Home page logo

pen-test logo Penetration Testing mailing list archives

Re: Pentester convicted..
From: "Art Cooper" <acooper () pop innerwall com>
Date: Thu, 11 May 2006 15:46:31 -0600

Because I BELIEVE there is a "LOT" more here than meets the eye..  I wonder 
if he took the evidence to the Univ. and they ignore him.. If so, then 
perhaps he had an axe to grind.. My point is this - what ACTUAL DAMAGE was 
caused?  Most lawyers will tell you that you MUST prove there was malice and 

I agree he acted stupid, but I'm just afraid it may start a precedent.  I 
also agree he should have had permission, but I just can't help but have 
a "gut-feeling" there's more here than meets the eye..  I have only been in 
IT for 28 years, but I'm still learning..


On Thu, 11 May 2006 17:41:21 -0400, lee.e.rian wrote
"Art Cooper" <acooper () pop innerwall com> wrote on 05/11/2006 
11:25:57 AM:

I agree Bill.  The fact they use information HE provided to then convict
is completely ridiculous..

If he actually did provide the information to USC that would be one thing.
But he breaks in, steals personal records, doesn't notify USC about the
security problem, and sends the personal records to a reporter!??


  "McCarty is a professional computer security consultant who 
noticed that   there was a problem with the way the University of 
Southern California   had constructed its web page for online 
applications. A database   programming error allowed outsiders to 
obtain applicants' personal   information, including Social Security 

   For proof, the man copied seven applicants' personal records and
   anonymously sent them to a reporter for SecurityFocus. The journalist
   notified the school, the school fixed the problem, and the 
reporter   wrote an article about it."

Why would anyone try to defend this behavior much less get upset 
when he's prosecuted?


On Wed, 10 May 2006 09:20:22 -0500, William Hancock wrote
Hey there pen-testers, take this with a grain of salt, it just got me
excited.  I am really interested in everyones opinion on the matter
or corporate responsibility and ownership.

In an article posted to slashdot today

(http://it.slashdot.org/article.pl?sid=06/05/10/112259&from=rss) a
man has been convicted of hacking when he casually and helpfully
reported a security vulnerability to the owners of a web site, in
this case The University of Southern California.  It reads like it
was some sort of simple SQL injection and upon gleaning the
information he reported it.
        <.. snip ..>

Best Regards,

Arthur B. Cooper Jr. "Coop"
Senior Network Engineer
Innerwall, Inc.
US Mobile: 719-640-7223
acooper () innerwall com

"Most men lead lives of quiet desperation
 and go to the grave with the song still in them."
* Henry David Thoreau *

This List Sponsored by: Cenzic

Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's 
Choice Award from eWeek. As attacks through web applications continue to rise, 
you need to proactively protect your applications from hackers. Cenzic has the 
most comprehensive solutions to meet your application security penetration 
testing and vulnerability management needs. You have an option to go with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request () cenzic com for details.

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]