Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

The No-Tech Hacker
Forbes ^ | February 29, 2008 | Andy Greenberg

Posted on 04/09/2008 5:08:48 PM PDT by 2ndDivisionVet

Hackers have a lot of fancy names for the technical exploits they use to gain access to a company's networks: cross-site scripting, buffer overflows or the particularly evil-sounding SQL injection, to name a few. But Johnny Long prefers a simpler entry point for data theft: the emergency exit door.

"By law, employees have to be able to leave a building without showing credentials," Long says. "So the way out is often the easiest way in."

Case in point: Tasked with stealing data from an ultra-secure building outfitted with proximity card readers, Long opted for an old-fashioned approach. Instead of looking for vulnerabilities in the company's networks or trying to hack the card readers at the building's entrances, he and another hacker shimmied a wet washcloth on a hanger through a thin gap in one of its exits. Flopping the washcloth around, they triggered a touch-sensitive metal plate that opened the door and gave them free roam of the building. "We defeated millions of dollars of security with a piece of wire and a washcloth," Long recalls, gleefully.

In other instances, Long has joined employees on a smoke break, chatted with them casually, and then followed them into the building. Sometimes stealing data is as simple as wearing a convincing hard hat or walking onto a loading dock, before accessing an unsecured computer or photocopying a few sensitive documents and strolling out the front door.

In Pictures: Hacking Without Technology

Fortunately for his victims, the companies that Long invades are also his customers. As a penetration tester for Computer Sciences Corporation security team, Long is paid to probe weak points in a company's information security. His job as a "white-hat" hacker is to think like the bad guys--the more evil genius he can summon up, the better.

(Excerpt) Read more at forbes.com ...


TOPICS: Business/Economy; Crime/Corruption; Extended News; Government
KEYWORDS: computers; espionage; hacker; hackers; internet
Navigation: use the links below to view more comments.
first 1-2021-33 next last
Interesting article.
1 posted on 04/09/2008 5:08:48 PM PDT by 2ndDivisionVet
[ Post Reply | Private Reply | View Replies]

To: hiredhand

Ping.


2 posted on 04/09/2008 5:16:50 PM PDT by DuncanWaring (The Lord uses the good ones; the bad ones use the Lord.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: 2ndDivisionVet

I had to go in to work on a weekend and left my security pass at home. I slipped a sheet of paper between the doors and let it float through the air. It tripped the motion sensor, and the doors unlocked to let the “exiting employee” out.


3 posted on 04/09/2008 5:21:04 PM PDT by gitmo (From now on, ending a sentence with a preposition is something up with which I will not put.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: 2ndDivisionVet
SAMPLE DEFINITION:

:hacker: n. [originally, someone who makes furniture with an axe] 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. 2. One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming. 3. A person capable of appreciating {hack value}. 4. A person who is good at programming quickly. 5. An expert at a particular program, or one who frequently does work using it or on it; as in `a UNIX hacker'. (Definitions 1 through 5 are correlated, and people who fit them congregate.) 6. An expert or enthusiast of any kind. One might be an astronomy hacker, for example. 7. One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations. 8. [deprecated] A malicious meddler who tries to discover sensitive information by poking around. Hence `password hacker', `network hacker'. The correct term is {cracker}.

The term `hacker' also tends to connote membership in the global community defined by the net (see {network, the} and {Internet address}). It also implies that the person described is seen to subscribe to some version of the hacker ethic (see {hacker ethic, the}).

It is better to be described as a hacker by others than to describe oneself that way. Hackers consider themselves something of an elite (a meritocracy based on ability), though one to which new members are gladly welcome. There is thus a certain ego satisfaction to be had in identifying yourself as a hacker (but if you claim to be one and are not, you'll quickly be labeled {bogus}). See also {wannabee}.

4 posted on 04/09/2008 5:22:07 PM PDT by robomatik ((wine plug: renascentvineyards.com cabernet sauvignon, riesling, and merlot))
[ Post Reply | Private Reply | To 1 | View Replies]

To: 2ndDivisionVet; rdb3; Calvinist_Dark_Lord; GodGunsandGuts; CyberCowboy777; Salo; Bobsat; JosephW; ..

5 posted on 04/09/2008 5:24:18 PM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: DuncanWaring

If you didn’t I was gonna......:o)


6 posted on 04/09/2008 5:25:37 PM PDT by Squantos (Be polite. Be professional. But, have a plan to kill everyone you meet.©)
[ Post Reply | Private Reply | To 2 | View Replies]

To: 2ndDivisionVet

Social engineering is nothing new


7 posted on 04/09/2008 5:35:21 PM PDT by thecabal
[ Post Reply | Private Reply | To 1 | View Replies]

To: robomatik

*I* am a REAL hacker. Always have been, that “criminal” stuff is a bunch of lies, like “militias are bad”, all made up by media


8 posted on 04/09/2008 5:43:15 PM PDT by Rick.Donaldson (http://www.transasianaxis.com - Please visit for lastest on DPRK/Russia/China/et al.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: gitmo
27 years ago I worked in a company that required a yellow badge to gain access to certain secure areas. I was sent to get a computer tape, but only had a green badge.

So, I bought a bag of peanut M&M's, pinned the empty bad to my shirt pocket, and got right in.

I was "social engineering" before there was a word for it. :)

9 posted on 04/09/2008 6:01:40 PM PDT by The Duke (I have met the enemy, and he is named 'Apathy'!)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Squantos

Ping him anyway. It’ll make him think more people like him.


10 posted on 04/09/2008 6:09:39 PM PDT by DuncanWaring (The Lord uses the good ones; the bad ones use the Lord.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: robomatik

“...if you claim to be one and are not, you’ll quickly be labeled {bogus}). See also {wannabee}.”

Jnaanorr unpxref hfr ebg13 naq guvax vg’f erny rapelcgvba!


11 posted on 04/09/2008 6:10:13 PM PDT by PetroniusMaximus
[ Post Reply | Private Reply | To 4 | View Replies]

To: DuncanWaring; hiredhand

LOL.....But we really do like the guy !.....:o)

Hey get out that computer tanning booth an get over here HH !!


12 posted on 04/09/2008 6:11:45 PM PDT by Squantos (Be polite. Be professional. But, have a plan to kill everyone you meet.©)
[ Post Reply | Private Reply | To 10 | View Replies]

To: 2ndDivisionVet

The security of any system is never better than it’s dumbest user. Stupid IT people who have their personal accounts as members of the “domain admins” group is another gift.


13 posted on 04/09/2008 6:20:15 PM PDT by KoRn (CTHULHU '08 - I won't settle for a lesser evil any longer!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Rick.Donaldson

I see your homepage and have a security question to ask you.
Not a computer security, but more of a national security question.
Can you write me at blackhood55@gmail.com and I will write back with my question?
Thanks for considering it


14 posted on 04/09/2008 6:27:58 PM PDT by DeLaine
[ Post Reply | Private Reply | To 8 | View Replies]

To: 2ndDivisionVet
Flopping the washcloth around, they triggered a touch-sensitive metal plate that opened the door and gave them free roam of the building.

This reminds me of a place I went that had an electrically locked door with RFID locks, but a motion sensor on the other side to unlock it when people on the inside needed to get out.

So how did we get in? By sliding a piece of paper though the crack between the doors, triggering the motion sensor.

15 posted on 04/09/2008 6:30:47 PM PDT by dan1123 (If you want to find a person's true religion, ask them what makes them a "good person".)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dan1123

“By sliding a piece of paper though the crack between the doors, triggering the motion sensor.”

Thats why the motion sensor is supposed to be a few feet indoors. Makes that a lot harder.


16 posted on 04/09/2008 6:38:26 PM PDT by driftdiver
[ Post Reply | Private Reply | To 15 | View Replies]

To: PetroniusMaximus

EBG13 jbexf svar gubhtu vs lbh qba’g xabj 1337!


17 posted on 04/09/2008 6:47:55 PM PDT by DBrow
[ Post Reply | Private Reply | To 11 | View Replies]

To: 2ndDivisionVet

A friend of mine went to a meeting with a potential client to discuss computer security. The client told him that their computers were very secure, and that he’d never be able to break into their network. My friend asked if he could have the job if he left a message on the client’s computer by morning.

While the meeting was taking place, my friend’s associate was touring around the secretarial pool, and stealing post-it notes with passwords written on them.

He got the job.


18 posted on 04/09/2008 6:54:08 PM PDT by wolfpat (If you don't like the Patriot Act, you're really gonna hate Sharia Law.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: 2ndDivisionVet

I wonder how much more successful a hot babe in a tight skirt would be doing this job?


19 posted on 04/09/2008 6:56:46 PM PDT by LiberConservative (Part of the "Vast Typical White Guy Conspiracy")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Squantos
But we really do like the guy !.....:o)

Yeah, but you're not supposed to actually tell him that!

20 posted on 04/09/2008 6:57:43 PM PDT by DuncanWaring (The Lord uses the good ones; the bad ones use the Lord.)
[ Post Reply | Private Reply | To 12 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-33 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson