SlideShare a Scribd company logo
1 of 16
AgendaAgenda
 What is a hackerWhat is a hacker
 What motivates a hackerWhat motivates a hacker
 The hacking training communityThe hacking training community
 Who belongs?Who belongs?
 The “rules” of the game (aka Hacker Ethic)The “rules” of the game (aka Hacker Ethic)
 ConclusionsConclusions
What is a hacker?What is a hacker?
Many ways to describe hackers:Many ways to describe hackers:
1.1. Creates and modifies.Creates and modifies.
-computer software and computer hardware-computer software and computer hardware
2.2. Exploits systems and gains unauthorized access.Exploits systems and gains unauthorized access.
-through clever tactics and detailed knowledge.-through clever tactics and detailed knowledge.
3.3. Computer enthusiast/person who enjoys learningComputer enthusiast/person who enjoys learning
programming languages.programming languages.
4.4. Someone who breaks into computers.Someone who breaks into computers.
5.5. Can make a computer do what they wantCan make a computer do what they want
6.6. Anyone who ‘breaks open’ code and manipulates it in a cleverAnyone who ‘breaks open’ code and manipulates it in a clever
or originalor original
-Not necessarily illegal.-Not necessarily illegal.
Types of Hackers- white hatTypes of Hackers- white hat
 ““White Hat”- hired by large corporations, orWhite Hat”- hired by large corporations, or
governmentsgovernments
 Usually as a “Tiger Team”Usually as a “Tiger Team”
 Tiger Team is a team that is hired to test the security ofTiger Team is a team that is hired to test the security of
networks/find flaws or loopholesnetworks/find flaws or loopholes
 Will snoop around networks, trying to findWill snoop around networks, trying to find
loopholesloopholes
 If such loophole(s) is/are found – report createdIf such loophole(s) is/are found – report created
explaining how hack was achievedexplaining how hack was achieved
Types of Hackers- grey hatTypes of Hackers- grey hat
 ““Grey Hat”Grey Hat”
 UnhiredUnhired
 People who break into networks for funPeople who break into networks for fun
 Usually don’t intentionally cause harm (following hackerUsually don’t intentionally cause harm (following hacker
ethic)ethic)
 Enjoy doing thisEnjoy doing this
 Perceived as challengePerceived as challenge
 Want kudos from hacker peersWant kudos from hacker peers
 Want to “test security to prevent such attacks in future”Want to “test security to prevent such attacks in future”
Types of Hackers- black hatTypes of Hackers- black hat
 ““Black hat”/crackersBlack hat”/crackers
 Stereotypical hacker you hear about in the mediaStereotypical hacker you hear about in the media
 Break into systems and damage themBreak into systems and damage them
 May write things like “you just got served by X group”May write things like “you just got served by X group”
 May delete files, erase portions of code, etc.May delete files, erase portions of code, etc.
 ““Crackers” fall under this categoryCrackers” fall under this category
 Use reverse engineering of assembly code to make it openUse reverse engineering of assembly code to make it open
source, or to customize it to their likingsource, or to customize it to their liking
 Also known as pirates, or “warez writers”Also known as pirates, or “warez writers”
What motivates a hackerWhat motivates a hacker
 To help othersTo help others
 ‘‘Hooliganism’Hooliganism’
 Criminal intentCriminal intent
 Financial gainFinancial gain
 Most hacker activity is of a nature where money isMost hacker activity is of a nature where money is
rarely involvedrarely involved
 CuriosityCuriosity
 Intellectual ChallengeIntellectual Challenge
 Security heads-up!Security heads-up!
The hacking community- whoThe hacking community- who
belongsbelongs
 To join, have to be recognizedTo join, have to be recognized
 Sharing your creations (time, creativity, open sourceSharing your creations (time, creativity, open source
programs)programs)
 Learn to code efficientlyLearn to code efficiently
 Hackers like “well-coded” programsHackers like “well-coded” programs
 Better the program- more kudosBetter the program- more kudos
 Become recognized when top hackers recognize youBecome recognized when top hackers recognize you
1.1. reject hierarchiesreject hierarchies
2.2. mistrust authoritymistrust authority
3.3. promote decentralizationpromote decentralization
4.4. share informationshare information
5.5. serve your community (i.e. the hacker community)serve your community (i.e. the hacker community)
The hacking community- the HackerThe hacking community- the Hacker
EthicEthic
Reject HierarchiesReject Hierarchies
 User no less important than authorUser no less important than author
 User may be able to improve productUser may be able to improve product
 Authors are also users of other’s productsAuthors are also users of other’s products
 People are only judged on skillPeople are only judged on skill
 No social class, age, gender, race restrictionsNo social class, age, gender, race restrictions
 Open source programsOpen source programs
 Hacking into secure networksHacking into secure networks
 Hackers ignore what society says about classHackers ignore what society says about class
 Have their own communityHave their own community
 Have their own systemHave their own system
Mistrust AuthorityMistrust Authority
 Believe in libertarian environmentBelieve in libertarian environment
 Everyman for himselfEveryman for himself
 Government shouldn’t dictate our boundariesGovernment shouldn’t dictate our boundaries
 A rule is meant to be brokenA rule is meant to be broken
 If said can’t be done; green light to do itIf said can’t be done; green light to do it
 Increased security= better “problem to solve”Increased security= better “problem to solve”
 Increased security is better reason to find loopholesIncreased security is better reason to find loopholes
Hacker Joke of the day!!Hacker Joke of the day!!
Not your typical hacker
Promote DecentralizationPromote Decentralization
 Every man for himself mentalityEvery man for himself mentality
 Segregation from society goodSegregation from society good
 Keeps your identity more secureKeeps your identity more secure
 More efficient work can be doneMore efficient work can be done
 Cooperation can occur over internetCooperation can occur over internet
 Don’t need to be physically near each otherDon’t need to be physically near each other
 Communities operate worldwideCommunities operate worldwide
Share InformationShare Information
 Believe all info should be freeBelieve all info should be free
 no restricted infono restricted info
 no “top secret” filesno “top secret” files
 Governments should NOT hide thingsGovernments should NOT hide things
 software should be “open source”software should be “open source”
 Open source= free/no copyrightsOpen source= free/no copyrights
 Increases awareness of software “out there”Increases awareness of software “out there”
 Value of info increases when sharedValue of info increases when shared
 Data can be basis for learningData can be basis for learning
 software can be improved collectivelysoftware can be improved collectively
Serve Your CommunityServe Your Community
 Contribute to open source projectsContribute to open source projects
 Become beta testerBecome beta tester
 Code new projects to shareCode new projects to share
 Make improvements to existing onesMake improvements to existing ones
 Keep Hacker infrastructure intactKeep Hacker infrastructure intact
 Make FAQ’s on how to be a hackerMake FAQ’s on how to be a hacker
 Establish websites/meeting places for hackersEstablish websites/meeting places for hackers
 ““Boring” jobs: maintain mailing lists, projectBoring” jobs: maintain mailing lists, project
databases/archives, moderate hacker news groupsdatabases/archives, moderate hacker news groups
ConclusionConclusion
 Gave broad overview of hackers/hacker cultureGave broad overview of hackers/hacker culture
 what is a hacker?what is a hacker?
 White hatWhite hat
 Grey hatGrey hat
 Black hat/crackerBlack hat/cracker
 Hacker motivationsHacker motivations
 Hacker CommunityHacker Community
 Who belongsWho belongs
 The “rules” of the game (aka Hacker Ethic)The “rules” of the game (aka Hacker Ethic)

More Related Content

What's hot

Cazando Cibercriminales con: OSINT + Cloud Computing + Big Data
Cazando Cibercriminales con: OSINT + Cloud Computing + Big DataCazando Cibercriminales con: OSINT + Cloud Computing + Big Data
Cazando Cibercriminales con: OSINT + Cloud Computing + Big DataChema Alonso
 
White hat and black hat hackers
White hat and black hat hackersWhite hat and black hat hackers
White hat and black hat hackersBilal Ahmed
 
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff SilverCloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff SilverEC-Council
 
SOCs for the rest of us
SOCs for the rest of usSOCs for the rest of us
SOCs for the rest of usRyan Kovar
 
How to Secure Your Organisation Data
How to Secure Your Organisation DataHow to Secure Your Organisation Data
How to Secure Your Organisation DataPhannarith Ou, G-CISO
 
the best hacking ppt
the best hacking pptthe best hacking ppt
the best hacking pptfuckubitches
 
Hackers are innocent
Hackers are innocentHackers are innocent
Hackers are innocentdanish3
 
Statistical analysis of HTTPS reachability
Statistical analysis of HTTPS reachabilityStatistical analysis of HTTPS reachability
Statistical analysis of HTTPS reachabilityAPNIC
 
Computer Security pro english course
Computer Security pro english courseComputer Security pro english course
Computer Security pro english courseAbdo Shajadi
 
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...Andrew Morris
 
10(?) holiday gifts for the SOC who has everything
10(?) holiday gifts for the SOC who has everything10(?) holiday gifts for the SOC who has everything
10(?) holiday gifts for the SOC who has everythingRyan Kovar
 
SACON - Deception Technology (Sahir Hidayatullah)
SACON - Deception Technology (Sahir Hidayatullah)SACON - Deception Technology (Sahir Hidayatullah)
SACON - Deception Technology (Sahir Hidayatullah)Priyanka Aash
 
GreyNoise - Lowering Signal To Noise
GreyNoise - Lowering Signal To NoiseGreyNoise - Lowering Signal To Noise
GreyNoise - Lowering Signal To NoiseAndrew Morris
 
Ethical hacking : Beginner to advanced
Ethical hacking : Beginner to advancedEthical hacking : Beginner to advanced
Ethical hacking : Beginner to advancedKavin K
 
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
Practical White Hat Hacker Training -  Passive Information Gathering(OSINT)Practical White Hat Hacker Training -  Passive Information Gathering(OSINT)
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)PRISMA CSI
 
Threat Intelligence Victory Garden
Threat Intelligence Victory GardenThreat Intelligence Victory Garden
Threat Intelligence Victory GardenRyan Kovar
 

What's hot (20)

Cazando Cibercriminales con: OSINT + Cloud Computing + Big Data
Cazando Cibercriminales con: OSINT + Cloud Computing + Big DataCazando Cibercriminales con: OSINT + Cloud Computing + Big Data
Cazando Cibercriminales con: OSINT + Cloud Computing + Big Data
 
White hat and black hat hackers
White hat and black hat hackersWhite hat and black hat hackers
White hat and black hat hackers
 
Hackers
HackersHackers
Hackers
 
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff SilverCloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
 
Ethical_Hacking
Ethical_HackingEthical_Hacking
Ethical_Hacking
 
SOCs for the rest of us
SOCs for the rest of usSOCs for the rest of us
SOCs for the rest of us
 
How to Secure Your Organisation Data
How to Secure Your Organisation DataHow to Secure Your Organisation Data
How to Secure Your Organisation Data
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
the best hacking ppt
the best hacking pptthe best hacking ppt
the best hacking ppt
 
Hackers are innocent
Hackers are innocentHackers are innocent
Hackers are innocent
 
Statistical analysis of HTTPS reachability
Statistical analysis of HTTPS reachabilityStatistical analysis of HTTPS reachability
Statistical analysis of HTTPS reachability
 
Computer Security pro english course
Computer Security pro english courseComputer Security pro english course
Computer Security pro english course
 
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
 
10(?) holiday gifts for the SOC who has everything
10(?) holiday gifts for the SOC who has everything10(?) holiday gifts for the SOC who has everything
10(?) holiday gifts for the SOC who has everything
 
SACON - Deception Technology (Sahir Hidayatullah)
SACON - Deception Technology (Sahir Hidayatullah)SACON - Deception Technology (Sahir Hidayatullah)
SACON - Deception Technology (Sahir Hidayatullah)
 
GreyNoise - Lowering Signal To Noise
GreyNoise - Lowering Signal To NoiseGreyNoise - Lowering Signal To Noise
GreyNoise - Lowering Signal To Noise
 
Ethical hacking : Beginner to advanced
Ethical hacking : Beginner to advancedEthical hacking : Beginner to advanced
Ethical hacking : Beginner to advanced
 
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
Practical White Hat Hacker Training -  Passive Information Gathering(OSINT)Practical White Hat Hacker Training -  Passive Information Gathering(OSINT)
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
 
Threat Intelligence Victory Garden
Threat Intelligence Victory GardenThreat Intelligence Victory Garden
Threat Intelligence Victory Garden
 
Dark Web Forensics
Dark Web Forensics Dark Web Forensics
Dark Web Forensics
 

Similar to What is a Hacker? Understanding Types, Motivations and Culture

Ethi mini - ethical hacking
Ethi mini - ethical hackingEthi mini - ethical hacking
Ethi mini - ethical hackingBeing Uniq Sonu
 
Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking OverviewSubhoneel Datta
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingAkshay Kale
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxGautam708801
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesKlaus Drosch
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentationteriwoja
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfxererenhosdominaram
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical HackingAkashy Kale
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hackingWaseem Rauf
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingarohan6
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingarohan6
 

Similar to What is a Hacker? Understanding Types, Motivations and Culture (20)

Ethi mini - ethical hacking
Ethi mini - ethical hackingEthi mini - ethical hacking
Ethi mini - ethical hacking
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking Overview
Ethical Hacking OverviewEthical Hacking Overview
Ethical Hacking Overview
 
Hacking Kishor
Hacking KishorHacking Kishor
Hacking Kishor
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
hacking
hackinghacking
hacking
 
Dhams hacking
Dhams hackingDhams hacking
Dhams hacking
 
hacking basics
hacking basicshacking basics
hacking basics
 
Ethichack 2012
Ethichack 2012Ethichack 2012
Ethichack 2012
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniques
 
Hacking
HackingHacking
Hacking
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Recently uploaded

CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 

Recently uploaded (20)

CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 

What is a Hacker? Understanding Types, Motivations and Culture

  • 1.
  • 2. AgendaAgenda  What is a hackerWhat is a hacker  What motivates a hackerWhat motivates a hacker  The hacking training communityThe hacking training community  Who belongs?Who belongs?  The “rules” of the game (aka Hacker Ethic)The “rules” of the game (aka Hacker Ethic)  ConclusionsConclusions
  • 3. What is a hacker?What is a hacker? Many ways to describe hackers:Many ways to describe hackers: 1.1. Creates and modifies.Creates and modifies. -computer software and computer hardware-computer software and computer hardware 2.2. Exploits systems and gains unauthorized access.Exploits systems and gains unauthorized access. -through clever tactics and detailed knowledge.-through clever tactics and detailed knowledge. 3.3. Computer enthusiast/person who enjoys learningComputer enthusiast/person who enjoys learning programming languages.programming languages. 4.4. Someone who breaks into computers.Someone who breaks into computers. 5.5. Can make a computer do what they wantCan make a computer do what they want 6.6. Anyone who ‘breaks open’ code and manipulates it in a cleverAnyone who ‘breaks open’ code and manipulates it in a clever or originalor original -Not necessarily illegal.-Not necessarily illegal.
  • 4. Types of Hackers- white hatTypes of Hackers- white hat  ““White Hat”- hired by large corporations, orWhite Hat”- hired by large corporations, or governmentsgovernments  Usually as a “Tiger Team”Usually as a “Tiger Team”  Tiger Team is a team that is hired to test the security ofTiger Team is a team that is hired to test the security of networks/find flaws or loopholesnetworks/find flaws or loopholes  Will snoop around networks, trying to findWill snoop around networks, trying to find loopholesloopholes  If such loophole(s) is/are found – report createdIf such loophole(s) is/are found – report created explaining how hack was achievedexplaining how hack was achieved
  • 5. Types of Hackers- grey hatTypes of Hackers- grey hat  ““Grey Hat”Grey Hat”  UnhiredUnhired  People who break into networks for funPeople who break into networks for fun  Usually don’t intentionally cause harm (following hackerUsually don’t intentionally cause harm (following hacker ethic)ethic)  Enjoy doing thisEnjoy doing this  Perceived as challengePerceived as challenge  Want kudos from hacker peersWant kudos from hacker peers  Want to “test security to prevent such attacks in future”Want to “test security to prevent such attacks in future”
  • 6. Types of Hackers- black hatTypes of Hackers- black hat  ““Black hat”/crackersBlack hat”/crackers  Stereotypical hacker you hear about in the mediaStereotypical hacker you hear about in the media  Break into systems and damage themBreak into systems and damage them  May write things like “you just got served by X group”May write things like “you just got served by X group”  May delete files, erase portions of code, etc.May delete files, erase portions of code, etc.  ““Crackers” fall under this categoryCrackers” fall under this category  Use reverse engineering of assembly code to make it openUse reverse engineering of assembly code to make it open source, or to customize it to their likingsource, or to customize it to their liking  Also known as pirates, or “warez writers”Also known as pirates, or “warez writers”
  • 7. What motivates a hackerWhat motivates a hacker  To help othersTo help others  ‘‘Hooliganism’Hooliganism’  Criminal intentCriminal intent  Financial gainFinancial gain  Most hacker activity is of a nature where money isMost hacker activity is of a nature where money is rarely involvedrarely involved  CuriosityCuriosity  Intellectual ChallengeIntellectual Challenge  Security heads-up!Security heads-up!
  • 8. The hacking community- whoThe hacking community- who belongsbelongs  To join, have to be recognizedTo join, have to be recognized  Sharing your creations (time, creativity, open sourceSharing your creations (time, creativity, open source programs)programs)  Learn to code efficientlyLearn to code efficiently  Hackers like “well-coded” programsHackers like “well-coded” programs  Better the program- more kudosBetter the program- more kudos  Become recognized when top hackers recognize youBecome recognized when top hackers recognize you
  • 9. 1.1. reject hierarchiesreject hierarchies 2.2. mistrust authoritymistrust authority 3.3. promote decentralizationpromote decentralization 4.4. share informationshare information 5.5. serve your community (i.e. the hacker community)serve your community (i.e. the hacker community) The hacking community- the HackerThe hacking community- the Hacker EthicEthic
  • 10. Reject HierarchiesReject Hierarchies  User no less important than authorUser no less important than author  User may be able to improve productUser may be able to improve product  Authors are also users of other’s productsAuthors are also users of other’s products  People are only judged on skillPeople are only judged on skill  No social class, age, gender, race restrictionsNo social class, age, gender, race restrictions  Open source programsOpen source programs  Hacking into secure networksHacking into secure networks  Hackers ignore what society says about classHackers ignore what society says about class  Have their own communityHave their own community  Have their own systemHave their own system
  • 11. Mistrust AuthorityMistrust Authority  Believe in libertarian environmentBelieve in libertarian environment  Everyman for himselfEveryman for himself  Government shouldn’t dictate our boundariesGovernment shouldn’t dictate our boundaries  A rule is meant to be brokenA rule is meant to be broken  If said can’t be done; green light to do itIf said can’t be done; green light to do it  Increased security= better “problem to solve”Increased security= better “problem to solve”  Increased security is better reason to find loopholesIncreased security is better reason to find loopholes
  • 12. Hacker Joke of the day!!Hacker Joke of the day!! Not your typical hacker
  • 13. Promote DecentralizationPromote Decentralization  Every man for himself mentalityEvery man for himself mentality  Segregation from society goodSegregation from society good  Keeps your identity more secureKeeps your identity more secure  More efficient work can be doneMore efficient work can be done  Cooperation can occur over internetCooperation can occur over internet  Don’t need to be physically near each otherDon’t need to be physically near each other  Communities operate worldwideCommunities operate worldwide
  • 14. Share InformationShare Information  Believe all info should be freeBelieve all info should be free  no restricted infono restricted info  no “top secret” filesno “top secret” files  Governments should NOT hide thingsGovernments should NOT hide things  software should be “open source”software should be “open source”  Open source= free/no copyrightsOpen source= free/no copyrights  Increases awareness of software “out there”Increases awareness of software “out there”  Value of info increases when sharedValue of info increases when shared  Data can be basis for learningData can be basis for learning  software can be improved collectivelysoftware can be improved collectively
  • 15. Serve Your CommunityServe Your Community  Contribute to open source projectsContribute to open source projects  Become beta testerBecome beta tester  Code new projects to shareCode new projects to share  Make improvements to existing onesMake improvements to existing ones  Keep Hacker infrastructure intactKeep Hacker infrastructure intact  Make FAQ’s on how to be a hackerMake FAQ’s on how to be a hacker  Establish websites/meeting places for hackersEstablish websites/meeting places for hackers  ““Boring” jobs: maintain mailing lists, projectBoring” jobs: maintain mailing lists, project databases/archives, moderate hacker news groupsdatabases/archives, moderate hacker news groups
  • 16. ConclusionConclusion  Gave broad overview of hackers/hacker cultureGave broad overview of hackers/hacker culture  what is a hacker?what is a hacker?  White hatWhite hat  Grey hatGrey hat  Black hat/crackerBlack hat/cracker  Hacker motivationsHacker motivations  Hacker CommunityHacker Community  Who belongsWho belongs  The “rules” of the game (aka Hacker Ethic)The “rules” of the game (aka Hacker Ethic)

Editor's Notes

  1. Anyone who breaks into a computer without authorization. An example of an enthusiast is a person who enjoys learning programming languages and computer systems and can often be considered an expert on the subject(s). Being called a hacker could be a compliment or an insult. It's called a hack when you do something in an ugly way. When you do something so clever that you somehow beat the system, that's also called a hack. Ugly and imaginative solutions have something in common: they both break the rules.
  2. Zen poem explaining how to become a hacker To follow the path:    look to the master,    follow the master,    walk with the master,    see through the master,    become the master.