Dueling Hackers: Difference between revisions

Content added Content deleted
(fixed Wikipedia link, copyedits to new example)
Line 7: Line 7:


Almost no one thinks to simply unplug the target computer from the network because apparently [[Everything Is Online]], always.
Almost no one thinks to simply unplug the target computer from the network because apparently [[Everything Is Online]], always.
{{examples}}


{{examples}}
== Anime & Manga ==
== Anime & Manga ==
* ''[[Mahou Sensei Negima]]'': Chisame versus Chachamaru in the festival arc.
* ''[[Mahou Sensei Negima]]'': Chisame versus Chachamaru in the festival arc.
Line 75: Line 75:


== [[Real Life]] ==
== [[Real Life]] ==
* ''[[wikipedia:The Cuckoochr(27)s Egg (book)|The Cuckoo's Egg]]'' is a first-hand account of real-life Dot Combat from 1986. Clifford Stoll was asked by his supervisor to find the cause of a $0.75 billing anomaly in the accounts; over ten months, he followed the trail from that, to a hacker who was breaching American military networks looking for information on the Nuclear and SDI programs and selling what he stole to the KGB.
* ''[[w:The Cuckoo's Egg|The Cuckoo's Egg]]'' is a first-hand account of real-life Dot Combat from 1986. Clifford Stoll was asked by his supervisor to find the cause of a $0.75 billing anomaly in the accounts; over ten months, he followed the trail from that, to a hacker who was breaching American military networks looking for information on the Nuclear and SDI programs and selling what he stole to the KGB.
** This story is notable for being the first properly documented case of computer hacking due to the fact that Cliff Stoll was an astronomer properly trained in documentation and with the sense of curiosity of a scientist as opposed to a computer person whose response was merely to lock out the user and forget about it (as was generally the case).
** This story is notable for being the first properly documented case of computer hacking due to the fact that Cliff Stoll was an astronomer properly trained in documentation and with the sense of curiosity of a scientist as opposed to a computer person whose response was merely to lock out the user and forget about it (as was generally the case).
* Hackers from Taiwan and China have had actual hacking feuds going on. After all, why not try to hack your countries most likely enemy and get sympathy from your neighbors, rather then making them mad.
* Hackers from Taiwan and China have had actual hacking feuds going on. After all, why not try to hack your countries most likely enemy and get sympathy from your neighbors, rather then making them mad.
* Bletchley Park vs Enigma could count as this in [[World War 2]] though computers as were not invented (or were just being invented depending how you look at it). In any case Bletchley Park was one big stuffy British hacker camp.
* Bletchley Park vs Enigma could count as this in [[World War 2]] though computers as were not invented (or were just being invented depending how you look at it). In any case Bletchley Park was one big stuffy British hacker camp.
* Nations and political factions anywhere from the level of superpowers to the level of terrorist rings regularly keep an arsenal of offensive, defensive, or just Signint (signals intelligence) apps. As well as hacker teams to run them. One of the most famous was the Stuxnet virus which leapfrogged from computer to computer deleting itself in any that did not contain what it's instructions told it to target until it reached it's prey. This happened to be the Iranian nuclear facilities and is generally suspected to have been launched by the US and/or Israeli secret services. It was picked up, tracked, and dissected remarkably soon by white hatters from security companies but by that time it had done what it had been intended to do. In this case the perps and the white hats were each other's [[Worthy Opponent|Worthy Opponents]] kind of by accident and the Iranians were not a player as they got stomped from the get-go.
* Nations and political factions anywhere from the level of superpowers to the level of terrorist rings regularly keep an arsenal of offensive, defensive, or just Signint (signals intelligence) apps. As well as hacker teams to run them. One of the most famous was the Stuxnet virus which leapfrogged from computer to computer deleting itself in any that did not contain what its instructions told it to target until it reached its target. This happened to be the Iranian nuclear facilities. Stuxnet is generally suspected to have been launched by the US and/or Israeli secret services. It was quickly picked up, tracked, and dissected by white hatters from security companies but by that time it had done what it had been intended to do. In this case the perps and the white hats were each other's [[Worthy Opponent]]s kind of by accident and the Iranians were not a player as they got stomped from the get-go.
**The Stuxnet had five Zero-day exploits in it. A Zero day exploit is a bug no one knows about but you. To compare it is like being the Texas Rangers taking revolvers to battle and the Commanche don't know about it yet. Zero-days are normally carefully hoarded or sold to a cyberwarfare [[Arms Dealer]] at high price depending on how good it is. To fire off five of them in one virus means you either have a lot to fire off or you really want to hit your target.
**The Stuxnet had five zero-day exploits in it. A zero-day exploit is a bug no one knows about but you. To compare, it is like being the Texas Rangers taking revolvers to battle and the Commanche don't know about it yet. Zero-days are normally carefully hoarded or sold to a cyberwarfare [[Arms Dealer]] at high price depending on how good they are. To fire off five of them in one virus means you either have a lot to fire off or you really want to hit your target.


{{reflist}}
{{reflist}}