Hacker versus cracker
By Matthew Hunter
| Apr 2, 2023
| gcih
In the early days of the internet, and even before that, there was a distinct difference in the terminology used for the people who obtained unauthorized access to computer systems. The term hacker meant someone who created an interesting hack, usually something interesting that used a system – not necessarily even a computer system – to do something outside its design intent. A Rube Goldberg machine is a good example of a hack. So is playing music with printers. Conversely, cracker was applied to people who broke into computer systems for nefarious purposes. There was often some overlap between the two, as people making interesting hacks often didn’t have authorized access to the systems they were using.
GIAC Incident Handler
By Matthew Hunter
| Mar 30, 2023
| giac, gcih
I recently took and passed the GCIH Certification. It’s primarily focused on understanding how attackers behave, the tools they use, and why those tools do the things they do.
GIAC Certified Incident Handler
By Matthew Hunter
| Mar 29, 2023
| gcih
Last weekend, I took the certification exam to become a GIAC certified incident handler. Both the exam and the course material leading up to it were interesting enough to deserve a few comments.
One thing I was moderately surprised by in the SANS course was the initial focus on Linux shell tools and Windows Powershell. I’ve been using Linux for a long time, so there weren’t any surprises there. The Powershell material was new to me.