreakdownDrama KS5 Breakdown
Drama KS5 Breakdown
WestHatch79 views
AI Tools for Business and Startups by Svetlin Nakov
AI Tools for Business and StartupsAI Tools for Business and Startups
AI Tools for Business and Startups
Svetlin Nakov107 views
PLASMA PROTEIN (2).pptx by MEGHANA C
PLASMA PROTEIN (2).pptxPLASMA PROTEIN (2).pptx
PLASMA PROTEIN (2).pptx
MEGHANA C68 views
Classification of crude drugs.pptx by GayatriPatra14
Classification of crude drugs.pptxClassification of crude drugs.pptx
Classification of crude drugs.pptx
GayatriPatra1486 views
Ch. 7 Political Participation and Elections.pptx by Rommel Regala
Ch. 7 Political Participation and Elections.pptxCh. 7 Political Participation and Elections.pptx
Ch. 7 Political Participation and Elections.pptx
Rommel Regala97 views
The Accursed House by Émile Gaboriau by DivyaSheta
The Accursed House  by Émile GaboriauThe Accursed House  by Émile Gaboriau
The Accursed House by Émile Gaboriau
DivyaSheta201 views
Use of Probiotics in Aquaculture.pptx by AKSHAY MANDAL
Use of Probiotics in Aquaculture.pptxUse of Probiotics in Aquaculture.pptx
Use of Probiotics in Aquaculture.pptx
AKSHAY MANDAL100 views
REPRESENTATION - GAUNTLET.pptx by iammrhaywood
REPRESENTATION - GAUNTLET.pptxREPRESENTATION - GAUNTLET.pptx
REPRESENTATION - GAUNTLET.pptx
iammrhaywood100 views
Class 10 English notes 23-24.pptx by TARIQ KHAN
Class 10 English notes 23-24.pptxClass 10 English notes 23-24.pptx
Class 10 English notes 23-24.pptx
TARIQ KHAN131 views
Dance KS5 Breakdown by WestHatch
Dance KS5 BreakdownDance KS5 Breakdown
Dance KS5 Breakdown
WestHatch79 views
Create a Structure in VBNet.pptx by Breach_P
Create a Structure in VBNet.pptxCreate a Structure in VBNet.pptx
Create a Structure in VBNet.pptx
Breach_P75 views
The basics - information, data, technology and systems.pdf by JonathanCovena1
The basics - information, data, technology and systems.pdfThe basics - information, data, technology and systems.pdf
The basics - information, data, technology and systems.pdf
JonathanCovena1115 views
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively by PECB
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB 585 views
The Open Access Community Framework (OACF) 2023 (1).pptx by Jisc
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
Jisc110 views

20180120 hacking the art of learning

  • 1. Hacking the art of learning Yi-Lang Tsai 20180120@RAT Community
  • 2. Hacker are ready. Are you? Google me. Yi-Lang Tsai Chapter @ The Honeynet Project / Cloud Security Alliance / OWASP Lead @ TWCSIRT / Cyber Security Team / Cybersecurity Program Attendee @ BlackHat / DEFCon / H.P. Workshop / RSAC / FIRST / IoT / AppSec / .Conf / CES etc. Director @ TWCSA / ISDA / AFDA / CDPA / DTA(itSMA) / AICSP Chairman @ HoneyCon / CSA Taiwan Summit / OWASP Taiwan Days / IRCON Teach @ Government / University / Campus / Non-Profit Org. / Enterprise etc. Speak @ International and Regional Cybersecurity Conference Write @ 35 Books about IT / Hacking / Software / Tools / D.I.Y. / O.S. Find @ blog.yilang.org Connect @ Email / Line / FB / Linked in etc. 2
  • 3. Hacker are ready. Are you? How long ? 3
  • 4. Hacker are ready. Are you? EE years … 4
  • 5. Hacker are ready. Are you? My First Computer. 5 •Microprofessor II (MPF II) •since 1982 •CPU: MOS 6502 •RAM: 64KB •ROM: 16KB(12KB for BASIC) •Color: 8
  • 6. Hacker are ready. Are you? Mouse vs Maze 6 8051
  • 7. Hacker are ready. Are you? BBS Era Modem connect the cyber world. Host BBS station by telephone - only one line Telix everyday 7
  • 8. Hacker are ready. Are you? How to conversation with machine ? programming language Assembly 4GL C Clipper Fox Pro VB etc. 8 solve the problem
  • 9. Hacker are ready. Are you? How to learning ? Hands-on 9
  • 10. Hacker are ready. Are you? How to become a Hacker? 10
  • 11. Hacker are ready. Are you? SANS Training Roadmap 11Source: https://www.sans.org/media/security-training/roadmap.pdf
  • 12. Hacker are ready. Are you? Conference 12 more and more…
  • 13. Hacker are ready. Are you? Workshop & Hands-on Training HITCON / HoneyCon Workshop TWNIC Network Security Courses https://dns-security.twnic.net.tw/ White Hacker Campus https://www.isda.org.tw/ AIS3 https://ais3.org/ Hacker Collage https://hackercollege.nctu.edu.tw/ 13
  • 14. Hacker are ready. Are you? Search…
  • 15. Hacker are ready. Are you? Tools 15 http://sectools.org/
  • 16. Hacker are ready. Are you? News 16 https://thehackernews.com/
  • 17. Hacker are ready. Are you? Information 17 https://pastebin.com
  • 18. Hacker are ready. Are you? Tor Project 18 https://www.torproject.org/
  • 19. Hacker are ready. Are you? ~ Th@nks ~ 19