The recent London Fashion Week debuting the spring 2019 styles of top designers, involved some unlikely runway models – a group of female hackers who spend far more time reading and writing computer code than they do buried in the pages of Vogue magazine.
One model in particular stood out, not just for the Nicholas Kirkwood boots she was sporting, but also for her serious hacker cred. Her name is CyFi, and at 18, she is one of the most high-profile white hat hackers. Basically, rather than using her advanced computer skills to hack into systems and wreak havoc, like, for instance, stealing money or important data from banks and other businesses (the work of black hat hackers), she instead uses her tech knowledge for good.
White hat hackers – also known as ethical hackers – are often hired by companies to locate vulnerabilities or bugs in their systems that might allow the bad hackers to break into their cyber networks and compromise whatever it is that they’re trying to keep secure. CyFi, who goes to high school in Silicon Valley in the U.S., actually co-founded a group and conference known as R00tz Asylum to teach younger kids about ethical hacking and motivate them to find vulnerabilities in mobile apps and programs and help strengthen them. CyFi has said, “Our generation has a responsibility to make the internet safer and better.”
White hat hackers have been stealing the tech spotlight, praised for protecting everything from valuable Instagram-influencer accounts to detecting cyber weaknesses at multi-million-dollar companies. And, they are being paid well for their efforts. Bugcrowd, a platform that crowd sources bug hunters for other companies, recently released a report on the economics of white hat hackers. According to Bugcrowd, the average yearly payout of the top 50 white hat hackers in 2018 was $145,000.
White hat hackers tend to be young, digital natives who consider screens as essential as food and water. So, we turned to two of the most well known teen white hat hackers to learn more about their work. Jack Cable, 18 and a freshman at Stanford University, recently appeared on the Time Magazine list of the 25 most influential teens of 2018. Dubbed a rising star in the world of white hat hackers, Cable has focused his ethical hacking on the cryptocurrency industry (think bitcoin) through his company, Lightning Security. Sam Curry, an 18-year-old from Lincoln, Nebraska, U.S., who has been covered by the likes of MarketWatch, BBC and the New York Post for his six-figure success strengthening the cyber security of companies like Yahoo, graduated from high school two years ago and is taking time off to focus on his business, 17security.
“Seeing the rise of data breaches, white hat hackers are motivated to work alongside companies, helping prevent the next large-scale hack.” — Jack Cable
Both Cable and Curry are passionate about their work. “Cybersecurity is one of the most pressing matters facing companies, our government and our society,” says Cable, who has used his renowned hacker-security skills to work with the U.S. Department of Defense. “Just the knowledge that finding one vulnerability can singlehandedly prevent a data breach affecting millions of users is incredible. The challenge of finding vulnerabilities, as well, makes ethical hacking a fun and rewarding field.”
They help us better understand the world of the white hat hacker.
White Hats and Bug Bounties. “A white hat hacker is an individual who works alongside companies to help identify flaws in their security,” explains Cable. “Bug bounties are a form of crowdsourced white hat hacking, where a company can make use of hundreds of white hat hackers to find vulnerabilities. This is effective because no company can find or prevent all of its vulnerabilities internally, so enlisting an external set of eyes can expose new vulnerabilities.” Bug bounty platforms like HackerOne source the cybersecurity researchers (a.k.a. white hat hackers) and connect them with businesses.
The Bugs Revealed. “Generally speaking, when bug bounty hunters attempt to find vulnerabilities, they’re attempting to find web application security vulnerabilities. These are issues that can be identified with pretty much only a web browser and tools to interact with the web browser,” notes Curry. “At the end of the day, you’re trying to exploit the logic of the web application to do something it shouldn’t do in terms of confidentiality (disclosing user information), integrity (displaying content that it shouldn’t), and availability (taking the asset offline as a rogue attacker). There are hundreds of vulnerability classifications and examples.” Here are a few examples of Curry’s ethical-hacking work from his blog: https://samcurry.net/hacking-a-massive-steam-scamming-and-phishing-operation-for-fun-and-profit/ and https://samcurry.net/reading-asp-secrets-for-17000/ and https://samcurry.net/exploiting-directory-traversal-on-a-yahoo-acquisition/.
More bugs! Cable’s company Lightning Security worked with Solidified, a company providing a bounty platform to connect certain blockchain companies to auditors skillful in finding vulnerabilities. Solidified reached out to Cable to probe for vulnerabilities in its platform. Lightning was given access only to the public-facing URLs, in order to simulate a real cyber attack scenario, and then Cable set out to make sure those URLs were secure. “While testing, I identified vulnerabilities that could have led to theft of funds stored on Solidified and the exposure of user information, which would have harmed Solidified’s finances and reputation if exploited,” says Cable. “Instead, Solidified was able to fix these vulnerabilities before the business launched.” Hungry for all Cable’s bug-hunting details? You can find them HERE.
Show Me the Bounty. Payoffs can be big, but they’re not definite. “In the last 12 months, I’ve made about $100,000 working 20 hours a week,” says Curry. “Bug bounty, however, is a field where people are paid in bounties, not salaries. I could make $140,000 in the next 12 months or $60,000 depending on what I’m able to find. The thing that is so scary to bug bounty for most people is that there is absolutely no guarantee that you’ll find any issues, and this is true for even the most competent researchers. During high school, I was still making about $70,000 yearly working between the end of the school day and about 1:00-2:00 a.m.”
Grasping at Flaws. If you’re interested in ethical hacking, you should first understand underlying protocols like HTTP and DNS. HTTP (Hypertext Transfer Protocol), for example, is the underlying protocol used by the World Wide Web that defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. You should also have experience with programming language and have strong critical-thinking skills and focus, suggest our experts. “White hat hacking is an exciting blend of curiosity, adversarial thinking and technical knowledge,” notes Cable. “It definitely helps to be familiar with the basics of programming and development. Beyond understanding the technical aspects of various vulnerabilities, having programming experience exposes the process needed to build a secure website, which goes hand-in-hand with the attitude of a white hat hacker to look for flaws anywhere and everywhere.”
Adds Curry: “If it’s something you’re interested in, pursue it! Everything is on the internet, and a challenge to yourself would be to make it your responsibility to figure out the groundwork yourself. Spend time trying and failing to understand things. If you aren’t able to learn by yourself it is likely that you won’t succeed later down the road.”
Black Hoodies and Dark-lit Basements. Get this image out of your mind! A large and well-lit community of people – including established professionals and young part-timers who have few barriers to jumping into the hunt — are pursuing computer security and penetration testing. “People who do this work are generally very successful and competent,” says Curry. “Most information-security professionals are very vocal and communicative people who collaborate with other professionals. Try to completely throw away any assumptions you have of “hackers” (even though they definitely may exist somewhere in the real world) and instead see it as a melting pot of every persona.”
Echoes Cable: “The community of bug bounty hunters is extremely diverse and supportive. Many hackers run a blog where they detail interesting findings and their thought process, and lots of resources are freely available to learn about security. For instance, HackerOne runs a website called Hacker101 (hacker101.com), where it provides resources to get started in bug bounties. There is a community of hackers happy to answer questions and help newcomers to learn. Bug Bounty Forum in Slack communities is one example.”
Good vs. Evil. “We’re fortunate to live in a time where the easiest path to get started in hacking is the legal and ethical path,” says Cable. “Seeing the rise of data breaches, white hat hackers are motivated to work alongside companies, helping prevent the next large-scale hack. Further, experience gained and interactions with companies are invaluable. Countless hackers, including myself, have started careers in cybersecurity by participating in bug bounty programs, which can never be achieved via illegal activity.”
Related Links
- CyFi on the Runway
- 15 Skills You Need to Be a White Hat Hacker
- Time Magazine’s 25 Most Influential Teens of 2018
- Sam Curry Blog
- New York Post: Sam Curry Made $100,000
- U.S. Dept. of Defense Announces Hack the Marine Corps Bug Bounty Program
- Bugcrowd Report
- Planet Money: The Price of a Hack
- R00tz Asylum
Conversation Starters
Jack Cable says that white hat hacking is “an exciting blend of curiosity, adversarial thinking and technical knowledge.” What does he mean? What are some key skills that ethical hackers must have to succeed?
What is cybersecurity? Using the Related Links in the article’s righthand toolbar, research why unethical hacks can hurt companies.
Do you have any experience with hacking, either ethical or otherwise? We want to hear about it! Log in and share your stories and insight in the Comment section following this article.
I think it is cool that a 18-year-old kid is hacking and making a difference in the world by using his skills,
Before reading this article, I had very shallow information about white hackers. Benevolent hackers. That was it. However, after reading this article, I found out I was correct, but with many more things packed inside. White hackers were portrayed as ethical hackers expected to embark on their own journey of hacking and pioneering their own path, not following others’ footsteps. Then I wondered: how can I improve the white hat hacker system if it is already very well-organized and individualistic? I pivoted to searching for places to improve their business.
As the article mentions, “A white hat hacker is an individual who works alongside companies to help identify flaws in their security,” The “individuals” have to withstand hours of solitude and dedication when working. It involves no social communication, making it a very individualistic job. As the work takes the form of monotone and demands extreme commitment, an average of 40 hours per week must be dedicated. While it may seem like an advantage, solitude can serve as a deadly flaw in this seemingly flawless job. Thomas Lote, a hacker, replied to the question “Are hackers lonely?” that “Very much all the time, day or night… I’m by myself…nobody really understands what we go through.” He expressed the mentally burdensome atmosphere he is subject to due to the loneliness he experiences. Hackers are widely known to work alone in a dark basement with the hood on. However, in order to enhance the working conditions and their mental health, working as a team may expedite their work speed, vary the approaches, and allow them to tackle more significant challenges.
White hat hackers are a deserted job that is not encompassed by a company or an organization, relying only on themselves. They have to find their own way through the abilities they possess, which is hacking, to make a living without any help from their surroundings. Even if they do find a way to benefit a company, it could turn out as a failure just in a second. When there exists no sign of malicious hacking in the company system, the job of white hat hackers is over. All or nothing is their everyday life of working. It can lead to a miserable failure despite the arduous effort they put in. Furthermore, most hackers are self-taught, usually through media. These factors leave them with no shelter to stay under when hard times come or lean on someone they can trust when a slump comes.
Instead of expecting prospective white-hat hackers to follow the precedent, CyFi may want to spearhead and establish an organization or affiliation that registers current white-hat hackers, gives systematic tutorials to potential candidates who dream of becoming white-hat hackers, and shapes up the cyber security market. For training purposes, CyFi can throw a competition so that aspirants can come and hone their skills in a simulated situation. In a male-dominant field, CyFi’s initiative and leadership can set an admirable precedent for future female white hat hackers and organize the career path more tangible and doable because, for so many years, the field was left in individuals’ hands without proper guidance. If it can be systemized, all the years of accumulated knowledge and strategies can be organized and trained to cultivate highly skilled white hat hackers.
These limitations are crucial to establishing a more stable work system and protecting data worldwide in a myriad of businesses and industries. The improvements benefit not only white hat hackers themselves but also the cybersecurity system in general and companies that are potentially under a threat of data leakage.