A white hat (or a white-hat hacker, a whitehat) is an ethical
security hacker
A security hacker or security researcher is someone who explores methods for breaching or bypassing defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, pro ...
. Ethical hacking is a term meant to imply a broader category than just penetration testing.
Under the owner's consent, white-hat hackers aim to identify any vulnerabilities or security issues the current system has. The white hat is contrasted with the
black hat, a malicious hacker; this definitional dichotomy comes from
Western films, where
heroic and antagonistic cowboys might traditionally wear a white and a black hat, respectively. There is a third kind of hacker known as a
grey hat
A grey hat (greyhat or gray hat) is a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but usually does not have the malicious intent typical of a black hat hacker.
The term came into u ...
who hacks with good intentions but at times without permission.
White-hat hackers may also work in teams called "
sneakers and/or hacker clubs",
red team
A red team is a group that simulates an adversary, attempts a physical or digital intrusion against an organization at the direction of that organization, then reports back so that the organization can improve their defenses. Red teams work fo ...
s, or
tiger teams.
History
One of the first instances of an ethical hack being used was a "security evaluation" conducted by the
United States Air Force
The United States Air Force (USAF) is the Air force, air service branch of the United States Department of Defense. It is one of the six United States Armed Forces and one of the eight uniformed services of the United States. Tracing its ori ...
, in which the
Multics
Multics ("MULTiplexed Information and Computing Service") is an influential early time-sharing operating system based on the concept of a single-level memory.Dennis M. Ritchie, "The Evolution of the Unix Time-sharing System", Communications of t ...
operating systems were tested for "potential use as a two-level (secret/top secret) system." The evaluation determined that while Multics was "significantly better than other conventional systems," it also had "...
vulnerabilities
Vulnerability refers to "the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally." The understanding of social and environmental vulnerability, as a methodological approach, involves ...
in hardware security,
software security
Application security (short AppSec) includes all tasks that introduce a secure software development life cycle to development teams. Its final goal is to improve security practices and, through that, to find, fix and preferably prevent security is ...
and procedural security" that could be uncovered with "a relatively low level of effort." The authors performed their tests under a guideline of realism, so their results would accurately represent the kinds of access an intruder could potentially achieve. They performed tests involving simple information-gathering exercises, as well as outright attacks upon the system that might damage its integrity; both results were of interest to the target audience. There are several other now unclassified reports describing ethical hacking activities within the
US military
The United States Armed Forces are the military forces of the United States. U.S. federal law names six armed forces: the Army, Marine Corps, Navy, Air Force, Space Force, and the Coast Guard. Since 1949, all of the armed forces, except th ...
.
By 1981 ''
The New York Times
''The New York Times'' (''NYT'') is an American daily newspaper based in New York City. ''The New York Times'' covers domestic, national, and international news, and publishes opinion pieces, investigative reports, and reviews. As one of ...
'' described white-hat activities as part of a "mischievous but perversely positive 'hacker' tradition". When a
National CSS employee revealed the existence of his
password cracker, which he had used on customer accounts, the company chastised him not for writing the software but for not disclosing it sooner. The letter of reprimand stated "The Company realizes the benefit to NCSS and encourages the efforts of employees to identify security weaknesses to the VP, the directory, and other sensitive software in files".
On October 20, 2016, the
Department of Defense
The United States Department of Defense (DoD, USDOD, or DOD) is an executive department of the U.S. federal government charged with coordinating and supervising the six U.S. armed services: the Army, Navy, Marines, Air Force, Space Force, ...
(DOD) announced "
Hack The Pentagon."
The idea to bring this tactic of ethical hacking to assess the security of systems and point out vulnerabilities was formulated by
Dan Farmer and
Wietse Venema. To raise the overall level of security on the
Internet
The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
and
intranets, they proceeded to describe how they were able to gather enough information about their targets to have been able to compromise security if they had chosen to do so. They provided several specific examples of how this information could be gathered and exploited to gain control of the target, and how such an attack could be prevented. They gathered up all the tools they had used during their work, packaged them in a single, easy-to-use application, and gave it away to anyone who chose to download it. Their program called
Security Administrator Tool for Analyzing Networks, or SATAN, was met with a great amount of media attention around the world in 1992.
Tactics
While
penetration testing concentrates on attacking software and computer systems from the start – scanning ports, examining known defects in protocols and applications running on the system, and patch installations, for example – ethical hacking may include other things. A full-scale ethical hack might include emailing staff to ask for password details, rummaging through executive dustbins, usually without the knowledge and consent of the targets. Only the owners, CEOs, and Board Members (stakeholders) who asked for such a security review of this magnitude are aware. To try and replicate some of the destructive techniques a real attack might employ, ethical hackers may arrange for cloned test systems, or organize a hack late at night while systems are less critical. In most recent cases these hacks perpetuate for the long-term con (days, if not weeks, of long-term human infiltration into an organization). Some examples include leaving
USB
Universal Serial Bus (USB) is an industry standard, developed by USB Implementers Forum (USB-IF), for digital data transmission and power delivery between many types of electronics. It specifies the architecture, in particular the physical ...
/flash key drives with hidden auto-start software in a public area as if someone lost the small drive and an unsuspecting employee found it and took it.
Some other methods of carrying out these include:
*
Disk and memory forensics
*
DoS attacks
* Frameworks such as:
**
Metasploit
*
Network Security
*
Reverse engineering
Reverse engineering (also known as backwards engineering or back engineering) is a process or method through which one attempts to understand through deductive reasoning how a previously made device, process, system, or piece of software accompl ...
* Security scanners such as:
**
Burp Suite
**
Nessus
**
W3af
*
Social engineering tactics such as:
** Phishing
** Pretexting
* Training Platforms
*
Vulnerability research
The methods identified
exploit known security
vulnerabilities
Vulnerability refers to "the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally." The understanding of social and environmental vulnerability, as a methodological approach, involves ...
and attempt to evade security to gain entry into secured areas. They can do this by hiding software and system 'back-doors' that can be used as a link to information or access that a non-ethical hacker, also known as 'black hat' or 'grey hat', may want to reach.
Legality
Belgium
Belgium legalized white hat hacking in February 2023.
China
In July 2021, the
Chinese government
The government of the People's Republic of China is based on a system of people's congress within the parameters of a Unitary state, unitary communist state, in which the ruling Chinese Communist Party (CCP) enacts its policies through people's ...
moved from a system of voluntary reporting to one of legally mandating that all white hat hackers first report any vulnerabilities to the government before taking any further steps to address the vulnerability or make it known to the public.
Commentators described the change as creating a "dual purpose" in which white hat activity also serves the country's intelligence agencies.
United Kingdom
Struan Robertson, legal director at Pinsent Masons LLP, and editor of
OUT-LAW.com says "Broadly speaking, if the access to a system is authorized, the hacking is ethical and legal. If it isn't, there's an offense under the
Computer Misuse Act. The unauthorized access offense covers everything from guessing the password to accessing someone's webmail account, to cracking the security of a bank. The maximum penalty for unauthorized access to a computer is two years in prison and a fine. There are higher penalties – up to 10 years in prison – when the hacker also modifies data". Unauthorized access even to expose vulnerabilities for the benefit of many is not legal, says Robertson. "There's no defense in our hacking laws that your behavior is for the greater good. Even if it's what you believe."
Employment
The United States
National Security Agency
The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
offers certifications such as the CNSS 4011. Such a certification covers orderly, ethical hacking techniques and team management. Aggressor teams are called "red" teams. Defender teams are called "blue" teams.
When the agency recruited at
DEF CON in 2020, it promised applicants that "If you have a few, shall we say, ''indiscretions'' in your past, don't be alarmed. You shouldn't automatically assume you won't be hired".
A good "white hat" is a competitive skillful employee for an enterprise since they can be a
countermeasure
A countermeasure is a measure or action taken to counter or offset another one. As a general concept, it implies precision and is any technological or tactical solution or system designed to prevent an undesirable outcome in the process. The fi ...
to find the
bugs to protect the enterprise network environment. Therefore, a good "white hat" could bring unexpected benefits in reducing the risk across systems, applications, and endpoints for an enterprise.
Recent research has indicated that white-hat hackers are increasingly becoming an important aspect of a company's network security protection. Moving beyond just penetration testing, white hat hackers are building and changing their skill sets, since the threats are also changing. Their skills now involve
social engineering, mobile tech, and
social networking
A social network is a social structure consisting of a set of social actors (such as individuals or organizations), networks of Dyad (sociology), dyadic ties, and other Social relation, social interactions between actors. The social network per ...
.
Notable people
*
Jim Browning, alias of a Northern Ireland white hat hacker,
scam baiter, and
journalist
A journalist is a person who gathers information in the form of text, audio or pictures, processes it into a newsworthy form and disseminates it to the public. This is called journalism.
Roles
Journalists can work in broadcast, print, advertis ...
, with investigations published on
YouTube
YouTube is an American social media and online video sharing platform owned by Google. YouTube was founded on February 14, 2005, by Steve Chen, Chad Hurley, and Jawed Karim who were three former employees of PayPal. Headquartered in ...
and on
BBC
The British Broadcasting Corporation (BBC) is a British public service broadcaster headquartered at Broadcasting House in London, England. Originally established in 1922 as the British Broadcasting Company, it evolved into its current sta ...
programmes such as ''
Panorama
A panorama (formed from Greek language, Greek πᾶν "all" + ὅραμα "view") is any Obtuse angle, wide-angle view or representation of a physical space, whether in painting, drawing, photography (panoramic photography), film, seismic image ...
'' and ''
Scam Interceptors''
*
Charlie Miller, an American white hat hacker previously employed by the
National Security Agency
The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
and
Uber
Uber Technologies, Inc. is an American multinational transportation company that provides Ridesharing company, ride-hailing services, courier services, food delivery, and freight transport. It is headquartered in San Francisco, California, a ...
who has, amongst other exploits, published successful hacks into the vulnerabilities of the computer on a 2014
Jeep Cherokee along with
Chris Valasek, being able to take control of acceleration, braking, and steering
*
Jennifer Arcuri, an American technology entrepreneur founded the white hat consultancy Hacker House in 2016.
See also
*
Bug bounty program
*
IT risk
*
Locksmith
*
MalwareMustDie
*
Wireless identity theft
References
{{DEFAULTSORT:White Hat (Computer Security)
Hacking (computer security)
Computer ethics