How to be a Hacker

Avatar image for michaelenger
michaelenger

143

Forum Posts

2259

Wiki Points

0

Followers

Reviews: 8

User Lists: 0

Edited By michaelenger

So you've played Watch Dogs and thought to yourself "that don't look too hard," and now you want to learn how to be a hacker. Well, you should know that there is more to hacking than just staring at your phone all day, which we all do anyway, and you have a long way to go if you want to give DEDSEC a run for their money.

DEDSEC
DEDSEC

Before we begin I should say up front that I am not a security expert and I may misrepresent certain details or skip over information as I oversimplify this topic for the sake of brevity. Feel free to chime in if I'm wrong about anything, or if I've glossed over something important.

To get a better insight into what it entails to be a hacker, you need to know what hacking is and what it isn't. "Hacking" is often used by the media as a catch-all term for any computer-related crime, but the crimes that can be committed using a computer are many and varied, so just calling everything "hacking" is a gross misunderstanding of how computers play a part in our connected world.

Real computer hacking is, at heart, exploiting the weaknesses in a computer system to gain access to protected data or features. It could mean probing a corporate network to get to company secrets or circumventing the software block on a console to make it run homebrew games. Whether this is done with malicious/criminal intent isn't exactly important, but die-hard hackers tend to prefer that the term "hacking" is reserved for exploiting weaknesses whereas "cracking" is the definition of hacking with the intent to steal, destroy, manipulate or commit some other crime (such as bypassing the DRM on a game, which is illegal under the DMCA).

Wearing these hats do NOT make you a hacker
Wearing these hats do NOT make you a hacker

Despite this distinction between innocuous and criminal hacking, there is still a separation in the hacking community between "good" and "bad" hacking, with the "white hat" and "black hat" monikers referring to the respective types. White hat hacking is hacking done for the sake of research or to test the security of a system, usually at the behest of the systems administrators, who are interested in how robust their system is in case they are targeted by others hackers (this is called penetration testing). Black hat hacking, on the other hand, is hacking done for selfish reasons, either to prove that you could, or because you have something to gain by exploiting the system. There are the obvious monetary gains, but some hackers are solely looking for a challenge or the infamy gained by breaking into heavily protected systems. They may notify the administrators of the system which they broke into to make them aware of the security hole, but unless actually invited to test the security of the system then this type of hacking isn't always appreciated (or legal). Where the line between this and "cracking" lies is subjective and the source of endless arguments, as is tradition in computer culture.

On a related side-note, it is impossible to talk about hacking without making a mention of phone phreaking. Phreaking was the 1960-1970s era phenomena of exploiting telephone systems by using specific frequencies of sound to trick the electronic switchboards into doing what you want. Most commonly it was to let you call long-distance for free, but it was also accompanied by a practice called "war dialling", which is a brute-force way of finding if there are any exploitable computer systems connected to the telephone network. Phreakers would gather in conference calls (for free), on unprotected corporate networks to trade stories, share techniques, and just hang out.

Despite all this talk about computer systems and program flaws, there is a much more analogue aspect to hacking which is important to mention. Most often, especially in this world of advanced firewalls and paranoid sysadmins, the weakest point in a system are the users. Hacking has always involved aspects of social engineering, where a hacker would convince another person to give them access to a private area or system, sometimes without doing anything more complicated than asking. We're naive and trusting creatures and our desire to help usually wins over any suspicions, especially if the person you're talking to seems legit.

The nmap program making an apperance in The Matrix: Reloaded - an example of Hollywood hacking done right
The nmap program making an apperance in The Matrix: Reloaded - an example of Hollywood hacking done right

So you want to be a hacker? Meaning you want to exploit weaknesses in a computer system, and the humans using it, to gain access to information not meant for your eyes. Hacking itself is very difficult and involves a lot of research and experimentation which can take a lot of time to accomplish, especially when you're trying to exploit programming flaws or penetrate a well-constructed network. However, you can also find a lot of programs on the internet which exploit already-known flaws, giving you the powers to intrude into systems without all that hard work. But then you would be just a "script kiddie", and nobody likes script kiddies.

In the Watch Dogs game, Aiden Pierce is referred to as a great hacker but all he does is run programs on his phone which do the work for him. The game doesn't feature any of the poking and prodding that goes into actually finding weaknesses in secure systems and Aiden relies on the apps to do the heavy lifting. If you'd like a better example of hacking in a video game you should check out Uplink: Hacker Elite, which features a lot of techniques that real hackers use to exploit computer system. That way you can feel like the righteous hacker that you always wanted to be... but don't do any real hacking, though; that stuff is illegal.

Sources

Avatar image for rebel_scum
Rebel_Scum

1633

Forum Posts

1

Wiki Points

0

Followers

Reviews: 1

User Lists: 3

This is a good write up and informative but there's not really any real info on how to be a hacker. Stuff like injecting SQL statements into text fields to gather access info for example (apparently that used to work, dunno if it does now).

Avatar image for jhajha
jhajha

82

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

This is a good write up and informative but there's not really any real info on how to be a hacker. Stuff like injecting SQL statements into text fields to gather access info for example (apparently that used to work, dunno if it does now).

I agree with you. :)

Avatar image for michaelenger
michaelenger

143

Forum Posts

2259

Wiki Points

0

Followers

Reviews: 8

User Lists: 0

@rebel_scum: This blog post was about how to be hacker, not particularly about how to hack computer systems. A tongue-in-cheek post about the hacker-less-ness of hacking in video games.

Concerning SQL injections: they are not as easy to pull off anymore as most web development frameworks have built-in functions to combat them (using prepared SQL statements, for example), but if I recall correctly there was an article about a hack consisting of an SQL injection (and some other stuff) not too long ago and the general reaction was "that stuff still works?? lol someone is about to be fired"

Avatar image for ssully
SSully

5753

Forum Posts

315

Wiki Points

0

Followers

Reviews: 0

User Lists: 3

@rebel_scum: This blog post was about how to be hacker, not particularly about how to hack computer systems. A tongue-in-cheek post about the hacker-less-ness of hacking in video games.

Concerning SQL injections: they are not as easy to pull off anymore as most web development frameworks have built-in functions to combat them (using prepared SQL statements, for example), but if I recall correctly there was an article about a hack consisting of an SQL injection (and some other stuff) not too long ago and the general reaction was "that stuff still works?? lol someone is about to be fired"

Most exploits will never be 100% cleared up. There will always be that 1% that doesn't use a framework that provides protection against SQL injection, or a sever that still hasn't been patched to protect against heartbleed.

I will also throw in to anyone in the United States interested in learning more to possibly sign up for cyber aces. I am not sure the requirements or when their next run is, but they offer free online lessons on this stuff. It doesn't get incredibly deep, but it gives you a really good starting point.