The Mind of a Hacker

advertisement
The Mind of a Hacker
A broad look at the motivation of hackers and the hacking
community
By Tyler Herrington and Marlo Hume
Agenda
What is a hacker
 What motivates a hacker
 The hacking community

 Who
belongs?
 The “rules” of the game (aka Hacker Ethic)

Conclusions
What is a hacker?
Many ways to describe hackers:
1. Creates and modifies.
-computer software and computer hardware
2.
Exploits systems and gains unauthorized access.
3.
Computer enthusiast/person who enjoys learning
programming languages.
Someone who breaks into computers.
Can make a computer do what they want
Anyone who ‘breaks open’ code and manipulates it in a clever
or original
4.
5.
6.
-through clever tactics and detailed knowledge.
-Not necessarily illegal.
Types of Hackers- white hat

“White Hat”- hired by large corporations, or
governments

Usually as a “Tiger Team”


Tiger Team is a team that is hired to test the security of
networks/find flaws or loopholes
Will snoop around networks, trying to find
loopholes

If such loophole(s) is/are found – report created
explaining how hack was achieved
Types of Hackers- grey hat

“Grey Hat”
Unhired
 People who break into networks for fun

Usually don’t intentionally cause harm (following hacker
ethic)
 Enjoy doing this




Perceived as challenge
Want kudos from hacker peers
Want to “test security to prevent such attacks in future”
Types of Hackers- black hat

“Black hat”/crackers
Stereotypical hacker you hear about in the media
 Break into systems and damage them

May write things like “you just got served by X group”
 May delete files, erase portions of code, etc.


“Crackers” fall under this category
Use reverse engineering of assembly code to make it open
source, or to customize it to their liking
 Also known as pirates, or “warez writers”

What motivates a hacker








To help others
‘Hooliganism’
Criminal intent
Financial gain
Most hacker activity is of a nature where money is
rarely involved
Curiosity
Intellectual Challenge
Security heads-up!
The hacking community- who
belongs

To join, have to be recognized
Sharing your creations (time, creativity, open source
programs)
 Learn to code efficiently

Hackers like “well-coded” programs
 Better the program- more kudos


Become recognized when top hackers recognize you
The hacking community- the Hacker
Ethic
1.
2.
3.
4.
5.
reject hierarchies
mistrust authority
promote decentralization
share information
serve your community (i.e. the hacker community)
Reject Hierarchies

User no less important than author



People are only judged on skill




User may be able to improve product
Authors are also users of other’s products
No social class, age, gender, race restrictions
Open source programs
Hacking into secure networks
Hackers ignore what society says about class


Have their own community
Have their own system
Mistrust Authority

Believe in libertarian environment



A rule is meant to be broken


Everyman for himself
Government shouldn’t dictate our boundaries
If said can’t be done; green light to do it
Increased security= better “problem to solve”

Increased security is better reason to find loopholes
Hacker Joke of the day!!
Not your typical hacker
Promote Decentralization


Every man for himself mentality
Segregation from society good



Keeps your identity more secure
More efficient work can be done
Cooperation can occur over internet


Don’t need to be physically near each other
Communities operate worldwide
Share Information

Believe all info should be free

no restricted info



software should be “open source”



no “top secret” files
Governments should NOT hide things
Open source= free/no copyrights
Increases awareness of software “out there”
Value of info increases when shared


Data can be basis for learning
software can be improved collectively
Serve Your Community

Contribute to open source projects
Become beta tester
 Code new projects to share
 Make improvements to existing ones


Keep Hacker infrastructure intact
Make FAQ’s on how to be a hacker
 Establish websites/meeting places for hackers
 “Boring” jobs: maintain mailing lists, project
databases/archives, moderate hacker news groups

Conclusion

Gave broad overview of hackers/hacker culture

what is a hacker?
White hat
 Grey hat
 Black hat/cracker

Hacker motivations
 Hacker Community

Who belongs
 The “rules” of the game (aka Hacker Ethic)

Bibliography







ABC. (2004). Platform 6. Retrieved 04/06, 2006 from
http://www.abc.net.au/pipeline/platform/feature/hacking/Nicholas.htm
Cagle, D. (2006). Hacker attacks! Retrieved 04/06, 2006 from
http://www.cagle.com/news/hackers/hacker28.asp
Chance, T. (2005). The hacker ethic and meaningful work. Retrieved 04/06, 2066
from http://tom.acrewoods.net/files/dissertation/dissertation.pdf
Graham, P. (2004). The word "hacker". Retrieved April, 6, 2006, 2006 from
http://www.paulgraham.com/gba.html
Hannemyr, G. (2005). Considering hacking constructive. Retrieved 04/06,
2006 from http://turingmachine.org/opensource/lectures/03_hackers.pdf
Hannemyr, G. (1997). Technology and pleasure:
HACKING CONSIDERED CONSTRUCTIVE. Retrieved 04/06, 2006 from
http://folk.uio.no/gisle/essay/oks97.html#HDR2
Jordan, T., & Taylor, P. (1998). A sociology of hackers. Retrieved 04/06, 2006
from http://www.blackwell-synergy.com/links/doi/10.1111/1467954X.00139
Bibliography Cont.







Jupitermedia Corporation. (2006). What is a hacker? Retrieved April, 6, 2006,
2006 from http://www.webopedia.com/TERM/H/hacker.html
Levy, S. (Undisclosed). Hackers, heroes of thecomputer revolution.
Retrieved 04/06, 2006 from http://quetzal.uis.edu.co/cieehtml/biblioteca_virtual/criptografia/Hackers_Heroes%20of%20the%20com
puter%20revolution.pdf
Lowgren, J. (2000). Hacker culture(s). Retrieved 04/06, 2006 from
http://webzone.k3.mah.se/k3jolo/HackerCultures/newethics.htm
Mizrach, S. (2006). Is there a hacker ethic for 90s hackers? Retrieved 04/06, 2006
from http://www.fiu.edu/~mizrachs/hackethic.html
Raikow, D. (2000). Is hacking healthy? Retrieved 04/06, 2006 from
http://news.zdnet.co.uk/hardware/0,39020351,2078225,00.htm
Steven Raymond, E. (2001). How to become A hacker. Retrieved April, 6, 2006,
2006 from http://www.catb.org/~esr/faqs/hacker-howto.html#what_is
Wikipedia. (2006). Hacker. Retrieved April, 6, 2006, 2006 from
http://en.wikipedia.org/wiki/Hacker
Download