Automoderated users, Autopatrolled users, Bureaucrats, Comment administrators, Confirmed users, Moderators, Rollbackers, Administrators
214,656
edits
m (fix broken external links) |
(added an example, removed excess whitespace) |
||
(15 intermediate revisions by 7 users not shown) | |||
Line 1:
{{trope}}
[[File:
'''Dueling
One hacker is trying to hack into a system, while the other is busily trying to keep him out. Expect the hackers to consider each other to be a [[Worthy Opponent]]. Often mixed with an attempt to back-trace the invading Hacker's source, depicted much like phone backtracing usually is.
Almost no one thinks to simply unplug the target computer from the network because apparently [[Everything Is Online]], always.
{{examples}}▼
▲{{examples}}
== Anime
* ''[[Mahou Sensei Negima]]'': Chisame versus Chachamaru in the festival arc.
* In ''[[Gakuen Heaven]]'' of all things the vice-presidents of the student council and the treasury are constantly trying to hack each other and keep the other out.
* ''[[Ghost in
* Happens in ''[[Cannon God Exaxxion]]'' as both sides run a propaganda war against each other.
* In ''[[Demon Hunters: Dead Camper Lake]]'', two Cyborg
* A slowed down and scaled up version: The ''[[.hack]]'' plot-lines for the ''Twilight'' manga and anime involve a group of hackers breaking down an [[Massively Multiplayer Online Role Playing Game|MMORPG]] while the game's programmers try and counter the slow infection.
* ''[[
* It's not really made that much of, but this happens between Yatouji Satsuki and Imonoyama Nokoru in ''[[X 1999]]''. She is trying to hack into the computers of CLAMP Campus and he is trying to keep her out. Given that Satsuki is a technopath working in tandem with a supercomputer, the fact that Nokoru actually manages to make it combat instead of a [[Curb Stomp Battle]] is [[Crowning Moment of Awesome|pretty impressive]].
* Happens often enough in ''[[Dennou Coil]]'', since realspace and cyberspace are linked. A particularly heated one happens between Isako and Fumie early on.
* While it wasn't precisely done by hackers (mostly) the ''[[Digimon Adventure]]'' movie with Diablomon featured a fight between the titular villain and the hero 'mons... <small>IN CYBERSPACE</small>.
* A short scene in the second season of ''[[A Certain Scientific Railgun]]'' shows white-hat hacker Uiharu fending off an attempt to gain illegal entry to a system that she set up the protection for (the system is otherwise unremarkable - the crackers are doing it for the bragging rights). She cheers on her opponents.
== Comic Books ==
* Oracle and [[Evil Counterpart|Calculator]] faced each other online several times in [[Birds of Prey]]. Typically, it was to get the other's location so they could send superhuman agents to arrest/kill each other.
== Film ==
Line 30 ⟶ 29:
* Part of the climax of ''[[Hackers]]''.
** Also the scene where Dade tries to take over the TV studio. In reality, it's two robot arms trading a videotape. In Hollywood it's two titans meeting on the battlefield, if the kung fu clips interspersed with the robot arms and neat visual effects surrounding Dade's head are supposed to mean anything.
* [[James Bond]], ''[[
** The backtracing map is trivial to implement (traceroute, GeoIP, Google Maps, whatever takes your fancy), its just that fancy [[Viewer
** Also, [[Playful Hacker|Boris]] kills time by hacking into Western computers and taunting his opponents as they try to thwart him.
*** He even thinks of unplugging his computer in the end, when he gets hacked back. He doesn't just pull the cable out though, but rips out whole racks of gear and throws them on the floor.
* In ''Demon Hunters: Dead Camper Lake'', two Cyborg
* ''[[Resident Evil (
* [[The Core]] treated Rat's interaction with security systems this way, as though he were dueling with the security programmer. After breaking into DESTINI and shutting it down, "Your kung fu is not strong."
== [[Literature]] ==
* In ''[[The Hunger Games]]'', Beetee occasionally attempts to hack the Capitol's television network in order to display the rebel's propaganda shorts.
* On ''[[Alias (TV series)|Alias]]'' Marshall (the resident Omnidisciplinary Nerd) was in a hacking duel at least once, as someone tried to break into SD6's system.▼
▲== Live Action TV ==
▲* On ''[[Alias (TV)|Alias]]'' Marshall (the resident Omnidisciplinary Nerd) was in a hacking duel at least once, as someone tried to break into SD6's system.
* Hardison on ''[[
▲* ''[[Smallville (TV)|Smallville]]'', as Chloe tries to keep hackers out of Watchtower.
▲* Hardison on ''[[Leverage (TV)|Leverage]]'' got into one of these in "The Two Live Crew Job". Bonus points for the fact that the antagonist is played by [[Wil Wheaton]].
▲{{quote| '''Hardison''': Chaos. I heard you were in jail. Guess I was wrong.<br />
'''Chaos''': Alec Hardison. [[Lame Comeback|I heard you sucked]]. Guess I was right. }}
* On ''[[
** It also happened once when Garcia '''lost''' and was out of commission all day while she ripped apart her computer (physically) to get it running again.
* Used quite often in ''[[
** In fairness, the reason they can't typically do that is because they need that computer online to do [[Fridge Logic|whatever they were doing on it in the first place]]. Especially since it's frequently time-sensitive.
*** Subverted when Gibbs unplugs the computer just as McGee and Abby are about to lose the computer.
* Kyle and Jessi do this in a second-season episode of ''[[Kyle XY]]''.
* A legendary duel occurs early in Season 7 of ''[[
* During the Chairman arc of ''[[Walker, Texas Ranger]]'', at one point the hacker working for the [[Big Bad]] and the one on Walker's team (who have some prior history between them) get into a duel while trying to crash Walker's plane and trying to save it respectively.
* In "[[Chuck]] Versus the Hack-Off", Chuck has to participate in the episode's titular "hack-off" (a competition where hackers have to outduel their competition) in order to get some dirt on the villain of the week.
* Kind of the point of CSI: Cyber seeing as it focuses on an elite FBI Cyberwar team.
== [[Tabletop Games]] ==▼
▲== Tabletop Games ==
* Can happen in [[Cyberpunk]] games when a hacker tries to break into a computer system guarded by defending programmers. For example, in ''[[Shadowrun]]'' adventures whenever a decker tries to penetrate a system protected by defense deckers.
== [[Video Games]] ==
* According to emails in ''[[Deus Ex: Human Revolution
==
▲* According to emails in ''[[Deus Ex Human Revolution (Video Game)|Deus Ex Human Revolution]]'', Pritchard aka "Nucl3arsnake" got into one of these with Arie van Bruggen aka "Windmill". Pritchard managed to hold his own and would have won if Windmill hadn't discovered Sarif's hidden backdoor access.
* A sequence in ''[[Megatokyo]]'' featured this.
* A [[Curb Stomp Battle]] [http://xkcd.com/341/ happened in] ''[[
== [[Real Life]] ==
* ''[
** This story is notable for being the first properly documented case of computer hacking due to the fact that Cliff Stoll was an astronomer properly trained in documentation and with the sense of curiosity of a scientist as opposed to a computer person whose response was merely to lock out the user and forget about it (as was generally the case).
* Hackers from Taiwan and China have had actual hacking feuds going on. After all, why not try to hack your countries most likely enemy and get sympathy from your neighbors, rather then making them mad.
* Bletchley Park vs Enigma could count as this in [[World War 2]] though computers as were not invented (or were just being invented depending how you look at it). In any case Bletchley Park was one big stuffy British hacker camp.
* Nations and political factions anywhere from the level of superpowers to the level of terrorist rings regularly keep an arsenal of offensive, defensive, or just Signint (signals intelligence) apps. As well as hacker teams to run them. One of the most famous was the Stuxnet virus which leapfrogged from computer to computer deleting itself in any that did not contain what its instructions told it to target until it reached its target. This happened to be the Iranian nuclear facilities. Stuxnet is generally suspected to have been launched by the US and/or Israeli secret services. It was quickly picked up, tracked, and dissected by white hatters from security companies but by that time it had done what it had been intended to do. In this case the perps and the white hats were each other's [[Worthy Opponent]]s kind of by accident and the Iranians were not a player as they got stomped from the get-go.
**The Stuxnet had five zero-day exploits in it. A zero-day exploit is a bug no one knows about but you. To compare, it is like being the Texas Rangers taking revolvers to battle and the Commanche don't know about it yet. Zero-days are normally carefully hoarded or sold to a cyberwarfare [[Arms Dealer]] at high price depending on how good they are. To fire off five of them in one virus means you either have a lot to fire off or you really want to hit your target.
**In 1999 the intrusion, Moonlight Maze caused a panic in the US security systems. It was finally caught by a honey pot, that is a bait app, normally only metaphorically related to the [[Honey Trap|more fleshly variety]]. It was the supposed specs of a new stealth plane. The trap had the (new at the time) variation of leaving a signal of the user's address which pointed to Russia. In this case it was a moderately successful intelligence probe rather than a spectacular sabotage like the Stuxnet but it is noticeable by the ingenuity displayed [[Worthy Opponent|by both sides.]]
{{reflist}}
[[Category:
[[Category:Cyberpunk Tropes]]
[[Category:Magical Computer]]
[[Category:
|