Hacking and Linux Go Together Like 2 Keys in a Key Pair | Touch Latest Local,World,Tech,Entertainment,Health,Sport News
18 February 2018 00:00:00 AM Breaking News

• TECHNOLOGY

Hacking and Linux Go Together Like 2 Keys in a Key Pair

information-security-hacker-conference

Ever since taking an interest Linux, with the specific aim of better understanding and enhancing my personal digital security, I have been fascinated by hacker conferences. As soon as I learned of their existence, I made a point of keeping tabs on the major conferences so I could browse through the latest videos in their archive once each one wraps up.

I thought that was the closest I would get to such an event, but a couple of weeks ago, I had the chance to attend one for the first time: Chicago's THOTCON. While I'm definitely still swimming in all the experiences I had, I wanted to share a few of my observations and insights.

At this point I can practically hear you asking, "Wait, you said hacker conference? For security?" So, before I go on, I should explain a bit about the interrelationship between hacking and security.

Ebony and Ivory?

The information security, or InfoSec, field is built on hacking. Without the latter, the former would be both impossible and pointless. This is because there are two sides to hacking. The more sensationalized of the two, often called "black hat" hacking, refers to malicious actors breaching a system without authorization either for personal gain or just to cause mayhem.

The far more common variety of hacking is "white hat" hacking, often more formally known as "penetration testing," in which experienced, professional hackers are hired by a company to hack it, without inflicting any permanent damage, in order to audit the company's security.

Obviously, there would be no need for white hat hackers if there were no black hat hackers, but because the ranks of the white hats far outnumber the black hats, we are able to enjoy what computers and the Internet have to offer in relative security.

The other reason these two approaches are related is because they depend on each other. In order for the white hats to fend off the black hats, they need to understand the tactics of the black hats. Correspondingly, the black hats can operate only where the white hats have yet to probe. It's a perpetual cat-and-mouse game, but it's one we have to play in order to make use of the modern Internet.

So what happens at a hacker conference? As I found out, quite a lot. Mainly, though, leading figures in the hacking/security community give presentations on their latest research so that attendees can hone their craft. Like at any professional gathering, there's also a lot of networking (literally as well as figuratively).

That might sound boring, but I can tell you from experience that it's anything but! The professionals, both presenting and attending, are at the leading edge of a field which -- as the recent global ransomware attack demonstrated -- affects all of us every day.

A Whole New World

As I said, there was a lot to take in, but here are some of the aspects of the hacker con experience that made an impression on me for one reason or another.

The most immediate aspect that stood out to me was the sheer amount of stimulation to be found there. In addition to a choice of three simultaneously scheduled talks to attend at any given time, attendees had the option of touring an exhibition room full of vendors, participating in a lockpicking tutorial, socializing at a full bar (open from 10 a.m.), or -- last but not least -- taking part in a con-wide scavenger hunt that included debugging the conference badge and deciphering hidden messages scattered throughout the area.

In short, there was so much to choose from that it was overstimulating, but in a good way. Everywhere I looked, there was something new to take in, and that's exactly why we were all there.

Another thing that impressed me was the considerable range in the topics of the talks themselves. In just the presentations I saw, I heard speakers delve into everything from current vulnerabilities in Internet of Things devices to the philosophy of red team testing; from evaluating your ideas and models by attacking them from the outside to how the military is training soldiers to conduct hacking operations in open, state-on-state warfare.

Some of the talks may not have been directly applicable to me, but many of them were -- and all of them expanded my understanding and appreciation for the work of the InfoSec community. Specifically, the conference gave me a sense of what goes into the pipeline between Internet services and my computer, providing a more holistic look at security than simply locking down my system.

Linux Love

Less surprising, but still great to see, was the fact that there was so much Linux at the con! It's only natural that Linux, an operating system that lets you infinitely tweak and fine-tune your system, would be popular among the tinkerers that are hackers. The configurability and openness of Linux lends itself well to hacking, as hackers can wield exactly the right tool for the job.

Far and away the favorite OS for hacking is Kali Linux, a distribution armed to the teeth with network monitoring, forensics and injection tools. Because hackers have a way of, shall we say, "challenging" each other when assembled at an event like THOTCON, Linux is often a preferred choice for ensuring access to a computer to participate in the many puzzles and challenges offered.

One of the most encouraging things I encountered at the conference was an approachable and open-minded attitude among the conference-goers. People there were extremely open to sharing their knowledge and expertise with others, and no matter what your experience level. Everyone I met there had something to teach and something to learn. There wasn't a conversation I participated in that didn't involve everyone leaving better off.

Finally, one of the best experiences I had at THOTCON was seeing the hacker community's very own hip hop act, Dual Core, perform during the after-party. Besides being a treasured cultural artifact from the community, the group's lyrics are sharp and they are very personable with their fans, so they're definitely worth checking out.

This is definitely only a taste of the full hacker conference experience, as even I was surprised by how much there was to see and do in spite of my familiarity with the phenomenon. While THOTCON doesn't record its talks, DEFCON and Hackers on Planet Earth (HOPE) post theirs online, so if my account of my first con has you intrigued, look them up and check them out for yourself.

Recommended

Loading...

Related Posts

Samsung’s Galaxy S8 hits stores, aims to move on from recall crisis

The world’s biggest smartphone maker Samsung Electronics added more than

Read More

Alexa Can Make Music Echo All Through the House

Amazon's digital assistant, Alexa, has a new musical talent, the company announc

Read More

Apple Watch Rumoured Update Boasting New Display Tech Could Be Brilliant

Apple Watch users know that their smart timepieces have great OLED displays, esp

Read More

Apple ​iPhone ​X: UK release date, price, latest news and features

Apple has unveiled the iPhone X - pronounced iPhone 10 - its prem

Read More

Then and Now

A few years ago, when Oracle was busy buying companies to fill out its front-off

Read More

Turing partners with TCL for next smartphone

Turing Robotic Industries (TRI) partnered with TCL Communications to produce wha

Read More

Samsung to update software over 'red screen' smartphone

Samsung has pinned its hopes on the Galaxy S8 to compete against archrival Apple

Read More

Skype's 'all-new' Windows 10 app makes the trip to Xbox One

Although Microsoft isn't promoting its Xbox One camera add-on nearly as much the

Read More

Study Finds Gender Bias in Open Source Community

Gender bias affects contributions to the open source community, according to a

Read More

Also Read

BBNaija: "Sorry doesn't make things right" Tboss' sister reacts to Kemen getting as much media attention as other housemates

Apparently, BBNaija contestant, Tboss’ sister is not happy with disqualif

Read More

Trump backs down in new short-term spending bill

US lawmakers have reached a deal to avert a federal government shutdown after th

Read More

EFCC & the Whistleblowers, Reuben Abati vs Tboss & Cossy Orjiakor, Patience Jonathan at the bank plus

Hero Daniels is back again with another interesting episode of The Report Card w

Read More

Pope Francis heads to Egypt to boost ties with Muslim community

Catholic Pontiff, Pope Francis will be flying to Cairo on Friday, barely a month

Read More

City will be stronger next season vows Guardiola

Manchester City’s Spanish manager Pep Guardiola suffers defeat after the

Read More

Biafra is My Life - IPOB leader, Nnamdi Kanu

Leader of the Indigenous People of Biafra (IPOB), Nnamdi Kanu, has said that the

Read More

Cut funding, minimise diplomatic ties with N’Korea, US tells Asian ministers

Amid growing tension in the Korean peninsula, US Secretary of State, Rex Tillers

Read More

Our Sci-Fi Future: Silly vs. Terrifying

The future is now, or at least it is coming soon. Today's technological developm

Read More

Bisola finally opens up on what she did with ThinTallTony under the sheet while in the house

Recall that after one of their weekly Saturday night party, Bisola and Thin Ta

Read More

One dead as Air Force aircraft crashes in Kaduna

A Nigerian Airforce Trainer Aircraft has crashed at the permanent site

Read More