1 / 15

Stepan Konecny

Critical evaluation of current means of coping with computer crime – should we ask hackers what they want? *. Stepan Konecny Institute for Research on Children, Youth and Family, Faculty of Social Studies, Brno, Czech Republic *This study was supported by MSM0021622406. Hackers and mass media.

Download Presentation

Stepan Konecny

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Critical evaluation of current means of coping with computer crime – should we ask hackers what they want?* Stepan Konecny Institute for Research on Children, Youth and Family, Faculty of Social Studies, Brno, Czech Republic *This study was supported by MSM0021622406

  2. Hackers and massmedia • almostmythological power of hackers • „quasi-psychological“ profile of hacker‘s personality • massmediausuallyprefer describing only blackhat hackers

  3. Introduction to the problem • The difference between hackers and security experts need not to be as big as we think • It is not so difficult to cross the border from one of this group to another • Bad social representation of hackers is usually caused by themass media‘s description of their illegal activities • Current legislation prefers only persecution, not prevention • Young people interested in computer security don‘t have an opportunity to learn and test the security of servers and web pages in a safe environment

  4. Goals of this study • Are there any signs of character abnormalities? • Find out/define/ starter(s), which trigger risky behavior • Advantages and disadvantages named by hackers themselves

  5. Method and sample • Semi-structured online interviews • Respondents was contacted through the security portals and discussion forums + snowball technique • 8 participants (another6 was excluded for social engineeringwhich is not typical kind of hacking) • Age of participants was about 18-32 • All participants were men

  6. Please describe your typical hacking. In which areas are you interested in? • My|Ms/SQL injection, file Inclusion, log injection, Command Execution, cross site scripting, Cross Site Request Forgery, information disclosure, ajax worms ... (4194) • Everything, from webappz over rooting, mass owning and zeroday explotation (Nostur) • Searching security leaks in web applications (.cCuMiNn.) • My goal is not to attack other web sites or servers a destroy them. I am trying to warn the owner and to help with fixing errors. By this way I also learn, how to avoid those errors when I am programming my web applications (RubberDuck)

  7. How did you come to hacking? • I was simply fascinated by original thought of hacking, the amount of possibilities, how to get to the system etc. (4194) • I‘ve loved hacker‘s movies and the word „hacking“ had for me magical denotation (.cCuMiNn.) • Probably the most powerful driving force for me was to gain respect from others due to skills I have. (cm3l1k1) • I saw a book „Hacking without mysteries“, my parents bought it for me and I started to study. Then I started looking for another „comrades-in-arms“ by discussion forums. (RnmX4) • I wanted to work for the USA government (since I was inspired by some movie) and it was a foolish idea of course. (ShaiMagal)

  8. Do you remember any important event from timeyou started hacking? • I wouldn‘t looking for some particular event which made me to interested in hacking. (.cCuMiNn.) • A lot of events happened when I became interested in computers because it was in my teenage years. If you ask me if I lived only „with computers“, I wouldn‘t say that (cm3l1k1) • Nothing important happened (Nostur)

  9. If you could change anything from this time, what would it be? • Nothing (4194) • Definitely nothing. It was better than going to the pubs with friends and getting drunk (cm3l1k1) • I don‘t regret anything. Maybe I could study informatics much more earlier (Emkei) • I wasted a lot of time looking for some skillful hacker who would teach me. For that reason I am always ready to advise anyone, who is not completely lame.(RnmX4)

  10. + skills can be useful in your work (4194) + increasing your analytic/creative/logic thinking (4194) + I can change prices in e-shops or lease my botnet which can bring me money (Emkei) + I love that feeling when you become admin of the system (Nostur) + you can manifest your opinion, e.g. I recently „corrected“ some russian web pages when Russia attacked Georgia(RnmX4) -you loose an ability for active communication with others (.cCuMiNn.) - incomprehension from mass media and public. They will think of you as a terrorist (RubberDuck) - if they catch you, you will go to the jail (RnmX4) Can you describe pros and cons of your hacking?

  11. When you imagine someone younger at your positions, what advicewould you give him or her? • Create your own application/methods instead of using applications already made by another hacker. On the black market you can only sold those applications, which are original and were not revealed yet (4194) • Lrn2google? (Nostur) • Learn, learn, read, read, try and try (RubberDuck) • Sell your knowledge (Shaimagal)

  12. Are you member of any hacker‘s community? • I am member of few non-public communities (4194) • Of course (Nostur) • I am founder a community, which serves to newbie to learn step-by-step how to hack and at the same time are learned, that they are able to not only destroy someone‘s job but refine (Rubberduck) • I am definitely member of community, we have a lot of 0day exploits, botnet (not the smallest one ) etc. (RnmX4) • I am not member of any community. In normal communities no one will trade with you. Exchange of exploits, zombies or valuable information proceed always between people, who can trust each other. (Emkei)

  13. In a future, do you think you might engage in computer security as a professional? • Yes, sometimes I think about it (RubberDuck,.cCuMiNn.) • I am already doing it, but a lot of companies think that they have their applications secured enough and the don‘t need security audit (cm3l1k1, Nostur, Shaimagal) • Maybe. On the one side I like my freedom and in a case of penetration testing i prefer my instinct and experience before standard procedures prefered by certified companies (Emkei)

  14. General conclusions • We have to critically re-evaluate existing attitude towards hackers – what we only do is looking for them when we want to punish them. Maybe it would by more effective if we educate them and then try to employ them. • In opposite of mass media presentation, all young hackers need not to be deviant individuals • Although some of our participants may be only „script kiddies“, they can still be dangerous when they try to learn something • The main motivation for hacking is not usually to harm, but only improving one‘s skill, which is often connectedwith testing one‘s skill on operating systems

  15. General conclusions • The typical first motivation for interesting in hacking is a romantic presentation of hacker from movies – it is connected with superior skills, powerfulness, respect from others • We should try to establish a communication with young hacking applicant, who are interestedin this area for some time and they are considering professional career in thisarea • The majority of them are motivated to be(come) professionals, some of them even mentioned collaboration with police or Ministry of the Interior affairs.

More Related