This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
October 2007 (vol. 8 no. 10)
pp. 2
Sergey Bratus, Dartmouth College
This two-part article discusses the factors distinguishing the hacker culture from the IT industry and traditional academia, using networking examples. This first part describes the starting points of the hackers' approach to layered computer systems.

1. G. Conti,"Why Computer Scientists Should Attend Hacker Conferences," Comm. ACM, vol. 48, no. 3, 2005, http://www.rumint.org/gregconti/publications 20050301_CACM_HackingConferences_Conti.pdf pp. 23—24;
2. S. Bratus,"What Hackers Learn That the Rest of Us Don't: Notes on Hacker Curriculum," IEEE Security and Privacy vol. 5, no. 4, 2007, pp. 72—75.
3. "(Nearly) Complete Linux Loadable Kernel Modules," Mar. 1999; http://packetstormsecurity.org/docs/hack LKM_HACKING.html.
4. S. Cesare,"Runtime Kernel Kmem Patching," VX Heavens, Nov. 1998; http://vx.netlux.org/libvsc07.html.
5. M. Handley,V. Paxson,, and C. Kreibich,"Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics," Feb. 1998; http://www.icir.org/vern/papersnorm-usenix-sec-01-html .
6. O. Arkin,"ICMP Usage in Scanning: The Complete Know-How," ver. 3, June 2001; http://www.sys-security.com/archive/papers ICMP_Usage_v3.0.pdf.
7. N. Provos,"A Virtual Honeypot Framework," Proc. 13th Conf. Usenix Security Symp. Usenix, 2004; http://www.usenix.org/publications/library/ proceedings/sec04/tech/full_papers/provos provos.pdf
8. K. Wang,"Frustrating OS Fingerprinting with Morph," presentation at DefCon 12, 2004; http://www.defcon.org/images/defcon-12/dc-12-presentations/ Wangdc-12-wang.pdf
9. J. Ellch,"802.11 VLANs and Association Redirection," Uninformed vol. 2, Sept. 2005; http://uninformed.org?v=2&a=3&t=pdf .
10. J. Cache,"Fingerprinting 802.11 Implementations via Statistical Analysis of the Duration Field," Uninformed vol. 5, Sept. 2006; http://uninformed.org?v=5&a=1
11. J. Cache and D. Maynor,"Hijacking a MacBook in 60 Seconds or Less," video, Washington Post2 Aug. 2006; http://www.washingtonpost.com/wp-dyn/content/ video/2006/08/02VI2006080201424.html .
12. T.H. Ptacek and T.N. Newsham,Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , tech. report, Secure Networks, Jan. 1998.

Index Terms:
hacking, black hat, white hat, gray hat
Citation:
Sergey Bratus, "Hacker Curriculum : How Hackers Learn Networking," IEEE Distributed Systems Online, vol. 8, no. 10, pp. 2, Oct. 2007, doi:10.1109/MDSO.2007.58
Usage of this product signifies your acceptance of the Terms of Use.