How whitehats secure a 0day before patch?
up vote
1
down vote
favorite
I'm working on a thesis about the hacker community.
When a 0day is published, how can a whitehat secure his application/website between the time the 0day is published and the patch is developed?
Moreover, most of the time, this same 0day is used for months by blackhats, so are the blackhats ahead of whitehats?
zero-day black-hat white-hat
New contributor
|
show 2 more comments
up vote
1
down vote
favorite
I'm working on a thesis about the hacker community.
When a 0day is published, how can a whitehat secure his application/website between the time the 0day is published and the patch is developed?
Moreover, most of the time, this same 0day is used for months by blackhats, so are the blackhats ahead of whitehats?
zero-day black-hat white-hat
New contributor
To you, what is the definition of a "whitehat"? I could read your question in a couple ways depending on your definition.
– schroeder♦
22 mins ago
"The term "white hat" refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization's information systems" from wikipedia
– K.Fanedoul
10 mins ago
Ok, so then why would a whitehat have a website to secure? What website is that? Why is a whitehat responsible to apply protections? This is the source of my confusion.
– schroeder♦
7 mins ago
I suspect you are misusing the terms. I suspect you mean to say "criminals" and "defenders". How can defenders secure their assets after a 0day is published and before a patch is released?
– schroeder♦
4 mins ago
He may have a website to secure if his campany work with a website. For me white hats have to FIND vulnerabilies and then to FIX them. Maybe i'm wrong and they just need to find them
– K.Fanedoul
2 mins ago
|
show 2 more comments
up vote
1
down vote
favorite
up vote
1
down vote
favorite
I'm working on a thesis about the hacker community.
When a 0day is published, how can a whitehat secure his application/website between the time the 0day is published and the patch is developed?
Moreover, most of the time, this same 0day is used for months by blackhats, so are the blackhats ahead of whitehats?
zero-day black-hat white-hat
New contributor
I'm working on a thesis about the hacker community.
When a 0day is published, how can a whitehat secure his application/website between the time the 0day is published and the patch is developed?
Moreover, most of the time, this same 0day is used for months by blackhats, so are the blackhats ahead of whitehats?
zero-day black-hat white-hat
zero-day black-hat white-hat
New contributor
New contributor
edited 23 mins ago
schroeder♦
72.5k29160194
72.5k29160194
New contributor
asked 1 hour ago
K.Fanedoul
63
63
New contributor
New contributor
To you, what is the definition of a "whitehat"? I could read your question in a couple ways depending on your definition.
– schroeder♦
22 mins ago
"The term "white hat" refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization's information systems" from wikipedia
– K.Fanedoul
10 mins ago
Ok, so then why would a whitehat have a website to secure? What website is that? Why is a whitehat responsible to apply protections? This is the source of my confusion.
– schroeder♦
7 mins ago
I suspect you are misusing the terms. I suspect you mean to say "criminals" and "defenders". How can defenders secure their assets after a 0day is published and before a patch is released?
– schroeder♦
4 mins ago
He may have a website to secure if his campany work with a website. For me white hats have to FIND vulnerabilies and then to FIX them. Maybe i'm wrong and they just need to find them
– K.Fanedoul
2 mins ago
|
show 2 more comments
To you, what is the definition of a "whitehat"? I could read your question in a couple ways depending on your definition.
– schroeder♦
22 mins ago
"The term "white hat" refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization's information systems" from wikipedia
– K.Fanedoul
10 mins ago
Ok, so then why would a whitehat have a website to secure? What website is that? Why is a whitehat responsible to apply protections? This is the source of my confusion.
– schroeder♦
7 mins ago
I suspect you are misusing the terms. I suspect you mean to say "criminals" and "defenders". How can defenders secure their assets after a 0day is published and before a patch is released?
– schroeder♦
4 mins ago
He may have a website to secure if his campany work with a website. For me white hats have to FIND vulnerabilies and then to FIX them. Maybe i'm wrong and they just need to find them
– K.Fanedoul
2 mins ago
To you, what is the definition of a "whitehat"? I could read your question in a couple ways depending on your definition.
– schroeder♦
22 mins ago
To you, what is the definition of a "whitehat"? I could read your question in a couple ways depending on your definition.
– schroeder♦
22 mins ago
"The term "white hat" refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization's information systems" from wikipedia
– K.Fanedoul
10 mins ago
"The term "white hat" refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization's information systems" from wikipedia
– K.Fanedoul
10 mins ago
Ok, so then why would a whitehat have a website to secure? What website is that? Why is a whitehat responsible to apply protections? This is the source of my confusion.
– schroeder♦
7 mins ago
Ok, so then why would a whitehat have a website to secure? What website is that? Why is a whitehat responsible to apply protections? This is the source of my confusion.
– schroeder♦
7 mins ago
I suspect you are misusing the terms. I suspect you mean to say "criminals" and "defenders". How can defenders secure their assets after a 0day is published and before a patch is released?
– schroeder♦
4 mins ago
I suspect you are misusing the terms. I suspect you mean to say "criminals" and "defenders". How can defenders secure their assets after a 0day is published and before a patch is released?
– schroeder♦
4 mins ago
He may have a website to secure if his campany work with a website. For me white hats have to FIND vulnerabilies and then to FIX them. Maybe i'm wrong and they just need to find them
– K.Fanedoul
2 mins ago
He may have a website to secure if his campany work with a website. For me white hats have to FIND vulnerabilies and then to FIX them. Maybe i'm wrong and they just need to find them
– K.Fanedoul
2 mins ago
|
show 2 more comments
1 Answer
1
active
oldest
votes
up vote
4
down vote
The person who discovers a security issue often reports it to the software vendor or developer first. This gives the software vendor time to fix the issue before publication. Then, after it is fixed the bug is publicly disclosed. This process is called responsible disclosure.
Sometimes, someone doesn't disclose the zero-day to the software vendor but uses it to hack other systems. Doing this can tip of security companies and disclose the bug, burning the zero-day.
I don't think your statement "most of the time, this same 0day is used since months by black hats" is true. This is true for some security issues, but a lot of zero-day bugs are found for the first time by white-hat hackers. I wouldn't say black hat hackers are ahead of white hat hackers. They both find security issues and some of these overlap. However, the offense has it easier than the defense in that the offense only needs to find one bug, and the defense needs to fix all the bugs.
Thank's for the answer, I said that : "most of the time, this same 0day is used since months by black hats" because i have read a lot of black hats interview saying that they are using those 0day way before any publication
– K.Fanedoul
47 mins ago
Ah, because we all know that anonymous black hats are completely reliable sources ...
– pjc50
2 mins ago
add a comment |
Your Answer
StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "162"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});
function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
convertImagesToLinks: false,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
noCode: true, onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});
}
});
K.Fanedoul is a new contributor. Be nice, and check out our Code of Conduct.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f199672%2fhow-whitehats-secure-a-0day-before-patch%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
1 Answer
1
active
oldest
votes
1 Answer
1
active
oldest
votes
active
oldest
votes
active
oldest
votes
up vote
4
down vote
The person who discovers a security issue often reports it to the software vendor or developer first. This gives the software vendor time to fix the issue before publication. Then, after it is fixed the bug is publicly disclosed. This process is called responsible disclosure.
Sometimes, someone doesn't disclose the zero-day to the software vendor but uses it to hack other systems. Doing this can tip of security companies and disclose the bug, burning the zero-day.
I don't think your statement "most of the time, this same 0day is used since months by black hats" is true. This is true for some security issues, but a lot of zero-day bugs are found for the first time by white-hat hackers. I wouldn't say black hat hackers are ahead of white hat hackers. They both find security issues and some of these overlap. However, the offense has it easier than the defense in that the offense only needs to find one bug, and the defense needs to fix all the bugs.
Thank's for the answer, I said that : "most of the time, this same 0day is used since months by black hats" because i have read a lot of black hats interview saying that they are using those 0day way before any publication
– K.Fanedoul
47 mins ago
Ah, because we all know that anonymous black hats are completely reliable sources ...
– pjc50
2 mins ago
add a comment |
up vote
4
down vote
The person who discovers a security issue often reports it to the software vendor or developer first. This gives the software vendor time to fix the issue before publication. Then, after it is fixed the bug is publicly disclosed. This process is called responsible disclosure.
Sometimes, someone doesn't disclose the zero-day to the software vendor but uses it to hack other systems. Doing this can tip of security companies and disclose the bug, burning the zero-day.
I don't think your statement "most of the time, this same 0day is used since months by black hats" is true. This is true for some security issues, but a lot of zero-day bugs are found for the first time by white-hat hackers. I wouldn't say black hat hackers are ahead of white hat hackers. They both find security issues and some of these overlap. However, the offense has it easier than the defense in that the offense only needs to find one bug, and the defense needs to fix all the bugs.
Thank's for the answer, I said that : "most of the time, this same 0day is used since months by black hats" because i have read a lot of black hats interview saying that they are using those 0day way before any publication
– K.Fanedoul
47 mins ago
Ah, because we all know that anonymous black hats are completely reliable sources ...
– pjc50
2 mins ago
add a comment |
up vote
4
down vote
up vote
4
down vote
The person who discovers a security issue often reports it to the software vendor or developer first. This gives the software vendor time to fix the issue before publication. Then, after it is fixed the bug is publicly disclosed. This process is called responsible disclosure.
Sometimes, someone doesn't disclose the zero-day to the software vendor but uses it to hack other systems. Doing this can tip of security companies and disclose the bug, burning the zero-day.
I don't think your statement "most of the time, this same 0day is used since months by black hats" is true. This is true for some security issues, but a lot of zero-day bugs are found for the first time by white-hat hackers. I wouldn't say black hat hackers are ahead of white hat hackers. They both find security issues and some of these overlap. However, the offense has it easier than the defense in that the offense only needs to find one bug, and the defense needs to fix all the bugs.
The person who discovers a security issue often reports it to the software vendor or developer first. This gives the software vendor time to fix the issue before publication. Then, after it is fixed the bug is publicly disclosed. This process is called responsible disclosure.
Sometimes, someone doesn't disclose the zero-day to the software vendor but uses it to hack other systems. Doing this can tip of security companies and disclose the bug, burning the zero-day.
I don't think your statement "most of the time, this same 0day is used since months by black hats" is true. This is true for some security issues, but a lot of zero-day bugs are found for the first time by white-hat hackers. I wouldn't say black hat hackers are ahead of white hat hackers. They both find security issues and some of these overlap. However, the offense has it easier than the defense in that the offense only needs to find one bug, and the defense needs to fix all the bugs.
answered 1 hour ago
Sjoerd
16.1k73856
16.1k73856
Thank's for the answer, I said that : "most of the time, this same 0day is used since months by black hats" because i have read a lot of black hats interview saying that they are using those 0day way before any publication
– K.Fanedoul
47 mins ago
Ah, because we all know that anonymous black hats are completely reliable sources ...
– pjc50
2 mins ago
add a comment |
Thank's for the answer, I said that : "most of the time, this same 0day is used since months by black hats" because i have read a lot of black hats interview saying that they are using those 0day way before any publication
– K.Fanedoul
47 mins ago
Ah, because we all know that anonymous black hats are completely reliable sources ...
– pjc50
2 mins ago
Thank's for the answer, I said that : "most of the time, this same 0day is used since months by black hats" because i have read a lot of black hats interview saying that they are using those 0day way before any publication
– K.Fanedoul
47 mins ago
Thank's for the answer, I said that : "most of the time, this same 0day is used since months by black hats" because i have read a lot of black hats interview saying that they are using those 0day way before any publication
– K.Fanedoul
47 mins ago
Ah, because we all know that anonymous black hats are completely reliable sources ...
– pjc50
2 mins ago
Ah, because we all know that anonymous black hats are completely reliable sources ...
– pjc50
2 mins ago
add a comment |
K.Fanedoul is a new contributor. Be nice, and check out our Code of Conduct.
K.Fanedoul is a new contributor. Be nice, and check out our Code of Conduct.
K.Fanedoul is a new contributor. Be nice, and check out our Code of Conduct.
K.Fanedoul is a new contributor. Be nice, and check out our Code of Conduct.
Thanks for contributing an answer to Information Security Stack Exchange!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Some of your past answers have not been well-received, and you're in danger of being blocked from answering.
Please pay close attention to the following guidance:
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f199672%2fhow-whitehats-secure-a-0day-before-patch%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
To you, what is the definition of a "whitehat"? I could read your question in a couple ways depending on your definition.
– schroeder♦
22 mins ago
"The term "white hat" refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization's information systems" from wikipedia
– K.Fanedoul
10 mins ago
Ok, so then why would a whitehat have a website to secure? What website is that? Why is a whitehat responsible to apply protections? This is the source of my confusion.
– schroeder♦
7 mins ago
I suspect you are misusing the terms. I suspect you mean to say "criminals" and "defenders". How can defenders secure their assets after a 0day is published and before a patch is released?
– schroeder♦
4 mins ago
He may have a website to secure if his campany work with a website. For me white hats have to FIND vulnerabilies and then to FIX them. Maybe i'm wrong and they just need to find them
– K.Fanedoul
2 mins ago