ReviewEssays.com - Term Papers, Book Reports, Research Papers and College Essays
Search

Hacking Tools

Essay by   •  November 13, 2010  •  Research Paper  •  3,536 Words (15 Pages)  •  1,696 Views

Essay Preview: Hacking Tools

Report this essay
Page 1 of 15

INTRODUCTION

The word 'hacker' is used in two different but associated

ways: for some, a hacker is merely a computer enthusiast of any kind,

who loves working with the beasties for their own sake, as opposed to

operating them in order to enrich a company or research project --or

to play games.

This book uses the word in a more restricted sense: hacking is a

recreational and educational sport. It consists of attempting to make

unauthorised entry into computers and to explore what is there. The

sport's aims and purposes have been widely misunderstood; most

hackers are not interested in perpetrating massive frauds, modifying

their personal banking, taxation and employee records, or inducing

one world super-power into inadvertently commencing Armageddon in the

mistaken belief that another super-power is about to attack it. Every

hacker I have ever come across has been quite clear about where the

fun lies: it is in developing an understanding of a system and

finally producing the skills and tools to defeat it. In the vast

majority of cases, the process of 'getting in' is much more

satisfying than what is discovered in the protected computer files.

In this respect, the hacker is the direct descendant of the phone

phreaks of fifteen years ago. Phone phreaking became interesting as

intra-nation and international subscriber trunk dialling was

introduced, but when the London-based phreak finally chained his way

through to Hawaii, he usually had no one there to speak to except the

local weather service or American Express office, to confirm that the

desired target had indeed been hit. One of the earliest of the

present generation of hackers, Susan Headley, only 17 when she began

her exploits in California in 1977, chose as her target the local

phone company and, with the information extracted from her hacks, ran

all over the telephone network. She 'retired' four years later, when

friends started developing schemes to shut down part of the phone

system.

There is also a strong affinity with program copy-protection

crunchers. Most commercial software for micros is sold in a form to

prevent obvious casual copying, say by loading a cassette, cartridge

or disk into memory and then executing a 'save' on to a

** Page VII

blank cassette or disk. Copy-protection devices vary greatly in

their methodology and sophistication and there are those who, without

any commercial motive, enjoy nothing so much as defeating them. Every

computer buff has met at least one cruncher with a vast store of

commercial programs, all of which have somehow had the protection

removed--and perhaps the main title subtly altered to show the

cruncher's technical skills--but which are then never actually used

at all.

Perhaps I should tell you what you can reasonably expect from this

handbook. Hacking is an activity like few others: it is semi-legal,

seldom encouraged, and in its full extent so vast that no individual

or group, short of an organisation like GCHQ or NSA, could hope to

grasp a fraction of the possibilities. So this is not one of those

books with titles like Games Programming with the 6502 where, if the

book is any good and if you are any good, you will emerge with some

mastery of the subject-matter. The aim of this book is merely to give

you some grasp of methodology, help you develop the appropriate

attitudes and skills, provide essential background and some

referencing material--and point you in the right directions for more

knowledge. Up to a point, each chapter may be read by itself; I have

compiled extensive appendices, containing material which will be of

use long after the main body of the text has been absorbed.

It is one of the characteristics of hacking anecdotes,

...

...

Download as:   txt (23.3 Kb)   pdf (312.2 Kb)   docx (26.7 Kb)  
Continue for 14 more pages »
Only available on ReviewEssays.com