1. g_man526

    g_man526 Member

    Joined:
    Aug 29, 2011
    Messages:
    90
    Likes Received:
    5

    Hacking and hacking terminology

    Discussion in 'Research' started by g_man526, Apr 20, 2013.

    I know nearly nothing about computers, and definitely less than I did when I had a Windows. I'm writing a scene in which a college age comp-sci student is hacking into a corporate database. Anything I should know jumping into this?
     
  2. erebh

    erebh Banned Contributor

    Joined:
    Jan 12, 2013
    Messages:
    2,642
    Likes Received:
    481
    Location:
    Los Angeles
    hey g_man - theres a member here who spent time in prison for his hacking activities, you might want to find him. I think his post was entitled "Writing my first novel through my own personal experiences" or something like that - good luck!
     
  3. g_man526

    g_man526 Member

    Joined:
    Aug 29, 2011
    Messages:
    90
    Likes Received:
    5
    Thank you! Do you happen to recall his username?
     
  4. erebh

    erebh Banned Contributor

    Joined:
    Jan 12, 2013
    Messages:
    2,642
    Likes Received:
    481
    Location:
    Los Angeles
    thegeek rings a bell
     
  5. g_man526

    g_man526 Member

    Joined:
    Aug 29, 2011
    Messages:
    90
    Likes Received:
    5
    Yep, found him. Thank you!
     
  6. TimHarris

    TimHarris Member

    Joined:
    Oct 11, 2012
    Messages:
    172
    Likes Received:
    5
    Location:
    Oslo, Norway
    You can have a look at the movie Takedown (2000) to get some ideas about what hacking is about. It's far from accurate, but I think it captures the essence pretty well, that it's mostly about exploring what is possible rather than deliberately trying to access and steal information.
     
  7. g_man526

    g_man526 Member

    Joined:
    Aug 29, 2011
    Messages:
    90
    Likes Received:
    5
    Thanks, I'll look into that. Yeah, the character isn't *looking* for something; she happens upon something by accident and with curiosity piqued, decides to take a peek.
     
  8. TechnoGoth

    TechnoGoth New Member

    Joined:
    Apr 15, 2013
    Messages:
    28
    Likes Received:
    5
    Location:
    Chester, Cheshire, United Kingdom
    Having studied comp sci and worked in an it for many years I can say that real hacking is dull and most of it is done via off the shelf kits.
    Hacking a corporate database from outside isn't easy. But one way that security analysts are always warning about are social engineering based attacks. The idea is to get into the building or get someone to load software directly onto a computer. For example you leave a usb key or cd labeled "confidential employee salary reviews" for someone to find. When they put it into a computer it deploys software that allows you harvest data or gain remote access to the machine.

    Maybe your hacker likes to go to the bars where executives go to drink. A little flirting, some slight of hand and she slips the prepared usb stick into their pockets and then later on when he connects it to his laptop she gains back door access.

    Also a database probably isn't what you want in terms of interesting areas. They are useful for criminals and people looking to steal data but I'm guessing you want confidential files.
     
  9. GingerCoffee

    GingerCoffee Web Surfer Girl Contributor

    Joined:
    Mar 3, 2013
    Messages:
    18,385
    Likes Received:
    7,080
    Location:
    Ralph's side of the island.
  10. g_man526

    g_man526 Member

    Joined:
    Aug 29, 2011
    Messages:
    90
    Likes Received:
    5
    Thank you! I'm not going to confirm or deny that last bit as I don't want to give the game away, but if I may ask, what kind of work did you do in comp sci? I imagine that information will also be massively useful for my character.
     
  11. TechnoGoth

    TechnoGoth New Member

    Joined:
    Apr 15, 2013
    Messages:
    28
    Likes Received:
    5
    Location:
    Chester, Cheshire, United Kingdom
    Well IT is a massive field and there are many different parts. I've done host of jobs.

    -Programming back end systems
    -Business Analysis
    -Managing Off shore teams
    -Designing Data Mining and Data Warehousing systems.
    -App Development

    I've worked on multi-million pound projects with teams of over two dozen people that after a year of work were completely scrapped because they weren't going to do what the business wanted.
    I've worked on projects that had the potential to do really cool things with customer data.

    Ever hear of smart meters? They report your energy usage in real time to the supplier. Well with the right data model and a well designed data mining systems they can input your address and find out what your working hours are, when you run the washing machine, even if you have air conditioning. I didn't work on that system but I have worked on similar types of things in other areas.
     
  12. g_man526

    g_man526 Member

    Joined:
    Aug 29, 2011
    Messages:
    90
    Likes Received:
    5
    Hmm...I think I can give the game away for this, but I would love to know if such an occupation as what I'm about to describe exists (it would really help with this character).

    This character emerged out of conceiving of the scene I've described above. She's a comp-sci major at a private (American-style) uni, set to graduate in a few months. She wants to work creating adaptive computer security systems, and she hacks into these corporate confidential files not to obtain any specific information, but she feels like she has to say that she can; if she wants to keep someone out, she has to be the best at getting in. The best analogy I can come up with comes from the movie Inception, in which Ken Watanabe's character asks Leo DiCaprio's how he can be protected against the best extractor: "Because I am the best extractor."

    Unfortunately she succeeds, and then the story begins in earnest.
     
  13. TechnoGoth

    TechnoGoth New Member

    Joined:
    Apr 15, 2013
    Messages:
    28
    Likes Received:
    5
    Location:
    Chester, Cheshire, United Kingdom
    Sure what you're talking about is often called a white hat hacker or a security analyst. They tend to specialize in penetration testing, which is when a company hires the firm to test their security by trying to break into their systems. They tend provided comprehensive reports on their findings. The area you'll want to read up on is InfoSec (Information Security).

    Although Adaptive Security systems doesn't really mean anything.
     
  14. g_man526

    g_man526 Member

    Joined:
    Aug 29, 2011
    Messages:
    90
    Likes Received:
    5
    Oh yeah, that latter bit was just my noobish way of describing someone who can then use their white hat findings to program a security system that is adaptive, unless that doesn't exist.

    And thank you so much for all of this, this is really helping me.
     
  15. T.Trian

    T.Trian Overly Pompous Bastard Supporter Contributor

    Joined:
    Mar 12, 2013
    Messages:
    2,253
    Likes Received:
    1,470
    Location:
    Mushroom Land
    That's what I've gathered. I'm fairly illiterate when it comes to computers, but luckily a friend of mine is a pro and knows a fair deal about hacking. I, too, have a hacker in one story (specializing in the illegal stuff), and it truly is a daunting project to write the character without sinking to Hollywood-level silliness. Then again, I'll learn a great deal about a world that has always interested me, but which I have never explored for the very reason that the subject is so advanced for regular dumbasses like yours truly.
     
  16. chicagoliz

    chicagoliz Contributor Contributor

    Joined:
    May 30, 2012
    Messages:
    3,280
    Likes Received:
    817
    Location:
    Pennsylvania
    Have you looked into all the books/movies/articles by and about Kevin Mitnick? I'd think they would give you quite a bit of info and insight into this world.
     
  17. T.Trian

    T.Trian Overly Pompous Bastard Supporter Contributor

    Joined:
    Mar 12, 2013
    Messages:
    2,253
    Likes Received:
    1,470
    Location:
    Mushroom Land
    Thanks for the heads up! Definitely some useful stuff, added his books to my already far too long to-be-bought -list.
     
  18. Cogito

    Cogito Former Mod, Retired Supporter Contributor

    Joined:
    May 19, 2007
    Messages:
    36,161
    Likes Received:
    2,828
    Location:
    Massachusetts, USA
    I wonder if anyone truly knowledgeable about hacking would be inclined to open up to someone labeling himself a G-Man. :)
     
  19. g_man526

    g_man526 Member

    Joined:
    Aug 29, 2011
    Messages:
    90
    Likes Received:
    5
    Yeahhhh, not particularly farsighted of me. :p But then when I made this account I never imagined I would ever ask about something like that.
     
  20. T.Trian

    T.Trian Overly Pompous Bastard Supporter Contributor

    Joined:
    Mar 12, 2013
    Messages:
    2,253
    Likes Received:
    1,470
    Location:
    Mushroom Land
    Most guys/gals I've met who are the real deal when it comes to hacking seem quite selective about to whom they reveal the secrets of their trade. The friend I mentioned earlier told me they have closed forums (invite only) only accessible via TOR where they discuss these things more freely, but that they don't really open up on any public forums. I suppose they've got a good reason for it since a lot of the information is, well, usable for less than legal actions. If only I was born with a penchant for computer literacy; to me it all sounds like so much gibberish and I constantly have to ask stupid questions just to understand even the basic concepts being discussed. Even then I usually look like :confused:
     
  21. g_man526

    g_man526 Member

    Joined:
    Aug 29, 2011
    Messages:
    90
    Likes Received:
    5
    I'm sorry powers that be if reviving old threads is frowned upon here, but I once again have a question for anyone with hacking knowledge. Would it be out of the ordinary for a particular corporation's confidential files to take up to a few months of prodding at to obtain access? Or rather, how long can it take until an uninvited hacker (i.e. not a white hat) could break through a tight security system?
     
  22. Al Stevens

    Al Stevens New Member

    Joined:
    Apr 17, 2013
    Messages:
    15
    Likes Received:
    1
    Location:
    Florida

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice