[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <000701c4b49e$4eb9d310$7942100a@mother>
From: yossarian at planet.nl (yossarian)
Subject: Full-Disclosure Posts
I can understand the frustrations of seeing bad security. But what makes a
'hacker' better than an academic with some training? Either can be good, or
extremely bad.
In my experience some hackers can think secure instead of break, but most
can't. There is a major difference which many people - including hackers -
rarely see: as a hacker you look for a way in, and when you're in, you
exploit, notify or sit back and feel proud. In a comparison to the military,
you're a sniper or a fighter ace - whatever. As for a security
professional - the job is plugging all holes. Or designing stuff so, that
other people won't create them (you probably don't build all the systems
yourself), but somehow they still manage to break nearly every 'good'
design. You are a grunt doing the feet work or a sergeant leading the
infantry - where some bony headed general sends you with tools other people
choose for you. And in the end you don't get a medal. No heroics - it takes
a different mindset. That is probably why a lot of so called security
professionals are bad at their job too. Try staying motivated and up to
date - since exploits come in every layer. Hackers normally focus on
specific types of holes - you can't - and have much time - you don't.
The worst thing is, if you are good at security, either a reformed hacker or
retrained academic - companies will love you since you understand nearly
everything about the infra. So they promote you, away from the frontline.
Then the lesser gods will do the job with predictable results. You can turn
down a promotion, sure, otherwise you'll be branded being in it for the
money. But in most companies 'doing' security is a lonely job where other
people make the decisions, like installing PCanywhere in an old version on a
reverse proxy, so they can do their 'support' from at home - well after a
few of these events, you'll take the promotion. Not for the money, but to
get away form the thick skulls.
But Dear Backyard - have you applied for a job at yahoo as a security pro?
Apparantly you know what they should know and you are willing to tell
them.... If not - give it a try.
----- Original Message -----
From: "backyard@...oo-inc" <xploitable@...il.com>
To: <full-disclosure@...ts.netsys.com>
Sent: Sunday, October 17, 2004 9:54 PM
Subject: Re: [Full-Disclosure] Full-Disclosure Posts
> On Sun, 17 Oct 2004 12:34:33 -0500, Todd Towles<BR>
> <toddtowles@...okshires.com> wrote:<BR>
> > I agree with your idea, but I am one of those uni graduate/20
something<BR>
> > professionals. I am very passion about my work and the security of
the<BR>
> > company I work for. I work in a rural state and the money isn't as
high<BR>
> > as some other places. I took a pay cut to work in the IT field
when I<BR>
> > finished college.<BR>
> > <BR>
> > Maybe you weren't talking about people like myself in your
statement<BR>
> > (since most people that are part of FD are here to be on the edge
of<BR>
> > security and around people that understand them) but it seemed
like you<BR>
> > were talking in pretty general terms....with that in mind I have
to<BR>
> > disagree with you that all the 20 something professionals are not
good<BR>
> > security professionals. A lot of the older folks are sitting in
the<BR>
> > corner talking about their 1980 modems, while some 15 year old
from<BR>
> > south amercian uses a three year old exploit on their
misconfigured<BR>
> > Apache webserver and defaces it.<BR>
> > <BR>
> > I agree that you have to love computers...you have to eat and
sleep<BR>
> > computers/security to be good in the field and a lot of people in
the IT<BR>
> > field aren't like that. Kinda sad, but I will have their job
one<BR>
> > day..so..I just smile.<BR>
> > <BR>
> <BR>
> <BR>
> My motivation is yahoo.. these guys need to wake up more.
Everything<BR>
> about them says they are out of touch with the threats of today. If<BR>
> you report X, they patch X, even if they know Y and Z are
vulnerable,<BR>
> the apparent attitude is to leave Y and Z until they get reported
or<BR>
> become an active problem, because they want to move onto the next<BR>
> reported vulnerability. From the idea I get, its all about what
looks<BR>
> good on paper and productivity. I mean, I bet yahoo hand out most<BR>
> productive security employee of the month awards and stuff. Its all<BR>
> screwed up and wrong.<BR>
> <BR>
> My stance is.. yahoo sack all the ones who are in it for the money,<BR>
> keep the employees who think like a hacker, then recruit some real<BR>
> life hackers from the underground. That combination is a winning<BR>
> security team, not the current team who in my opinion are out of
touch<BR>
> and out dated for the threats of the 21st century.<BR>
> <BR>
> As for misconfigured web servers with 3 year old exploit. Yahoo!
don't<BR>
> even need exploits and misconfigured web servers. They do fine by<BR>
> cutting corners and taking short cuts in security. Half the network
is<BR>
> vulnerable to all manner of stuff. In my opinion, the only threat
to<BR>
> Yahoo are Yahoo themselves, not hackers.<BR>
> <BR>
> Sorry to go on about yahoo, but its something i'm passionate about.<BR>
> <BR>
> Feel free to hit the block sender button, I fully understand. <BR>
> <BR>
> :-)<BR>
> <BR>
> _______________________________________________<BR>
> Full-Disclosure - We believe in it.<BR>
> Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists