Dueling Hackers: Difference between revisions

added an example, removed excess whitespace
(added an example, removed excess whitespace)
 
(5 intermediate revisions by 3 users not shown)
Line 2:
[[File:dueling hackers 6317.png|link=Bigger Than Cheeses|frame|That's Hollywood. Reality is [[Cut the Juice|simpler]].]]
 
'''Dueling hackersHackers''', combining the excitement of people typing with the thrill of network protocol loopholes being exploited.
 
One hacker is trying to hack into a system, while the other is busily trying to keep him out. Expect the hackers to consider each other to be a [[Worthy Opponent]]. Often mixed with an attempt to back-trace the invading Hacker's source, depicted much like phone backtracing usually is.
 
Almost no one thinks to simply unplug the target computer from the network because apparently [[Everything Is Online]], always.
{{examples}}
 
{{examples}}
== Anime &and Manga ==
* ''[[Mahou Sensei Negima]]'': Chisame versus Chachamaru in the festival arc.
* In ''[[Gakuen Heaven]]'' of all things the vice-presidents of the student council and the treasury are constantly trying to hack each other and keep the other out.
* ''[[Ghost in the Shell]]'' has a few examples.
* Happens in ''[[Cannon God Exaxxion]]'' as both sides run a propaganda war against each other.
* In ''[[Demon Hunters: Dead Camper Lake]]'', two Cyborg Dueling Hackers complete with ominously named programs with skull icons, while sitting face to face at the same table. Eventually, the losing cyborg shrugs, picks up his laptop and clubs his enemy to death.
* A slowed down and scaled up version: The ''[[.hack]]'' plot-lines for the ''Twilight'' manga and anime involve a group of hackers breaking down an [[Massively Multiplayer Online Role Playing Game|MMORPG]] while the game's programmers try and counter the slow infection.
* ''[[Hanaukyo Maid Tai]]''. In episode 8 the Jihiyou family hacks into the MEMOL supercomputer to steal information (and possibly activate the mansion's [[Self-Destruct Mechanism]]). Grace manages to defeat them.
* It's not really made that much of, but this happens between Yatouji Satsuki and Imonoyama Nokoru in ''[[X 1999]]''. She is trying to hack into the computers of CLAMP Campus and he is trying to keep her out. Given that Satsuki is a technopath working in tandem with a supercomputer, the fact that Nokoru actually manages to make it combat instead of a [[Curb Stomp Battle]] is [[Crowning Moment of Awesome|pretty impressive]].
* Happens often enough in ''[[Dennou Coil]]'', since realspace and cyberspace are linked. A particularly heated one happens between Isako and Fumie early on.
* While it wasn't precisely done by hackers (mostly) the ''[[Digimon Adventure]]'' movie with Diablomon featured a fight between the titular villain and the hero 'mons... <small>IN CYBERSPACE</small>.
* A short scene in the second season of ''[[A Certain Scientific Railgun]]'' shows white-hat hacker Uiharu fending off an attempt to gain illegal entry to a system that she set up the protection for (the system is otherwise unremarkable - the crackers are doing it for the bragging rights). She cheers on her opponents.
 
 
== Comic Books ==
* Oracle and [[Evil Counterpart|Calculator]] faced each other online several times in [[Birds of Prey]]. Typically, it was to get the other's location so they could send superhuman agents to arrest/kill each other.
 
 
== Film ==
Line 37 ⟶ 36:
* ''[[Resident Evil (film)|Resident Evil]]''. In the first movie Kaplan has a hacking duel with the Red Queen AI to bypass her defenses.
* [[The Core]] treated Rat's interaction with security systems this way, as though he were dueling with the security programmer. After breaking into DESTINI and shutting it down, "Your kung fu is not strong."
 
 
== [[Literature]] ==
* In ''[[The Hunger Games]]'', Beetee occasionally attempts to hack the Capitol's television network in order to display the rebel's propaganda shorts.
 
== [[Live -Action TV]] ==
 
== Live Action TV ==
* On ''[[Alias (TV series)|Alias]]'' Marshall (the resident Omnidisciplinary Nerd) was in a hacking duel at least once, as someone tried to break into SD6's system.
* ''[[Smallville]]'', as Chloe tries to keep hackers out of Watchtower.
Line 60 ⟶ 57:
* Kind of the point of CSI: Cyber seeing as it focuses on an elite FBI Cyberwar team.
 
== [[Tabletop Games]] ==
 
== Tabletop Games ==
* Can happen in [[Cyberpunk]] games when a hacker tries to break into a computer system guarded by defending programmers. For example, in ''[[Shadowrun]]'' adventures whenever a decker tries to penetrate a system protected by defense deckers.
 
== [[Video Games]] ==
 
== Video Games ==
* According to emails in ''[[Deus Ex: Human Revolution|Deus Ex Human Revolution]]'', Pritchard aka "Nucl3arsnake" got into one of these with Arie van Bruggen aka "Windmill". Pritchard managed to hold his own and would have won if Windmill hadn't discovered Sarif's hidden backdoor access.
 
== [[Web Comics]] ==
 
== Webcomics ==
* A sequence in ''[[Megatokyo]]'' featured this.
* A [[Curb Stomp Battle]] [http://xkcd.com/341/ happened in] ''[[Xkcd]]''.
 
 
== [[Real Life]] ==
* ''[[wikipediaw:The Cuckoochr(27)Cuckoo's Egg (book)|The Cuckoo's Egg]]'' is a first-hand account of real-life Dot Combat from 1986. Clifford Stoll was asked by his supervisor to find the cause of a $0.75 billing anomaly in the accounts; over ten months, he followed the trail from that, to a hacker who was breaching American military networks looking for information on the Nuclear and SDI programs and selling what he stole to the KGB.
** This story is notable for being the first properly documented case of computer hacking due to the fact that Cliff Stoll was an astronomer properly trained in documentation and with the sense of curiosity of a scientist as opposed to a computer person whose response was merely to lock out the user and forget about it (as was generally the case).
* Hackers from Taiwan and China have had actual hacking feuds going on. After all, why not try to hack your countries most likely enemy and get sympathy from your neighbors, rather then making them mad.
* Bletchley Park vs Enigma could count as this in [[World War 2]] though computers as were not invented (or were just being invented depending how you look at it). In any case Bletchley Park was one big stuffy British hacker camp.
* Nations and political factions anywhere from the level of superpowers to the level of terrorist rings regularly keep an arsenal of offensive, defensive, or just Signint (signals intelligence) apps. As well as hacker teams to run them. One of the most famous was the Stuxnet virus which leapfrogged from computer to computer deleting itself in any that did not contain what it'sits instructions told it to target until it reached it'sits preytarget. This happened to be the Iranian nuclear facilities. and Stuxnet is generally suspected to have been launched by the US and/or Israeli secret services. It was quickly picked up, tracked, and dissected remarkably soon by white hatters from security companies but by that time it had done what it had been intended to do. In this case the perps and the white hats were each other's [[Worthy Opponent|Worthy Opponents]]s kind of by accident and the Iranians were not a player as they got stomped from the get-go.
**The Stuxnet had five Zerozero-day exploits in it. A Zero zero-day exploit is a bug no one knows about but you. To compare, it is like being the Texas Rangers taking revolvers to battle and the Commanche don't know about it yet. Zero-days are normally carefully hoarded or sold to a cyberwarfare [[Arms Dealer]] at high price depending on how good itthey isare. To fire off five of them in one virus means you either have a lot to fire off or you really want to hit your target.
**In 1999 the intrusion, Moonlight Maze caused a panic in the US security systems. It was finally caught by a honey pot, that is a bait app, normally only metaphorically related to the [[Honey Trap|more fleshly variety]]. It was the supposed specs of a new stealth plane. The trap had the (new at the time) variation of leaving a signal of the user's address which pointed to Russia. In this case it was a moderately successful intelligence probe rather than a spectacular sabotage like the Stuxnet but it is noticeable by the ingenuity displayed [[Worthy Opponent|by both sides.]]
 
{{reflist}}
[[Category:Narrative Devices{{PAGENAME}}]]
[[Category:Cyberpunk Tropes]]
[[Category:Magical Computer]]
[[Category:{{PAGENAME}}Narrative Devices]]