COOK LIKE A HACKER!
JIM GILSINN
Image Courtesy of Maruchan
Baking takes precision!
I’m talking about cooking
I’M ALSO NOT TALKING ABOUT
PRESENTATION
Image Courtesy of Dreamworks
A LITTLE ABOUT ME
• I love to cook (and eat)
• Cooking on my own ~10 years old
• Cooking full family meals in high-school
• Learned to cook by smell/taste
• I assess & design ICS/SCADA networks
• I’m an engineer & programmer
• I’m not a hacker!
HACKER MENTALITY?
• Learn about equipment, tools, resources, etc.
• Question everything
• Experiment and figure things out
• Share with others
• Teach others
EQUIPMENT
Images Courtesy of Ikea, Kenmore, Hak5, Great Scott Gadgets
TOOLS
Images Courtesy of McCormick, Snort, Security Onion, Wireshark, Offensive Security, Rapid7, Tenable Network Security, The Bro Project
TECHNIQUES
• Grill/Barbeque
• Bake/Broil
• Sauté/Fry
• Pressure Cook
• Roast
• Stew
• Assess
• Audit
• Passive/Active Scan
• Pen Test
• War drive
RESOURCES
RESOURCES
Images Courtesy of Google, Food Network, Pinterest, GitHub, SourceForge, Shodan, Wikipedia
RECIPES
• Good place to start
• Learn something new
• Making something very
specific
• Suggestion for general
amounts/times/temps
• “To Taste”
• Good place to start
• Learn something new
• Do something very
specific
• Suggestion for general
workflow
• Adjust based on findings
Images Courtesy of Lucasfilm
REQUIREMENTS/CONSTRAINTS
• Kosher/Halal
• Vegetarian/Vegan
• Low/No-Salt
• Low Fat
• Low Carb
• Passive-Scanning Only
• No Physical Penetration
• These are Out-of-Scope
• Only Afterhours
• You Can’t Talk to Those
People
“
”
I have not failed. I've just found
10,000 ways that won't work.
Just because something doesn't do
what you planned it to do doesn't
mean it's useless.
Thomas Edison
“
”
A COUPLE EXAMPLES
PIZZA
• Why does pizza from a restaurant taste so good?
• Heat
• Bake/Broil
• Grill
• Dough
• Pre-made crusts
• Fresh dough
• Scratch
RICE
• Why do you cook rice the way you do?
• ‘Cause Uncle … says so?
• Why does rice end up like a block of goo?
• Starch
• Rinse before cooking
• Water
• Boil it like pasta
• Microwave it
SHARE WITH OTHERS
TEACH OTHERS
QUESTIONS?
• Jim Gilsinn
• Email: jimgilsinn@gmail.com or jim.gilsinn@kenexis.com
• Phone: +1-301-706-9985 or +1-614-323-2254
• Twitter: @JimGilsinn
• LinkedIn: http://www.linkedin.com/in/jimgilsinn/
• SlideShare: http://www.slideshare.net/gilsinnj
• Website: http://www.kenexis.com

More Related Content

PPTX
Wireshark Network Protocol Analyzer
PPTX
Test Tool for Industrial Ethernet Network Performance (June 2009)
PPTX
Cyber & Process Attack Scenarios for ICS
PPTX
Network Packet Analysis with Wireshark
PPTX
Cooking and Food - Tainan.pptx
KEY
Sourdough: Hacking Bread and Social Baking (for non hackers)
PDF
Culinary R&D
PPT
Don’t bake my heart!
Wireshark Network Protocol Analyzer
Test Tool for Industrial Ethernet Network Performance (June 2009)
Cyber & Process Attack Scenarios for ICS
Network Packet Analysis with Wireshark
Cooking and Food - Tainan.pptx
Sourdough: Hacking Bread and Social Baking (for non hackers)
Culinary R&D
Don’t bake my heart!

Similar to Cook Like a Hacker! (8)

PPT
Don’t bake my heart!
PPT
The range isn’t all that's hot in the kitchen
PPTX
Why You Should Make Friends With Your Slow Cooker
PDF
Educ416 week four_assignment
PPTX
Unit 3 Cooking
KEY
HCI and Shepherd's Pie
KEY
The bread
PPTX
Unit 3 Cooking
Don’t bake my heart!
The range isn’t all that's hot in the kitchen
Why You Should Make Friends With Your Slow Cooker
Educ416 week four_assignment
Unit 3 Cooking
HCI and Shepherd's Pie
The bread
Unit 3 Cooking

More from Jim Gilsinn (10)

PPTX
ISA/IEC 62443: Intro and How To
PPTX
Practical Approaches to Securely Integrating Business and Production
PPTX
Network Security: Protecting SOHO Networks
PPTX
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
PPTX
Integrating the Alphabet Soup of Standards
PPTX
ICS Performance Lab
PPTX
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
PPTX
Low-Cost ICS Network Performance Testing
PPTX
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
PPTX
You name it, we analyze it
ISA/IEC 62443: Intro and How To
Practical Approaches to Securely Integrating Business and Production
Network Security: Protecting SOHO Networks
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Integrating the Alphabet Soup of Standards
ICS Performance Lab
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Low-Cost ICS Network Performance Testing
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
You name it, we analyze it

Recently uploaded (20)

PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPTX
Chapter 5: Probability Theory and Statistics
PPT
Geologic Time for studying geology for geologist
PDF
Five Habits of High-Impact Board Members
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PPTX
Modernising the Digital Integration Hub
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
CloudStack 4.21: First Look Webinar slides
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Hybrid model detection and classification of lung cancer
PPTX
Tartificialntelligence_presentation.pptx
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
DOCX
search engine optimization ppt fir known well about this
Hindi spoken digit analysis for native and non-native speakers
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Developing a website for English-speaking practice to English as a foreign la...
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Chapter 5: Probability Theory and Statistics
Geologic Time for studying geology for geologist
Five Habits of High-Impact Board Members
Web Crawler for Trend Tracking Gen Z Insights.pptx
Modernising the Digital Integration Hub
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
CloudStack 4.21: First Look Webinar slides
DP Operators-handbook-extract for the Mautical Institute
Enhancing emotion recognition model for a student engagement use case through...
Zenith AI: Advanced Artificial Intelligence
A review of recent deep learning applications in wood surface defect identifi...
Hybrid model detection and classification of lung cancer
Tartificialntelligence_presentation.pptx
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
search engine optimization ppt fir known well about this

Cook Like a Hacker!

  • 1. COOK LIKE A HACKER! JIM GILSINN
  • 2. Image Courtesy of Maruchan
  • 3. Baking takes precision! I’m talking about cooking
  • 4. I’M ALSO NOT TALKING ABOUT PRESENTATION Image Courtesy of Dreamworks
  • 5. A LITTLE ABOUT ME • I love to cook (and eat) • Cooking on my own ~10 years old • Cooking full family meals in high-school • Learned to cook by smell/taste • I assess & design ICS/SCADA networks • I’m an engineer & programmer • I’m not a hacker!
  • 6. HACKER MENTALITY? • Learn about equipment, tools, resources, etc. • Question everything • Experiment and figure things out • Share with others • Teach others
  • 7. EQUIPMENT Images Courtesy of Ikea, Kenmore, Hak5, Great Scott Gadgets
  • 8. TOOLS Images Courtesy of McCormick, Snort, Security Onion, Wireshark, Offensive Security, Rapid7, Tenable Network Security, The Bro Project
  • 9. TECHNIQUES • Grill/Barbeque • Bake/Broil • Sauté/Fry • Pressure Cook • Roast • Stew • Assess • Audit • Passive/Active Scan • Pen Test • War drive
  • 11. RESOURCES Images Courtesy of Google, Food Network, Pinterest, GitHub, SourceForge, Shodan, Wikipedia
  • 12. RECIPES • Good place to start • Learn something new • Making something very specific • Suggestion for general amounts/times/temps • “To Taste” • Good place to start • Learn something new • Do something very specific • Suggestion for general workflow • Adjust based on findings Images Courtesy of Lucasfilm
  • 13. REQUIREMENTS/CONSTRAINTS • Kosher/Halal • Vegetarian/Vegan • Low/No-Salt • Low Fat • Low Carb • Passive-Scanning Only • No Physical Penetration • These are Out-of-Scope • Only Afterhours • You Can’t Talk to Those People
  • 14. “ ” I have not failed. I've just found 10,000 ways that won't work. Just because something doesn't do what you planned it to do doesn't mean it's useless. Thomas Edison “ ”
  • 16. PIZZA • Why does pizza from a restaurant taste so good? • Heat • Bake/Broil • Grill • Dough • Pre-made crusts • Fresh dough • Scratch
  • 17. RICE • Why do you cook rice the way you do? • ‘Cause Uncle … says so? • Why does rice end up like a block of goo? • Starch • Rinse before cooking • Water • Boil it like pasta • Microwave it
  • 20. QUESTIONS? • Jim Gilsinn • Email: jimgilsinn@gmail.com or jim.gilsinn@kenexis.com • Phone: +1-301-706-9985 or +1-614-323-2254 • Twitter: @JimGilsinn • LinkedIn: http://www.linkedin.com/in/jimgilsinn/ • SlideShare: http://www.slideshare.net/gilsinnj • Website: http://www.kenexis.com

Editor's Notes

  • #2: Cook like a hacker, and I don’t mean Ramen noodles, take-out pizza, and a bowl of cereal. A lot of hacking involves using a basic set of equipment, learning a powerful set of tools, following a basic set of procedures, a lot of improvising and experimenting, and learning from your mistakes. Cooking is the same. You can cook amazing meals, but it means that you have to be willing to apply a hacker-type mindset to an area that doesn’t involve computers.