Ethical Hacking The Security Justification Redux
Ethical Hacking The Security Justification Redux
net/publication/3955165
CITATIONS READS
17 3,479
3 authors, including:
William Yurcik
University of Illinois, Urbana-Champaign
201 PUBLICATIONS 2,959 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by William Yurcik on 03 July 2014.
Ethical Hacking:
The Security Justification
Abstract
The state of security on the Internet is poor and progress toward increased protection is slow.
This has given rise to a class of action referred to as “Ethical Hacking”. Companies are
releasing software with little or no testing and no formal verification and expecting consumers to
debug their product for them. For dot.com companies time-to-market is vital, security is not
sunk expense such that there is no economic incentive to produce bug-free software. There are
even legislative initiatives to release software manufacturers from legal responsibility to their
defective software.
Ethical hackers find bugs and fix bugs. In the process they beta test software for companies in
exchange for access and information. They scan networks for bugs and share information about
software bugs over the Internet. Alerting a software company to a bug, there is an expectation
Hackers often take it upon themselves to disclose sensitive information they have themselves
incredible ambiguity in that sometimes the Ethical Hacker is a respected university professor
who is perceived as doing a service to the Internet community and sometimes the Ethical Hacker
is suspicious foreign student who is perceived as a malicious cracker. It is not clear that without
Introduction
Hacking has come to have many different and often conflicting definitions. Hackers do not
require certification, anyone can say they are a hacker. For the purposes of this paper we define
hacking as the software methodology to achieve a particular goal using self-taught programming
experimentation “to make rough cuts” (Murray 2000). Celebrated incidents of unauthorized
computer intrusions into computer systems have been attributed to hackers due to the extensive
Computer intrusions are considered to be unethical and laws have been passed to prosecute such
behavior. Spafford clearly states that computer intrusions are ethical only in life-saving
circumstances (Spafford 1992). Once hacking ability is used to commit a crime, the hacker
becomes a criminal. However, a new class of “ethical hackers” has arisen who believe that
probing for computer intrusions, a legal activity that provides sensitive information, provides a
altruistic service to increase both local and global Internet security by exposing and fixing
security flaws.
The debate between “ethical hacking” and criminal intrusion dates back to the very first
widespread Internet virus, the Internet Worm of 1988. Robert Morris was convicted for intrusion
damage caused by the Internet Worm but his defense lawyers argued that he had provided a
Ethical hackers use their knowledge to help improve system security. Upon discovering a
security flaw, they do not exploit the flaw; they fully disclose all relevant information to the
affected users of the systems, software companies, mailing lists, trade press, or popular media.
In contrast, unethical hackers (crackers) gain unauthorized access to subvert systems. Statistics
show that the motivation of unethical hackers has changed from the pursuit of knowledge and the
desire for challenge to the new lures of money, power, or political purposes (hactivism) (Palmer
2001). They privately share their knowledge of security flaws, maintain unauthorized access,
The Problem
networked information systems that can consistently prevent successful attacks (Evans 2001).
The natural escalation of offensive threats versus defensive countermeasures has demonstrated
time and again that no practical systems can be built that is invulnerable to attack. Even an
organization where network and computer security is paramount such as the US Department of
We posit that the main factor contributing to the poor state of security on the Internet is the lack
of quality software testing. The intellectual complexity associated with software design, coding,
and testing virtually ensures the presence of “bugs” in software that can be exploited by
attackers. Most software today is tested for bugs by the penetrate-and-patch approach – when
someone finds an exploitable security “hole” the software manufacturer issues a patch.
This approach has proved inadequate since after-the-fact security leaves bug vulnerabilities open
until they are exploited. However, software manufacturers find this approach economically
attractive – why invest time and money in assurance testing if consumers are not willing to pay a
premium for secure software. Time-to-market survival dictates that software is released as early
The problem presented by lack of quality testing is also acerbated by automated attacks,
operating system homogeneity, and poor practices. Devastating attacks appear in executable
scripts that can be downloaded to anonymously target systems anywhere in the world. The
homogeneity of operating system software from the same manufacturer (i.e., Microsoft
Windows) makes it possible for a single-attack strategy to have a wide-ranging and devastating
impact. Poor system administration practices result in a system remaining susceptible to
vulnerabilities even after corresponding patches have been issued from software manufacturers.
It has been estimated that over 90% of all Internet attacks would have been deterred if system
administrators had implemented the most current versions of their system software (Schneier
2000).
Testing for security flaws appears to be a natural attraction many for hackers – it is both
challenging and contributes to the public good by exposing and patching vulnerabilities. Manual
testing has evolved into automated programs scanning a network of computers for known
weaknesses (de Vivo 1999). Scanning is not a one-time fix – new software versions bring new
bugs and new security flaws that can be exploited are discovered. The frequency of the scan will
depend on the software lifecycle of the systems involved and the ability to cleanup
In 1995 Dan Farmer introduced a scanner called SATAN (Security Administrator for Analyzing
Networks) (Freiss 1997, Farmer 1993). Unlike previous automated scanners that ran on the
particular system being analyzed, SATAN could analyze any system accessible over the Internet.
The dual nature of SATAN was quickly understood even in the mass media- Newsweek
published a brief article “SATAN: Friend or Foe?” (April 3, 1995). Proponents of SATAN view
it as a system administration tool to find bugs to prevent intrusions. Opponents of SATAN view
it as an easy-to-use tool an inexperienced hacker can use to bring down systems all over the
Internet.
As a whole, the hacker community represents a testing environment far more effective than any
one corporation could ever construct. Ethical hacking has become institutionalized by most
major software companies in the form of “beta” testing new software with select groups of
customers who will stress test and report back information about defects (e.g. extensive beta
testing of Microsoft’s Windows XP). Often the only reward for the “beta” testers is privileged
access to the software. This may work well for testing software performance but security bugs
do not often show up in “beta” testing unless the testing is done by security experts or a security
bug is stumbled upon (Schneier 2000). In the rare cases where a security flaw is discovered by
beta testers, fixing the bug may not be a high priority for the software vendor and “ethical
hackers” have sometimes had to resort to a form of blackmail (threaten release of bug
Some firms offer penetration testing or “ethical hacking” services (IBM Consulting). For a fee
($15K to $200K), a red team will launch a controlled simulated attack to test known
vulnerabilities and report back corrective patches that need to be installed (Wood 2000). An
overall evaluation of a system’s security will focus on there three questions: (Palmer 2001)
(A) What can an intruder see on the target system?
(C) Does anyone at the target system notice the intruder’s attempts
or successful attacks?
The hypocrisy in penetration testing is that organizations are paying hackers to attack with the
same behavior that they would legally prosecute if under any other circumstances. The irony of
penetration testing is that it is only superficial, real attacks will exploit unpublicized
vulnerabilities, and the most attractive red team employee may be a “reformed” cracker-for-hire
– who better to test your system than the kind of people who may break in? (Koch 2000, Winkler
2000, Marr 1999). If outsourcing penetration testing, trusting contractors becomes important
because real things can be damaged and sensitive security details will be revealed. Public
perception in the integrity of an organization’s information assets may be more important than an
objective technical security assessment. Lastly, quantitative system security assessments need to
be mapped to an organization’s subjective risk profile all vulnerabilities do not have equal risks
security of a product against sustained hacking and to use the hacking community to harden
software that has not been adequately tested. These contests are generally unfair and the prize
money not scaled to the level of effort required but they still remain very popular – even causing
network congestion (Baltazar 2000, Schneier 2000, Solomons 2000). The hypocrisy in contests
is that organizations are paying (prize money) and thus encouraging the same expertise they
Conclusions
Security on the Internet is broken and “ethical hacking” has evolved as part of the potential
domains – which has a long history of achievement but it is not clear that this technique is
A security hole on one computer is not just an isolated problem as demonstrated by recent
attack other systems worldwide. At present, the Internet has poor security and “ethical hacking”
may be one of the most effective ways to proactively plug rampant security holes. “Ethical
hackers” see themselves as a necessary part of a larger vanguard protecting freedom and privacy
in addition to security.
On the other hand, “ethical hacking” tools (such as scanners) have also been notorious tools of
malicious attackers. A fine line exists between hacking for the public good and releasing
scanning tools that enable malicious attacks. Trying to fix the Internet security problem with
automated tools over a wide scale may have actually made the Internet less secure taken as a
whole.
We have focused in this paper on technical aspects of what may intrinsically be a non-technical
problem. If human intent does indeed dominate then technical solutions will not suffice and
instead solutions will need to focus on behavioral modification. Internet security is a complex
problem and while altruistic behavior such as “ethical hacking” may make a difference (not sure
References
Baltazar, Henry. June 26 2000. Hacker Attacks Welcomed. eWeek 30, 34.
de Vivo, Marco, Eddy Carrasco, Germinal Isern, and Gabriela O. de Vivo. April 1999. A Review of
Computer Ethics & Social Values. by Deborah G. Johnson and Helen Nissenbaum, Prentice Hall 60-
89.
Emmanuel Goldstein interview within “Two Views of Hacking: ‘Hackers are Necessary.’” CNN
Interactive. <http://www.cnn.com/TECH/specials/hackers/qandas/goldstein.html>
Ethical Hacker 1999. IBMConsulting e-business advertisement, trademark, service mark & logo.
Evans, Bob. June 4 2001. The Sorry State of Software. InformationWeek 112.
Farmer, Dan and Weitse Venema. 1993. Improving the Security of Your Site By Breaking Into It.
<http://www.fish.com/security/admin-guide-to-cracking.html>
Goslar, Martin D. August 2001. Is There Such a Thing as “Ethical Hacking?” Information Security.
Koch, Lewis Z. June 29 2000. Hacking for the Common Good? Inter@ctive Week.
Marr, Steph. October 1999. Ethical Hackers: Latest IT Craze or Real Deterrent? SC Magazine 17-18.
Schneier, Bruce. 2000. Secrets & Lies: Digital Security in a Networked World. John Wiley & Sons.
Solomons, Mark. September 13 2000. Hackers Offered $10,000 Bait. Financial Times.
Spafford, Eugene H. 1992. Are Computer Hacker Break-ins Ethical? Journal of Systems Software
17:41-47.
Winkler, Ira. July 2000. The “Ethical Hacker” Debate, Information Security 82.
Wood, Bradley J. and Ruth A. Duggan. Red Teaming of Advanced Information Assurance Concepts.
Zimmerman, Christine. March 26 2001. Race to Deploy May Magnify Software Bugs. InternetWeek
13.