Grey hat

From Wikipedia, the free encyclopedia

Grey hat in the computer security community, is a skilled hacker who sometimes acts legally, sometimes in good will and sometimes not. They are a hybrid between white and black hat hackers. They hack for no personal gain and do not have malicious intentions, but may or may not occasionally commit crimes during the course of their technological exploits.

For example, attacking corporate businesses with unethical practices could be regarded as highly unethical and would normally be considered black hat activity. However, to a grey hat, it may not appear bad even though it is against that local law. So instead of tagging it black hat, it is a grey hat hack. A person who breaks into a computer system and simply puts their name there while doing no damage, is usually classified as a grey hat.

  • Side note- the terms White Hat, Grey Hat, and Black Hat were also taken from the Spy vs. Spy comic strips in Mad Magazine.

Contents

[edit] Examples

[edit] The apache.org hack. by {} and Hardbeat

In April 2004, grey hat hackers gained unauthorized access to apache.org. These people could have tried to damage apache.org servers, write text offensive to apache crew, or distribute trojans or other malicious actions. Instead, they choose just alert apache crew of the problems and then publish this article, beginning with:

     This paper does _not_ uncover any new vulnerabilities. It points out common
     (and slightly less common) configuration errors, which even the people at
     apache.org made. This is a general warning. Learn from it. Fix your systems,
     so we won't have to :)
     This paper describes how, over the course of a week, we succeeded in
     getting root access to the machine running www.apache.org, and changed
     the main page to show a 'Powered by Microsoft BackOffice' logo instead
     of the default 'Powered by Apache' logo (the feather). No other changes
     were made, except to prevent other (possibly malicious) people getting in.

[edit] Arga Unga Hackare vs Antipiratbyrån

In 2005, a Swedish ISP was raided and servers were seized that contained torrent files which provided users the ability to download warez (illegal software) and some legitimate content. This move was applauded by international media industry, such as the MPAA.

A few days later, a swedish hacker group known as AUH (Arga Unga Hackare, translates to "Angry Young Hackers") defaced the website of Antipiratbyrån (Anti-Piracy Bureau), Sweden's biggest organisation working to stop piracy. Arga Unga Hackare is generally regarded as a group of black hats. However, in this case, it may be argued that this particular action was grey.

The defacement was unusual, because AUH published information which became the basis for a nation wide discussion regarding abuse of Swedish legal resources, and possibly criminal acts supervised by international anti-piracy industry. The servers of the raided ISP was found containing warez, but as AUH was hacking Antipiratbyrån, they found evidence in the form of private emails that showed that Antipiratbyrån had used an infiltrator to put the illegal software on the ISP's servers. The infiltrator worked under the nickname rouge, but AUH identified him with real name, address and Swedish personal identification number. He was shown to be wanted by Swedish authorities for criminal acts. AUH also published e-mails that loosely linked international anti-piracy agencies to these actions, but the e-mails did not show to which extent the case was known outside of Sweden.

In the next few days, other sources provided evidence that strongly suggested that:

  • Antipiratbyrån funded the warez servers, making Antipiratbyrån the source of the illegal software - not the ISP.
  • Antipiratbyrån knew that the ISP owners were not aware that the servers were being used for warez.
  • Antipiratbyrån put effort into moving the warez servers from a former location to the raided ISP, because the raided ISP had a very good bandwidth (high speed internet connection).
  • Antipiratbyrån had been able to influence legal system into not following proper procedures: The raided ISP owners were not interviewed by a judge before the raid. The raid was needlessly intrusive and caused downtime to critical infrastructure for systems which did not serve illegal content. The Antipiratbyrån staff had supervised and instructed Swedish authorities on place what to do.
  • Antipiratbyrån's hurry to raid the ISP may have been initiated by the fact that the ISP recently before the raid had performed an inventory, in which the warez servers had been notified as unknown servers to be investigated.

The credibility of Antipiratbyrån was badly injured, and they did not deny the allegations. Eventually, Antipiratbyrån and the ISP reached a settlement, and did not publicly debate the incident further.

So, black hat tactics and skills were used by AUH, but they were used to unravel what many considers to be an unethical and criminal conspiracy, which possibly has international ties. This is typically grey shades of ethics; while the methods employed by AUH can be considered unacceptable and unethical, they were used to uncover even more unethical and possibly criminal actions on the part of Antipiratbyrån.

The hacked version of Antipiratbyrån's website can be seen at http://www.antipiratbyran.se (in Swedish), while the current website of Antipiratbyrån is located at http://www.antipiratbyran.com

Grey hat use their methods to optimize their websites for search engines such as Google, so that they can get an increase in traffic. Grey Hat is now becoming quite popular in site design and is a perfectly legal method of increasing earnings from commercial websites. Unlike Black Hat websites that are normaly just spam or splog sites or White Hat which are the top sites.

[edit] See also

[edit] References

[edit] External links

In other languages