My Authors
Read all threads
What’s today’s hacker-generation learn path? (Thread) “In my times” we were good at C/Python, wrote exploits with its shellcode using gdb/olly to reverse, we read books on #algorithms, unix internals, protocol design and RISC architectures were beautiful. Regex was a most. (1/1)
I remember reading books of Knuth “art of computer programming”, Cormen’s algorithm design, the old C programming by Kernighan, Unix Internals. Moreover we were into OS design, I used to have a SGI fuel to experiment with schedulers/kernel in IRIX on MIPS64, SPARC and other (1/2)
We used to mock of Theo de Raadt’s OpenBSD’s phrase of “no vulnerabilities in the default install” when we were involved in the first exploit for it. We collected srcs of OSes (not OSS). I published stego tools, ELF encryptors and in-memory patching modules in packetstorm (1/3)
In protocols we were more into tcp sequencing predicting, libnet, libpcap. SQL injection was a must even that it was a triviality. We developed exploits and tools for SSH/SMB/HTTP with people that is maybe reading now. We exploited apache 1.3x in N different ways (I did one)(1/4)
We developed protocol fuzzers to exploit them, we were interested in cracking challenges or developing & publishing kernel backdoors for different OSs/archs. We made congresses, go to defcon & published our stuff in ezines from different hacker groups using our nicknames (1/5)
We always gained access to ninja party by hacking. We also traveled to give conferences using our nicknames mainly in the US, Canada, Mexico, south america and Spain. I gave my conferences in those times about steganography, cryptography or hacking in general for workshops. (1/6)
We used to Hack other “hacker” groups for fun. We talked about Gobbles, Aleph1, el8. I was more into cryptography, interested in SSL/TLS GMP math. We used to gather in the 2600 meeting point of our cities (we used IRC). We were more interested in bypassing stack protection (1/7)
Most of my friends are doing phd’s, working at big security/hardware companies as leaders, others predicting the stock market, SIEM. That was in a few words my experience. Now after my PhD I work as a data scientist in the energy sector predicting threats using math (1/8)
If you are in my 2000s hacker generation feel free to continue the thread with more fun experiences. I must be forgetting (uint64_t)-1 things.

If you are not in my generation please tell us your experience I am really interested! (1/9).
By the way my counting of tweets converges to 0.
I forgot to say that today, I still do Cryptography which is what motivated my path. I still do research on hyperelliptic curves, one month ago I just published a primality testing algorithm using these curves. It is important not to abandon what you were good in the beginning.
Missing some Tweet in this thread? You can try to force a refresh.

Enjoying this thread?

Keep Current with Eduardo Ruíz-Duarte

Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Follow Us on Twitter!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!