Advertisement
Guest User

Untitled

a guest
Sep 19th, 2017
403
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 16.89 KB | None | 0 0
  1. For all you noobs.
  2.  
  3.  
  4. Computer hacking. Where did it begin and how did it grow?
  5. ____________________________________________________________
  6.  
  7. If you wonder what it was like in days of yore, ten, twenty, thirty years
  8. ago, how about letting and oldie tell you the way it used to be.
  9.  
  10. Where shall we start? Many years ago and the World Science Fiction
  11. Convention in Boston, Massachusetts? Back then the World Cons were the
  12. closest thing we had to hacker conventions.
  13.  
  14. Picture 1980. Ted Nelson is running around with his Xanadu guys: Roger
  15. Gregory, H. Keith Henson (now waging war against the Scientologists) and K.
  16. Eric Drexler, later to build the Foresight Institute. They dream of creating
  17. what is to become the World Wide Web. Nowadays guys at hacker cons might
  18. dress like vampires. In 1980 they wear identical black baseball caps with
  19. silver wings and the slogan: "Xanadu: wings of the mind." Others at World
  20. Con are a bit more underground: doing dope, selling massages, blue boxing
  21. the phone lines. The hotel staff has to close the swimming pool in order to
  22. halt the sex orgies.
  23.  
  24. Oh, but this is hardly the dawn of hacking. Let's look at the Boston area
  25. yet another seventeen years further back, the early 60s. MIT students are
  26. warring for control of the school's mainframe computers. They use machine
  27. language programs that each strive to delete all other programs and seize
  28. control of the central processing unit. Back then there were no personal
  29. computers.
  30.  
  31. In 1965, Ted Nelson, later to become leader of the silver wing-headed
  32. Xanadu gang at the 1980 Worldcon, first coins the word "hypertext" to
  33. describe what will someday become the World Wide Web. Nelson later spreads
  34. the gospel in his book Literacy Online.
  35.  
  36. But in 1965 the computer is widely feared as a source of Orwellian powers.
  37. Yes, as in George Orwell's ominous novel , "1984," that predicted a future
  38. in which technology would squash all human freedom. Few are listening to
  39. Nelson. Few see the wave of free-spirited anarchy the hacker culture is
  40. already unleashing. But LSD guru Timothy Leary's daughter Susan begins to
  41. study computer programming.
  42.  
  43. Around 1966, Robert Morris Sr., the future NSA chief scientist, decides to
  44. mutate these early hacker wars into the first "safe hacking" environment. He
  45. and the two friends who code it call their game "Darwin." Later "Darwin"
  46. becomes "Core War," a free-form computer game played to this day by some of
  47. the uberest of uberhackers.
  48.  
  49. Let's jump to 1968 and the scent of tear gas. Wow, look at those rocks
  50. hurling through the windows of the computer science building at the
  51. University of Illinois at Urbana-Champaign! Outside are 60s antiwar
  52. protesters. Their enemy, they believe, are the campus' ARPA-funded
  53. computers. Inside are nerdz high on caffeine and nitrous oxide. Under the
  54. direction of the young Roger Johnson, they gang together four CDC 6400s and
  55. link them to 1024 dumb vector graphics terminals. This becomes the first
  56. realization of cyberspace: Plato.
  57.  
  58. 1969 turns out to be the most portent-filled year yet for hacking.
  59.  
  60. In that year the Defense Department's Advanced Research Projects Agency
  61. funds a second project to hook up four mainframe computers so researchers
  62. can share their resources. This system doesn't boast the vector graphics of
  63. the Plato system. Its terminals just show ASCII characters: letters and
  64. numbers. Boring, huh?
  65.  
  66. But this ARPAnet is eminently hackable. Within a year, its users hack
  67. together a new way to ship text files around. They call their unauthorized,
  68. unplanned invention "email." ARPAnet has developed a life independent of its
  69. creators. It's a story that will later repeat itself in many forms. No one
  70. can control cyberspace. They can't even control it when it is just four
  71. computers big.
  72.  
  73. Also in 1969 John Goltz teams up with a money man to found Compuserve using
  74. the new packet switched technology being pioneered by ARPAnet. Also in 1969
  75. we see a remarkable birth at Bell Labs as Ken Thompson invents a new
  76. operating system: Unix. It is to become the gold standard of hacking and the
  77. Internet, the operating system with the power to form miracles of computer
  78. legerdemain.
  79.  
  80. In 1971, Abbie Hoffman and the Yippies found the first hacker/phreaker
  81. magazine, YIPL/TAP (Youth International Party -- Technical Assistance
  82. Program). YIPL/TAP essentially invents phreaking -- the sport of playing
  83. with phone systems in ways the owners never intended. They are motivated by
  84. the Bell Telephone monopoly with its high long distance rates, and a hefty
  85. tax that Hoffman and many others refuse to pay as their protest against the
  86. Vietnam War. What better way to pay no phone taxes than to pay no phone bill
  87. at all?
  88.  
  89. Blue boxes burst onto the scene. Their oscillators automate the whistling
  90. sounds that had already enabled people like Captain Crunch (John Draper) to
  91. become the pirate captains of the Bell Telephone megamonopoly. Suddenly
  92. phreakers are able to actually make money at their hobby. Hans and Gribble
  93. peddle blue boxes on the Stanford campus.
  94.  
  95. In June 1972, the radical left magazine Ramparts, in the article
  96. "Regulating the Phone Company In Your Home" publishes the schematics for a
  97. variant on the blue box known as the "mute box." This article violates
  98. Californian State Penal Code section 502.7, which outlaws the selling of
  99. "plans or instructions for any instrument, apparatus, or device intended to
  100. avoid telephone toll charges." California police, aided by Pacific Bell
  101. officials, seize copies of the magazine from newsstands and the magazine's
  102. offices. The financial stress leads quickly to bankruptcy.
  103.  
  104. As the Vietnam War winds down, the first flight simulator programs in
  105. history unfold on the Plato network. Computer graphics, almost unheard of in
  106. that day, are displayed by touch-sensitive vector graphics terminals.
  107. Cyberpilots all over the US pick out their crafts: Phantoms, MIGs, F-104s,
  108. the X-15, Sopwith Camels. Virtual pilots fly out of digital airports and try
  109. to shoot each other down and bomb each others' airports. While flying a
  110. Phantom, I see a chat message on the bottom of my screen. "I'm about to
  111. shoot you down." Oh, no, a MIG on my tail. I dive and turn hoping to get my
  112. tormentor into my sights. The screen goes black. My terminal displays the
  113. message "You just pulled 37 Gs. You now look more like a pizza than a human
  114. being as you slowly flutter to Earth."
  115.  
  116. One day the Starship Enterprise barges in on our simulator, shoots everyone
  117. down and vanishes back into cyberspace. Plato has been hacked! Even in 1973
  118. multiuser game players have to worry about getting "smurfed"! (When a hacker
  119. breaks into a multiuser game on the Internet and kills players with
  120. techniques that are not rules of the game, this is called "smurfing.")
  121.  
  122. 1975. Oh blessed year! Under a Air Force contract, in the city of
  123. Albuquerque, New Mexico, the Altair is born. Altair. The first
  124. microcomputer. Bill Gates writes the operating system. Then Bill's mom
  125. persuades him to move to Redmond, CA where she has some money men who want
  126. to see what this operating system business is all about.
  127.  
  128. Remember Hans and Gribble? They join the Home Brew Computer club and choose
  129. Motorola microprocessors to build their own. They begin selling their
  130. computers, which they brand name the Apple, under their real names of Steve
  131. Wozniak and Steve Jobs. A computer religion is born.
  132.  
  133. The great Apple/Microsoft battle is joined. Us hackers suddenly have boxes
  134. that beat the heck out of Tektronix terminals.
  135.  
  136. In 1978, Ward Christenson and Randy Suess create the first personal
  137. computer bulletin board system. Soon, linked by nothing more than the long
  138. distance telephone network and these bulletin board nodes, hackers create a
  139. new, private cyberspace. Phreaking becomes more important than ever to
  140. connect to distant BBSs.
  141.  
  142. Also in 1978, The Source and Compuserve computer networks both begin to
  143. cater to individual users. "Naked Lady" runs rampant on Compuserve. The
  144. first cybercafe, Planet Earth, opens in Washington, DC. X.25 networks reign
  145. supreme.
  146.  
  147. Then there is the great ARPAnet mutation of 1980. In a giant leap it moves
  148. from Network Control Protocol to Transmission Control Protocol/Internet
  149. Protocol (TCP/IP). Now ARPAnet is no longer limited to 256 computers -- it
  150. can span tens of millions of hosts! Thus the Internet is conceived within
  151. the womb of the DoD's ARPAnet. The framework that would someday unite
  152. hackers around the world was now, ever so quietly, growing. Plato fades,
  153. forever limited to 1024 terminals.
  154.  
  155. Famed science fiction author Jerry Pournelle discovers ARPAnet. Soon his
  156. fans are swarming to find excuses -- or whatever -- to get onto ARPAnet.
  157. ARPAnet's administrators are surprisingly easygoing about granting accounts,
  158. especially to people in the academic world.
  159.  
  160. ARPAnet is a pain in the rear to use, and doesn't transmit visuals of
  161. fighter planes mixing it up. But unlike the glitzy Plato, ARPAnet is really
  162. hackable and now has what it takes to grow. Unlike the network of hacker
  163. bulletin boards, people don't need to choose between expensive long distance
  164. phone calls or phreaking to make their connections. It's all local and it's
  165. all free.
  166.  
  167. That same year, 1980, the "414 Gang" is raided. Phreaking is more
  168. hazardous than ever.
  169.  
  170. In the early 80s hackers love to pull pranks. Joe College sits down at his
  171. dumb terminal to the University DEC 10 and decides to poke around the campus
  172. network. Here's Star Trek! Here's Adventure! Zork! Hmm, what's this program
  173. called Sex? He runs it. A message pops up: "Warning: playing with sex is
  174. hazardous. Are you sure you want to play? Y/N" Who can resist? With that "Y"
  175. the screen bursts into a display of ASCII characters, then up comes the
  176. message: "Proceeding to delete all files in this account." Joe is weeping,
  177. cursing, jumping up and down. He gives the list files command. Nothing!
  178. Zilch! Nada! He runs to the sysadmin. They log back into his account but his
  179. files are all still there. A prank.
  180.  
  181. In 1983 hackers are almost all harmless pranksters, folks who keep their
  182. distance from the guys who break the law. MITs "Jargon file" defines hacker
  183. as merely "a person who enjoys learning about computer systems and how to
  184. stretch their capabilities; a person who programs enthusiastically and
  185. enjoys dedicating a great deal of time with computers."
  186.  
  187. 1983 the IBM Personal Computer enters the stage powered by Bill Gates'
  188. MS-DOS operating system. The empire of the CP/M operating system falls.
  189. Within the next two years essentially all microcomputer operating systems
  190. except MS-DOS and those offered by Apple will be dead, and a thousand
  191. Silicon Valley fortunes shipwrecked. The Amiga hangs on by a thread. Prices
  192. plunge, and soon all self-respecting hackers own their own computers.
  193. Sneaking around college labs at night fades from the scene.
  194.  
  195. In 1984 Emmanuel Goldstein launches 2600: The Hacker Quarterly and the
  196. Legion of Doom hacker gang forms. Congress passes the Comprehensive Crime
  197. Control Act giving the US Secret Service jurisdiction over computer fraud.
  198. Fred Cohen, at Carnegie Melon University writes his PhD thesis on the brand
  199. new, never heard of thing called computer viruses.
  200.  
  201. 1984. It was to be the year, thought millions of Orwell fans, that the
  202. government would finally get its hands on enough high technology to become
  203. Big Brother. Instead, science fiction author William Gibson, writing
  204. Neuromancer on a manual typewriter, coins the term and paints the picture of
  205. "cyberspace." "Case was the best... who ever ran in Earth's computer matrix.
  206. Then he doublecrossed the wrong people..."
  207.  
  208. In 1984 the first US police "sting" bulletin board systems appear.
  209.  
  210. The 80s are the war dialer era. Despite ARPAnet and the X.25 networks, the
  211. vast majority of computers can only be accessed by discovering their
  212. individual phone lines. Thus one of the most treasured prizes of the 80s
  213. hacker is a phone number to some mystery computer.
  214.  
  215. Computers of this era might be running any of dozens of arcane operating
  216. systems and using many communications protocols. Manuals for these systems
  217. are often secret. The hacker scene operates on the mentor principle. Unless
  218. you can find someone who will induct you into the inner circle of a hacker
  219. gang that has accumulated documents salvaged from dumpsters or stolen in
  220. burglaries, you are way behind the pack. Kevin Poulson makes a name for
  221. himself through many daring burglaries of Pacific Bell.
  222.  
  223. Despite these barriers, by 1988 hacking has entered the big time. According
  224. to a list of hacker groups compiled by the editors of Phrack on August 8,
  225. 1988, the US hosts hundreds of them.
  226.  
  227. The Secret Service covertly videotapes the 1988 SummerCon convention.
  228.  
  229. In 1988 Robert Tappan Morris, son of NSA chief scientist Robert Morris Sr.,
  230. writes an exploit that will forever be known as the Morris Worm. It uses a
  231. combination of finger and sendmail exploits to break into a computer, copy
  232. itself and then send copy after copy on to other computers. Morris, with
  233. little comprehension of the power of this exponential replication, releases
  234. it onto the Internet. Soon vulnerable computers are filled to their digital
  235. gills with worms and clogging communications links as they send copies of
  236. the worms out to hunt other computers. The young Internet, then only a few
  237. thousand computers strong, crashes. Morris is arrested, but gets off with
  238. probation.
  239.  
  240. 1990 is the next pivotal year for the Internet, as significant as 1980 and
  241. the launch of TCP/IP. Inspired by Nelson's Xanadu, Tim Berners-Lee of the
  242. European Laboratory for Particle Physics (CERN) conceives of a new way to
  243. implement hypertext. He calls it the World Wide Web. In 1991 he quietly
  244. unleashes it on the world. Cyberspace will never be the same. Nelson's
  245. Xanadu, like Plato, like CP/M, fades.
  246.  
  247. 1990 is also a year of unprecedented numbers of hacker raids and arrests.
  248. The US Secret Service and New York State Police raid Phiber Optik, Acid
  249. Phreak, and Scorpion in New York City, and arrest Terminus, Prophet,
  250. Leftist, and Urvile.
  251.  
  252. The Chicago Task Force arrests Knight Lightning and raids Robert Izenberg,
  253. Mentor, and Erik Bloodaxe. It raids both Richard Andrews' home and business.
  254. The US Secret Service and Arizona Organized Crime and Racketeering Bureau
  255. conduct Operation Sundevil raids in Cincinnatti, Detroit, Los Angeles,
  256. Miami, Newark, Phoenix, Pittsburgh, Richmond, Tucson, San Diego, San Jose,
  257. and San Francisco. A famous unreasonable raid that year was the Chicago Task
  258. Force invasion of Steve Jackson Games, Inc.
  259.  
  260. June 1990 Mitch Kapor and John Perry Barlow react to the excesses of all
  261. these raids to found the Electronic Frontier Foundation. Its initial purpose
  262. is to protect hackers. They succeed in getting law enforcement to back off
  263. the hacker community.
  264.  
  265. In 1993, Marc Andreesson and Eric Bina of the National Center for
  266. Supercomputing Applications release Mosaic, the first WWW browser that can
  267. show graphics. Finally, after the fade out of the Plato of twenty years
  268. past, we have decent graphics! This time, however, these graphics are here
  269. to stay. Soon the Web becomes the number one way that hackers boast and
  270. spread the codes for their exploits. Bulletin boards, with their tightly
  271. held secrets, fade from the scene.
  272.  
  273. In 1993, the first Def Con invades Las Vegas. The era of hacker cons moves
  274. into full swing with the Beyond Hope series, HoHocon and more.
  275.  
  276. 1996 Aleph One takes over the Bugtaq email list and turns it into the first
  277. public "full disclosure" computer security list. For the first time in
  278. history, security flaws that can be used to break into computers are being
  279. discussed openly and with the complete exploit codes. Bugtraq archives are
  280. placed on the Web.
  281.  
  282. In August 1996 I start mailing out Guides to (mostly) Harmless Hacking.
  283. They are full of simple instructions designed to help novices understand
  284. hacking. A number of hackers come forward to help run what becomes the Happy
  285. Hacker Digest.
  286.  
  287. 1996 is also the year when documentation for routers, operating systems,
  288. TCP/IP protocols and much, much more begins to proliferate on the Web. The
  289. era of daring burglaries of technical manuals fades.
  290.  
  291. In early 1997 the readers of Bugtraq begin to tear the Windows NT operating
  292. system to shreds. A new mail list, NT Bugtraq, is launched just to handle
  293. the high volume of NT security flaws discovered by its readers.
  294. Self-proclaimed hackers Mudge and Weld of The L0pht, in a tour de force of
  295. research, write and release a password cracker for WinNT that rocks the
  296. Internet. Many in the computer security community have come far enough along
  297. by now to realize that Mudge and Weld are doing the owners of NT networks a
  298. great service.
  299.  
  300. Thanks to the willingness of hackers to share their knowledge on the Web,
  301. and mail lists such as Bugtraq, NT Bugtraq and Happy Hacker, the days of
  302. people having to beg to be inducted into hacker gangs in order to learn
  303. hacking secrets are now fading.
  304.  
  305. Where next will the hacker world evolve? You hold the answer to that in
  306. your hands.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement