Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:10 AM
Connect Directly

HD Moore Unplugged

Security researcher HD Moore talks about how he got into the biz, Microsoft, and what it's like to be a security rock star

HD Moore got his first real job in security research eight years ago, at the tender age of 17. He worked for the U.S. Department of Defense.

Moore, who today is one of the best known names in security research, had just returned to high school after dropping out for two years. He was getting some hands-on experience in security by auditing, consulting, and setting up collocation servers. Moore didn't have the proper classified security clearance at DOD, but his job description was written so that his then-rare skills could still be applied to some classified DOD work. He developed some exploits and wrote "something that captures traffic based on a set of rules" (essentially a sniffer) for DOD.

Figure 1:
Security researcher HD Moore.

"An example of how my development role worked -- really vague requirements that allowed me to provide useful code for projects that were classified," says Moore, director of security research with BreakingPoint Systems and developer of the wildly popular open source Metasploit tool. (See Metasploit Issues New Beta and Free Fuzzing Tool Launched.)

Today, most everything Moore, 25, does is watched closely by the commercial world, especially by software companies like Microsoft. His Metasploit penetration testing software has been hailed as a crucial tool for security white hats (the black hats love it, too), and his memorable Month of Browser Bugs (MOBB) project and other vulnerability discoveries and disclosures at times have put him at odds with Microsoft. (See Getting Buggy with the MOBB.) All of this activity has made him one of the most respected -- and sometimes criticized -- security researchers.

Moore's awkward relationship with Microsoft hasn't really changed much, he says, despite having several friends working there and his close ties with the Microsoft Security Response Team. Microsoft has at times credited him with finding bugs, and he gets invited to its Blue Hat summits. But his knack for finding and disclosing bugs in Microsoft's products hasn't always ingratiated him with the software giant. "There are definitely people there who see anyone who doesn't play by their rules as detrimental," he says. "And there are really sharp people at Microsoft who really care about the code and what they are working on."

But the relationship has definitely improved from when one former Microsoftie resorted to publicly calling Moore "spawn of the devil" and a few other choice things, he says.

Moore's philosophy on sharing and disclosing research information is "share early, share often." He admits, though, that his vulnerability data and tools can be abused by bad guys, too. When he gets complaints of the Metasploit tool being used to break into an organization, he says he doesn't feel guilty. "Yes, we provide the tools you can use for bad things, but we are not responsible for people misusing them," he says. "Nor are we saying you had it coming to you because you weren't patching."

Moore says what scares him most about security today is how careless people are about it. Once while driving around San Antonio with some friends and "watching" network traffic, he saw someone uploading "warez" files onto an FTP server housing medical transcription logs. It was some kids storing their pirated software on the outpatient services organization's server, he says. "The fact is, they were totally exposed," he says of the outpatient organization. And many people are afraid to blow the whistle when their organizations aren't properly handling sensitive data. "They’re scared to talk or don’t want to be involved in criminal charges," he says. "What scares me is this gross negligence [out there], and [there's] no way to report it responsibly."

Of course, being the industry's most famous white hat hacker also makes you a popular target. Moore says he's regularly "hammered" by attempted hacks, but he was only really hit once, when he worked for Digital Defense. While vacationing in Tokyo, he found a previously unknown vulnerability being exploited on the latest version of software on one of the servers he was maintaining. "I had to reverse-engineer it, bring the server down, and patch it."

That apparently provoked the hackers further. "They got pissed off and DDOSed us for two weeks," he says.

Lately, Moore has been busy with his day job, putting the final touches on exploits he's writing for a new product rollout for BreakingPoint. He spends his evenings working on Metasploit 3.0 and mapping out another pet project of his, building a more user-friendly Metasploit that any admin can use.

"If you don't know what an exploit is, it's difficult to use the current version," he says. "Our goal is to make exploit and vulnerability information more accessible" so admins wouldn’t need to be exploit experts to determine whether they should patch for a particular vulnerability.

Meanwhile, Moore's rock star status is about to go Hollywood (yes, really). The upcoming Die Hard sequel with Bruce Willis will feature an evil hacker named "evil hax0r" who takes down the U.S. infrastructure using the Metasploit tool. Moore can't help rooting for the bad guy: "Who needs marketing with movies like this?"

Personality Bytes

  • Worst part about writing exploits: "Finding a copy of the affected software and installing it. Many vendors only distribute the latest copy of their software, making it a challenge to locate a vulnerable copy for exploit development. I maintain a ~200Gb archive of evaluation software, solely for exploit development and Metasploit QA."

  • Microsoft Job Offers: "As long as I'm releasing exploit code, I couldn't work for them, and I'm fine with that. My work is contrary to companies who sell security solutions... I don't want to be gagged by corporate culture."

  • Favorite hangout: "A dark room full of electronics."

  • PC or Mac?: "Whatever runs Linux the fastest."

  • In his iPod: "Outkast, Kidney Thieves, Gnarls Barkley, Kool Keith, NWA, Praga Khan, Nine Inch Nails, Mos Def. Mostly hip-hop, industrial, or electronica."

  • Off the clock: "I head to the Alamo Drafthouse (drafthouse.com) to view the latest flicks through beer goggles, read books -- mostly science fiction -- Stross, Cheryhh, Sterling, Friedman, etc., and play basketball."

  • Favorite comfort food: "Sushi."

    — Kelly Jackson Higgins, Senior Editor, Dark Reading

    Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    US Turning Up the Heat on North Korea's Cyber Threat Operations
    Jai Vijayan, Contributing Writer,  9/16/2019
    Preventing PTSD and Burnout for Cybersecurity Professionals
    Craig Hinkley, CEO, WhiteHat Security,  9/16/2019
    NetCAT Vulnerability Is Out of the Bag
    Dark Reading Staff 9/12/2019
    Register for Dark Reading Newsletters
    White Papers
    Cartoon Contest
    Current Issue
    7 Threats & Disruptive Forces Changing the Face of Cybersecurity
    This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
    Flash Poll
    The State of IT Operations and Cybersecurity Operations
    The State of IT Operations and Cybersecurity Operations
    Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2019-09-18
    RSA BSAFE Crypto-J versions prior to 6.2.5 are vulnerable to an Improper Verification of Cryptographic Signature vulnerability. A malicious remote attacker could potentially exploit this vulnerability to coerce two parties into computing the same predictable shared key.
    PUBLISHED: 2019-09-18
    RSA BSAFE Crypto-J versions prior to 6.2.5 are vulnerable to Information Exposure Through Timing Discrepancy vulnerabilities during ECDSA key generation. A malicious remote attacker could potentially exploit those vulnerabilities to recover ECDSA keys.
    PUBLISHED: 2019-09-18
    RSA BSAFE Crypto-J versions prior to 6.2.5 are vulnerable to an Information Exposure Through Timing Discrepancy vulnerabilities during DSA key generation. A malicious remote attacker could potentially exploit those vulnerabilities to recover DSA keys.
    PUBLISHED: 2019-09-18
    RSA Archer, versions prior to 6.6 P3 (, contain an information disclosure vulnerability. Information relating to the backend database gets disclosed to low-privileged RSA Archer users' UI under certain error conditions.
    PUBLISHED: 2019-09-18
    RSA Archer, versions prior to 6.6 P2 (, contain an improper authentication vulnerability. The vulnerability allows sysadmins to create user accounts with insufficient credentials. Unauthenticated attackers could gain unauthorized access to the system using those accounts.