Agenda What is a hacker What motivates a hacker The hacking training community
Who belongs? The “rules” of the game (aka Hacker Ethic)
Conclusions
What is a hacker? Many ways to describe hackers: 1. Creates and modifies. -computer software and computer hardware
2.
Exploits systems and gains unauthorized access.
3.
Computer enthusiast/person who enjoys learning programming languages. Someone who breaks into computers. Can make a computer do what they want Anyone who ‘breaks open’ code and manipulates it in a clever or original
4. 5. 6.
-through clever tactics and detailed knowledge.
-Not necessarily illegal.
Types of Hackers- white hat
“White Hat”- hired by large corporations, or governments
Usually as a “Tiger Team”
Tiger Team is a team that is hired to test the security of networks/find flaws or loopholes
Will snoop around networks, trying to find loopholes
If such loophole(s) is/are found – report created explaining how hack was achieved
Types of Hackers- grey hat
“Grey Hat” Unhired People who break into networks for fun
Usually don’t intentionally cause harm (following hacker ethic) Enjoy doing this
Perceived as challenge Want kudos from hacker peers
Want to “test security to prevent such attacks in future”
Types of Hackers- black hat
“Black hat”/crackers Stereotypical hacker you hear about in the media Break into systems and damage them
May write things like “you just got served by X group” May delete files, erase portions of code, etc.
“Crackers” fall under this category Use reverse engineering of assembly code to make it open source, or to customize it to their liking Also known as pirates, or “warez writers”
What motivates a hacker
To help others ‘Hooliganism’ Criminal intent Financial gain Most hacker activity is of a nature where money is rarely involved Curiosity Intellectual Challenge Security heads-up!
The hacking community- who belongs
To join, have to be recognized Sharing your creations (time, creativity, open source programs) Learn to code efficiently
Hackers like “well-coded” programs Better the program- more kudos
Become recognized when top hackers recognize you
The hacking community- the Hacker Ethic 1. 2. 3. 4. 5.
reject hierarchies mistrust authority promote decentralization share information serve your community (i.e. the hacker community)
Reject Hierarchies
User no less important than author
People are only judged on skill
User may be able to improve product Authors are also users of other’s products No social class, age, gender, race restrictions Open source programs Hacking into secure networks
Hackers ignore what society says about class
Have their own community Have their own system
Mistrust Authority
Believe in libertarian environment
A rule is meant to be broken
Everyman for himself Government shouldn’t dictate our boundaries If said can’t be done; green light to do it
Increased security= better “problem to solve”
Increased security is better reason to find loopholes
Hacker Joke of the day!! Not your typical hacker
Promote Decentralization
Every man for himself mentality Segregation from society good
Keeps your identity more secure More efficient work can be done
Cooperation can occur over internet
Don’t need to be physically near each other Communities operate worldwide
Share Information
Believe all info should be free
no restricted info
software should be “open source”
no “top secret” files Governments should NOT hide things Open source= free/no copyrights Increases awareness of software “out there”
Value of info increases when shared
Data can be basis for learning software can be improved collectively
Serve Your Community
Contribute to open source projects Become beta tester Code new projects to share Make improvements to existing ones
Keep Hacker infrastructure intact Make FAQ’s on how to be a hacker Establish websites/meeting places for hackers “Boring” jobs: maintain mailing lists, project databases/archives, moderate hacker news groups
Conclusion
Gave broad overview of hackers/hacker culture
what is a hacker? White hat Grey hat Black hat/cracker
Hacker motivations Hacker Community
Who belongs The “rules” of the game (aka Hacker Ethic)