This document provides an overview of hackers and hacker culture. It defines different types of hackers such as white hats, grey hats, and black hats. It discusses what motivates hackers and the rules or ethic of the hacker community, which includes rejecting hierarchies, mistrusting authority, promoting decentralization, sharing information, and serving their community. The document aims to give a broad understanding of hackers, their motivations, and culture.
What is a Hacker? Understanding Types, Motivations and Culture
1.
2. AgendaAgenda
What is a hackerWhat is a hacker
What motivates a hackerWhat motivates a hacker
The hacking training communityThe hacking training community
Who belongs?Who belongs?
The “rules” of the game (aka Hacker Ethic)The “rules” of the game (aka Hacker Ethic)
ConclusionsConclusions
3. What is a hacker?What is a hacker?
Many ways to describe hackers:Many ways to describe hackers:
1.1. Creates and modifies.Creates and modifies.
-computer software and computer hardware-computer software and computer hardware
2.2. Exploits systems and gains unauthorized access.Exploits systems and gains unauthorized access.
-through clever tactics and detailed knowledge.-through clever tactics and detailed knowledge.
3.3. Computer enthusiast/person who enjoys learningComputer enthusiast/person who enjoys learning
programming languages.programming languages.
4.4. Someone who breaks into computers.Someone who breaks into computers.
5.5. Can make a computer do what they wantCan make a computer do what they want
6.6. Anyone who ‘breaks open’ code and manipulates it in a cleverAnyone who ‘breaks open’ code and manipulates it in a clever
or originalor original
-Not necessarily illegal.-Not necessarily illegal.
4. Types of Hackers- white hatTypes of Hackers- white hat
““White Hat”- hired by large corporations, orWhite Hat”- hired by large corporations, or
governmentsgovernments
Usually as a “Tiger Team”Usually as a “Tiger Team”
Tiger Team is a team that is hired to test the security ofTiger Team is a team that is hired to test the security of
networks/find flaws or loopholesnetworks/find flaws or loopholes
Will snoop around networks, trying to findWill snoop around networks, trying to find
loopholesloopholes
If such loophole(s) is/are found – report createdIf such loophole(s) is/are found – report created
explaining how hack was achievedexplaining how hack was achieved
5. Types of Hackers- grey hatTypes of Hackers- grey hat
““Grey Hat”Grey Hat”
UnhiredUnhired
People who break into networks for funPeople who break into networks for fun
Usually don’t intentionally cause harm (following hackerUsually don’t intentionally cause harm (following hacker
ethic)ethic)
Enjoy doing thisEnjoy doing this
Perceived as challengePerceived as challenge
Want kudos from hacker peersWant kudos from hacker peers
Want to “test security to prevent such attacks in future”Want to “test security to prevent such attacks in future”
6. Types of Hackers- black hatTypes of Hackers- black hat
““Black hat”/crackersBlack hat”/crackers
Stereotypical hacker you hear about in the mediaStereotypical hacker you hear about in the media
Break into systems and damage themBreak into systems and damage them
May write things like “you just got served by X group”May write things like “you just got served by X group”
May delete files, erase portions of code, etc.May delete files, erase portions of code, etc.
““Crackers” fall under this categoryCrackers” fall under this category
Use reverse engineering of assembly code to make it openUse reverse engineering of assembly code to make it open
source, or to customize it to their likingsource, or to customize it to their liking
Also known as pirates, or “warez writers”Also known as pirates, or “warez writers”
7. What motivates a hackerWhat motivates a hacker
To help othersTo help others
‘‘Hooliganism’Hooliganism’
Criminal intentCriminal intent
Financial gainFinancial gain
Most hacker activity is of a nature where money isMost hacker activity is of a nature where money is
rarely involvedrarely involved
CuriosityCuriosity
Intellectual ChallengeIntellectual Challenge
Security heads-up!Security heads-up!
8. The hacking community- whoThe hacking community- who
belongsbelongs
To join, have to be recognizedTo join, have to be recognized
Sharing your creations (time, creativity, open sourceSharing your creations (time, creativity, open source
programs)programs)
Learn to code efficientlyLearn to code efficiently
Hackers like “well-coded” programsHackers like “well-coded” programs
Better the program- more kudosBetter the program- more kudos
Become recognized when top hackers recognize youBecome recognized when top hackers recognize you
9. 1.1. reject hierarchiesreject hierarchies
2.2. mistrust authoritymistrust authority
3.3. promote decentralizationpromote decentralization
4.4. share informationshare information
5.5. serve your community (i.e. the hacker community)serve your community (i.e. the hacker community)
The hacking community- the HackerThe hacking community- the Hacker
EthicEthic
10. Reject HierarchiesReject Hierarchies
User no less important than authorUser no less important than author
User may be able to improve productUser may be able to improve product
Authors are also users of other’s productsAuthors are also users of other’s products
People are only judged on skillPeople are only judged on skill
No social class, age, gender, race restrictionsNo social class, age, gender, race restrictions
Open source programsOpen source programs
Hacking into secure networksHacking into secure networks
Hackers ignore what society says about classHackers ignore what society says about class
Have their own communityHave their own community
Have their own systemHave their own system
11. Mistrust AuthorityMistrust Authority
Believe in libertarian environmentBelieve in libertarian environment
Everyman for himselfEveryman for himself
Government shouldn’t dictate our boundariesGovernment shouldn’t dictate our boundaries
A rule is meant to be brokenA rule is meant to be broken
If said can’t be done; green light to do itIf said can’t be done; green light to do it
Increased security= better “problem to solve”Increased security= better “problem to solve”
Increased security is better reason to find loopholesIncreased security is better reason to find loopholes
12. Hacker Joke of the day!!Hacker Joke of the day!!
Not your typical hacker
13. Promote DecentralizationPromote Decentralization
Every man for himself mentalityEvery man for himself mentality
Segregation from society goodSegregation from society good
Keeps your identity more secureKeeps your identity more secure
More efficient work can be doneMore efficient work can be done
Cooperation can occur over internetCooperation can occur over internet
Don’t need to be physically near each otherDon’t need to be physically near each other
Communities operate worldwideCommunities operate worldwide
14. Share InformationShare Information
Believe all info should be freeBelieve all info should be free
no restricted infono restricted info
no “top secret” filesno “top secret” files
Governments should NOT hide thingsGovernments should NOT hide things
software should be “open source”software should be “open source”
Open source= free/no copyrightsOpen source= free/no copyrights
Increases awareness of software “out there”Increases awareness of software “out there”
Value of info increases when sharedValue of info increases when shared
Data can be basis for learningData can be basis for learning
software can be improved collectivelysoftware can be improved collectively
15. Serve Your CommunityServe Your Community
Contribute to open source projectsContribute to open source projects
Become beta testerBecome beta tester
Code new projects to shareCode new projects to share
Make improvements to existing onesMake improvements to existing ones
Keep Hacker infrastructure intactKeep Hacker infrastructure intact
Make FAQ’s on how to be a hackerMake FAQ’s on how to be a hacker
Establish websites/meeting places for hackersEstablish websites/meeting places for hackers
““Boring” jobs: maintain mailing lists, projectBoring” jobs: maintain mailing lists, project
databases/archives, moderate hacker news groupsdatabases/archives, moderate hacker news groups
16. ConclusionConclusion
Gave broad overview of hackers/hacker cultureGave broad overview of hackers/hacker culture
what is a hacker?what is a hacker?
White hatWhite hat
Grey hatGrey hat
Black hat/crackerBlack hat/cracker
Hacker motivationsHacker motivations
Hacker CommunityHacker Community
Who belongsWho belongs
The “rules” of the game (aka Hacker Ethic)The “rules” of the game (aka Hacker Ethic)
Editor's Notes
Anyone who breaks into a computer without authorization.
An example of an enthusiast is a person who enjoys learning programming languages and computer systems and can often be considered an expert on the subject(s).
Being called a hacker could be a compliment or an insult.
It's called a hack when you do something in an ugly way.
When you do something so clever that you somehow beat the system, that's also called a hack.
Ugly and imaginative solutions have something in common: they both break the rules.
Zen poem explaining how to become a hacker
To follow the path: look to the master, follow the master, walk with the master, see through the master, become the master.