Thoughts Media.com

 


Windows Phone Thoughts

Loading feed...

Digital Home Thoughts

Loading feed...

Apple Thoughts

Loading feed...




Go Back   Thoughts Media Forums > Thoughts Media Off Topic

Reply
 
Thread Tools Display Modes
  #1  
Old 05-22-2003, 06:39 PM
MonolithicDawgX
Pupil
Join Date: Mar 2002
Posts: 32
Default Seriously, how do you hire someone to try to hack a secure code?

I know that sounds weird, but this is a legit request... My company is creating a process for physically securing a door lock that uses software built to communicate via Bluetooth. We know that there will be people trying to attack this system as this is for "doors" in the public domain. We have been working with an outside company to build the security and software, but are thinking of trying to find someone to "crack"the system before deployment.

So how do you find someone who is good at that without risking public knowledge? Oh sure, my company has loads of lawyers and retained legal firms, but the reality is that if the "keys"were posted on the internet, by the time we prosecuted we could be out of millions of dollars. And since I mentioned that this is a door, we are talking, basically about finding a "locksmith" who operates somewhat on the right side of the law... he/she needs to be someone who is trying to beat the system...

What would you do?
 
Reply With Quote
  #2  
Old 05-22-2003, 06:42 PM
Jason Dunn
Executive Editor
Jason Dunn's Avatar
Join Date: Aug 2006
Posts: 29,160

Find a legitimate programmer that does Bluetooth communication protocols for a living, and hire him to attack your system. A "white hat cowboy" can know just as much as a "black hat" one. :-)
__________________
Want to contact me personally? Use this. Want to read my personal blog? Check it out. Want to follow me on Twitter? Here you go.
 
Reply With Quote
  #3  
Old 05-22-2003, 06:45 PM
Jeff Rutledge
Moderator Emeritus
Jeff Rutledge's Avatar
Join Date: Aug 2006
Posts: 1,998

You could look into getting an IRM (Information Risk Management) consultant to provide this service. I'm not sure if they do this specifically, but I do know that there are services like this out there (i.e. hiring a consultant to hack a system). You could start with the consulting arms of the big firms. They've changed their names so I will try to remember them. Andersen Consulting is called Accenture now. KPMG Consulting is Bearing Point now and I don't know what PriceWaterhouseCoopers consulting is called (I think they got bought by IBM Consulting though).

I don't know if they're able to do this or not, but it's worth a call.
 
Reply With Quote
  #4  
Old 05-22-2003, 07:37 PM
ghostppc
Intellectual
Join Date: Mar 2006
Posts: 137

Quote:
Originally Posted by Jason Dunn
Find a legitimate programmer that does Bluetooth communication protocols for a living, and hire him to attack your system. A "white hat cowboy" can know just as much as a "black hat" one. :-)

Often times, the ones who make their living "legitimately" are the ones that wear more than one hat! :jester: :x-mas: :bday:

But seriously, there are good ones out there, if they are bonded and have a fear of jail time
 
Reply With Quote
  #5  
Old 05-22-2003, 08:34 PM
Mike Temporale
Editor Emeritus
Mike Temporale's Avatar
Join Date: Aug 2006
Posts: 10,981

Personally, I would use @ Stake. These guys are some of the best out there IMHO. I have used their Windows Password tester on many occasions. (My clients were not impressed with some of the simple passwords used by employees.)

They can be found at: http://www.atstake.com and you might want to check out this page: http://www.atstake.com/services/exce...imulation.html It talks attack simulations.

However, if you have that much at stake, I wouldn't get just one security person/firm. AND I wouldn't tell the people you hired that there are others hired to do the same thing.
 
Reply With Quote
  #6  
Old 05-22-2003, 09:05 PM
Kati Compton
5000+ Posts? I Should OWN This Site!
Join Date: Jul 2003
Posts: 5,133

Quote:
Originally Posted by GHOSTPPC
Often times, the ones who make their living "legitimately" are the ones that wear more than one hat! :jester: :x-mas: :bday:
I think that's true, but a lot of it is people that USED to do the bad things, but got tired of it, got older, whatever, and now use their powers for good instead of evil.
 
Reply With Quote
  #7  
Old 05-22-2003, 10:21 PM
Janak Parekh
Editor Emeritus
Janak Parekh's Avatar
Join Date: Aug 2006
Posts: 15,171

Quote:
Originally Posted by kati42
I think that's true, but a lot of it is people that USED to do the bad things, but got tired of it, got older, whatever, and now use their powers for good instead of evil.
That, and good can be pretty darn profitable in these situations. Not as much as finance cracking, perhaps, but there's no threat of jailtime...

--janak
 
Reply With Quote
  #8  
Old 05-23-2003, 08:48 PM
Mike Temporale
Editor Emeritus
Mike Temporale's Avatar
Join Date: Aug 2006
Posts: 10,981

Quote:
Originally Posted by kati42
Quote:
Originally Posted by GHOSTPPC
Often times, the ones who make their living "legitimately" are the ones that wear more than one hat! :jester: :x-mas: :bday:
I think that's true, but a lot of it is people that USED to do the bad things, but got tired of it, got older, whatever, and now use their powers for good instead of evil.
That's where @stake came from, a bunch of hackers that merged with a security firm. http://www.computerworld.com/news/20...,40542,00.html (in case you're interested)
 
Reply With Quote
Reply


Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT +1. The time now is 11:23 PM.


Powered by vBulletin® Version 3.8.9
Copyright ©2000 - 2019, vBulletin Solutions, Inc.
Copyright Thoughts Media Inc. 2009