Skip to main content

Here is how a ethical hacker works at IBM

As an ethical hacker for IBM, Charles Henderson gets paid to think like a bad guy. His job is to break into networks, applications, or physical locations to find out how a real attacker would carry out their work, uncovering errors and the effect those errors might have on an organization's security.
IBM says that there has been a
continuous change in corporations
appointing their own hackers to
"pen-test" (penetration test) online
systems, networks, and physical
locations, considering the increase in cyber-attacks and the need to
strengthen cyber security.
In fact, Henderson is just one of the
1,000 security specialists the tech
giant hired in 2015.

In a candid conversation with
Business Insider, Henderson, 40,
described what is like to be a hacker for IBM.
He said he has always been curious as a kid. He grew up in Austin, Texas where he still resides has now become a haven for young
technologists with its lively computer security scene.

Henderson attended the University of Texas and studied Computer Science.
"When I was 11, my father brought
home our first computer. Within a
week, I had become an active
participant on the Bulletin Board
Systems (BBS). Using these bulletin
boards introduced me to other like-
minded individuals and hackers
across the world. All of a sudden the world became more accessible to me."
"I quickly decided that I was more
interested in taking things apart than putting them together."
By the age of 12, Henderson started
taking interest in networks, which at that saw the emergence of phone
system. After legally getting a phone booth in his room, he took it apart.
Today, we have websites and videos that tell us how things work and how to take them apart and put them back together. However, while Henderson was growing up, none of it existed,which is what thrilled him. With inquisitiveness triggered by the unknown, he decided to take things apart so that he could learn how they operated. He says that he would have
probably never done it, had there
been a book on how these things
worked.
"I've always been bound by ethics,"
he says. "That is not to say that kids don't do stupid things."
"For example, when I was in
elementary school, I discovered that I could use my parent's cordless phone as a scanner to listen in on our neighbor's conversations. Did my
parents love when I'd take apart their expensive electronics within just a few days of purchase? Probably not.
But being a hacker, I had to know
how everything worked."
Henderson says that his curiosity led him into security research and
penetration testing over the last 20
years, which has helped him make his career.

About seven months ago, when he
was looking to switch jobs, IBM
offered him a very interesting and
challenging position that he couldn't resist. He was fascinated to the wealth of information and resources available here.
For him, it has been really exciting
working for IBM from the time he
joined the company in October of
2015, as he gets to work with some of the largest brands in the world.
"Coming from smaller security
teams, we just didn't have access to
the kinds of tools we have at IBM. We often had to create adhoc tools, which took time. At IBM, we have more firepower, thanks to tools like
BlueMix and Watson, among other
resources. I have access to basically anything I could ever imagine —which is really exciting for a researcher. The sky is really the limit here."

"The first thing I do every morning is catch up on what happened when I was sleeping"
"The cool thing is, since I run a global team, when I'm sleeping there are teams conducting research and working engagements with customers.
"So in the morning I start by asking,'Did we find any critical flaws?' 'Do I need to tell a client we found a vulnerability and begin working to fix it?' From there, I am working with my team to plan penetration tests and make sure we have the resources we need to address the issues we have found. There isn't an hour that goes by that I don't find a cool, new way of doing something, which means
my days are both unpredictable and exciting.
While Henderson does a lot of
research himself, he does like to look at consumer electronic devices that range from planes to trains to
automobiles to mobile devices. He
always find methods to break into or break apart these devices, to find new errors and susceptibilities. Also, he is
always interested in knowing how
devices connect to one another and
what vulnerabilities might surface as a result. Thanks, to the growth of the Internet of Things (IoT).
Henderson travels the world to meet with clients when not in Texas, in order to help him better understand their security issues and the security landscape. During these meetings, he gets to work with some of the world's biggest and most exciting companies
that help him find out how their
company handles security concerns.
While the companies share their
needs, requirements, and the trials
they face, they work together to come up with solutions to fix them.
Sharing some examples of what
Henderson and his team does, he
says:
"One time, with the authorization of a previous client, I was hired to
conduct a physical penetration test,which resulted in a stolen corporate vehicle filled with confidential information.
"The goal of the engagement was to
have my team see how much damage we could do by using tools such as social engineering to infiltrate the client's building and see how much confidential information we could get
our hands on. Turns out, we could
take it a few steps further, and stole
the data and then drove away with it in a company car — but of course, we had permission.

"When it comes to hacking physical
locations, we typically execute what I call 'tiger teams' (think ninja style/secret ops) to break into buildings on behalf of clients, to test their physical front-door security.
"We don't use bars to get in the door— rather, we organise highly
orchestrated attacks to get into client buildings by any means necessary,which often includes hacking into unsecured systems, copying employee badges, etc., with the client's prior approval."
Henderson says that the best part of his job is to find and fix key security susceptibility before attackers get a chance to abuse it.
Explaining the excitement of the
chase, it is one less possibility for a
criminal to abuse every time they
help a client fix major security
vulnerability, which also extends to
the customers' customers, the people they do business with.
He says, "Every day I'm faced with a new brain teaser, a new challenge,and that's really exciting. The worst part about my job is telling a client they have a major vulnerability.
"Often, their initial reaction is fear,
but the good news is, no matter how
bad the vulnerability is, there is
something we can do to fix it to
protect the customer. But often, that initial delivery of bad news is
difficult."

Whenever Henderson tells people
what he does for a living, he is often
faced with one question which is "Can you hack into my bank account?"
To which his reply to the question
would be, "It depends on what bank
you use."
He is also asked by people if he has
ever done any 'spy stuff".
Henderson says that the biggest
misconception that people have
about hackers is that they are all
criminals. Ironically, the word
'hacker' has been regarded as
malicious computer hacking, which is why it very necessary to understand that the word is not a synonym for criminal.
"To me, being a hacker means you
have an unbridled curiosity about
how things work. Whereas many
people look at a new technology and think about the possibility for
creation, hackers look at a new
technology and want to understand how to deconstruct that technology.
We have an insatiable appetite for
understanding how the world works— and we take it as a personal challenge to find flaws in technology before criminals have a chance to.
"Television shows and movies depict hackers as simply knowing how to do something. In reality, hacking is about taking something apart physically or virtually and
understanding the inner workings."
Explaining the difference between
good hackers and bad hackers, he
says that a criminal hacker is
someone who abuses susceptibility
for monetary gain or hidden motives, and is not interested in helping to fix the flaw they used to gain access.

Criminals take the path of least
resistance, while non-criminal
hackers choose their targets based on a challenge or the learning process.
"As an ethical hacker, we are driven to understand how things work.
When we find a vulnerability, we
share that information and we work to responsibly disclose it and help fix the problem we found. Ethical hackers have a moral compass guiding them to help protect people from the flaws they find."
"There is also a preconceived notion of hackers that we are people who choose to hack because we are maladjusted or full of angst and anger.
"Most people assume if you're
hacker, you had no friends growing
up. But honestly, hacking has nothing to do with that. There are perfectly well-adjusted hackers in the world,we're just curious people, looking for a deeper understanding of how the world works. I'm a father of two and I'm happily married.
"Also, my expertise in hacking has
lead me to become a world-class
practical joker within my team. I
think that practical jokes foster
critical thinking."
Giving his piece of advice for aspiring hackers, Henderson says that the one thing they should always do is to question everything, be curious and
never take anything at face value.
He further adds on to say that you
should always keep sight of your
ethical compass and practice
responsible disclosure. It is easy to
upset a promising career by doing
something stupid. Ensure that you
are guided by your values while you research vulnerabilities.

Always keep in mind that a company cannot protect their users from a flaw found by a hacker unless they responsibly
reveal it to the company, as a flaw
cannot be fixed if the affected
company has no knowledge about it.
www.josiahdele.blogspot.com

Comments

Popular posts from this blog

Windows 10 now on 600 million machines.

Microsoft CEO Satya Nadella told shareholders that Windows 10 has now passed 600 million monthly active users, picking up 100 million since May of this year. This number counts all Windows 10 devices used over a 28-day period. While most of these will be PCs, there are other things in the mix there: a few million Xbox Ones, a few million Windows 10 Mobile phones, and special hardware like the HoloLens and Surface Hub. The exact mix between these categories isn't known, because Microsoft doesn't say. The company's original ambition (and sales pitch to developers) was to have one billion systems running Windows 10 within about three years of the operating system's launch. In July last year, the company acknowledged that it won't hit that target—the original plan called for  50 million or more phone sales a year , which the retreat from the phone market has made impossible. But at the current rate it should still be on track for somewhere in excess of 700 million use...

WZoneLite – A Pretty Cool WooCommerce Amazon Affiliate Plugin .

Everyone wants to make a million dollars by being a blogger. The promise of riches and internet fame is a big draw to doing it for a lot of people, and I’m sorry to say that the reality of being a blogger (even a professional blogger!) is not quite…as financially lucrative as all that. But that’s not to say that it  can’t be –one of the best ways to start your empire is with an Amazon affiliate plugin. For me, the Amazon Associates program has been one of the biggest earners for me over the years. Not only are there CPM ads like Google Adsense (you know, the normal banner ads we all love to hate), but any time someone clicks a link from your site, you get a percentage of  anything  they buy while the token from your site lasts in their browser. If they buy a song, you get a few cents. If they buy a new MacBook Pro and iPhone? You get…a lot more cents. With that in mind, WZoneLite is a  pretty cool WooCommerce Amazon affiliate plugin that syncs everything together s...

Josidel Online Stores

 Josidel Online Stores is an e-commerce website that offers a wide range of products to customers worldwide. From trendy fashion items to cutting-edge electronics, the store provides an easy and convenient shopping experience for everyone. One of the things that set Josidel Online Stores apart is the variety of products available on the platform. Customers can find everything from stylish clothing and accessories to gadgets and home appliances. With a focus on quality and affordability, the store offers products that are both stylish and practical. Another key feature of Josidel Online Stores is its user-friendly interface. The website is easy to navigate, with products sorted into various categories and subcategories. Customers can easily find what they're looking for, with a simple search bar and filtering options available. The store also provides detailed product descriptions and high-quality images to help customers make informed purchase decisions. Josidel Online Stores pride...