ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Hacker Perspective

Updated on December 21, 2019

This article was published in the magazine 2600 Hacker Quarterly

August, 2019 issue

Hello friends, are hackers born or do they become hackers after getting a Sega Dreamcast with a gameshark? If you think that's a silly question to ask, please read on and I'll take you down a path of wonder, awe, and more questions. I began to get my feet wet in hacking when I was a teenager. This was while many adversities were afflicting my life, and I felt like a stereotypical teenage hacker rebel. After all, sometimes stereotypes are true. Society and life had given me a reason to stand up to the system I live in and say, I'm going to do what I want. I started off as an online hacker, exploiting flaws in games like Phantasy Star Online. There was a vulnerability in the game that would allow you to PK(People Kill) people in a non-player-vs-player area of the game. Now, at the time this was a cheap and simple sadistic thrill. There was an attack called a Resta spell that would take away all of the players health points. But in order to use it you had to modify a certain hex value in the game. This was originally great fun having the power to do things that other people couldn't. But as time went on I learned that the sort of hacking I was doing was black hat, and more important it was mean and wrong.
What caused me to lay to rest my old ways of black hat exploitation? Well, in short, I grew a conscience. They say there are many different intelligences people can possess. When I was younger hacking Phantasy Star Online, the intelligence that I didn't possess was an emotional one. However, one day after I had PKed someone, something happened to me that stood out for the rest of my teen years. A person with a more advanced hacking method came in and did the same thing to me, only worse. I felt powerless and was in very deep in despair. I thought to myself, "is this all that life amounts to? A dog eat dog world where there is always a bigger fish seeking to devour a smaller weaker morsel?" As it turned out, that little experience inside of a somewhat Massively Online Muliplayer game was one of the main turning points in my life. It made me see that just because someone can do something, doesn't mean that they should do it. There was also an example I learned by watching players that didn't exploit the vulnerabilities in the game. They were in essence sitting ducks, but they seemed like they were having more fun. In that way I found out that vulnerability is a strength rather than a weakness.
What I realized with my black hat hacking pursuits is that it all seemed to boil down to control, this mainly stemmed from the fact that I felt helpless in real life. It seems like if the thrill of being able to have control over things leaves you, you start seeing things from a more altrusitic perspective. At least this is what happened to me during my teen years. I left behind the shadowy arts of black hat game hacking for more benign things that actually helped others. These were things like volunteering at a local computer recycling shop and helping my mom and grandma with their computers. This was where my black hat changed to a halo, or more specifically a white hat. Some people never reach the level of calling themselves a white hat hacker, or they go from white hat to black hat. However, like life, hacking has many varying shades of grey. As stated earlier, the black hat hacking I did when I was younger was not without its pitfalls. People would get mad at me in the game and say some very distressing things. This brings me to a big point about life. I found that doing the wrong thing was easy and took very little effort to gain monetary or mood benefits. But in life doing the right thing is difficult. I had this epiphany when I was around 17 years old, and was walking down the street in the city I grew up in. I thought about infamous hackers such as Kevin Mitnick, and how he was able to recover his stance in the world after being locked up for social engineering. This is in stark contrast to people like Bill Gates who seem to always do the right thing. Up until the time I found my way, my friends and I would participate in questionable hacking activities, ie (building cantennas, trying to make virii, and general teenage hacker shenanigans). Later, I found out that the time I had spent doing these things would have probably been better spent looking for a job.
So, what really is a hacker and what do they do? People can always look at a hacker and say, "They exploit things." But you have to realize that the only way to mend a broken bone is by knowing it is broken in the first place. Along those same lines, the same code that makes us weak, also makes us strong. If for instance you find a zero day vulnerability inside of your own machine, you could use that for nefarious means, or to benefit others by releasing the information. In that way life is proved to be both a gift and a curse at times. Hackers prove this notion because some hack because they feel as though they're caste down in the world. After all, isn't it a psychological tenant to human nature that people who feel powerless want to gain it, even by force. But in doing so, some have fallen farther than they ever stood to gain from their activities. I know I've heard of many hackers on the news getting long jail sentences for stealing. This is what changed my mind about being a black hat hacker. I learned that by doing the right thing you close up the vulnerability within yourself for people act against you. Really then, the smart hackers are the ones that try to build up their community, friends, and family and not try to break it down. Besides, there are other ways to keep progressing as a hacker without breaking the law. It may not be the most glamorous form of hacking to help family or friends remove viruses from their machines, but it feels way better than exploiting others. Other areas such as open source contributions over github would be the primary way I see to hone one's skills, and still remain in the right by the law. Another way would be to create your own home network and hack it for fun. I plan on trying both of these things in the near future.
My message to the younger generation of hackers out there and hackers in general. Is to not view hacking as a politial, social, or monetary tool, but mostly as a manifestation self. Without getting too deep in my personal psychological analysis of why people hack. I'd say that most people hack mostly because they're curious. It wouldn't seem proper to say that this curiousity always kills the cat. But there are many instances of people in history that were too curious for their own good. Take Marie Curie for example, I consider her to be a hacker in a way, because she was curious about radiation. She and many other scientists ended up getting sick or dying over their experimentation with radioactive elements. Many scientists are hackers because they hold knowledge as tantamount to life. And both hackers and scientists run experiments, although hackers experiments often take the form of debugging a piece of software. We then must be careful that if we live by the hack we do not also die by it.
Being a hacker is one of the many things I have experienced in my life. There is always the person that is purposely vulnerable that makes you question the whole basis of why you hack, or the person that has more skill than you that makes you feel like the victim. Going back to the beginning of the article when I was talking about the game Phatasy Star Online, it wasn't playing the game that taught me a lesson. It was trying to game the game that taught me a lesson. Some lessons in life don't come about no matter how many times you read a book or go down the same road. Hacking has taught me that to learn you must try things in novel ways. You must experiment with your surroundings and transfer skills from one aspect of life to another. I've read in scientific papers that stepping outside your comfort zone is one of the best ways to master a new skill. If that is true then hacking must be one of the best ways of learning there is. This is because in hacking you're always adapting to a new architecture, programming language, or platform.
If you're an aspiring hacker trying to get into the scene, I recommend going down the path less traveled by. As Smash Mouth sings in the famous song All Star, "what's wrong with taking the back streets? You'll never know if you don't go." So shine in whatever path you choose to take in hackerdom. Whether you're simply hacking together a spreadsheet or getting paid to pen test some vulnerability in Google. To me the exceptional hacker is the one that spends the most time on a seemingly trivial facet of something others overlook. After all, while everyone else is using python for an Artificial Neural Network, you can be the brave explorer and find out why not to use PHP for the same endeavor, at least that's what I'm doing. We don't learn in life by doing what everyone else is doing, to be an exceptional hacker my advice is to step outside of your comfort zone and do something new.
There have been many good things that have come about because I hacked things when I was younger. I was able to get my Information Technology associates degree with relative ease. This involved taking a fundamentals of programming and web design basics classes, which was already right up my alley. Also, whenever I see a problem hacking has given me the insight to know that there is always more than one way to skin a catfish. Yes, the skills I learned in hacking are translatable to other areas of life. That's why you don't always need the right tool for the right job. What is needed, instead, is the right mind for the right job.
If this article finds its way among the other great articles I've read in the 2600 magazine over the years I hope it helps someone. I've tried to incorporate some life lessons I've learned from being a hacker. Sometimes the lessons were harsh and other times they were easy. But in the end a hacker is just a word. The word means many different things to many different people. I ask that if you're reading this and have a negative view of hackers, that you realize that we are people too. Some of us even have lives. We're not always the bad guys that the media portrays as stealing massive amount of information online. We are sons, daughters, fathers, grandfathers, and most important, we are human beings. We vary as greatly as the life on the planet Earth and we are curious enough about life to teach you a thing or two about what we've learned along the way.


Comments

    0 of 8192 characters used
    Post Comment

    No comments yet.

    working

    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://maven.io/company/pages/privacy

    Show Details
    Necessary
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
    Features
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Marketing
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Statistics
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
    ClickscoThis is a data management platform studying reader behavior (Privacy Policy)