Hacking

Reflection on how previous understanding of hacking was shaped by fiction. Explores ethical hacking, Wifi pineapples, and spear phishing gaining a new respect and perspective of cybersecurity complexity.

Nicholas Dorsey

28 June 2025

Before I began studying cybersecurity, I held many beliefs that I now see were shaped more by Hollywood fiction than real-world experience. I used to believe that hacking was mostly about typing furiously into a black screen and gaining access to systems within seconds. I thought cybersecurity was just about setting up firewalls or antivirus software. It was a concern only for governments or large companies. However, after engaging more with the topic through Keren Elazari’s breakdown of hacking scenes, I see how narrow and inaccurate my views were.

One of the biggest misconceptions I had was that all hackers were criminals operating in secret to break into systems for financial gain or to cause chaos. I was not aware that there was such a thing as an “ethical hacker.” Learning from Elazari helped me understand the broader community and motivations behind hacking. For example, the video describes capture-the-flag competitions as legal and structured hacking challenges designed for learning and innovation. This was surprising because I had never imagined hacking as something legitimate or constructive. It changed how I viewed the field and made it feel more creative, collaborative and focused on problem-solving than I had thought before. 

Another belief I had was that hacking was flashy and almost magical. Movies often depict animated 3D interfaces and hackers breaking into secure systems in mere seconds. Elazari directly debunks this in the video, explaining how hacking often involves tedious, detailed work, such as analyzing hex code or exploiting outdated systems like SSH version 1. One scene she reviewed even showed a hacker using the Unix “shred” command, something real and practical but far less dramatic than Hollywood’s version. That made me reconsider how media influences our understanding of technology and how those portrayals shape what the public believes. 

I never realized how legitimate the dangers of spear-phishing and credential stuffing were. I thought that I would be alright as long as I did not touch on unfamiliar links. Nevertheless, the video showed the ways in which hackers may acquire personal information using open-source intelligence and compose a very personal message to a particular person. The moment in which a character gains access to the webcam via the targeted attack has redesigned the way I thought of threats on the Internet. It reminded me that to remain safe online, we have to implement multifactor defense layers such as two-factor authentication and good password habits.

It was also in the video that I was exposed to the tools that I had not used before, like the WiFi Pineapple. It resembles a regular object that can deceive phones and laptops into connecting with it and open them to a lot of dangers. I could never imagine that something like that exists, and it demonstrated to me that cybersecurity risks have become very sophisticated. I have learned that most attackers do not need raw technical power as they rely more on deception and social engineering. Such revelations caused me to ponder how most of us live defenselessly, simply due to a lack of information.

My early understanding of cybersecurity was shaped more by fiction than reality. By studying the subject and watching Elazari’s expert analysis, I now see cybersecurity as a complex and constantly changing field that impacts everyone. My old misconceptions were wrong and dangerous because they led me to underestimate the importance of digital safety. I am more mindful of the potential threats and the resources necessary to remain secure in today’s increasingly connected world.