Hackerman: Do The Memes Do Him Justice?

If asked to picture a “hacker,” the average person would summon a similar image: a lone, hoodie-clad neckbeard in a dark basement, surrounded by buzzing terminals, typing away behind an RGB keyboard and black ski mask to a dubstep soundtrack. Though this image has its roots in TV, film and media, it’s made its fair share of appearances in various memes, typically exaggerated or tragically misunderstood in the name of comedy.

If memes are known for anything, it’s for their gritty, unwavering insistence on realism and inability to tell lies. So in this sense, where do “hackers” stand? We know that hackers are real, and they’re out there — stealing your grandmother’s credit card information — but how accurate are the memes in which our beloved hackers are portrayed?


technology electronic device

Origin of the Hacker

Historically, the prototypical hacker began with the term “black hat,” which originated from the hat color dichotomy in 1950s Western films. In these, the antagonist typically wore a black hat to contrast the protagonist’s white one.


ROOMS LO WIGGINS DSMITH UNSMITH MAR MARS OF Will Hutchins Peter Brown John Russell Sugarfoot Maverick Photograph Standing Snapshot Uniform

The purpose of the term’s adoption in cybersecurity was to portray the hacker as a common criminal, and while the terms “black hat” and “white hat” still see some use — particularly in the professional security career field — usage of such imagery is slipping in favor of a more familiar, modern image of a criminal. Robberies, muggings and thefts are likely the most notable example of a “modern, petty criminal,” so it’s no surprise that these criminals likely wear — you guessed it — a hoodie and a ski mask, exemplified with a 2019 robbery in a North Carolina Wells Fargo.

While the individual silhouette of your everyday hacker largely varies by medium, there are a few iconic styles, in particular, many of which juxtaposed with the ’80s and ’90s nostalgia imagery due to the exaggerated nature of film and TV at the time.


Hackers in late 90s action movies: ENCY EXIT (chuckles) I'm in Animated cartoon Cartoon Animation

This imagery mostly found its way into modern media as early as the 1990s during the timely “cyberpunk boom” of the decade, but some of the greatest influences on modern memes stem from two particular films: “The Matrix” and V for Vendetta. The former left its mark largely in the form of the “green-on-black” scrolling text terminals, while the latter left its own mark in the form of the infamous hacktivist group, Anonymous, who adopted the film’s use of the iconic Guy Fawkes Mask.

Expectations

Anonymous

Since its inception in 2003, the group has grown alongside the modern web, becoming the staple image of a “hacker gang.” While Anonymous had built somewhat of a reputation as a hacktivist group –– most notably as part of their public scuffles with The Church of Scientology –– their influence as a group has largely waned. This is mostly due to their inconsistent public perception, preference to “troll” more than actually hack, and tendency to hit the wrong targets, like when their 2008 attempt to DDoS the Church of Scientology resulted in the targeting of an unrelated Dutch children’s school. Nevertheless, the group’s mainstay image became an iconic pillar of hacker imagery on the web, and the Guy Fawkes mask is here to stay.


Hannah Montana is actually Miley Cyrus United States Snapshot Font

Hackerman

A juxtaposition of the character Hackerman from the 2014 short film “Kung Fury” and an in-character photo of Rami Malek as Elliot Alderson from “Mr. Robot,” “Hackerman” gives web-goers the tools to do what they do best: exaggerate their technical prowess for doing technically mundane tasks. For the average person, a “hacker” is the peak physical form of the tech guru, the equivalent of a cyber Super Saiyan, so it’s no surprise that people’s exaggeration would take form as such. Hackerman has, thus, become a new icon for the quintessential hacker on the modern web.


When you have used the shortcut to open a new tab HACKERMAN blue purple poster

Ryan Beckford’s “Hackerman”

In homage to the interpretation of hackers in the film “The Matrix,” the Ryan Beckford Hackerman meme is used to ironically describe oneself as a hacker. Much like the Rami Malek Hackerman meme, its primary use is to exaggerate one’s technical abilities. The exaggeration here is much greater, swapping the retro-wave aesthetic and hoodie for a silly pair of glasses and a toy laptop.


When you successfully install a Minecraft Texture Pack

The 400-Pound Hacker

Tying the hacker’s image into a general “programmer” stereotype of an obese, socially awkward recluse, then-candidate Donald Trump mentioned (during the 2016 U.S. Presidential Debates) the potential that the culprit of the 2016 DNC email hacks could potentially have been perpetrated by “someone sitting on their bed who weighs 400 pounds,” giving birth to the 400-Pound Hacker meme.


Anonymous @YourAnonNews Follow @realdonaldtrump hey you called? #debates ▼ PORTAL Z MAN CAVE [ANONYMITY INTENSIFIES

Reality

We’ve seen a wide range of stereotypes and an array of imagery for our beloved hackers. But is any of this imagery grounded in reality? Are those “hacker” stock images accurate in their portrayal? Turns out, no; who would have guessed that memes –– a thing that people use for fun and to heavily exaggerate everyday things –– would have stretched the truth?

The Hoodie

While some real-life hackers still choose to wear actual hoodies –– most likely due to the perceived “hacker aesthetic” alone –– the only practical sense to wear a hoodie as a hacker is when hanging out in a cafe with a packet sniffer, in which case remaining unidentified is important.

However, this is not realistic. Sitting in a cafe with “H4ck th3 w0rld” stickers all over your laptop, not ordering anything and hiding behind your screen with a hoodie covering your face will do nothing but attract attention. You could, technically, do this at home … but who, exactly, are you hiding your identity from if you’re just sitting in your apartment?


182355 82355 ㄇㄧ VIRUS INTRUDER 23280CRACKER SPYWARE 2328 1O0 11 11 IDENTITYii PASSWORD ㄩ le! UNSAFE 155432 HEFT HACKER -기니 31232 White hat technology

Additionally, sitting in a cafe with a packet sniffer isn’t nearly as effective today, due to the general transition from WEP to WPA2 encryption standards and the general adoption of SSL encryption instead of unencrypted HTTP, two colossal barriers that a Script Kiddie in a hoodie will likely have no idea how to circumvent.

The Mask

Much like the hoodie, the mask serves no practical purpose from a technical standpoint and only really sees use during communication from hacker groups who wish to conceal their identities. Masks do not give hackers superpowers, unfortunately.

The Matrix Terminal

It is true that hackers will typically spend time using the terminal. For nearly all tech professionals, a GUI tends to “get in the way,” whereas command-line interface (CLI) utilities are often seen as more efficient and more powerful, largely due to the ability to automate CLI tools using scripts. However, many GUI utilities exist and see heavy use among security professionals, such as Burp Suite. Most importantly, though, terminals look more like this:


root@kali: - File Edit View Search Terminal Help root@kali:~# msfconsole -h Usage: msfconsole [options] Common options -Е, neither option not RAILS ENV environment variable is set. --environment ENVIRONMENT The Rails environment. Will use RAIL_ENV environment variable if that is set. Defaults to production if Database options -M, --migration-path DIRECTORY -n, --no-database Specify a directory containing additional DB migrations Disable database support -у, --уaml РАTH Specify a YAML file containing database settings Framewo rk options -c FILE -v, --version Load the specified configuration file Show version Module options --defer-module-loads Defer module loading unless explicitly asked. An additional module path – m, --module-path DIRECTORY Console options: Ask before exiting Metasploit or accept 'exit -y' Execute the console as defanged Use the system Readline library instead of RbReadline Output to the specified file Load a plugin on startup Do not print the banner on startup Execute the specified resource file (- for stdin) Execute the specified string as console commands (use ; for multiples) Show this message -а, --ask -d, --defanged -L, --real - readline -0, --output FILE --plugin PLUGIN - - quiet -r, --resource FILE -X, --execute-command COMMAND -h, --help root@kali:-# I -р, -q, Text Font Screenshot

The stereotypical “digital rain” interpretation of the terminal, made popular by “The Matrix,” was largely designed for dramatic effect. If you open a terminal and it, instead, looks like the one below, you might have accidentally found yourself playing Bethesda’s 2008 post-apocalyptic, sci-fi RPG, “Fallout 3.”


ROBCO INDUSTRIES (TM) TERMLINK PROTOCOL ENTER PASSWORD NOW 3 ATTEMPT(S) LEFT: I.. 8XF924 : *@'L{8%@/# 0×F9F0 (*-??%>;{>{_ T[/->?>[ +@' 0XF9FC }).DREGS,) -^@t+_%),-< OXFA08 {#@>>[:?$-:1 6XF930 OXF93C 6XF948 <--#?^^',@/, OXFA14 |}%+.':'": 8XF954 @%!<>[%%}{$ 0×FA20 $*-_'].L00 OXF960 ::1DAREN?% 0XFA2C NY$=,1(:?'{ OXF96C '?#/+/:*((: 0XFA38 @(@CASES_'?, 0XF978 [#+{.{"$: : ME 0XFA44 -(--:?:1="- OXF984 ANT>[>,_>CL 8×FA50 ]%/::'/C 8XF990 AWS:/-+[(LEA 8XFA5C %:$1$O)( OXF99C DS/]?*$#?'+ 0XFA68 ?]+?$ MARNS? 8XF9A8 |#"/!,-<**> OXFA74 [,:-:]e-CAGE 8XF9B4 **'$$*+):/$: OXFA80 S=^'}%[{:/-, >LEADS OXF9CB <-'| !*:<$_!* 0XFABC OXF9CC I[-e-1%+?+ 8XFA98 ,@'-;]*>.- >1/5 correct. 8XF9D8 ?$>CARE S+$I 0XFAA4 1%**FRANK$_ 9XF9E4 _@/LRUINS OXFABO ;%%<CLANS-" >C * " TURNS Entry denied 00000000000 POWER Fallout 3 Fallout 4 Fallout 76 Green Technology Electronic device Display device

The Loneliness

This one’s actually true. Hackers don’t have friends.


furniture sitting chair office chair

Source: https://knowyourmeme.com/editorials/meme-insider/hackerman-do-the-memes-do-him-justice