Congrats, I knowwhat a whitehatis, I knowwhat a blackhatis.
Whatistheredhatangryhacker.
I don't think I'veheardthetermredhathackerbeforewhenyouwere a whitehathackeryouhackforgood.
Um, a lotofpeopleinthesecurityindustryarewhitehathackersandthenforthecybercriminalsthatwecallthemblackhats, there's alsothisothertermcalledgrayhatwheretheycouldbe a IIttieadminduringtheday, whilemoonlightas a blackhatduringthenighthackerforlife.
Askmyunicorn.
Howdoyouevenbeginlearningandexceedinginthisfield?
I'm tryingtobecome a penetrationtester, needinspiration.
Butifyoureallywanttobe a penetrationtester, there's a lotofcontentoutonthewebrightnow, courses, workshops, Theyevenhaveeventsorconferenceswhereyoucanmeetotherpeopleinthefield.
Youcanfind a mentorlearnfromthem, theywouldpointyouintherightdirection.
I feellikethehackercultureisprettyopenandanddiverse.
Sowhatthatmeansisthey'retryingtobypass a lotofautomateddetectionsfromsocialmediathattheyhaveinplacetolookforfakeaccountsandsobytweetingormessagingormakinganytypeofaction, they'retryingtobypassdetectiontolookmorelike a legitimateaccount.
Thistwitteristhere?
Andrewcheekyatwhatwouldtheythinkofnext?
Isthereanythingthathasbeencourtedinthelastdecadethathackershaven't found a vulnerabilitytodosomedamage.
A lotofthesedevicesaredevelopedin a waywherethey'relookingforthelowestpossiblecostofmanufacturing, sowhentheygettothesecuritypart, it's kindoflikeanafterthought.
Should I justget a fileand a bookandstartdoingthebestwayistojustjumprightinthinkaboutitasriding a bike, ittakestime, ittakespractice, buteventuallyyou'llgetit.
There's a differentbuggerforeveryoperatingsystem, butthey'renoteasytolearnunlessyoustart, youknow, justdoingit, you'reselfandtrainingyourselfandpracticinglike I don't remembereverysinglecommandintheburger, I havetouse a cheatsheet, twitteruserstormwolf, myawesomebosssaysthat I canrequesttochangemyjobtitletowhatever I wantittobeinourcompanyprofile.
So I thinkyoushouldjustnameyourselfsafeforwork, thistwitterusersubeight, youaskyoursmarttvandyourvideostreamingappsarecollectingandsharingtonsofdatajustbecauseitcanhowlongbeforewecanstarthavingembeddedcamerasthatmalwaretriggers.
There's not a lotofMaooutthereforMacandLinux, I meanit's there, butyouknow, currentlymostofthemhoursonWindows, thebishoporjoshHarris 25 whatisthepointofspamemails?
Sayyouhad a millionemailssentoutandthey'rerequesting $1.
Thesecybercriminalsareexpectingthat 1% willactuallybite a lotofthesecybercriminalswilltreatthisas a business.
Soitbecomesverylucrativeforthem, cybertooth, Maoriunicornifyouwouldcreate a timelineforanincident.
Whatwoulditlooklike?
Justcuriousbecauseyourdesignskillsarecraycray, well a lotofpeopledon't knowthis, butbefore I gotintocomputerscience, I wasactuallypursuing a degreeingraphicdesign.
So a lotofitfrommytimedoingthatcarriesoverintomyworkbackwhen I usedtoworkattheDepartmentofDefense, I usedtocreatethesethree D videostodescribedifferenttypeofnetworklayouts.
I didn't knowthree D designatthetime.
So I spenttheweekendtaughtmyselfandthenextdaystartedyouknow, makingcontentifyoucanmakethingslookniceandbeabletocomecommunicatetheactualabstractcontent.
Ithelps.
Don't lookasked.
Yeah, butbadpickuplinesandfishingreally.
Anydifferentloweffort, easyreuseandreallydoget a success.
I reallythinkfishingismoreeffectivethansaying a pickupline.
Theyhave a teamthatactsastheredteamdoingtheattacksandtheblueteamservesasdefenseteamsimilartowhatwehaveincybersecurityandthattheredteamishackingtheblueteam's systems.
Thewholepointofwhattheredteamdoesistoenumerateholeswithin a network.