3. The Adversary of Cybersecurity: Hackers 59 “to own.” It expresses the idea of dominating the other player. It has a similar meaning for hackers. When hackers take over a victim’s computer, the victim has been pwned. Table 3.1 lists some popular hacking terms. Table 3.1 A selection of hacking-related terms. Hacker culture also includes art. ASCII art creates images out of ASCII characters (see Figure 3.6). Hackers use command-line interfaces (CLIs) extensively. Since CLIs can only display ASCII characters, ASCII art allows for creative expressions. Figure 3.6 ASCII art used in the hacking tool Metasploit.
RkJQdWJsaXNoZXIy MTM4ODY=