Follow TV Tropes

Following

Context Main / DuelingHackers

Go To

1%% Image selected per Image Pickin' thread: https://tvtropes.org/pmwiki/posts.php?discussion=1645299293059808800
2%% Please do not replace or remove without starting a new thread.
3%%
4[[quoteright:300:[[Webcomic/{{Noblesse}} https://static.tvtropes.org/pmwiki/pub/images/hakers3_9.png]]]]
5%%
6A head-to-head confrontation between two computer hackers, combining the excitement of [[MundaneMadeAwesome people typing]] with the thrill of [[TechnoBabble network protocol loopholes being exploited]].
7
8One hacker is trying to penetrate a computer system while the second is busily trying to keep the first one out. Expect the hackers to consider each other to be a WorthyOpponent. Often mixed with an attempt to back-trace the invading Hacker's source, depicted much like phone back-tracing usually is. Expect plenty of HollywoodHacking jargon and visuals to keep the audience occupied.
9
10Almost no one thinks to simply [[CutTheJuice unplug the target computer]] from the network because apparently EverythingIsOnline, always.
11
12Also worth noting is that in reality, if hackers have identified each other, whoever has root access (or is closer than the other one) can simply deny the other one access to absolutely everything. By default, this means that if either hacker is the home security, they automatically win the moment they know the hacker exists. This is why in reality, hacking is all about stealth (hence the common phrases like "trojan horse" and "worm")
13
14Can overlap with RivalScienceTeams, if the Dueling Hackers are working for scientists, or are scientists themselves.
15
16----
17!!Examples:
18[[foldercontrol]]
19
20[[folder:Anime & Manga]]
21* ''Manga/NegimaMagisterNegiMagi'': Chisame versus Chachamaru in the festival arc.
22* In ''VisualNovel/GakuenHeaven'' of all things the vice-presidents of the student council and the treasury are constantly trying to hack each other and keep the other out.
23* In ''Manga/BloodyMonday'' the protagonist has many duels with opposing hackers, both in the first and second seasons.
24* ''Franchise/GhostInTheShell'' has a few examples. It also averts the trope in ''[[Anime/GhostInTheShellStandAloneComplexSolidStateSociety Solid State Society]]''. Section 9 actually does cut the power when they start getting hacked (via fire axe to the power cords).
25* Happens in ''Manga/CannonGodExaxxion'' as both sides run a propaganda war against each other.
26* In ''Demon Hunters: Dead Camper Lake'', two Cyborg DuelingHackers complete with ominously named programs with skull icons, while sitting face to face at the same table. Eventually, the losing cyborg shrugs, picks up his laptop and clubs his enemy to death.
27* A slowed down and scaled up version: The ''Franchise/DotHack'' plot-lines for the ''[[Manga/DotHackLegendOfTheTwilight Twilight]]'' manga and anime involve a group of hackers breaking down an {{MMORPG}} while the game's programmers try and counter the slow infection.
28* ''Manga/HanaukyoMaidTeam''. In episode 8 the Jihiyou family hacks into the MEMOL supercomputer to steal information (and possibly activate the mansion's SelfDestructMechanism). Grace manages to defeat them.
29* It's not really made that much of, but this happens between Yatouji Satsuki and Imonoyama Nokoru in ''Manga/{{X 1999}}''. She is trying to hack into the computers of CLAMP Campus and he is trying to keep her out. Given that Satsuki is a technopath working in tandem with a supercomputer, the fact that Nokoru actually manages to make it combat instead of a CurbStompBattle is [[SugarWiki/MomentOfAwesome pretty impressive]].
30* Happens often enough in ''Anime/DenNohCoil'', since realspace and cyberspace are linked. A particularly heated one happens between Isako and Fumie early on.
31* While it wasn't precisely done by hackers (mostly), the ''Anime/DigimonAdventure'' movie introducing Diablomon featured a fight between the viral creature and the hero 'mons... [-IN CYBERSPACE-].
32* Mohawked cyber-hacker Gogul was kept out of the action of the first episode of ''Anime/CyberCityOEDO808'' by being constantly engaged in a hacking duel against the "virtual ghost" who was fighting him for control of not only the functions of the massive Oedo skyscraper the episode was set in (including the gyroscope that kept the ridiculously-tall structure stable), but also the 30 gigawatt satellite laser canon orbiting overhead, leaving Sengoku and Benten to handle all the physical stuff.
33* ''Anime/BubblegumCrisis'': In the eighth and final episode of the original series, Nene, the {{Hackette}} of the Knight Sabers, is caught in the middle of a DieHardOnAnX situation at A.D. Police headquarters caused by a disgruntled scientist and the hero hunter [[KillerRobot boomers]] he created -- one of which physically merges with the ADP's main server and takes control of the building. Once Nene's teammates come to the rescue, Nene has to battle the hacker boomer in order to [[LiveActionEscortMission escort the police chief's daughter to safety]], opening locked doors and overriding building defenses all the while. After the other boomers are defeated, Nene has to prevent the hacker boomer from self-destructing the headquarters building.
34[[/folder]]
35
36[[folder:Comic Books]]
37* ''ComicBook/BirdsOfPrey'': Oracle and [[EvilCounterpart Calculator]] faced each other online several times. Typically, it was to get the other's location so they could send superhuman agents to arrest/kill each other.
38* ''ComicBook/{{Robin|1993}}'': Tim ends up in a hacker duel with a hacker the Joker kidnapped in "Joker's Wild". When it becomes clear that the kidnapped hacker is trying to hack into the batcave's systems and won't be of any aid in his own rescue Tim [[CutTheJuice cuts the power]] to the batcomputer.
39[[/folder]]
40
41[[folder:Films -- Live-Action]]
42%%* ''Film/JohnnyMnemonic''.
43* Part of the climax of ''Film/{{Hackers}}''. Also the scene where Dade tries to take over the TV studio. In reality, it's two robot arms trading a videotape. In Hollywood it's two titans meeting on the battlefield, if the kung fu clips interspersed with the robot arms and neat visual effects surrounding Dade's head are supposed to mean anything.
44* The Film/JamesBond film ''Film/GoldenEye'' has a world map where the audience can see how the tracing back of the hacker works (in Hollywood!). The backtracing map is trivial to implement (traceroute, [=GeoIP=], Google Maps, whatever takes your fancy), its just that fancy {{Viewer Friendly Interface}}s tend to get in the way of most useful network administration or abusing activities. Also, PlayfulHacker Boris kills time by hacking into Western computers and taunting his opponents as they try to thwart him. He even thinks of unplugging his computer in the end, when he gets hacked back. He doesn't just pull the cable out though, but rips out whole racks of gear and throws them on the floor.
45* In ''Film/DemonHuntersDeadCamperLake'', two Cyborg DuelingHackers, complete with ominously named programs with skull icons, while sitting face to face at the same table. Eventually, the losing cyborg shrugs, picks up his laptop and [[CombatPragmatist clubs his enemy to death]].
46* In ''Film/ResidentEvil2002'', Kaplan has a hacking duel with the Red Queen [=AI=] to bypass her defenses.
47* ''Film/TheCore'' treated Rat's interaction with security systems this way, as though he were dueling with the security programmer. After breaking into DESTINI and shutting it down, "Your kung fu is not strong."
48* In ''Film/WhoAmI2014'', two hackers with the alias ''[=WhoAmI=]'' and ''MRX'' try to outgambit one another.
49[[/folder]]
50
51[[folder:Literature]]
52* A regular element in Creator/VernorVinge's [[UsefulNotes/HugoAward Hugo]]-nominated novella, "Literature/TrueNames", especially in the climax, where Mr. Slippery and Erythrina are fighting the BigBad for control of the world's computer systems, including missile launch codes and military {{Kill Sat}}s.
53* ''Literature/AFoxTail'' quickly switches from Vulpie controlling everything with an internet connection to Vulpie struggling for control against his own robotic duplicate Evil Vulpie.
54[[/folder]]
55
56[[folder:Live-Action TV]]
57* On ''Series/{{Alias}}'' Marshall (the resident Omnidisciplinary Nerd) was in a hacking duel at least once, as someone tried to break into [=SD6=]'s system.
58* ''[[https://www.youtube.com/watch?v=4gHNVNRQTJg The KGB, The Computer And Me]]'' : A semi-dramatization[[note]]with, wherever possible, the real-life people being [[AsHimself played by themselves]] to... let's say ''mixed'' results[[/note]], semi-documentary made for PBS Nova on Clifford Stoll's discovery of a KGB-backed hacking ring, as mentioned in Real Life below. Features a recreation of the real-life PhoneTraceRace that finally pinpointed the hacker's origin, along with a lot of pretty good (if sometimes slightly simplified) explanations of how the hacking worked, and how Stoll used his ingenuity, computer skills, and the many and varied talents of his friends and colleagues to help crack the case.
59* ''Series/{{Smallville}}'', as Chloe tries to keep hackers out of Watchtower.
60* ''Series/{{Leverage}}'' :
61** Hardison got into one of these in "The Two Live Crew Job". Bonus points for the fact that the antagonist is played by Creator/WilWheaton.
62--->'''Hardison:''' Chaos. I heard you were in jail. Guess I was wrong.\
63'''Chaos:''' Alec Hardison. [[LameComeback I heard you sucked]]. Guess I was right.
64** When they re-match later in the episode, Chaos uses the oft-mentioned MundaneSolution (CutTheJuice) on Hardison's rig in his van. [[spoiler: Hardison had already set up a hand-cranked generator so he could restart all his equipment and come back online to save the day]]
65** [[ClassyCatBurglar Parker]] also had a [[CookingDuel pickpocketing duel]] with her opposite number as well. This ends up backfiring, as the guy suddenly finds a lot of his stuff missing and immediately orders a lockdown.
66* ''Series/CriminalMinds'':
67** This is the set-up for a sort of online MeetCute between Penelope Garcia and her soon-to-be-boyfriend, Kevin Lynch, with Garcia as the hacker.
68** It also happens once when Garcia '''lost''' and is out of commission all day while she rips apart her computer (physically) to get it running again.
69* Used quite often in ''Series/{{NCIS}}'', predominantly with Abby and/or [=McGee=] against any villain of the week who has a modicum of techno savvy who is trying to hack them. Subverted in one episode where Gibbs, who is notoriously bad with technology and especially computers, does, in fact, simply pull the plug when the aforementioned brainy duo are being overwhelmed by a particularly skilled hacker. In fairness, the reason they can't typically do that is because they need that computer online to do [[FridgeLogic whatever they were doing on it in the first place]]. Especially since it's frequently time-sensitive.
70** When in doubt, [[https://www.youtube.com/watch?v=u8qgehH3kEQ have two people type at once for double the hack potential]]!
71* Kyle and Jessi do this in a second-season episode of ''Series/KyleXY''.
72* A legendary duel occurs early in Season 7 of ''Series/TwentyFour'' between Chloe and Janis.
73* During the Chairman arc of ''Series/WalkerTexasRanger'', at one point the hacker working for the BigBad and the one on Walker's team (who have some prior history between them) get into a duel while trying to crash Walker's plane and trying to save it respectively.
74* In "Series/{{Chuck}} Versus the Hack-Off", Chuck has to participate in the episode's titular "hack-off" (a competition where hackers have to outduel their competition) in order to get some dirt on the villain of the week.
75* Generally averted in ''Series/PersonOfInterest''. Most hacking affairs are entirely one-directional with the hacker working against the system security and either succeeding or failing to reach their objective. In the three cases where an enemy counter-hacks, the situation is generally resolved by [[CutTheJuice powering down the hacking device]] or [[CuttingTheKnot destroying it.]]
76* In the ''Series/DoctorWho'' episode "[[Recap/DoctorWhoS33E6TheBellsOfSaintJohn The Bells of Saint John]]", the Doctor engages in this with the Shard organization when he hacks and [[ItMakesSenseInContext reverses an upload of Clara's soul]].
77* ''Series/{{Arrow}}'':
78** The episode "[[Recap/ArrowS2E14TimeOfDeath Time of Death]]" is all about this, with Felicity engaging in a hacking war with the Clock King.
79** Two seasons later in "[[Recap/ArrowS4E12Unchained Unchained]]", she gets into it again with the Calculator, who is revealed [[spoiler:to be her DisappearedDad]], and so in the season finale she teams up with him to stop HIVE from [[EverythingIsOnline hacking into the world's nuclear missiles]] to destroy the world, only to find they're using [[spoiler:her hackivist ex-boyfriend from college]] to counter-hack them.
80
81[[/folder]]
82
83[[folder:Tabletop Games]]
84* Can happen in {{Cyberpunk}} games when a hacker tries to break into a computer system guarded by defending programmers. For example, in ''TabletopGame/{{Shadowrun}}'' adventures whenever a decker tries to penetrate a system protected by defense deckers (known as "spiders").
85** Since the Matrix in ''Shadowrun'' employs copious amounts of YourMindMakesItReal, hacking duels between deckers and especially Technomancers can resemble a WizardDuel. Failing to defeat standard IC (Intrusion Countermeasures) tends to leave a hacker with a headache. Failing to defeat Black IC tends to be [[YourHeadAsplode more permanent]].
86* Special mention goes to ''TabletopGame/{{Infinity}}'', where hackers can and will end up in duels where the loser's head explodes.
87[[/folder]]
88
89[[folder:Video Games]]
90* One of the [[HackingMinigame RTS missions]] in ''VideoGame/ShinMegamiTenseiNINE'' involves defending a private shop's customer records from hackers.
91* According to emails in ''VideoGame/DeusExHumanRevolution'', Pritchard aka "[=Nucl3arsnake=]" got into one of these with Arie van Bruggen aka "Windmill". Pritchard managed to hold his own and would have won if Windmill hadn't discovered Sarif's hidden backdoor access.
92* As ''VideoGame/{{Uplink}}'' is all about hacking, this is inevitable; lingering around the backdoor of a computer network brings you closer to the target system carrying out a back-trace, and there's also the risk of the system administrator coming online to deal with you.
93* The SpiritualSuccessor ''VideoGame/{{Hacknet}}'' also has an example. [[spoiler: During a certain mission, [[TheCracker Naix]] will trace you, delete a file on your in-game PC and then execute a forkbomb to force a reboot.]]
94* In ''VideoGame/InjusticeGodsAmongUs'', when the Alternate Universe Cyborg (who's working with Superman) finds his Main Universe counterpart trying to hack into the Watchtower's teleporters (and having beaten alternate Catwoman in the meantime), he sends a virus to his systems to hold him in place. Cyborg immediately counters by hacking into his double's systems to do the same. They stand before each other, using holographic screens to hack into the other's cybernetics for a good while, until they decide that isn't working and go on to just beat the crap out of each other.
95* This naturally occurs several times in ''VideoGame/WatchDogs'' and its [[VideoGame/WatchDogs2 sequel]], most notably with Defalt and Lenni respectively. In a variation on the trope, there are also physical confrontations on top of the digital contests.
96* A more physical ([[{{cyberspace}} sort of]]) variant takes place in ''VideoGame/DigimonStoryCyberSleuthHackersMemory'' where hacker duels take the form of [[{{mons}} Digimon]] battles, as they're essentially living malware.
97* In ''VideoGame/Ghost10'', this is the premise of the FinalBattle - [[spoiler:[[BadBoss Viktor's]] coder trying to disable the shield around [[PlayerCharacter Ghost's]] [[WetwareCPU brain]], while [[MissionControl Jacker]] tries to scramble the brains' ID numbers so that no one will be able to tell which one belongs to Ghost ever again.]]
98[[/folder]]
99
100[[folder:Visual Novels]]
101* In ''VisualNovel/InvisibleApartment'', the protagonist tries to go after a hacker who nearly got her caught, but since the hacker can't be tracked directly, the "duel" eventually involves physically trying to track down the actual locations from which the other hacker could connecting.
102* Happens in several route in ''VisualNovel/MysticMessenger'' between Seven and Unknown. Makes sense, considering they're [[spoiler: twin brothers.]]
103[[/folder]]
104
105[[folder:Webcomics]]
106* ''Webcomic/CtrlAltDel'': [[GeniusCripple Scott]] battles with TheMaster for [[https://cad-comic.com/comic/analog-and-d-pad-06-27/ control]] of [[KillerRobot Zeke]].
107* A sequence in ''Webcomic/{{Megatokyo}}'' featured this.
108* A CurbStompBattle [[http://xkcd.com/341/ happened in]] ''Webcomic/{{xkcd}}''.
109* In ''Webcomic/{{Narbonic}}'', Dave got into one of these with Lovelace before the beginning of ''Professor Madblood and the Lovelace Affair''. He's sad when she turns out to be better at it than he is, but then they [[RomanticFalseLead start talking]]... [[spoiler: It wasn't his fault. She's an AI.]]
110[[/folder]]
111
112[[folder:Web Video]]
113* Parodied in the ''WebVideo/DoorMonster'' skit ''[[https://www.youtube.com/watch?v=ZTwCtQIEswM&index=87&list=PL0u5ZHidq4X48xzpr-IfP8nHVFhtQfitZ Hacker Fight]]'', appropriately. The two sides duel using HollywoodHacking techniques only, such as sunglasses and multiple screens.
114[[/folder]]
115
116[[folder:Real Life]]
117* ''[[http://en.wikipedia.org/wiki/The_Cuckoo%27s_Egg_%28book%29 The Cuckoo's Egg]]'' is a first-hand account of real-life Duelling Hackers from 1986. Clifford Stoll was asked by his supervisor to find the cause of a $0.75 billing anomaly in the accounts; over ten months, he followed the trail from that, to a hacker who was breaching American military networks looking for information on the Nuclear and SDI programs and selling what he stole to the KGB.
118** This story is notable for being the first properly documented case of computer hacking: Clifford Stoll was an astronomer, trained to document what he did in detail, and with the curiosity of a scientist - as opposed to the standard response of an IT guy, who would usually have just locked out the offending user accounts and forgotten all about it.[[note]]Although it is worth noting that locking out the offending accounts was in fact the first thing Stoll did - he started to pay way more attention when he noticed the hackers had come back.[[/note]]
119* Hackers from Taiwan and China have had actual hacking feuds going on. After all, why not try to hack your countries most likely enemy and get sympathy from your nearest neighbors, rather then making them mad?
120** Israel and just about every Arab nation around also have this going on.
121* Allegedly, the internet has recently been slowed down by a 'war' that started when [[http://digitaledge.excite.co.uk/monster-revenge-cyberattack-against-anti-spam-firm-causes-global-internet-slowdown-N45345.html SpamHaus, a non-profit organization that provides anti-spam services, decided to blacklist sketchy Dutch web filtering firm CyberBunker, who didn't take it lightly. They retaliated apparently not only with a massive strike of the Distributed Denial of Service (DDoS) kind - but also with a more vicious Domain Name System (DNS) attack.]]
122* [[http://en.wikipedia.org/wiki/Core_War Core War]] is a nerdier version of gladiator fighting. Programmers write small "warrior" programs in a special language called Redcode, which are then released into a simulated computer to fight to the death.
123* There are actual competitions - sponsored by technology companies - in which a team of programmers have to set up and operate a computer system that performs some function while a second team tries to hack into and take down the system.
124* A [[https://en.wikipedia.org/wiki/Tiger_team Tiger Team]] can be thought of as a version of this: the security system they are trying to break is not always computer based, but the central notion - pitting two technological experts against each other - is very similar.
125* "Bug Bounties" are sometimes offered by software companies in an effort to avert this trope; if a hacker finds an exploitable bug in a piece of software, they ''could'' go to all the trouble of weaponizing it and hope that the company doesn't find and patch the problem before their own exploit tool is finished... or they could just report it to the maker and take a nice payoff - the more the bug threatens security, the higher the payoff tends to be. Of course, some hackers aren't in it for the money, and some have FlameWar levels of hatred for the big software companies and want their products to fail, so it doesn't always work.
126[[/folder]]

Top