
foreign [Music] education has that involved okay okay now you may recognize this movie this is from 95 it's Angeline Jolie's first movie I believe was called hackers and it's a it's a good time so if you get a chance to get a copy uh go ahead and do it because it's a it's a really fun look at sort of a snippet in time in the 90s where we we were talking about and looking at um this this this idea this this the spirit of hacking which is why I wanted to bring this up uh if you haven't seen the movie go ahead and grab a copy but it's the basically a plot line is that this group of of young hackers that want to um they're up they pivot against a villainous hacker who's they who's uh imprisoned their friends and they need to gather the right amount of information to go up against the super cute super computer called the Gibson and and take it down and bring it bring it bring their friends to Justice okay and fun note for those who have watched the movie the the name Gibson is actually a a nod to an author called William Gibson who wrote uh he wrote um where is it in my notes it's not too um burning Chrome in 84. and that's where we actually saw the very first terminology of cyberspace so it was William Gibson that term coined the the term uh cyberspace was kind of which I think is kind of neat uh going forward and this is we're gonna it's gonna be a little bit of a history of of hacking as we go back so now I'm curious how many people recognize this yeah yeah okay okay good anybody over here Yep 2600. this is such a cool uh magazine okay and if you get a chance I believe they're still publishing it if you get a chance go ahead and grab a copy because man the stories that they they share in this are awesome and it goes all the way back to I believe it was it started in the 80s and it's a collection of stories that hackers had contributed to this magazine and they did more than just share really cool hacking stories they actually shared uh tips on how to do various things you know if we're going to be hacking into phones public phones or if they're talking about anything and it it seemed as if nothing was off the off the table and they also did a little bit of muck racking and do you do there's a term that people may have heard about does have people heard of the term muckracking yeah okay good I think we'll have their hands up for 2600 know the term but basically mop racking is uh going about and saying hey there's this thing that's that's out there it's kind of like going against the man a little bit and saying um we're gonna expose what you're what you're doing we're gonna throw some Mudder around and tell people about tell people about it and so this this magazine the 2600 was good for that because it did sort of bring people uh down a level okay um look at this slide and I've I did a Google Search and I said uh hacker with a hoodie on and I got like 50 000 pictures because this is a really popular picture I mean it looks cool for sure and I do joke with my students that when they graduate they're going to be handed a black hoodie and be sent out into industry and I think some people believe me right no and I actually I actually I think the image is cool but absolutely it kind of frustrates me a little bit when I see uh news articles and they got the person in the hoodie hunched over the computer because this is the image that people are being presented of hackers and I don't think that's the image that we should be presenting uh because I don't second I recommend yeah oh just like take a go to my LinkedIn and then do a picture of me look at this honest felt like he's doing a lot of good security good security for us no but I don't even know how you can avoid that because it's so popular right or you got the anonymous the guy fox image is pretty popular as well yeah we should be wearing that when I um I do have a YouTube channel that I that I post regularly to red blue labs for those who are interested and I'm glad to time timed it because this is fun um I talked to my wife and I said I need to have an image for the channel and so as I bought a I bought a white hoodie and I bought a black hoodie so that when I'm doing like sort of like offensive stuff I put the black hoodie on when I'm doing defensive things I put the white the white hoodie on but so if you ever watch the video and you see me wearing a black hoodies because I'm feeling particularly nefarious that day uh there you go um the this is the definition that I actually hold to so when I think about what is what is a hacker it's people that can do this and I'm gonna actually read it to you I don't I don't typically read all slides I don't actually even use slides in my class so that's why I'm a little out of out of out of sorts but it's any sort of technological utilization or manipulation of technology which goes above and beyond the capabilities inherent to the design of a given application okay and the reason I love this definition is because when we when you take a piece of technology and you you're holding it and you turn it upside down and up all around and you get to such a deep knowledge of this piece of technology you're able to manipulate it in a way that it goes past its inherent capabilities and that's what I think that's what I think hacking is right and if you look even further back into history of the technology it's the it is the hackers that uh push the boundaries of what techno technology can do that actually gave us the technology that we are benefiting from today because they they knew it uh hands down right um so why am I bringing up um packing magazines and why am I talking about um hacker movies well the the primary reason for that is that there's a hacker ideology this is what I is what I call it and it's it's kind of this this way of thinking when you're addressing a particular situation or a technology logical challenge or when you just want to generally explore what the the capabilities are in front of you and it is a attitude how do we conduct ourselves when I'm faced with a new challenge what is what is my attitude am I going to give up quickly am I or am I going to persevere and play with that technology until I I really really know it there's a belief what is actually capable with this technology and that's that's the part where we're in the hacker ideology it's dreaming in my mind okay and a mentality which is uh what it's the mindset when it comes to our hacking education okay so in order to understand how cyber education has changed there has to be an appreciation appreciation for this hacker ideology because if as the presentation is called it's called 90s to now and there that hacker ideology existed back in the 90s and I believe that that hacker ideology exists now it's just what we've got as technology and what is available to us is is vastly different than what we had uh back then okay hmm so just to reiterate what is what is this hacker mentality mean to me and perseverance is is a key phrase and I when I'm working on a hack the Box machine and it's brutal um the the mentality that we are we need in order to be successful in that is to persevere and I've been in a number even before I was in security uh as an I.T professional there were many at times where I was sitting there for a 12-hour stint where you have to find the solution and I know a lot of people that are in this room have had that experience or you've sat for a number of hours to in order to get that solution okay and perseverance is that is a key skill not only for I.T people but it's key for security people as well because the answer isn't always going to be abundantly available or or obvious what what it is okay so how did we how did we scratch this this itch for knowledge and I'm thinking about now in the 90s maybe a little bit of the early 2000s how did I how do we learn how did I figure out how to get to a deep level of knowledge and the truth is we read books okay we read instruction manuals uh we read you know the the acronym rtfm that's a that's a common one as well and up on the screen here I've selected only six and these are have you heard of the rainbow Series yeah this is a collection from the rainbow series there's a lot bigger and I get the name rainbow series because of the colors of the books right there right there uh these aren't necessarily hacker books but they were used by people that wanted to know and understand the fundamentals of computing and networking okay uh these are these were also referenced in the in the movies hackers there's a scene when they're up on during this fancy looking club and they're they're throwing out books and talking about it it's really funny scene um but yeah we we read we read books and textbooks and they were thick and I we still do that okay and I I have got a whole library at my house of of networking books to get to refresh myself on some of those fundamentals that you might not use all the time um how else did we spread the knowledge of our uh of hacking the for those who may not know this term freaks or freaking have you have you heard of freaking yeah okay this is a fun one um I'll be I'll be truthful this one is a little bit past my time I didn't get the opportunity to freak it in the wild but uh this was a really fun technique where you could actually trick a public Payphone to let you be make calls wherever you wherever you want in the world uh and so I wanted to bring this as a phone cracking freaks okay this is also sort of the Genesis of fishing as well as the beginning of fishing the pH part of that just this is just a side note but I can I could then at this point in the 90s as they started in the 80s and 70s but we were able to communicate across the globe whoever we wanted to and so the the knowledge of hacking was spreading and so this is the piece of cyber occasion that I wanted to bring to you about sort of that history piece okay um so what does if we step a few more years into the into the the future what did this naturally lead to and you might recognize Internet relay chats as a very popular way to talk okay these are still being used okay uh by lots of people and it's a it's it may not look like much but it it really is a and I don't I didn't actually proofread some of these texts so who swears in there I uh I apologize I did I did a Google search for Internet relay chats and uh I found some pretty good ones someone pretty offensive but uh whatever it's good for a good laugh these were a text-based way of communicating we could do a group chat you could do a private chat and they're very popular as I said they're still being used today and if you think about how we could phone everybody with with the technique of freaking imagine being able to reach a room virtually of thousands of people to spread the spread that hacking knowledge now it wasn't it wasn't just that you could just open up your computer and just bam be inside this in this thing you did need a little bit of a gumption to do it and there there was opportunities for like more senior hackers to give us some give some uh edging and help out with uh the more novice and get into this into this world the there's internally really fun I had to put this image in there this is actually a side note because uh I read a really good book it's called we are Anonymous and it was uh my author's parmy parmy something uh but that's not that's not important the the anonymous the early days of anonymous and I'm thinking like 10 15-ish years ago and lol's like if you've heard of anonymous I know that and if you've likely heard of Lil SEC this is an older an older group they they did a ton of communication over IRC and uh 4chan was the beginning of the anonymous movement okay that's just another another little throwback just a little tidbit for you I'm on the wrong way boom uh that was a that was a wave file I just did there uh 90s to now uh this one is we had just an explosion of growth in technology we had uh people had computers like it was I believe in like a mid 90s getting to the later 90s it wasn't abnormal for people to have a a personal computer in their house okay and we could reach out and and touch touch machine so people remember when they got their first computer I'm sure I'm sure you do uh I was remembering back when I got my first computer and my parents had bought it because I didn't have any money and we called it the computer room right and it was really there's a room that was dedicated to this personal computer and it was the computer room and that was that was a fun that was a fun throwback I just want to get caught up here uh but with this explosion and this accessibility of computers that we had in our in our homes now we actually this was a ushered in what I believe to be a new era of cyber education thank you and here's a here's a pie and I I coin it just like William Gibson coin cyberspace I call it the Cyber education pie okay so if you ever see that around I you heard it here first okay well but uh it's also really good high definition when I was really lucky on that Google search um but there's I believe that there's four key elements that we see in cyber education okay and they they were birthed in in the 90s and it has continued on to to date but it has altered just a little bit so let's look at the first the first one first one being access okay this is this is quite literally having access to technology when I think about my my lab environment at my house is vastly different than when I was learning uh computing when I was when I was a kid at my parents house destroying their computer because I did multiple times and I I fixed it most most often I was able to cover my tracks thanks LimeWire for that um but uh thank you I need some water we had we had we have access and if you go back further there wasn't as much access it was really expensive to get these computers but you think right now it's easy I've got a I got a phone that could be rooted and doing Cali I've got my lab environment's got a few machines I've gotten a box in my house that's got like four or five laptops that I would want to do whatever I could I just picked up eight old routers uh out of the garbage to practice router hacking on for some videos that I want to do down the road right I have access to it I'm connected to a Global Network okay which is pretty awesome and when we when we Ponder this the the gravity and the expanse of the Internet it's huge and and it connects all of us if we want to be right I can I can reach out and literally touch a server on the other side of the planet and I feel like that's amazing right that's that's a part of one of the things about technology that just blows my mind and it's all just through packets right it's it's amazing um but we're all connected to This Global Network infinite information this is this is important to cyber education right I've already admitted that I did some Google search for this presentation right all of us when I'm presented with a a challenge a hacking challenge it's just a general Tech Challenge or whatever we can go onto the internet and find the information that we need really really fast okay and it feels like infinite information that brings us to the uh final piece of this of this pie boom and that is the hacker mentality okay so I use the term hyper ideology I'm talking about hacker mentality um and this is when we think about cyber education and remember this is the pie of cyber education where I want to I want to know this thing as much as I possibly can I want to have a deep knowledge of it that's the hacker mentality okay I've got access to my I got access to my computer I'm connected on the local Global Network and I've got infinite access to information there really should be nothing stopping us because I can go out and get all of the information I need it's amazing the time passes okay uh from the 90s to now the name um what is it what does it look like today what has changed if back in the 90s we had these four elements okay and now I'm talking about sort of like the early 2000s 2010 we had all those four pieces of the pie okay it's that cyber education in my mind but something has slightly changed and for me that is how we ingest information and I think this is the key piece because I can I can get information really really fast and if we go back to an older slide where I look at the the fact that I mentioned that here's the rainbow series of these books and we had to we phoned each other the information wasn't just readily available I had to I had to pick up a book and read it now I can go to the internet and get information on hacking like if I'm working on a hack the Box I mean there's a ton of walkthroughs on those things uh and you all you know that right uh or I want to do a a quick look up on an exploit for Samba I can go to YouTube and bloop and immediately I'm presented with a plethora of options I'd like to look at more modern times so not modern but more recent so as I've already told you I'm a teacher at State and I've been teaching for five years now it's been it's been great I love it and during that time I've seen a lot of changes with cyber education and a lot of a lot of external factors played a role in that so covet had a huge impact on Cyber education I believe um and in general uh here's a here's a picture when I looked at my name tag that I hadn't looked at in a while I'm like oh my goodness that was five years ago and then that was last night when I took out the one on the right I'm like oh my goodness but uh also having kids makes it has an impact on how you look uh but whatever you know uh I when I started I was I really wanted to treat a I have a really positive impact on the world of cyber have a positive effect on the the world uh the the people that were going to be in my industry years years from now right and and it has happened I think people have learned things I'm not totally sure but I'm I'm hoping that hoping that things were learned uh but during that time it's in this moment that I actually learned something really important and I had a I had an experience and I'm actually going to tell you a story which I got I got the book up there it was it was a moment in time that I had a a massive switch and I experienced something that uh I realized that for the rest of my time in cyber education and as a as a person who believes that being a hacker is good uh there's an impact and this is this is how the story goes so a couple years ago I had a had a project and it was a VPN project and it was to set up site to site VPN between two virtual machines in a virtualized network okay and the the concept of site to site VPN for the students at this moment in time was was fairly challenging okay I knew it was challenging but it was kind of at the end of semester so at this point they should have been attending and doing the labs and had a good grasp of what I'm getting at all right um but as I'm as I'm going through it I got the I got the regular questions from the students and it was great and it's fine that's when I'm there from I'm supposed to be teaching and I got I had one student who asked a lot of questions and it was really really good um but I'll be honest there was a moment where I was I was not entirely sure that they were going to get this assignment there was and as a teacher you have that moment like when I you did your best I did my best and now it's up to you to see what you're going to accomplish here um and so the the submission time came and went and I went to look at the video that they made proving that they had done site to site VPN okay and they did it and I was I was pumped I was like oh my goodness I had my doubts here man uh and I actually called him I called this person I give him a call because I was kind of in disbelief I'll be honest and I said to them I said I wasn't really honest with this person I said y