This Article 
 Bibliographic References 
 Add to: 
October 2007 (vol. 8 no. 10)
pp. 2
Sergey Bratus, Dartmouth College
This two-part article discusses the factors distinguishing the hacker culture from the IT industry and traditional academia, using networking examples. This first part describes the starting points of the hackers' approach to layered computer systems.

1. G. Conti,"Why Computer Scientists Should Attend Hacker Conferences," Comm. ACM, vol. 48, no. 3, 2005, 20050301_CACM_HackingConferences_Conti.pdf pp. 23—24;
2. S. Bratus,"What Hackers Learn That the Rest of Us Don't: Notes on Hacker Curriculum," IEEE Security and Privacy vol. 5, no. 4, 2007, pp. 72—75.
3. "(Nearly) Complete Linux Loadable Kernel Modules," Mar. 1999; LKM_HACKING.html.
4. S. Cesare,"Runtime Kernel Kmem Patching," VX Heavens, Nov. 1998;
5. M. Handley,V. Paxson,, and C. Kreibich,"Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics," Feb. 1998; .
6. O. Arkin,"ICMP Usage in Scanning: The Complete Know-How," ver. 3, June 2001; ICMP_Usage_v3.0.pdf.
7. N. Provos,"A Virtual Honeypot Framework," Proc. 13th Conf. Usenix Security Symp. Usenix, 2004; proceedings/sec04/tech/full_papers/provos provos.pdf
8. K. Wang,"Frustrating OS Fingerprinting with Morph," presentation at DefCon 12, 2004; Wangdc-12-wang.pdf
9. J. Ellch,"802.11 VLANs and Association Redirection," Uninformed vol. 2, Sept. 2005; .
10. J. Cache,"Fingerprinting 802.11 Implementations via Statistical Analysis of the Duration Field," Uninformed vol. 5, Sept. 2006;
11. J. Cache and D. Maynor,"Hijacking a MacBook in 60 Seconds or Less," video, Washington Post2 Aug. 2006; video/2006/08/02VI2006080201424.html .
12. T.H. Ptacek and T.N. Newsham,Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , tech. report, Secure Networks, Jan. 1998.

Index Terms:
hacking, black hat, white hat, gray hat
Sergey Bratus, "Hacker Curriculum : How Hackers Learn Networking," IEEE Distributed Systems Online, vol. 8, no. 10, pp. 2, Oct. 2007, doi:10.1109/MDSO.2007.58
Usage of this product signifies your acceptance of the Terms of Use.