troperville

tools

toys


main index

Narrative

Genre

Media

Topical Tropes

Other Categories

TV Tropes Org
random
Dueling Hackers
aka: Hacker Duel
That's Hollywood. Reality is simpler.
A head-to-head confrontation between two computer hackers, combining the excitement of people typing with the thrill of network protocol loopholes being exploited.

One hacker is trying to penetrate a computer system while the second is busily trying to keep the first one out. Expect the hackers to consider each other to be a Worthy Opponent. Often mixed with an attempt to back-trace the invading Hacker's source, depicted much like phone back-tracing usually is. Expect plenty of Hollywood Hacking jargon and visuals to keep the audience occupied.

Almost no one thinks to simply unplug the target computer from the network because apparently Everything Is Online, always.

Examples:

    open/close all folders 

    Anime & Manga 
  • Mahou Sensei Negima!: Chisame versus Chachamaru in the festival arc.
  • In Gakuen Heaven of all things the vice-presidents of the student council and the treasury are constantly trying to hack each other and keep the other out.
  • In Bloody Monday the protagonist has many duels with opposing hackers, both in the first and second seasons.
  • Ghost in the Shell has a few examples.
    • It also averts the trope in Solid State Society. Section 9 actually does cut the power when they start getting hacked (via fireaxe to the power cords).
  • Happens in Cannon God Exaxxion as both sides run a propaganda war against each other.
  • In Demon Hunters: Dead Camper Lake, two Cyborg Dueling Hackers complete with ominously named programs with skull icons, while sitting face to face at the same table. Eventually, the losing cyborg shrugs, picks up his laptop and clubs his enemy to death.
  • A slowed down and scaled up version: The .hack plot-lines for the Twilight manga and anime involve a group of hackers breaking down an MMORPG while the game's programmers try and counter the slow infection.
  • Hanaukyō Maid Tai. In episode 8 the Jihiyou family hacks into the MEMOL supercomputer to steal information (and possibly activate the mansion's Self-Destruct Mechanism). Grace manages to defeat them.
  • It's not really made that much of, but this happens between Yatouji Satsuki and Imonoyama Nokoru in X/1999. She is trying to hack into the computers of CLAMP Campus and he is trying to keep her out. Given that Satsuki is a technopath working in tandem with a supercomputer, the fact that Nokoru actually manages to make it combat instead of a Curb-Stomp Battle is pretty impressive.
  • Happens often enough in Dennou Coil, since realspace and cyberspace are linked. A particularly heated one happens between Isako and Fumie early on.
  • While it wasn't precisely done by hackers (mostly), the Digimon Adventure movie introducing Diablomon featured a fight between the viral creature and the hero 'mons... IN CYBERSPACE.

    Comic Books 
  • Oracle and Calculator faced each other online several times in Birds of Prey. Typically, it was to get the other's location so they could send superhuman agents to arrest/kill each other.

    Film 
  • Johnny Mnemonic.
  • Part of the climax of Hackers.
    • Also the scene where Dade tries to take over the TV studio. In reality, it's two robot arms trading a videotape. In Hollywood it's two titans meeting on the battlefield, if the kung fu clips interspersed with the robot arms and neat visual effects surrounding Dade's head are supposed to mean anything.
  • The James Bond film GoldenEye has a world map where the audience can see how the tracing back of the hacker works (in Hollywood!).
    • The backtracing map is trivial to implement (traceroute, GeoIP, Google Maps, whatever takes your fancy), its just that fancy Viewer Friendly Interfaces tend to get in the way of most useful network administration or abusing activities.
    • Also, Playful Hacker Boris kills time by hacking into Western computers and taunting his opponents as they try to thwart him.
      • He even thinks of unplugging his computer in the end, when he gets hacked back. He doesn't just pull the cable out though, but rips out whole racks of gear and throws them on the floor.
  • In Demon Hunters: Dead Camper Lake, two Cyborg Dueling Hackers, complete with ominously named programs with skull icons, while sitting face to face at the same table. Eventually, the losing cyborg shrugs, picks up his laptop and clubs his enemy to death.
  • Resident Evil. In the first movie Kaplan has a hacking duel with the Red Queen AI to bypass her defenses.
  • The Core treated Rat's interaction with security systems this way, as though he were dueling with the security programmer. After breaking into DESTINI and shutting it down, "Your kung fu is not strong."

    Literature 
  • A regular element in Vernor Vinge's Hugo-nominated novella, "True Names", especially in the climax, where Mr. Slippery and Erythrina are fighting the Big Bad for control of the world's computer systems, including missile launch codes and military Kill Sats.
  • A Fox Tail quickly switches from Vulpie controlling everything with an internet connection to Vulpie struggling for control against his own robotic duplicate Evil Vulpie.

    Live Action TV 
  • On Alias Marshall (the resident Omnidisciplinary Nerd) was in a hacking duel at least once, as someone tried to break into SD6's system.
  • Smallville, as Chloe tries to keep hackers out of Watchtower.
  • Hardison on Leverage got into one of these in "The Two Live Crew Job". Bonus points for the fact that the antagonist is played by Wil Wheaton.
    Hardison: Chaos. I heard you were in jail. Guess I was wrong.
    Chaos: Alec Hardison. I heard you sucked. Guess I was right.
    • When they re-match later in the episode, Chaos uses the oft-mentioned Mundane Solution (Cut the Juice) on Hardison's rig in his van. Hardison had already set up a hand-cranked generator so he could restart all his equipment and come back online to save the day
    • Parker also had a pickpocketing duel with her opposite number as well.
      • This ends up backfiring, as the guy suddenly finds a lot of his stuff missing and immediately orders a lockdown.
  • On Criminal Minds, this was the set-up for a sort of online Meet Cute between Penelope Garcia and her soon-to-be-boyfriend, Kevin Lynch, with Garcia as the hacker.
    • It also happened once when Garcia lost and was out of commission all day while she ripped apart her computer (physically) to get it running again.
  • Used quite often in NCIS, predominantly with Abby and/or McGee pi against any villain of the week who has a modicum of techno savvy who is trying to hack them. Subverted in one episode where Gibbs, who is notoriously bad with technology and especially computers, does, in fact, simply pull the plug when the aforementioned brainy duo are being overwhelmed by a particularly skilled hacker.
  • Kyle and Jessi do this in a second-season episode of Kyle XY.
  • A legendary duel occurs early in Season 7 of 24 between Chloe and Janis.
  • During the Chairman arc of Walker, Texas Ranger, at one point the hacker working for the Big Bad and the one on Walker's team (who have some prior history between them) get into a duel while trying to crash Walker's plane and trying to save it respectively.
  • In "Chuck Versus the Hack-Off", Chuck has to participate in the episode's titular "hack-off" (a competition where hackers have to outduel their competition) in order to get some dirt on the villain of the week.

    Tabletop Games 
  • Can happen in Cyberpunk games when a hacker tries to break into a computer system guarded by defending programmers. For example, in Shadowrun adventures whenever a decker tries to penetrate a system protected by defense deckers.

    Video Games 
  • According to emails in Deus Ex: Human Revolution, Pritchard aka "Nucl3arsnake" got into one of these with Arie van Bruggen aka "Windmill". Pritchard managed to hold his own and would have won if Windmill hadn't discovered Sarif's hidden backdoor access.
  • As Uplink is all about hacking, this is inevitable; lingering around the backdoor of a computer network brings you closer to the target system carrying out a back-trace, and there's also the risk of the system administrator coming online to deal with you.

    Webcomics 

    Real Life 

Duels Decide EverythingDueling TropesFumbling The Gauntlet
Destruction Equals Off SwitchMagical ComputerEnhance Button
Deus Est MachinaCyberpunk TropesElectronic Telepathy
Drunk on the Dark SideNarrative DevicesDysfunction Junction
Bigger Than CheesesImageSource/Web ComicsMundane Solution

alternative title(s): Dot Combat; Hacker Duel
random
TV Tropes by TV Tropes Foundation, LLC is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Permissions beyond the scope of this license may be available from thestaff@tvtropes.org.
Privacy Policy
24175
29