Partner Perspectives  Connecting marketers to our tech communities.
SPONSORED BY
7/6/2017
11:00 AM
Tim Prendergast
Tim Prendergast
Partner Perspectives
Connect Directly
Twitter
LinkedIn
RSS
50%
50%

Security Experts & Hackers: We're Not So Different

Using the similarities among hackers and security programmers can be an advantage.

Many of us who work in cloud security are driven by a common goal: catch bad guys. We're not Harry Bosch putting the screws to some perp in the interrogation room, or laying on a rooftop to pick off an enemy at far range. But we know the damage that can be done by a malicious hacker, and we want to stop it. What's more, we have the ability to stop it ... or at least, we think we do, and this is why we deal in the science and art of technology security.

Interestingly, the mindset of a hacker and a security expert is in many ways quite similar. So is our training. In fact, the daily experience, tactically speaking, is almost indistinguishable. Our world is code, projects, delivery, iteration, many failures, and ultimately (hopefully) the big win. We don't intend to inflict harm as hackers do, but we are all intrigued with the pursuit of complex tasks that require analytical thinking and creative approaches. As perverted as it may seem, I'm sure hackers become overjoyed upon learning they've entered a network or accessed data not meant for them. Yet, in a similar way, the best security professionals experience the same feeling upon delivering a solution that will identify hundreds of misconfigurations across an entire enterprise.

I don't mean to suggest we are kindred spirits in a collegial way. While there are parts of our brains wired in similar fashion, we are most decidedly pitted against one another towards very divergent goals. But having this same type of mindset helps security programmers be more effective at understanding and identifying how to create effective security and compliance solutions to thwart even the best hackers. The feeling of success at having done so is what fuels so much of this work, and it's how the best security products are built.

Security developers and hackers both have a mission. They have training, knowlede, and are dedicated to their pursuits. Consider this when building your security team, and when identifying how to secure your cloud environment. The algebraist Carl Gustav Jacobi advised: "Invert, always invert." In other words, think backwards to figure out a solution. Programmers, irrespective of their proclivity for good or ill, approach their goals in the same way; that mindset will be a huge advantage for the good guys on your team who are pursuing hackers.

No one can truly appreciate security if they aren't participating in it. If you create an environment where security is part of the general mindset, it reminds your experts that you think security, in all its forms, is important. It also creates an alert atmosphere, which is precisely what is needed to reverse-engineer the devious thinking of hackers. There is no morality tale here; those with a good yardstick for right and wrong can see the twistedness of a ransomware attack. They may also appreciate the creativity in how it was engineered. But admiration is followed by a take-down mentality. There is victory in knowing that you didn’t let the bad guy get away with it. You’ve put your abilities to the task and have become the hero in the story.

Detectives and investigators hopefully don’t have experience doing the things they seek to prosecute. HR might have a thing or two to say about the homicide division hiring murderers just because they can put themselves in the suspect’s shoes. But technology is different; perhaps the right analogy is something like Hogwarts. Students are given a foundation in wizardry, the same foundation, but they might choose to use that knowledge for evil rather than good. That damn Lucius Malfoy and his beautiful, flowing locks of white hair.

Hackers get smarter and bolder every day. Correspondingly, so must the people trying to prevent security breaches. Environments that prize tinkering and problem solving will be able to build teams that prevent the pursuits of hackers. In using similar thinking to that used by hackers, you will help create a team that understands how to protect your assets, can identify the right security automation and compliance platforms to use, and will make your organization stronger in its pursuit against the dark hats.

Tim Prendergast co-founded Evident.io to help others avoid the pain he endured when helping Adobe adopt the cloud at a massive level.  After years of building, operating, and securing services in Amazon Web Services, he set out to make security approachable and ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12697
PUBLISHED: 2018-06-23
A NULL pointer dereference (aka SEGV on unknown address 0x000000000000) was discovered in work_stuff_copy_to_from in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. This can occur during execution of objdump.
CVE-2018-12698
PUBLISHED: 2018-06-23
demangle_template in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM) during the "Create an array for saving the template argument values" XNEWVEC call. This can occur during execution of objdump.
CVE-2018-12699
PUBLISHED: 2018-06-23
finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump.
CVE-2018-12700
PUBLISHED: 2018-06-23
A Stack Exhaustion issue was discovered in debug_write_type in debug.c in GNU Binutils 2.30 because of DEBUG_KIND_INDIRECT infinite recursion.
CVE-2018-11560
PUBLISHED: 2018-06-23
The webService binary on Insteon HD IP Camera White 2864-222 devices has a stack-based Buffer Overflow leading to Control-Flow Hijacking via a crafted usr key, as demonstrated by a long remoteIp parameter to cgi-bin/CGIProxy.fcgi on port 34100.