Carders. "Gentlemen of Fortune" or the computer elite?

Tomcat

Professional
Messages
2,302
Reputation
4
Reaction score
389
Points
83
A good friend of mine likes to repeat the phrase: "A carder is not the one who breaks, but the one who learns"!
I'll tell you a little bit about the evolution of hackers. I warn you right away: "having written a lot", not everyone will master it.

Who are these scary carders? This word originated in the 60s. Then there were no computers in our understanding, but a craze for radio electronics began. Many talented engineers (not by profession, but by life) have discovered a boundless world of creativity. The name of this world is ELECTRONICS. With a coil of wire and a handful of cheap parts, you can build a Tesla generator and surprise your friends at parties with fancy lightning bolts. Or you can build a simple receiver and listen to conversations and music from the other side of the planet. Radio amateurs (and radio buffs) have become such magicians in the eyes of others. Only their magic can be understood and repeated by everyone, just open the textbook and spend a few days or weeks at it. In the movie "Babylon 5" there was a smart name-technomages. It was these people who began to be called hackers. They don't know anything supernatural, but that's what they do. The boom in radio electronics began to subside with the introduction of personal computers to the masses (in the mid-90s), and with it the concept of "hacker"began to fade.

But, like a phoenix out of the fire, it was reborn in a new guise, in the face of computer specialists. Computers are now perceived by the majority of the population as a box for accessing the Internet, searching for porn and playing games. For a hacker, a computer is much more than that. This is his best friend or girlfriend, to whom he gives a name and sometimes even talks to him. They are not schizophrenics, just a computer for them is akin to a dog or a hamster that they care for. Also, the computer is his library, where with a skillful search you can find almost any knowledge. This is his battlefield, where he storms the "castles and bastions" of the defense systems of various servers. He "breaks" other people's systems not in order to hooliganize or vandalize them. He is interested in the very process of penetration, which for him is akin to the most interesting crossword puzzle or puzzle. This is his world. In it, he "walks" wherever he wants, and any protection means a fence in the park that can be climbed if it interferes with the walk. Here's a curious definition from the wiki:
1. A person who likes to study the details (details) of programmable systems, studying the issue of improving their capabilities, in contrast to most users who prefer to limit themselves to studying the necessary minimum. RFC 1392 reinforces this definition as follows:"A person who enjoys a thorough understanding of the inner workings of systems, computers, and computer networks in particular."
2. Someone who programs enthusiastically (even obsessively), or who loves programming rather than just theorizing about programming.
3. A person who can appreciate and understand hacker values.
4. A person who is strong in fast programming.
5. An expert in relation to a particular computer program, or someone who often works with it; example: "Unix hacker". (The definitions from the first to the fifth are interrelated, so that one person can fall under several of them.)
6. An expert or enthusiast of any kind. Anyone can be considered an "astronomy hacker", for example.
7. Someone who loves intellectual challenges that involve creatively overcoming or circumventing limitations.
8. A highly professional and curious programmer (administrator, etc.) with an original mindset.

Everything is clear, except for point 3. What are the values of a hacker? You can find many different definitions, but the main values are freedom! Freedom of movement, freedom of information, freedom of the mind from the confines of society, freedom, freedom, freedom! A hacker doesn't just have to have huge technical knowledge. A hacker is a state of mind and a certain mindset. To understand hackers, you need to read and think about every line of the carder manifesto, which was written back in the 90s and which very clearly reflects the values and thoughts of hackers. The manifest itself:
Another one was caught today, it's all over the papers. "Teen arrested for computer crime", "Hacker arrested for hacking a bank".

Damn kids… They're all the same.

But you, with your three-element psychology and ' 50s tech brain, have you ever looked a hacker in the eye? Have you ever wondered what makes it move, what forces shaped it?

I am a hacker, enter my world…

My world starts with school. I'm smarter than most other kids, and the nonsense they teach us at school is boring.

You fucking bastard… They're all the same.

I'm in middle or high school. I listen to my teacher explain how to reduce fractions for the fifteenth time. Yes, I already understand. "No, Miss Smith, I won't show you my work. I made it in my mind..."

Damn kid, probably cheated. They're all the same.

Today I made a discovery. I opened the computer. Wait a second ... that's great! It does what I want. If he makes a mistake — it's because I screwed up. Not because he doesn't like me... or is intimidated by me... or thinks I'm too smart… Or he doesn't like learning and shouldn't be here…

Damn boy. All he does is play games. They're all the same.

And it happened... the door to the world was thrown open... a sent electronic pulse shot through the phone lines like heroin through the veins of a drug addict, a refuge from everyday incompetence found. "This is it… What I belong to" I know everyone here... even if I've never met them, never spoken to them, and may never hear from them again… I know you all…

Damn kid, he's on the phone line again. They're all the same.

You can swear on your ass that we're all the same. At school, we were all spoon-fed baby food when we wanted steak... the bits of meat we got were chewed up and tasteless. We were dominated by sadists and ignored by the indifferent. The few who could teach us anything found us desirable students, but they were like drops of water in the desert.

This is our world now… A world of electrons and switches, a world of data beauty. We use existing systems without paying for something that would be damn cheap if it wasn't run by dirty speculators, and you call us criminals. We investigate, and you call us criminals. We seek knowledge... and you call us criminals. We exist without color, without nationality, without religious strife... and you call us criminals. You build atomic bombs, you start wars, you kill, cheat and lie to us, trying to make us believe that all this is for our own good, and we are already criminals.

Yes, I'm a criminal. My crime is curiosity. My crime is that I judge people not by what they look like, but by what they say and think. My crime is that I'm so much smarter than you. This is something you'll never forgive me for.

I'm a hacker. And this is my manifesto. You can stop me, but you can't stop us all... after all, we're all the same.


Have you smelled the unfamiliar smell of a parallel world where hackers live? You are standing next to the door to this world and you will be able to enter it only when your main value is not money, but FREEDOM! When I listen to Kipelov's song "I am free", I get goosebumps. This song is a real hacker anthem.

Now a little bit about the evolution of the hacker movement. In the mid-90s, when computers were big and programs were small, the Internet was very young and very young. After watching the cult movie "hackers" with friends, we gathered a group of good computer specialists and began to comprehend this new world. I was the organizer, mastermind, and main driving force behind our hacker group. I had the" underground " nickname Technorat-technocrat. As you know, a rat is a very intelligent animal that can crawl anywhere. This nickname symbolized that I could enter any man-made system. Diving into the world of the hacker underground was exciting. New knowledge, new acquaintances, new technologies, new music. It was a different world. Living among "ordinary" people made us feel like we were living in two different universes at the same time. They even had their own symbols of belonging to the hacker world. For example, in English words, the ending "- s", which means plural, is replaced by"- z". It turns out "filez", "warez", "computerz". The use of individual numbers as letters, which degenerated after a decade into the distortion of inscriptions in CS. For example: the number "1"="l", "3" = "e", "7" = "t". The inscription "31337" meant the word "eleet" and symbolized belonging to the hacker elite.

We "broke" servers all over the world. Moreover, the site about cats or flowers was more interesting for us than the most secret Pentagon server (I'll say right away, we didn't climb there), if there was a more interesting security system. What did we do with the hacked server afterwards? But nothing! Once, the crooked actions of one of our members led to a server crash, for which he received a "blow on the head"from us. Foreign servers were entered and forgotten about as a completed stage. If the server was Russian, then they sent an email to the admin with a description of how to hack his server. Usually such letters went unanswered, but a couple of times they even thanked me. One admin even asked to check the "strength" of his server again after fixing the gaps.

Since the Internet was very expensive and not everyone could afford it, many of our team had to hack providers and steal passwords. I found a vulnerability in two providers of our city and the guys began to get impudent, stealing Internet watches with impunity. My recommendations to be careful didn't come to anything. After a while, part of the team started selling "Internet-unlimited". This meant that for $ 80 (at a price of $ 2.5 per hour) they gave a person a dozen other people's passwords. If the provider covered up these passwords until the end of the month, then the person was given another 10. My demand and the demand of a part of our team to stop this mess split our team. A few months later, "Fraer's greed was ruined" and part of our group was put away, and some innocent members of the team were also jailed. The others stopped communicating with each other and the group disappeared. Greed and thirst for money are the main opponents of the hacking movement itself and the spirit of hacking.

In the late 90's, the carder movement and hacker culture flourished. Then a large number of "pioneers" and crooks appeared, who turned hackers from the elite of IT specialists into ordinary criminals in the eyes of society. Gradually, the hacker movement was stratified, transformed and at the moment is a motley collection of computer scientists of various stripes. Currently, there are several types of groups that can be distinguished:

1. Phreakers. These are electronics engineers, usually engaged in "bugs", telephony and other electronics. By and large, these are the descendants of the first radio amateurs. There are "right" and "wrong", or" good "and"bad". The "good ones" study various systems (anti-theft, telephone communication, etc.) just for fun. The "bad ones" are interested in the same thing only for the purpose of making a profit. They collect " bugs "and sell them to those who want to, which the" right " phreaker will not allow himself. The "right "phreaker will study the system of electronic travel cards and, in the worst case, will ride the subway for free, while the "wrong" one will set the production and sale of cards as the goal of their business.

2. Carders. This word means all those who are engaged in stealing money from debit and credit cards. The attitude of the rest of the hacker community towards them is frankly negative, as it contradicts the very name "carder". Carders can be professional or amateur. Professional carders invent various screamers, ways to intercept card data, hack payment systems and databases of banks and stores in order to steal data, print duplicate cards and cash them out. Although a great mind is not required in this case, the right organization is enough. If you have enough money, you can buy databases of card data stolen by others directly on the cardder forums. Depending on the amounts on the cards, their value can vary very widely. Usually "wholesale" cards are sold at a price of $ 5-20 apiece. Only to get on serious card forums, where there is no "kidalov" and most likely there are no "sent Cossacks", it is very difficult. This usually requires a personal recommendation from one of the members or elders of the forum, and often the cost of an "entrance ticket" is 1-5 thousand dollars. Some carders are only engaged in hacking various databases with the subsequent resale of information. This is the most secure, although less profitable. Others buy card details and cash out money. Cashing out is the most dangerous moment, because during cashing out, they usually "take white hands". If you have made duplicates of the card, then during cashing out at an ATM, you "light up" your face. In different banks, each ATM is equipped from one to 3!!! cameras. Even if you attract a drunk, student, or homeless person to make direct contact with an ATM, you still run the risk. When the police "take" the performer, then, according to him, they will draw a sketch of the one who gave the task and in a few years they will still promote the entire chain. Others cash out money by purchasing various products in online stores. Goods are sent to a rented apartment where a dispatcher girl is sitting, and a student courier picks up all the incoming goods once a day and takes them to the reseller. In the end, they take a girl dispatcher or reseller and again promote the entire group. Still others use the services of well-established resellers. In some country that does not cooperate with interpol, there is a person who sells goods and sends 30-50% of the value of the goods to the carder. There are a great many schemes for cashing out and laundering money, but usually this is one of the types of earnings of organized crime.

3. Crackers, crackers, crackers. These people are engaged in hacking the protection of various programs. Some people, such as a well-known hacker, cracker, and IT expert named Chris Kaspersky, hack programs only for personal use or to learn interesting security features. Moreover, they can then thank the author in writing for their pleasure in hacking such an interesting security algorithm and BUY a LICENSED COPY of the program as a reward for the author. Other (let's call them incorrect) crackers put hacking programs on the stream. This is usually done to sell "cracks" or as an advertisement for your hacker group. The attitude towards crackers in the hacker environment is ambiguous and depends on the motives of the cracker.

4. Script kiddies. This is a huge herd of stupid lamers who, as childish pranks, are engaged in mass defacing of sites. Since they do not have enough knowledge to crack a serious security system, they sit on hacker sites and forums in order to find or beg for 0-day or private exploit. When they get their hands on one, a huge number of sites with the engine that the exploit is written for are located through Google. Then there is a stupid sequential deface of dozens and hundreds of sites, until you get tired of it. Scriptkiddies sometimes get lost in pseudo-hacker groups, a prerequisite for the existence of which is to throw mud at the same groups and "measure pussy with them" in terms of the number of sites that are blocked. From the hacker community, such groups deserve only contempt, more than a teenager writing a sacramental three-letter inscription on a fence.

5. Directly hackers, the elite. They are divided into 2 main groups: "Black Hat"and" White Hat". The former are the elite with anarchist views. They believe that learning is possible with any goals and do not limit themselves to any framework. Hacking servers can be carried out for the purpose of narcissism, defacing, expanding the botnet, or for commercial purposes. They recognize only complete freedom without any moral restrictions." The latter defend the ideals of real hackers and fight to ensure that the bright concept of the IT elite is not confused with cybercriminals. After hacking the server, they write a letter to the administrator with a description of the vulnerability and, if they know, suggest a way to close it. If an error is found in the software, the software company that is the author of the program is notified. So that the servers are not affected by the vulnerability and the company has time to release a patch to the program, carders wait a month before publishing the vulnerability on security sites. At the request of the company, the non-disclosure period can be extended for timely release and distribution of the patch. White Hat also often works as security auditors at the request of the company itself. Some "fundamentalists" and orthodox adherents of hacker ideals protest against the military reward in this case, although most hackers consider it quite acceptable.

You can distinguish several other groups or divide them according to other criteria, but the main motto of REAL hackers remains the same:"a hacker is not the one who breaks, but the one who studies."

P.S. I warn you in advance of possible questions. I haven't done this for a long time, although I've never stopped following the topic. Now I work as an administrator in a very large and serious office. Therefore, do not even bother with requests to break anything, I will not undertake for any money. I respect the Criminal Code and division "K" is not asleep.
 
Top