WEB 2.0, the amazing wonderfully connected world, with services spanning social networks, social tagging and just about anything useful and social.
The next generation of Hacking, is exactly like the old generation. Based more on Social engineering than actual programming, and algorithmic might. Possibly even less on finding exploits and vulnerabilities and relying more on the tried and tested, the ultimate form of hacking.
Again, the buzz words seem to always contain social in them.
Welcome the wonderful world of Hacking 2.0!
The new Internet is different, and although it's as connected as it has always been, it feels more connected. You're able to search for (but more importantly find) things easily. You're able to research people and event, and unlike the old days when people had to come snooping around your neighborhood asking little kids about you, and calling your neighbors to get details about you. People are actually volunteering loads of information at everyone's finger tips
From Myspace, to Facebook, to social bookmarking to activity monitors. People are broadcasting the universe what they're doing, where they're going, who did they dine with, and who their friends are.
It does take a small amount of intelligence (but not a rocket scientist) to connect all the dots and know who exactly is who's friend, find them on facebook, figure out their friends and get to them through their friends. That's only one way of doing business. Not to mention Phishing, spoofing, Trojans, malware and a million other attack vector at the totally clueless individual who's just super excited about being able to see his picture on blogs he visits in the Myblogrolling section.
If you manage to look at one of these cookies you will discover a wealth of information. Where they user was, what name he used, how long did he stay, what he clicked, and track them as they hop from one site to another site. But that's all old news
What Hacking 2.0 is all about is exploiting the human side of the equation. Using smoke and mirrors into fooling people into providing information. Verifying their email accounts, and exposing their intimate details without even suspecting that they're not even talking to someone authorized to do so!
The next step, Hacking 3.0 is this...
And it's called, Psychic paper, from the famous TV Series, Doctor Who. Where "The Doctor" flashes a blank paper, and people's mind gives the the illusion that they're seeing what they want to see!
And that's how it's done, by making the victim see what they want to see, utilizing less technology and more social skills!
Now, do you know who snitched on you? Your own best friend! That's Hacking 2.0, leave the kernel debugger alone!