Grey hat

From Wikipedia, the free encyclopedia

A grey hat, in the hacking community, refers to a skilled hacker who sometimes acts legally, sometimes in good will, and sometimes not. They are a hybrid between white and black hat hackers. They usually do not hack for personal gain or have malicious intentions, but may or may not occasionally commit crimes during the course of their technological exploits.

Greyhat was also trademarked by Greyhat Limited Liability Corporation in 1998.

Contents

[edit] Disambiguation

One reason a grey hat might consider himself to be grey is to disambiguate from the other two extremes: black and white. It might be a little misleading to say that grey hat hackers do not hack for personal gain. While they do not necessarily hack for malicious purposes, grey hats do hack for a reason, a reason which more often than not remains undisclosed. A grey hat will not necessarily notify the system admin of a penetrated system of their penetration. Such a hacker will prefer anonymity at almost all cost, carrying out their penetration undetected and then exiting said system still undetected with minimal damages. Consequently, grey hat penetrations of systems tend to be for far more passive activities such as testing, monitoring, or less destructive forms of data transfer and retrieval.

A person who breaks into a computer system and simply puts their name there whilst doing no damage (such as in wargaming - see) can also be classified as a grey hat. A person who hacks for comedic value, may also be classified as a grey hat. However, he would have found his own security flaw, rather than using someone else's. See Script Kiddie for details.

[edit] Examples

[edit] Trudy

Isaac's server is on a network with Trudy. Unknown to Isaac, his server has a security flaw. Trudy finds the flaw and uses it to monitor the site, because his server runs a different OS and she wants to find out how it's configured. But Isaac has had problems with Mallory. Mallory finds the flaw and uses it to gain access to the server. Mallory then uploads a complex logic bomb that would fry Isaac's server in three days.

Trudy catches Mallory uploading the doom-code. She waits until Mallory leaves, and then proceeds to remove the logic bomb so that she can continue to learn how the server was configured. Trudy's actions may be qualified as grey hat hacking.

[edit] John

The local library server runs on a basic public network. John finds a security flaw within the system, and uses it to remote access different computers within the network. From this John sets up a series of pranks, such as making the computer speak, opening random files, even taking control of the computer's User Interface through a Remote Access Tool (RAT). Though these pranks may annoy the victims of these computers, in no way are the files nor the drive of these computers being remote accessed, harmed in anyway. John's actions may be viewed as a form of grey hat hacking

[edit] The apache.org hack. by {} and Hardbeat

In April 2000, grey hat hackers gained unauthorized access to apache.org[1]. These people could have tried to damage apache.org servers, write text offensive to apache crew, or distribute trojans or other malicious actions. Instead, they chose just to alert apache crew of the problems and then to publish this article, beginning with:

     This paper does _not_ uncover any new vulnerabilities. It points out common
     (and slightly less common) configuration errors, which even the people at
     apache.org made. This is a general warning. Learn from it. Fix your systems,
     so we won't have to :)
     This paper describes how, over the course of a week, we succeeded in
     getting root access to the machine running www.apache.org, and changed
     the main page to show a 'Powered by Microsoft BackOffice' logo instead
     of the default 'Powered by Apache' logo (the feather). No other changes
     were made, except to prevent other (possibly malicious) people getting in.

[edit] See also

[edit] References

[edit] External links