hackers_go_corporate.txt 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362
  1. |----------------------------- HACKERS GO CORPORATE -------------------------|
  2. |-----------------------------------------------------------------------------|
  3. |------------------ van Hauser / THC <vh@reptile.rug.ac.be> ------------------|
  4. ----| Preface
  5. The following article has been discussed controversially in the rows of the
  6. THC members. Some of Van Hauser's statements reflect his personal opinion
  7. and are inconsistent with other THC members opinions. As the webmaster of
  8. the THC site, I would like to give *YOU* the chance to judge.
  9. - Plasmoid
  10. ----| Introduction
  11. Young hackers usually dream about becoming a well-known security expert,
  12. whose job is about executing high profile penetration tests on fortune
  13. 100 companies. Why? Cool and interesting projects, bleeding edge hard and
  14. software to work with, new areas to learn and gain knowledge, earning money,
  15. creating (another) high profile - this time with the real name -
  16. most hackers dream of that - few actually achieve that.
  17. This article is meant to change this.
  18. It is mostly about the pitfalls a hacker has to overcome, especially when
  19. a company doesn't like "evil" hackers for the job. Therefore a sound and
  20. seemingly logical explanation, where he did get this security knowledge is
  21. very important. Some people might say "hey, nice article, but it is not
  22. really about hacking" - well, I say it is. It is about hacking coporate
  23. minds. You want to achieve your goal - working for that fortune 10 bank as
  24. an IT security expert, but f*ck, they don't like hackers. Hackers are evil,
  25. criminals, they say. So you have to hack their brains to get what you want!
  26. First, it should be clear what a "security job" is about - or being
  27. a whitehead. The world, work and views are different. The section
  28. "Hacker World vs. Security World" is describing this.
  29. Then you might need additional knowledge to impress your hope-fully new
  30. employer - also the ways for that are pretty clear, you can find some hints
  31. at "Getting a Background".
  32. After you know what will await you, you actually have to apply for a job.
  33. There are some do's and some don'ts you should keep in mind for writing
  34. your application documents and when you've got your job interview. The
  35. sections "Truthful or not", "How to find a job", "Getting your CV right"
  36. and "The Job Interview" will keep you on the right track.
  37. And finally: "Things you should not do after getting the job". This might
  38. be more important than you think.
  39. Last thing you should keep in mind when reading this text: it is
  40. especially meant for people who have a hard time to get employed because
  41. the company they are interested in have got a "no-hacker" policy, or the
  42. country they are living in are seeing hackers not as an enrichment to the
  43. security business. If you are trying to get into a company which welcomes
  44. hackers with open arms - which is rarely the case - this text can still be
  45. important to you.
  46. About me: as a former hacker and phreaker, I'm working for 7 years in the
  47. security field now and had to struggle several times with this topic. I
  48. also helped several friends and peers to their security jobs so far. The
  49. contents here is my own vast ;-) experience - with input from friends and
  50. colleagues.
  51. Enjoy.
  52. ----| Hacker World vs. Security World
  53. What is the hacker's view of the world? Wardialing modems, attacking web
  54. servers, writing exploits, driving around in the city to find vulnerable
  55. wavelan networks, exploring bleeding edge hardware, programming a new tool
  56. for weeks until it is perfect, meeting with hacker friends for weekend
  57. sessions and drinking jolt - well and having a good time.
  58. Is a security job like that? Well, of course not - but what is it actually
  59. about?
  60. In the security field, there are different positions.
  61. a) The Programmer - he deals with programming operating systems or
  62. applications. The job might be just that of a programmer (e.g.
  63. programmer for the Sun Solaris kernel), or a development of security
  64. components (e.g. part of the development team of Checkpoint's
  65. Firewall-1), or part of the security audit team of a software package
  66. (e.g. AIX security team from IBM in Austin/Texas).
  67. b) The Administrator - he is responsible for running special equipment or
  68. whole infrastructures. An administrator can be responsible for
  69. all servers of a special operating system (e.g. Windows admin), the
  70. network (LAN/WAN admin), applications (SAP, Oracle, Lotus Notes, etc.),
  71. firewalls, etc.
  72. The smaller the company, the broader and more general is usually the
  73. scope of work for an administrator.
  74. c) The Operator - sitting in front of a monitor (or several) all days and
  75. evaluating output of logs and system messages. Boring. But usually you
  76. get a good overall salary through additional holiday, weekend bonus
  77. etc. Hackers rarely do that - but it's an option.
  78. d) The Security Officer - he is writing the security policies and
  79. procedures for the company. If a security incident is happening, he
  80. has to decide what to do. Usually, he is also part for defining
  81. security and access roles for important. A very important job, but
  82. that of a paper tiger - and attending many boring meetings and
  83. eventually reviewing some audit files.
  84. e) The IT Auditor - an independent organ within the organization which
  85. ensures the adequateness of IT controls. A job where you not make many
  86. friends, but usually can travel around the world, if you are working
  87. for a big company. Most audit work is about organisational procedures
  88. and if they are followed, interviews and reviewing logs. However in
  89. some positions, you can also things like penetration tests - but also
  90. if that's the case, it's just a small part of the job description.
  91. An IT auditor usually can not build up deep knowledge, however get a
  92. very broad knowledge and a very good overview of the company.
  93. f) The Consultant - he works for a consultant company (whew!). From a
  94. hacker's point of view, there are 3 types: general consultant
  95. companies (e.g. McKinsey, KPMG, Ernst & Young), IT consultant
  96. companies (e.g. IBM Consulting, Accenture) or IT security companies
  97. (e.g. @stake, secunet, etc.). What is the difference? Well,
  98. specialization of the company and size of the company.
  99. It should be noted that most big audit companies (e.g. PWC, KPMG,
  100. etc.) also have got IT security auditors, which do a mix of e) and f).
  101. g) The "Hacker" - employed by the company to check the security of
  102. networks, review source code, etc. In some companies, they are hired to
  103. show to customers or press they employ cool people (hi to Ken William
  104. ;-) This job type is actually very rare ...
  105. In some companies - especially security consultant companies who also
  106. develop software, some people can actually be programmer and consultant.
  107. This is the case for @stake, Razor, eEye, etc. - but of course also there
  108. just for some special guys.
  109. So that you have got a picture now what type of work there is to do, how
  110. is the work done? What is the view on the work?
  111. 1) A hacker's "job" is actually very easy - viewed from a whiteheads side.
  112. "They try to break into some company, and if they find a hole - great, if
  113. not - well they try another company. They only have to find one hole,
  114. that's enough." Also this is exaggerated, there is much truth in it, if
  115. you see it as a game between "black" and "white".
  116. A "whitehead" has to find all holes, and close them. That's a completely
  117. different view - and many will say more challenging as well.
  118. 2) When you changed the side - you also have to change your work habits.
  119. You will normally get a description what is your scope of work - and
  120. that's what your job is about. You can't to just what you think would
  121. be fun to do. Doing a fast penetration test on your companies mail
  122. server? Might bring you to jail if you were not authorized.
  123. Every job brings limits with them - and if you want to keep yours, you
  124. have to follow them.
  125. 3) Then you have to follow procedures (e.g. the company's security
  126. policies, working hours, dress code). In some companies these are very
  127. strict, in others it's very relaxed.
  128. 4) You can not just work how you want to. If you are a database
  129. administrator or you got a job in a security consultant company to do
  130. penetration tests: you must either follow a methodology how you have to
  131. do your work - to ensure the quality, or you have got to document
  132. everything you did - if someone else has to pick-up your work later, he
  133. knows what you did and why.
  134. 5) A security job does not mean that you can implement all security you
  135. want. Everything will be focused on business needs. Want to install new
  136. firewalls, tighten down the filter lists in the firewall, install a new
  137. reverse proxy for the eCommerce system? Your boss will ask you why this
  138. is needed, what the cost will be, and the impact. The new firewall might
  139. add security, but be too expensive. Or the tightened filter lists would
  140. make administration, content updates etc. more difficult. Or the reverse
  141. proxy might downgrade performance, which would frustrate customers.
  142. 6) Ever heard about the famous "soft skills"? Yeah, you might be
  143. technically an expert, but within a company, you are not alone, and you
  144. don't act and work alone. This is why good communication skills (being
  145. friendly, helpful, open, respectful, truthfully etc. blabla) are very
  146. important. In fact you should even consider this for your private life
  147. anyway - it enhances your friendship with hackers (and girls as well!
  148. ;-) ...
  149. So why going corporate anyway? It doesn't sound like fun. Well - it can be
  150. fun. It depends on the company's culture and how much freedom you get.
  151. And the work can be very rewarding from what you can learn, expand your
  152. knowledge, environments and companies you see and working professionally
  153. the first time in your life.
  154. So brighten up - it can be fun and rewarding. Just remember: corporate
  155. life is not a piece of cake and to take too easy. You'll have to adapt.
  156. ----| Getting a Background
  157. Now that you know what a corporate life is about, you can qualify yourself
  158. better if you've got security background - not hacker background - already.
  159. Helpful are e.g. Cisco configuration know-how, solaris/aix/win2k
  160. administrator know-how, knowledge about security policies, hands-on
  161. experience about firewall setups and server hardening, programming skills,
  162. etc.
  163. What skills are especially helpful for the job you would like to do?
  164. Take a look at the job descriptions from the previous paragraph and then
  165. imagine what kind of knowledge is needed.
  166. Then try to acquire somehow the knowledge. E.g. buy books, read online
  167. articles about the topics, buy some old and cheap cisco/sun/rs6000/etc.
  168. hardware and get some experience.
  169. www.securityfocus.com is a good starting point for finding related
  170. articles and books, ebay.com is a good place to find hardware, etc.
  171. However the best is to get an internship or part-time job at an ISP or
  172. security division of a big company.
  173. ----| Truthful or not?
  174. There are companies out there which have got a "no hacker" policy.
  175. There are countries where it is common thinking that hackers do "hacking"
  176. and therefore not adequate for "security" jobs - for ethical,
  177. philosophical or technical reasons.
  178. If you think that a company has got a "no hacker" policy - don't tell them.
  179. If you don't know if they have got such a policy - don't tell them either.
  180. You can still do that later if you get the strong feeling in the interview
  181. they think positively about hackers. Otherwise: don't.
  182. ----| How to find a job
  183. For some people it's easy: the job offers are made to them. For this you've
  184. got to become famous or well-known in the security/hacker community. Good
  185. examples for this are the l0pht team or ADM, or single individuals like
  186. rain forrest puppy and Fyodor.
  187. If the job doesn't come to you, you have to look for a job yourself. There
  188. are three ways:
  189. 1) Go to security conferences (or hacker conferences) - Usenix
  190. Security Symposium and Blackhat Briefings are usually very good for
  191. this, hold a good presentation, talk to some people ... and there you
  192. are.
  193. 2) You search for security jobs on Internet job search engines (keywords
  194. like "firewall", "security" even maybe "hacker" will bring you further),
  195. additionally www.securityfocus.com has got the SecurityJobs mailing
  196. list (and archive).
  197. 3) You directly send your resume to the companies you want to work for.
  198. This is actually very effective. Job ads on the Internet, computer
  199. magazines or newspapers are expensive and usually don't bring much
  200. results for the companies as the market for security specialists is
  201. empty most of the time. So if you just send the IT security departments
  202. your resume - you will get at least a job interview 90% of the time.
  203. Or if you know someone within a company, he might propose you as a new
  204. team member :-) that would be the easiest way ...
  205. ----| Getting your CV right
  206. CV stands for Curriculum Vitae and means resume or application documents.
  207. Before you start writing yours, get on the internet and read tips about
  208. writing one.
  209. Specifically for hackers going corporate, you should take of the following:
  210. 1) Your CV should contain no holes. If you spent 3 month burping and
  211. farting in your room, put in your CV:
  212. "January 2000 - March 2000: private software development project on
  213. secure web applications. I experimented with various blabla, and
  214. developed blablabla which enhanced security blabla ..."
  215. I guess you get the picture.
  216. 2) Whatever you did - high school, internship, university, part-time jobs -
  217. mention everything from a light what you did there in the security
  218. field - and a bit more ... e.g. if you administrated a webserver for an
  219. ISP as an part-time job, you write:
  220. "I was responsible for the security of the webserver, had to review
  221. the system and apache log files, review the source code of the CGIs,
  222. blablabla"
  223. 3) If you did internships, part-time jobs or security related courses at
  224. high school or university (even about cryptography and system
  225. management) try to get a internship certification, signed resume,
  226. whatever. Try to influence the contents so it focuses on security.
  227. In many companies you usually write them yourself and let them sign by
  228. the boss - this is the easiest way of course.
  229. ----| The Job Interview
  230. Show that you are ethical - give them the feeling that you would never
  231. ever hack the company - without proper authorization by management. If
  232. they think you are a shady character, no way they will hire you. Even if
  233. they think positively about hackers.
  234. Don't tell them you are a hacker, unless you really get the feeling during
  235. the interview that this would help you!
  236. If the company has got a "no hacker" policy, you'll have to face questions
  237. like "Are you a hacker", "have you been a hacker before", "could you get
  238. into the system you once administrated?", etc. Sometimes even challenging
  239. you like "Are you skilled enough to still get into the firewall at the
  240. university you built up?".
  241. If you don't want to lie (like me), you can answer them like: "What do you
  242. mean by 'if I am a hacker', if you mean 'someone who is vandalizing web
  243. pages' - no, never, if you mean 'someone curious about security and
  244. paranoid enough to tighten down everything and programming until 4 o'clock
  245. in the morning' - yes, then I'm a hacker".
  246. If you don't want to appear like a hacker - don't dress like one. Dress
  247. Like the company expects the proper person to be. This might be a business
  248. suit or casual. If in doubt: business suit, especially if it's a
  249. consultant/auditor job.
  250. And of course the usual tips for job interviews apply here as well. Buy a
  251. book about that or read them on the internet.
  252. ----| Things you should not do after getting the job
  253. Remember the following things:
  254. Do NOT hack the company you are working for! If you are working for an
  255. external audit or consultancy company, this includes your customers!
  256. Do NOT hack other companies from the company you are working for or it's
  257. customers!
  258. NEVER tell anyone from the hacker scene about the security (or insecurity)
  259. of your company (and customers)!
  260. NEVER tell your company (or your customers) secrets from the hacker scene -
  261. otherwise you'll not have got much friends anymore ...
  262. It might not be wise to tell people in the company, that you are (or have
  263. been) a hacker. People usually can't keep their mouths shut.
  264. It is wise not to do any illegal things after becoming corporate - if you
  265. are caught hacking into some systems - do you think your company will
  266. believe that you never hacked them .... ?! So better become a greyhat, and
  267. have fun researching and still do the same stuff like before. But either
  268. authorized or passive watching ...
  269. ----| Closing Remarks
  270. Several companies which fear hackers will think after reading this -
  271. "f*ck, we have to tighten the "new employee" process".
  272. But I will tell you something: Too late ... we are already everywhere.
  273. In all major consultant, audit and software development, banks and IT
  274. security companies are former hackers. And guess what?
  275. The world is not crumbling down in despair. Most hackers have ethics.
  276. You might not like their ethical code, but most of them have a code of
  277. honour, and would never hack the company they are working for.
  278. You might say - "but the others, not all are good" - yes, that's true,
  279. but so is the rest of the world - same is true about people who are not
  280. hackers. If you fight us you will loose - valuable team-members, with
  281. strong skills and experiences. Think about it.
  282. And to the hacker scene: having a cool security job and still doing
  283. greyhat stuff - this is the best thing which can happen to us. Having fun -
  284. and getting paid for it. r0qz!
  285. ----| Greets
  286. Greets to Doc Holiday, Mindmaniac, Tick, Stealth, Vax, SevenUp,
  287. Escher and Rookie who all went corporate successfully - and these are
  288. just some of the German guys. Ken Williams, Fyodor, L0pht, some of ADM
  289. and many, many, many more as well. Have fun and kick ass!
  290. Greets to my group THC (visit our 31337 HACKER QUIZ at
  291. http://www.thc.org/quiz), TESO, ADM, LAM3RZ and L0pht.
  292. 2001, van Hauser / THC <vh@reptile.rug.ac.be>