Hacking and Linux Go Together Like 2 Keys in a Key Pair | Touch Latest Local,World,Tech,Entertainment,Health,Sport News
24 September 2017 00:00:00 AM Breaking News

• TECHNOLOGY

Hacking and Linux Go Together Like 2 Keys in a Key Pair

information-security-hacker-conference

Ever since taking an interest Linux, with the specific aim of better understanding and enhancing my personal digital security, I have been fascinated by hacker conferences. As soon as I learned of their existence, I made a point of keeping tabs on the major conferences so I could browse through the latest videos in their archive once each one wraps up.

I thought that was the closest I would get to such an event, but a couple of weeks ago, I had the chance to attend one for the first time: Chicago's THOTCON. While I'm definitely still swimming in all the experiences I had, I wanted to share a few of my observations and insights.

At this point I can practically hear you asking, "Wait, you said hacker conference? For security?" So, before I go on, I should explain a bit about the interrelationship between hacking and security.

Ebony and Ivory?

The information security, or InfoSec, field is built on hacking. Without the latter, the former would be both impossible and pointless. This is because there are two sides to hacking. The more sensationalized of the two, often called "black hat" hacking, refers to malicious actors breaching a system without authorization either for personal gain or just to cause mayhem.

The far more common variety of hacking is "white hat" hacking, often more formally known as "penetration testing," in which experienced, professional hackers are hired by a company to hack it, without inflicting any permanent damage, in order to audit the company's security.

Obviously, there would be no need for white hat hackers if there were no black hat hackers, but because the ranks of the white hats far outnumber the black hats, we are able to enjoy what computers and the Internet have to offer in relative security.

The other reason these two approaches are related is because they depend on each other. In order for the white hats to fend off the black hats, they need to understand the tactics of the black hats. Correspondingly, the black hats can operate only where the white hats have yet to probe. It's a perpetual cat-and-mouse game, but it's one we have to play in order to make use of the modern Internet.

So what happens at a hacker conference? As I found out, quite a lot. Mainly, though, leading figures in the hacking/security community give presentations on their latest research so that attendees can hone their craft. Like at any professional gathering, there's also a lot of networking (literally as well as figuratively).

That might sound boring, but I can tell you from experience that it's anything but! The professionals, both presenting and attending, are at the leading edge of a field which -- as the recent global ransomware attack demonstrated -- affects all of us every day.

A Whole New World

As I said, there was a lot to take in, but here are some of the aspects of the hacker con experience that made an impression on me for one reason or another.

The most immediate aspect that stood out to me was the sheer amount of stimulation to be found there. In addition to a choice of three simultaneously scheduled talks to attend at any given time, attendees had the option of touring an exhibition room full of vendors, participating in a lockpicking tutorial, socializing at a full bar (open from 10 a.m.), or -- last but not least -- taking part in a con-wide scavenger hunt that included debugging the conference badge and deciphering hidden messages scattered throughout the area.

In short, there was so much to choose from that it was overstimulating, but in a good way. Everywhere I looked, there was something new to take in, and that's exactly why we were all there.

Another thing that impressed me was the considerable range in the topics of the talks themselves. In just the presentations I saw, I heard speakers delve into everything from current vulnerabilities in Internet of Things devices to the philosophy of red team testing; from evaluating your ideas and models by attacking them from the outside to how the military is training soldiers to conduct hacking operations in open, state-on-state warfare.

Some of the talks may not have been directly applicable to me, but many of them were -- and all of them expanded my understanding and appreciation for the work of the InfoSec community. Specifically, the conference gave me a sense of what goes into the pipeline between Internet services and my computer, providing a more holistic look at security than simply locking down my system.

Linux Love

Less surprising, but still great to see, was the fact that there was so much Linux at the con! It's only natural that Linux, an operating system that lets you infinitely tweak and fine-tune your system, would be popular among the tinkerers that are hackers. The configurability and openness of Linux lends itself well to hacking, as hackers can wield exactly the right tool for the job.

Far and away the favorite OS for hacking is Kali Linux, a distribution armed to the teeth with network monitoring, forensics and injection tools. Because hackers have a way of, shall we say, "challenging" each other when assembled at an event like THOTCON, Linux is often a preferred choice for ensuring access to a computer to participate in the many puzzles and challenges offered.

One of the most encouraging things I encountered at the conference was an approachable and open-minded attitude among the conference-goers. People there were extremely open to sharing their knowledge and expertise with others, and no matter what your experience level. Everyone I met there had something to teach and something to learn. There wasn't a conversation I participated in that didn't involve everyone leaving better off.

Finally, one of the best experiences I had at THOTCON was seeing the hacker community's very own hip hop act, Dual Core, perform during the after-party. Besides being a treasured cultural artifact from the community, the group's lyrics are sharp and they are very personable with their fans, so they're definitely worth checking out.

This is definitely only a taste of the full hacker conference experience, as even I was surprised by how much there was to see and do in spite of my familiarity with the phenomenon. While THOTCON doesn't record its talks, DEFCON and Hackers on Planet Earth (HOPE) post theirs online, so if my account of my first con has you intrigued, look them up and check them out for yourself.

Recommended

Loading...

Related Posts

MTN Mobile Electricity with Lumos Solar Home System

MTN Mobile Electricity is a partnership between MTN, Nigeria’s largest Mobile

Read More

10 of the best things you can do with the Amazon Echo

If you're considering buying an Alexa device (including the new Echo Show or Ech

Read More

Samsung Presents First Samsung Safety Truck Prototype

Samsung Electronics Argentina unveiled to the public the first Samsung

Read More

Bodhi Linux With Moksha Is Truly Enlightening

Bodhi Linux 4.3.1's implementation of theEnlightenment desktop, releas

Read More

Amazon Gives Fashion Advice, Snacks Get Musical, and Coffee Tables Get Smart

Spring is in full swing, and what better way to celebrate the start of the war

Read More

Network sharing cuts China LTE capex 16%

A network sharing arrangement between China Unicom and China Telecom

Read More

Toyota develops robotic leg braces for older people

Toyota will be renting out robotic leg braces to 100 Japanese medical centres fr

Read More

Manchester United FC Introducing the new MUTV app

Your club, your channel - watch your favourite Manchester United moments live

Read More

Police search for man who broadcast deadly shooting on Facebook

Cleveland police issued an arrest warrant Monday for a gunman they said murdered

Read More

Also Read

How we will push made in Aba products into the global market – Gov. Ikpeazu

One of the major challenges of Abia State since its creation in 1991 is the in

Read More

Premier League: Manchester United boss Jose Mourinho unsatisfied with draw against 'powerful' Stoke City

Stoke-on Trent: Jose Mourinho admitted Manchester United were well below their b

Read More

Nigeria to process all tourist, business visas in two days

Nigeria will process all tourist and business visas within two days, the vi

Read More

Nigeria to reduce petrol importation to 60%

Nigeria has expressed commitment to the plan to reduce importation of petroleum

Read More

Shannon Town Crowed Clare Premier Division League Champions

Shannon Town have claimed their maiden Clare Premier Division League title.Donal

Read More

How Nnamdi Kanu Met Impossible Bail Conditions

Wandoo Sombo: The leader of the Indigenous People of Biafra (IPOB) Nnamdi Kanu w

Read More

Seeing the Brain…With Diapers

Call me a nerd, but this is fascinating! Image: Colorful digital image of the hu

Read More

Meningitis: Northern Governors, Traditional Rulers Hold Meeting In Kaduna

An emergency meeting of Governors and traditional rulers of the 19 northern st

Read More

A woman’s pioneering exoskeleton technology could allow paralyzed people to move again

There weren’t many role models for Sam Huynh when she was growing up in Belen,

Read More

SO SAD!!! Photos 16yrs old Nollywood Actress, Regina Daniels Leg ‘Amputated’

.Nollywod actress, Regina Daniels, is seriously terrorizing the industry with he

Read More