Dr. Dobb's is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Channels ▼
RSS

Dangerous Dealings




Plenty of Options

Of course, reformed hackers aren't the only ones peddling their security expertise to potential customers. Consulting firms (such as Computer Sciences and Electronic Data Systems), service providers (Exodus), and hardware and software vendors (Cisco Systems, Hewlett-Packard, and IBM, to name a few) all want to cash in on the security boom.

In recent months, hundreds of hackers have been joyriding throughout the nation, using laptops with wireless LAN cards to seek out insecure corporate networks. These "war riders" use NetStumbler and other PC software to hunt down signals from wireless LAN access points. Instead of linking to the wireless networks—which is illegal—most war riders just seek to raise awareness about poor wireless LAN security practices.

Jeremiah Grossman, former information security officer at Yahoo, is a poster boy for the corporate hacker movement. At Yahoo, Grossman designed, audited, and attempted to penetrate the company's Web applications. He also oversaw Yahoo's partner-integration security reviews. Grossman is now CEO of WhiteHat Security, a consulting firm in San Jose, California, that performs security and penetration testing for its clientele.

"All hackers aren't necessarily criminal per se, but they do have very advanced skills," says Grossman. "It's similar to any other profession. For example, doctors have very advanced skills, yet some of them are involved in bad and or illegal activities. Such is the case with hackers."

Security Services

Reformed hackers and security consulting firms offer a fairly similar list of services, including security assessment and penetration testing, systems and network auditing, security policy reviews and consultations, and denial-of-service-attack mitigation.

The fees for such services vary widely. IBM Global Services charges from $15,000 to $200,000 (plus travel costs and applicable taxes) for its Ethical Hacking Services. By contrast, Rent-A-Hacker (www.rent-a-hacker.com) charges $1,400 for a typical Web site security assessment, and former black-hat hackers are known to charge more than $250 an hour for their services.

"The question becomes, Who can you trust?" says Grossman. "Security is about limiting risk. Does hiring someone like a reformed hacker decrease your level of risk? That's a personal question every customer has to weigh."

Generally speaking, companies are loath to disclose their dependence on reformed hackers. Convicted Mitnick accomplice Lewis DePayne, for one, has confirmed that he worked for a Fortune 500 company. Hacker Petersen also says he works for a Fortune 500 firm. Neither hacker, however, cares to mention his employer by name.



Related Reading


More Insights






Currently we allow the following HTML tags in comments:

Single tags

These tags can be used alone and don't need an ending tag.

<br> Defines a single line break

<hr> Defines a horizontal line

Matching tags

These require an ending tag - e.g. <i>italic text</i>

<a> Defines an anchor

<b> Defines bold text

<big> Defines big text

<blockquote> Defines a long quotation

<caption> Defines a table caption

<cite> Defines a citation

<code> Defines computer code text

<em> Defines emphasized text

<fieldset> Defines a border around elements in a form

<h1> This is heading 1

<h2> This is heading 2

<h3> This is heading 3

<h4> This is heading 4

<h5> This is heading 5

<h6> This is heading 6

<i> Defines italic text

<p> Defines a paragraph

<pre> Defines preformatted text

<q> Defines a short quotation

<samp> Defines sample computer code text

<small> Defines small text

<span> Defines a section in a document

<s> Defines strikethrough text

<strike> Defines strikethrough text

<strong> Defines strong text

<sub> Defines subscripted text

<sup> Defines superscripted text

<u> Defines underlined text

Dr. Dobb's encourages readers to engage in spirited, healthy debate, including taking us to task. However, Dr. Dobb's moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing or spam. Dr. Dobb's further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | View the list of supported HTML tags you can use to style comments. | Please read our commenting policy.