Do hackers actually type a lot like in the movies?


Do they ever use mouse?

In: 0

In general, people who use computers professionally tend to be using keyboard commands more often than casual users. That being said, hacking in the movies is completely unrelated to how it works in real life, because it’s very difficult to make it look exciting to run a program and wait an hour or so for results. Having the characters type frantically makes for something that looks interesting on screen, so even if that’s completely not what hacking would look like, it gets put in movies anyway.

Not anywhere like in the movies, but yes, lots of typing in command line windows.

Some tools have graphical interfaces and there is tons of research involved so lots of web browsing, so yes they still use their mouse.

Hacking in the movies bears basically no resemblance to what hackers actually do. Speed is rarely of the essence, and all the flashing popups are just for show.

But there is a good reason why you would see them mainly at the keyboard. Most fundamental computer systems, the kind that hackers would want to gain unauthorized access to, are text-based. You interact with them by typing commands rather than clicking buttons. Software exists to give these types of systems a GUI (graphical user interface), but it would be silly to go around trying to install and connect that kind of thing in a system you just snuck into.

Are you trying to catch hackers?

Short answer is no, very minimal typing at the time of the attack and probably no mouse since it will be on a text driven command line line you do see in the movies.

Really most of the work will be done ahead of time, in the form of scripts/programs that someone already wrote. It could be that same hacker or another and they just downloaded it.

ELI5 part: Imagine your teacher says you have an online test with open ended questions. For the test itself you only get 30 minutes but they give you a bunch of questions the *could* be on the test ahead of time. A good student would prepare answers for those questions and then just paste them into the test.

That’s what hackers are doing