'I Hired a Hacker': A Security Manager's Confession

The new security department hire must be good because he's already broken into the system

I'm sitting at my desk, having a cup of coffee and a toasted bagel when I notice this young, blond, pimply-faced kid standing outside my cube with this smirk on his red, puffy-cheeked face. I ask him what I can do for him, and he hands me a piece of paper with a Web site address written on it. It looks like an address that a customer would use to access the application that we host.

1pixclear.gif
1pixclear.gif
1pixclear.gif

This Week's Links

Readers interested in learning more about network security and intrusion detection should check out the Network Security Library Web site. The site, which acts as an information repository for both hackers and security managers, contains links to some very well-written, recent papers. Timeliness is key in researching network security, because the technology is always changing.

For those readers who think I'm crazy for hiring hackers, the article "Issues: Hiring hackers, the fine line between cult and criminal" at the Help Net Security Web site lays out the arguments supporting my decision.

Internet Security Systems Inc.

The Nessus project Web site's goal is "to provide to the Internet community a free, powerful, up-to-date and easy to use remote security scanner." Check it out.

The Insecure.org hacker Web site is a source for the nmap port scanning tool.

RSA Security Inc.

Tripwire Inc.

F-Secure Corp.

1pixclear.gif

I ask what this is all about and he introduces himself as one of our company's application developers. He explains that he likes to "kinda hack a little bit" on the side and how he "discovered this" while playing around at home. I take the Web address, type it into my browser, hit Enter and a list of customer names, addresses, phone numbers and credit card numbers appears on screen.

Uh-oh. This information is normally supposed to be accessible only through a series of authentications, but the address bypassed the authentication mechanisms and displayed the data. The kid goes on to explain to me how the application programming interface (API) isn't configured properly and how many other pages can be displayed by bypassing the authentication screens. I thank him for the information, take a few notes on the details of the authentication API and then begin to interview him.

He's just 23 years old and has been playing with Linux since he was 14, started programming at 16 (for fun, he says) and has had part-time and full-time jobs as a Unix and Windows NT administrator and as an application developer for the past six years. He has no college education (but has just enrolled), and security is his hobby.

Eureka! I've hit the jackpot. A perfect fit for my plan to conquer the world. Even better, the application development project he has been working on was finished and he had been expressing an interest in security for some time. To make a long story short, I put in a request to have this kid transferred into my group. He's Unix-savvy, bright, articulate and, best of all, he knows our business very well. He's been working as a developer for almost two years and therefore has an extreme in-depth knowledge of the application we host and sell to customers.

As many readers probably know, security professionals are extremely difficult to find. In my experience, there are many of what I call "articulate incompetents": those who make great managers but can't do the keystroking if their lives depended on it. They can address a variety of audiences and wow them with security lingo and pontifications on security best practices and the ramifications of weak security. But ask them to install and configure a firewall-to-firewall virtual private network and they don't have a clue. In a large or consulting organization, security professionals of that type will fare well and are often needed. In a start-up environment, however, even the manager needs to get his hands dirty.

What's difficult is finding a mix of well-rounded individuals with good communication skills and some business sense, combined with years of hands-on Unix, Windows NT, programming and, most important, hacking skills. Yes, that's right, hacking skills. I've been involved in many hiring processes and in my experience hackers make the best employees on a security team. They're dedicated, disciplined, savvy and very technical. Yes, I sometimes have funny feelings about these folks, but as long as they pass a full background check and they have a reputable resume, I'm comfortable.

I believe that 98% of the people in this world are genuinely good. Most hackers, when faced with the opportunity to take advantage of a weakness and exploit it for some fiduciary gain, will shy away. Take a look at most of the "hacked" Web pages out there. The verbiage is that of an adviser: "This Web site hacked by [whomever]," or "Your security sucks. Your original home page is here [link to page]." Yeah, it's embarrassing and makes you feel violated, but most hackers will stop after they've hacked the Web page. Don't get me wrong, I would never hire anyone who I felt was a criminal. I've got a fairly good sense about people, and I haven't made a hiring decision I've regretted. Anyway, that's my 2 cents on today's hackers and why I usually don't have a problem hiring them.

Shopping Spree Begins

I spent the rest of the day on the phone with vendors, placing my initial requests for security software. I decided to go with Atlanta-based Internet Security Systems Inc.'s (ISS) RealSecure intrusion-detection software (IDS). I've used this tool before, and the only problem I had was with bandwidth.

When selecting an IDS product, you have to make sure that the tool will continue to be effective at the upper limits of your network bandwidth. In our case, the aggregate bandwidth never exceeds 8M bit/sec., even though we're on a 100M bit/sec. switched architecture. But there comes a point at which an IDS will start dropping packets. Some folks call this "sampling mode."

In any case, I don't want my IDS to miss anything, so I'm very picky about performance. I've done a lot of work testing IDS performance in a very controlled environment. And, being a start-up, we can't afford the $10,000-per-month outlay for an outsourced monitoring service. RealSecure is easily configurable out of the box, and the alerts are meaningful enough that, with moderate training, I can leverage our operations center personnel to react appropriately when something goes bump in the night.

In addition to RealSecure, I went ahead and placed an initial request for ISS's Internet Scanner and Database Scanner products. Like RealSecure, I've used them in the past and have been extremely satisfied. I feel that ISS's scanner, in conjunction with some free tools like the Nessus security scanning software and the Nmap port scanner, will be 98% effective in discovering any potential or glaring holes in our infrastructure.

The biggest problem with scanners is the corrective action necessary to fix the discovered vulnerabilities. It's always a challenge to get the system administrators to make changes to live production systems. As a security manager, you have to put on the hard hat and start acting as a threat broker and change agent. I usually like to demonstrate the vulnerability associated with the recommended corrective action. When I can show the hack, folks are more receptive and more willing to implement change.

I also started getting quotes for SecurID tokens from RSA Security Inc. in Bedford, Mass.; a Tripwire file integrity checking software from Tripwire Inc. in Portland, Ore.; and the latest commercially supported version of the SSH secure session software from F-Secure Corp. in Espoo, Finland.

Next time, I'll explain in detail my awesome IDS testing experience. It was actually fun for all of us . . . well . . . except the vendor.

What do you think? Would you hire a hacker? Post your opinion in our forums. (Note: Registration required to post message; anyone may read messages. To register for our forums, click here).

Copyright © 2001 IDG Communications, Inc.

7 inconvenient truths about the hybrid work trend
Shop Tech Products at Amazon