||This article may be confusing or unclear to readers. (May 2013)|
|This article is part of a series on|
A grey hat may refer to an individual who acts in a variety of IT-related areas. In the hacking community, this metaphorical title refers to a skilled hacker whose activities fall somewhere between white and black hat hackers in a variety of practices. The ambiguity connoted by the title suggests that such people sometimes act illegally, though in good will, to identify vulnerabilities in computing processes. They usually do not hack for personal gain or have malicious intentions, but may be prepared to break some laws during the course of their technological exploits in order to achieve better security. Whereas white hat hackers generally advise companies of security exploits quietly, grey hat hackers generally "advise the hacker community as well as the vendors and then watch the fallout".
In the search engine optimisation community, the term greyhat refers to the “questionable” category in search engine optimisation. While these actions may be against search engine guidelines or may not generally be considered an ethical way to SEO a website, it is not yet considered search engine spam. While Grey Hat tactics may work for SEO and may avoid search engine penalties, members of the web community may realise what the Grey Hat hacker is doing, negatively affecting the online reputation of both website and hacker.
Black Hat SEO refers to illegitimate (against search engine guidelines) and illegal optimization tactics, while White Hat SEO refers to legitimate and proper ways to optimize a website.
The term grey hat was first cited by the hacker group L0pht in 1998. The group references it in an interview with the NY Times from 1999 describing their "gray-hat" behavior. The earliest known use of the term grey hat in the context of computer security literature may be traced back to 1997, when the trademark was first filed in the USPTO by Greyhat, LLC. The phrase was used to describe hackers who support the ethical reporting of vulnerabilities directly to the software vendor. He contrasted this with the full disclosure practices that were prevalent in the white hat community at the time and with the principles of the black hat, whereby no one should be made aware of security holes.
In 2002, however, the Anti-Sec community published use of the term to refer to people who work in the security industry by day, but engage in black hat activities by night. The irony was that for black hats, this interpretation was seen as a derogatory term; whereas amongst white hats it was a term that lent a sense of popular notoriety.
Following the rise and eventual decline of the full disclosure vs. anti-sec "golden era"—and the subsequent growth of an "ethical hacking" philosophy—the term grey hat began to take on all sorts of diverse meanings. The prosecution in the U.S. of Dmitry Sklyarov for activities which were legal in his home country changed the attitudes of many security researchers. As the Internet became used for more critical functions, and concerns about terrorism grew, the term white hat started referring to corporate security experts who did not support full disclosure.
Nevertheless, in 2004, Harris (et al.) published a book on grey hat methodologies. This built upon the idea that black hats have malicious intentions and do not disclose their secrets, whereas white hats always engaged in public full disclosure, freely publicising security flaws in the hope that they will be fixed. The authors espoused that grey hats fall somewhere between, in that they derive income from notifying the vendor of what needs to be fixed after they have penetrated a system.
In 2006, the term was used to describe freelance hackers who browse the Internet in search of security holes and then seek to charge the host a fee for fixing the issue.
In 2008, the EFF defined grey hats as ethical security researchers who inadvertently or arguably violate the law in an effort to research and improve security. They advocate for computer offense laws that are clearer and more narrowly drawn.
In summary, the term "grey hat" may refer to a hacker who:
- Engages in security research with the intention to secure rather than exploit
- Grapples with questions of ethics and law in the line of their work.
- Does not support full disclosure of vulnerabilities.
- Usually reports the vulnerability to the product vendor.
In June 2010, a group of computer experts known as Goatse Security exposed a flaw in AT&T security which allowed the e-mail addresses of iPad users to be revealed. The group revealed the security flaw to the media thereafter notifying AT&T. Since then, the FBI has opened an investigation into the incident and raided the house of weev, the group's most prominent member.
In April 2011, a group of experts discovered that the Apple iPhone and 3G iPads were "logging where the user visits". Apple released a statement saying that the iPad and iPhone were only logging the towers that the phone could access. There have been numerous articles on the matter and it has been viewed as a minor security issue. This instance would be classified as "grey hat" because although the experts could have used this for malicious intent, the issue was reported.
- Anonymous (group)
- Black hat hacking
- Exploit (computer security)
- Computer crime
- Computer hacking
- Cyber warfare
- Goatse Security
- Hacker (computer security)
- Hacker Ethic
- IT risk
- Operation AntiSec
- Penetration test
- Vulnerability (computing)
- WATCH_DOGS (2014 video game)
- White hat
- Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness & Michael Lester (2004). Gray Hat Hacking : The Ethical Hacker's Handbook. McGraw-Hill Osborne Media. ISBN 978-0072257090.
- A E (2014). Grey Hat SEO 2014: The Most Effective and Safest Techniques of 10 Web Developers. Secrets to Rank High including the Fastest Penalty Recoveries.. Research & Co. ASIN B00H25O8RM.
- "Redhat.com". Docs.redhat.com. Retrieved 2013-11-01.
- Intrusion Detection Systems Terminology Symantec.com
- "HacK, CouNterHaCk". New York Times Magazine. 3 October 1999. Retrieved 6 January 2011.
- "1997, 2000, and 2008 USPTO Greyhat Service mark Filing". It.zibb.com.
- Symantec.com Cliff, A. 2 July 2001. "Intrusion Detection Systems Terminology"
- Digitalsec.net #Phrack High Council. 20 August 2002. "The greyhat-IS-whitehat List"
- "The thin gray line". CNET News. 23 September 2002. Retrieved 6 January 2011.
- Harris (et al.) (2004). Grey Hat Hacking: The Ethical Hacker's Handbook. McGraw-Hill Osborne Media.
- Moore, Robert (2006). Cybercrime:Investigating High-Technology Computer Crime. Cincinnati, Ohio: Anderson Publishing.
- EFF.org Electronic Frontier Foundation (EFF). 20 August 2008. "A 'Grey Hat' Guide"
- Michelle Finley (2013-03-28). "Wired.com". Wired.com. Retrieved 2013-11-01.
- "Textfiles.com". Retrieved 2013-11-01.
- FBI Opens Probe of iPad Breach Wall Street Journal, Spencer Ante and Ben Worthen. 11 June 2010.
- Tate, Ryan (9 June 2010). "Apple's Worst Security Breach: 114,000 iPad Owners Exposed". Gawker.com (Gawker Media). Retrieved 13 June 2010.
- "Is Apple Tracking You?". hackfile.org.