VIRTUALITY COMMUNITY - HACKERS by Charles Zepp
Dr. Wood
Sociology and the Internet – Spring 1999
The popular definition of a hacker has a negative
connotation in today’s society, but computer hackers aren’t criminals by
their definition of the word. Their definition deals with how someone
approaches an activity in life, not just when dealing with computers.
Hackers feel a certain depth of commitment and an enhanced level of
excitement at hacking a system. Hacking basically means learning all there
is to know about a system, becoming immersed in the system to the point of
distraction, and being able to fix the system if it breaks.
Hackers basically want to know how a system they find
interesting works. Most are not interested in making money or seeking
revenge, although certain hackers do cross that line to become what the
hacker community calls crackers. Computer hackers become outraged when
they are compared with these vandals and criminals the popular media now
calls hackers (instead of crackers). For the sake of this paper I am going
to be focusing on crackers, as that was the group that I studied, and I
will also be referring to them as hackers. Hopefully this paper will give
you a little more insight on what the hacker/cracker community is all
about.
Most of the hackers (I would estimate over 90%) on the
Internet are not malicious. Most of the time when a hacker gains access to
a system they will just leave a little sign that they were there and leave
things pretty much the same as before they were there. This can be in the
form of a web page, a small file saying they were there, or maybe even
some type of executable file (such as one that pops up everytime a person
logs on to a system that displays some message the hacker wrote). To this
group, hacking is kind of like a sport, where each hack is sort of like a
trophy. They try to gain access to the biggest or the most systems just
like a trophy game hunter. The rest of the hackers tend to be malicious
and hack in order to gain access to data they normally wouldn’t have,
destroy data, and to try and bring down a system or a network. These are
the hackers that you usually read or hear about in the news.
Probably the most sacred thing to a hacker is his or her
anonymity. A person can remain unknown on the Internet with hardly any
effort at all, so this makes the perfect home for hackers. Many hackers to
come up with their own nicknames so that they have some way to lay claim
to their exploits. The worst thing that could happen to a hacker is for
the real world identity to be found out. This would be comparable to a
person on the run from the law being found out by the authorities.
[ Top ]
The hacker community primarily exists over the Internet
because the Internet is the most convenient way for them to gather and
exchange information. One of the largest sources of hacking information is
Usenet. The largest and most extensive newsgroup on hacking would have to
be alt.2600.hackers. This group gets hundreds of posts daily and gets
posts about every aspect of hacking. This newsgroup is also where many
hackers go to brag about their hacks and other accomplishments. If a
hacker needed to find out the latest utility that was available for
finding out other users passwords, they could read the postings in this
group and probably find it.
Usenet is not the only way to get the latest hacking
hints and tricks. The most convenient would probably be the World Wide
Web. One of the most extensive web sites around showing most of the latest
hacking exploits around for every major operating system and network
packages is at http://www.technotronic.com/. This
site was designed for system administrators and security programmers so
that they could be made aware of what methods hackers were using. This
site gives the fix on how to prevent the hacks. The site not only has all
of the patches to the hacks, but it also has the actual code for the
actual hacks themselves. Since not every system administrator has the time
to keep their system completely up to date, they are leaving the door wide
open to hackers. All a hacker would have to do is simply get one of the
hacks off of this site and then test it out on different systems until
they find one that isn’t protected.
The are hundreds and hundreds of web sites devoted to
hacking. A person could go to any popular search engine, type in hacking
and come up with a list of invaluable hacking web sites. As a matter of
fact there are even search engines that are strictly devoted to hacking
such as http://astalavista.box.sk/ and http://www.kaboo.123hostme.com/hackme/mattindex.HTM.
There is also a site devoted to tracking and showing off many hacker
exploits. The site is http://www.antionline.com/ and they
specialize in capturing what system was hacked, by whom, and they also
show you the actual hack itself.
Another way that hackers use the Internet to communicate
with each other is through chat rooms using Internet Relay Chat (IRC). The
are hundreds of chat rooms devoted to hacking on the three main IRC
networks (Dalnet, Efnet, and Undernet) and countless others on the smaller
chat networks. In these chat rooms hackers can simply ask someone how to
do something and get almost instant feedback, instead of having to search
the web or reading through newsgroups.
Hackers tend to work alone but sometimes they team up to
form a group. Usually the groups say that they are fighting a worthy cause
and sometimes they do it just to spite another group. A few groups stand
out as elite, as they have done some of the biggest hacks around. Hacking
for girliez (H4gls) is most known for their hack of Yahoo.com, but has
also hacked other sites including: greenpeace.org, slashdot.org,
rootshell.com, www.hq.nasa.gov, and nytimes.com. A few other famous
hacking groups are the Masters of Download (M0D) and the Lordz of Download
(L0D).
Many of these hacking groups rally around the fight to
free Kevin Mitnick. Kevin Mitnick was a solo hacker who was able to hack
into what was believed to some of the most secure sites out there. He was
even able to hack his way into Motorola’s security expert’s personal
computer and leave him a little "I was here" message. He was eventually
caught and put in jail where he is now in pretrial detention without bail,
a bail hearing, and without having been convicted for over four years. The
government has finally set a sentencing hearing date for this summer.
Meanwhile hackers around the world tirelessly fight for his freedom,
looking up to Kevin as the hacking pioneer. Many hackers put the following
banner on all over their webpages, and it is linked to the Kevin Mitnick
web page.
[ Top ]
Some hackers specialize in creating computer viruses that
are designed to wreak havoc on the end users’ computer, rather than the
servers. These viruses can be distributed in many ways. Most commonly they
are attached to an email, or in a downloadable file that is available on
the Internet. These viruses usually try to erase system files on a
computer and render it useless. One of the latest viruses to be in the
news was the Melissa Virus. This virus was developed to run on the end
users’ computer, but it was designed to crash the email servers by
flooding them with more emails then they could handle.
Other hackers specialize in "cracking" commercial
software packages and making them freely available on the Internet as
"warez". I would estimate that at least 80% of all commercial software
packages have been cracked and can be downloaded for free. Software
companies are fighting a never ending battle to stop the free distribution
of their software so the website they are posted to are usually shut down
pretty fast. One of the most popular warez site on the web is http://www.liquidwarez.com/ and
they provide links to these temporary sites. These "warez" are also
distributed via IRC. The names of the chat rooms are always changing, but
they are easy to find just by looking for rooms with the string "warez" in
it.
Hackers definitely do form an online community. Everyone,
from the largest computer companies, down to the novice computer user
knows their presence. All computer users generally fear hackers even
though most of them are not out to do any harm. But the ones that do end
up being malicious, usually do enough damage do strike fear into
everybody’s mind. There are a few simple rules one can follow to protect
yourself from some of the hacker’s devious plot. The biggest thing the end
user can do is to always have a virus program running and to keep it up to
date. Another big thing is to never download anything from an untrusted
source, or to open an email attachment from an untrusted sender. There is
no 100% way to safeguard yourself from hackers because they are always new
hacks coming out.
alt.hacking
alt.2600.hacking
http://technotronic.com/
http://cert.net/
http://antionline.com/
http://astalavista.box.su/
http://www.kaboo.123hostme.com/hackme/mattindex.HTM
http://www.liquidwarez.com/
http://www.kevinmitnick.com/
http://www.mcaffee.com/
http://iclebox.secretinfo.com/
http://www.sotmesc.org/gcms/hackbb/wwwboard.html
http://www.hackers.com/
http://www.2600.com/
http://www.discovery.com/area/technology/hackers/crunch.html
http://hoshi.cic.sfu.ca/~guay/Paradigm/Hacker.html
[ Top ]
|