Jump to content

Grey hat

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by 70.134.107.21 (talk) at 22:04, 3 February 2007. The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

A grey hat (or gray hat, in American English) in the computer security community, refers to a skilled hacker who sometimes acts legally, sometimes in good will, and sometimes not. They are a hybrid between white and black hat hackers. They usually do not hack for personal gain or have malicious intentions, but may or may not occasionally commit crimes during the course of their technological exploits.

Disambiguation

One reason a grey hat might consider himself to be grey might be to disambiguate from the other two extremes: black and white. It might be a little misleading to say that grey hat hackers do not hack for personal gain. While they do not necessarily hack for malicious purposes, grey hats do hack for a reason, a reason which more often than not remains undisclosed. A grey hat will not necessarily notify the sys admin of a penetrated system of their penetration. Such a hacker will prefer anonymity at almost all cost, carrying out their penetration undetected and then exiting said system undetected with minimal damages. Consequently, grey hat penetrations of systems tend to be for far more passive activities such as testing, monitoring, or less destructive forms of data transfer and retrieval.

A person who breaks into a computer system and simply puts their name there while doing no damage can also be classified as a grey hat.

Examples

Trudy

Alice sets up a site for Bob on a server run by Isaac. Isaac's server is on a network with Trudy. Unknown to Isaac, his server has a security flaw. Trudy finds the flaw and uses it to monitor Bob's site, because his server runs a different OS and she wants to find out how it's configured. But Isaac has had problems with Mallory. Mallory finds the flaw and uses it to gain access to the server. Mallory then uploads a complex logic bomb that would fry Isaac's server in three days...literally.

Trudy catches Mallory uploading the doom-code. She waits until Mallory leaves then proceeds to remove the logic bomb so that she can continue to learn how the server was configured.

The apache.org hack. by {} and Hardbeat

In April 2004, grey hat hackers gained unauthorized access to apache.org. These people could have tried to damage apache.org servers, write text offensive to apache crew, or distribute trojans or other malicious actions. Instead, they chose just to alert apache crew of the problems and then to publish this article, beginning with:

     This paper does _not_ uncover any new vulnerabilities. It points out common
     (and slightly less common) configuration errors, which even the people at
     apache.org made. This is a general warning. Learn from it. Fix your systems,
     so we won't have to :)
     This paper describes how, over the course of a week, we succeeded in
     getting root access to the machine running www.apache.org, and changed
     the main page to show a 'Powered by Microsoft BackOffice' logo instead
     of the default 'Powered by Apache' logo (the feather). No other changes
     were made, except to prevent other (possibly malicious) people getting in.

Arga Unga Hackare vs Antipiratbyrån

In 2005, a Swedish ISP was raided and servers were seized that contained torrent files which provided users the ability to download warez (illegal software) and some legitimate content. This move was applauded by international media industry, such as the MPAA.

A few days later, a swedish hacker group known as AUH (Arga Unga Hackare, translates to "Angry Young Hackers") defaced the website of Antipiratbyrån (Anti-Piracy Bureau), Sweden's biggest organisation working to stop piracy. Arga Unga Hackare is generally regarded as a group of black hats. However, in this case, it may be argued that this particular action was grey.

The defacement was unusual, because AUH published information which became the basis for a nation wide discussion regarding abuse of Swedish legal resources, and possibly criminal acts supervised by international anti-piracy industry. The servers of the raided ISP was found containing warez, but as AUH was hacking Antipiratbyrån, they found evidence in the form of private emails that showed that Antipiratbyrån had used an infiltrator to put the illegal software on the ISP's servers. The infiltrator worked under the nickname rouge, but AUH identified him with real name, address and Swedish personal identification number. He was shown to be wanted by Swedish authorities for criminal acts. AUH also published e-mails that loosely linked international anti-piracy agencies to these actions, but the e-mails did not show to which extent the case was known outside of Sweden.

In the next few days, other sources provided evidence that strongly suggested that:

  • Antipiratbyrån funded the warez servers, making Antipiratbyrån the source of the illegal software - not the ISP.
  • Antipiratbyrån knew that the ISP owners were not aware that the servers were being used for warez.
  • Antipiratbyrån put effort into moving the warez servers from a former location to the raided ISP, because the raided ISP had a very good bandwidth (high speed internet connection).
  • Antipiratbyrån had been able to influence legal system into not following proper procedures: the raided ISP owners were not interviewed by a judge before the raid. The raid was needlessly intrusive and caused downtime to critical infrastructure for systems which did not serve illegal content. The Antipiratbyrån staff had supervised and instructed Swedish authorities on place what to do.
  • Antipiratbyrån's hurry to raid the ISP may have been initiated by the fact that the ISP recently before the raid had performed an inventory, in which the warez servers had been notified as unknown servers to be investigated.

The credibility of Antipiratbyrån was badly injured, and they did not deny the allegations. Eventually, Antipiratbyrån and the ISP reached a settlement, and did not publicly debate the incident further.

So, black hat tactics and skills were used by AUH, but they were used to unravel what many consider to be an unethical and criminal conspiracy, which possibly has international ties. This is typically grey shades of ethics; while the methods employed by AUH can be considered unacceptable and unethical, they were used to uncover even more unethical and possibly criminal actions on the part of Antipiratbyrån.

The current website of Antipiratbyrån is located at http://www.antipiratbyran.com/ .

See also

References