A good friend of mine likes to repeat the phrase: “A hacker is not the one who breaks, but the one who studies”!
I will talk a little about the evolution of hackers. I warn you at once: “literally many”, they will not master everything.
Who are these scary hackers? This word originated in the 60s. Then there were no computers in our understanding, but the craze for radio electronics began. Many talented engineers (not by profession, but in life) discovered the boundless world of creativity. The name of this world is ELECTRONICS. With the help of a coil of wire and a handful of cheap parts, you can assemble a Tesla generator and surprise your friends at parties with fancy lightning. And you can collect the simplest receiver and listen to conversations and music from the other end of the planet. In the eyes of those around them, radio amateurs (and radio killers) have become such wizards. Only their magic can comprehend and repeat each, it is enough to open a textbook and spend a few days or weeks following it. In the film "Babylon 5" was a chic name - technomage. It was these people who began to be called hackers. They do not know anything supernatural, but they are doing just such things. The boom of radio electronics began to subside with the advancement of personal computers to the masses (in the mid-90s), and with it the concept of “hacker” began to fade.
But, like a phoenix from fire, it was revived in a new guise, represented by computer specialists. Computers are now perceived by most people as a box for accessing the Internet, searching for porn and for playing games. For a hacker, however, a computer is much more. This is his best friend or girlfriend, to whom he gives a name and sometimes even talks to him. They are not schizophrenics, just a computer for them is akin to a dog or a hamster, for which they care. Also, the computer is its library, where, with a skillful search, you can find almost any knowledge. This is his battlefield, where he storms the "castles and bastions" of the defense systems of various servers. It "breaks" other people's systems not to prank or to vandalize. He is interested in the process of penetration, it is for him akin to the most interesting crossword or puzzle. This is his world. In it, he “walks” where he wants and any protection means a fence in the park, which can be climbed if it interferes with the walk. Here is a curious wiki definition:
1. A person who loves exploring the details (details) of programmable systems, exploring the issue of increasing their capabilities, as opposed to most users, who prefer to limit themselves to studying the necessary minimum. RFC 1392 reinforces this definition as follows: “A person enjoying a thorough understanding of the internal actions of systems, computers, and computer networks in particular.”
2. Someone programming enthusiastically (even obsessively), or loving to program, and not just to theorize about programming.
3. A person capable of appreciating and understanding hacker values.
4. A person who is strong in fast programming.
5. An expert in relation to a particular computer program, or someone often working with it; example: "Unix hacker". (The definitions from the first to the fifth are interrelated, so that one person may fall under several of them.)
6. An expert or enthusiast of any kind. Someone might be considered an “astronomy hacker,” for example.
7. Someone who loves intellectual tests, consisting in creative overcoming or circumventing restrictions.
8. Highly professional and curious programmer (administrator or others) characterized by original thinking.
')
Everything is clear, except for paragraph 3. And what are the values for a hacker? Many different definitions can be found, but the main values are freedom! Freedom of movement, freedom of information, freedom of reason from the framework of society, freedom, freedom, freedom! Hacker not only must have a huge technical data. A hacker is a state of mind and a certain mindset. To understand hackers, you need to read and ponder on each line of the "hacker manifesto", which was written back in the 90s and which very clearly reflects the values and thoughts of hackers. The manifesto itself:
Another one caught today, it's in all the newspapers. "A teenager is arrested for a computer crime", "A hacker is arrested for breaking a bank."
Damn children ... They are all the same.
But you, with your three-element psychology and the techno-brain of the 50s, did you ever look into the eyes of a hacker? Have you ever wondered what makes him move, what forces have shaped him?
I am a hacker, enter my world ...
My world begins at school. I am smarter than most other children, the nonsense that we are taught in school is boring.
Damn stupid ... They are all the same.
I'm in middle or high school. I listen to the teacher, who for the fifteenth time explains how to reduce the fraction. Yes, I understand already. “No, Miss Smith, I will not show you my work. I did it in my mind ... "
Damn child, probably wrote off. They are all the same.
Today I made a discovery. I opened the computer. Just a second ... it's great! He does what I want. If he makes a mistake, it's because I screwed it up. Not because he does not like me ... Or he is intimidated by me ... Or thinks that I am too clever ... Or does not like to study and should not be here ...
Damn boy. All he does is play games. They are all the same.
And it happened ... the door to the world opened wide ... the sent electronic impulse rushed along the telephone lines, like heroin through the veins of a drug addict, a refuge from everyday incompetence was found. "This is it ... What I belong to" I know everyone here ... even if I have never met him, never spoke to him, and I can never hear him again ... I know all of you ...
Damn kid, again takes the phone line. They are all the same.
You are ready to swear with your ass that we are all the same. At school, we were all fed baby food from a spoon, at a time when we wanted a steak ... Those pieces of meat that we got, were chewed and tasteless. We were dominated by sadists and ignored by the indifferent. Those few who could teach something, found in us the desired students, but they were like drops of water in the desert.
Now this is our world ... The world of electrons and switches, the world of beauty data. We use existing systems without paying for what could be pretty darn cheap if it weren't ruled by dirty speculators, and you call us criminals. We investigate, and you call us criminals. We are looking for knowledge ... and you call us criminals. We exist without color, without nationality, without religious strife ... and you call us criminals. You build atomic bombs, you start wars, kill, cheat and lie to us, trying to make us believe that all this is for our own good, and we are already criminals.
Yes, I am a criminal. My crime is curiosity. My crime is that I judge people not by what they look like, but by what they say and think. My crime is that I am much smarter than you. This is something you will never forgive me.
I'm a hacker. And this is my manifesto. You can stop me, but you can't stop us all ... after all, we are all the same.
Did you feel the unfamiliar smell of a parallel world where hackers live? You are standing next to the door to this world and you can enter it only when your main value is not money, but FREEDOM! When I listen to Kipelov's song “I am free”, I have goosebumps running around. This song is a real hacker anthem.
Now a little about the evolution of the hacker movement. In the mid-90s, when the computers were large and the programs were small, the Internet was very young and very young. After watching the cult film “hackers” with friends, we gathered a group of good computer specialists and began to comprehend this new world. I was the organizer, the ideological inspirer and the main driving force of our hacker group. I had an "underground" nickname Technorat - technocrats. As you know, a rat is a very intelligent animal that can crawl anywhere. This nickname also symbolized that I could penetrate into any technogenic system. Diving into the world of the hacker underground was exciting. New knowledge, new acquaintances, new technologies, new music. It was a different world. Living among “ordinary” people, we felt ourselves living simultaneously in two different universes. They even had their own symbols of belonging to the hacker world. For example, in English, the ending "-s", which means the plural, is replaced by "-z". It turns out "filez", "warez", "computerz". The use of individual numbers as letters, which degenerated after a dozen years into distorting the inscriptions in CS. For example: the digit "1" = "l", "3" = "e", "7" = "t". The inscription "31337" meant the word "eleet" and symbolized belonging to the hacker elite.
We "broke" servers around the world. Moreover, the site about cats or flowers was more interesting for us than the Pentagon’s most secret server (I’ll say right away, we didn’t climb there) if there was a more interesting protection system. What did we then do with the hacked server? And nothing! Once, the actions of a Krivoruka member of one of our members led to a server crash, for which he received the same message from us. Foreign servers entered and forgot about them, as a past stage. If the server was Russian, then they sent a letter to the admin with a description of how to hack his server. Usually such letters remained unanswered, but even thanked them a couple of times. One administrator even asked to check his server “for strength” once again after eliminating the gaps.
Because the Internet was very expensive and not everyone could afford it, many of our team had to crack providers and steal passwords. I found the vulnerability of two providers in our city and the guys started to get impudent, stealing Internet watches with impunity. My recommendations to be careful did not lead to anything. After some time, part of the team began selling "Internet-unlim". This meant that for $ 80 (at a price of $ 2.5 per hour), they gave the person a dozen other people's passwords. If the provider covered these passwords until the end of the month, another 10 were issued to the person. My request and the requirement of a part of our team to stop this outrage, split our team. A few months later, “Fraera’s greed was killed” and a part of our group was put in prison, and some innocent members of the team were also imprisoned. The others stopped communicating with each other and the group disappeared. Greed and thirst for money - this is the main opponent of the movement itself and the spirit of hacking.
In the late 90s, there was the heyday of the hacker movement, the hacker culture. Then a large number of “pioneers” and crooks appeared who, from the elite of IT specialists, turned hackers into ordinary criminals in the eyes of society. Gradually, the hacker movement stratified, transformed, and at the moment is a motley collection of computer scientists of various stripes. At the moment, there are several types of groups:
1. Phreakers. These are electronic engineers, usually engaged in "bugs", telephony and other electronics. By and large - this is the descendants of the first radio amateurs. There are “right” and “wrong”, or “good” and “bad”. "Good" are engaged in the study of various systems (anti-theft, telephone, etc.) just for fun. The "bad" are interested in the same only for the purpose of making a profit. They collect “bugs” and sell to those who wish, what the “right” fricker will not allow itself. The “right” fricker will study the electronic travel system and, in the worst case, he himself will ride the subway for free, while the “wrong” one will put the production and sale of cards as the goal of his business.
2. Carders. This word means all those who steal money from debit and credit cards. The attitude of the rest of the hacker community to them is frankly negative, as contrary to the very name “hacker”. Carders are professional and amateurs. Professional carders invent various screamers, ways to intercept card data, hack payment systems and databases of banks and stores to steal data, print duplicate cards and cash them. Although a big mind in this matter is not required, it is enough the right organization. If you have enough money, you can buy databases of card data stolen by others right on the card forums. Depending on the amounts on the cards, their value may vary within very wide limits. Usually "wholesale" cards are sold at a price of 5-20 dollars apiece. It’s very difficult to get into serious Carder forums where there is no “kidalov” and most likely no “sent Cossacks”. This usually requires a personal recommendation of someone from the members or elders of the forum and often the cost of the "entrance ticket" is 1-5 thousand dollars. Some carders are engaged only in hacking various databases with the subsequent resale of information. It is the safest, though less profitable. Others buy card data and cash out. Cashing is the most dangerous moment, because during the cash withdrawal, they usually take “white hands”. If you made a duplicate card, then during cash withdrawal at an ATM, you "shine" your face. In different banks, each ATM is equipped with from one to 3 !!! cameras. Even if attracted drunk, student or homeless for direct contact with an ATM, you still risk. When the police "take" the executor, then according to his words, they will draw an identikit of the one who gave the task and in some years will unleash the whole chain. Others cash money by buying various products in online stores. Goods are sent to a rented apartment, where a dispatcher girl is sitting, and a courier student takes all the incoming goods once a day and refers them to a reseller. In the end, take the girl-dispatcher or reseller, and again spun the whole group. Still others use the services of reputable resellers. In any country that does not cooperate with interpol, there lives a person who sells a product and sends carder 30-50% of the value of the goods. There are a great many cashing and laundering schemes, but this is usually one of the types of earnings of organized crime.
3. Crackers, crackers, crackers. These people are engaged in hacking protection of various programs. Some, such as the famous hacker, cracker and IT expert named Chris Kaspersky, hack into programs just for personal use or to learn interesting protection. Moreover, they can then thank the author in writing for the pleasure he has delivered in breaking into such an interesting protection algorithm and BUY THE LICENSE COPY of the program as an incentive to the author. Others (let's call them wrong) crackers put on a stream of hacking programs. This is usually done for the sale of "cracks" or as an advertisement for your hacker group. The attitude towards crackers in the hacker environment is ambiguous and depends on the cracker motives.
4. Script Kiddies. This is a huge population of blunt lamers who, as childish pranks, are engaged in massive deface of sites. Because they do not have enough of their knowledge to crack a serious security system, then they sit on hacker sites and forums in order to find or solicit a 0-day or private exploit. When this gets into their hands, through Google there is a huge number of sites with the engine, under which the exploit was written. Then comes the dumb consistent deface of dozens and hundreds of sites until you get bored. Scripts at the dips sometimes get together in pseudo-hacker groups, a prerequisite for the existence of which is bad-mouthing of the same groups and “measuring them with pussies” according to the number of sites that are identified. On the part of the hacker community, such groups deserve only contempt, more than a teenager writing a sacramental three-letter inscription on the fence.
5. Directly hackers, elite. They are divided into 2 main groups: “Black Hat” and “White Hat”. The first is the elite with anarchic views. They believe that the study is possible with any purpose and do not limit themselves to any framework. Hacking servers can carry out for the purpose of narcissism, deface, expansion of a botnet, for commercial purposes. They recognize only complete freedom without any moral restrictions. "The latter defend the ideals of real hackers and fight to ensure that the bright notion of the IT technology elite is not confused with cybercriminals. Having hacked the server, they write a letter to the administrator describing the vulnerability and if they know, they suggest the way If an error is found in the software, then the software company authoring the program is notified. In order not to hurt the server from the vulnerability and the company managed to release a patch to the program, hackers wait a month before publishing vulnerability on security sites. At the request of the company, the nondisclosure period can be extended for the timely release and distribution of the patch. Also, “White Hat” is often employed by security auditors at the request of the company. Some “fundamentalists” and orthodox supporters of hacker ideals protest against awarding in this case, although most hackers find this quite acceptable.
You can select several more groups or divide along other grounds, but the main motto of the PRESENT hackers remains the same: “a hacker is not the one who breaks, but the one who studies”.
PS I warn in advance possible questions. I have not been doing this for a long time, although I have never stopped following the topic. Now I work as an admin in a very large and serious office. Therefore, do not even bother with requests to break anything, I will not undertake any money. I respect the Criminal Code and the division "K" does not sleep.