199

I was invited to an interview for an IT position in an organization called XYZ.

While waiting in the lobby, I found an open WiFi network called XYZ. I connected to it and was greeted with a web page requesting for a username and a password. I ran a scan of the connected devices using Fing (an app on android) and found that there are some laptops with names XYZ-HR-1 and XYZ-FN-1.

In the interview, I told them that since my position entails some security aspects, I found that the open network is a security vulnerability in their network.

The IT manager was impressed but the HR representative was not, and acted defensively and said that I am not hired yet to check out their network security. I told them that this is a serious issue and should not wait until I or anyone else be hired.

Was I right in telling them that I did that? Did I kill my chances with them? Should I do it again with other job opportunities (if something is discovered by accident)? How can I gain an edge in the interview with this kind of information?

Chase Sandmann
  • 396
  • 1
  • 7
  • 15
workoverflow
  • 1,628
  • 2
  • 9
  • 15

17 Answers17

296

A stunt like this would - in most environments - be a show-stopper from HR. The reason for this is very simple: You knew what you were doing, and it was none of your responsibilities to perform the test.

If you happened to come across the issue in a "The shares showed up in the windows explorer" way it would probably have been ok. But a security professional needs to know that running a network scanner on a network, where this was not agreed to by the admin of the network, is definitely under the category "not nice" to "hostile". It may also cause real cost e.g. when you trigger a false alarm. I once wasted a few hours trying to find the source of a scan which some punk from some other department ran without our permission (or anybody else on the internal network).

Depending on the circumstances, one could also imagine that the network is not visible until you are inside the company area. I once worked on a site large enough that you would not see a wifi signal from the outside (without very special measures). In that case there would even be a breach of trust. (I know that it's still not a good idea to run an open wifi, you know, IT guys know, but I don't know if management and HR knows or wants to hear).

Sascha
  • 17,910
  • 2
  • 39
  • 67
  • 2
    Comments are not for extended discussion; this conversation has been moved to chat. – Monica Cellio May 22 '18 at 16:40
  • 6
    OP doesn't mention what country this was in, but in the US you should be very careful. Even a simple Fing scan could be considered a violation of the Computer Fraud and Abuse Act (CFAA) and unlawful access of a computer system. See first line of wikipedia description https://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act "The law prohibits accessing a computer without authorization, or in excess of authorization" – JesseM May 24 '18 at 23:23
  • 27
    @Gabe Sechan: No. The attitude of "anything that is not successfully secured is fair game" is a telltale sign of either the kind of security idealist that will spend hours improving a lock leaving the hinges broken, or of someone who has a cavalier attitude towards the property of those who should especially be expected to trust them - which isn't good. As an IT person, if involved in a hiring decision, I would at best be asking far more questions before giving any vote. – rackandboneman May 24 '18 at 23:24
  • 2
    @rackandboneman we'd have hired him at any company I've worked at in my 17 year career, except maybe hp. I'd rather have proactive than passive. I think you've worked at horrible places. I'd he'd attempted to respond this, he'd be a non hire, but telling us about it would elevate him above the pack – Gabe Sechan May 24 '18 at 23:33
  • 3
    It's foolishly arrogant to just assume an open network is any issue at all. It's entirely possible the network and XYZ-HR-1 and XYZ-FN-1 are setup exactly as intended. – DTRT May 28 '18 at 18:38
221

Imagine I invited you to my house for a backyard bar be que and you arrived and, while we were in the kitchen, said

I stopped by yesterday while you were at work. That fence doesn't keep anyone out. I noticed that your swing set isn't properly anchored into the ground - that could be unsafe if larger children swing really hard. Also, the spacing on your deck rails is too wide, these days code specifies X inches and you have Y.

I would be standing there with my mouth open staring at your rudeness. Nobody asked you, you didn't check if it was ok, you just intruded and now you're criticizing. Sure, children's safety on swing sets and back deck is really important. But so are the rules of polite society. A better guest wouldn't invade the back yard without consent and wouldn't blurt out an inspection report early in a conversation. Instead that guest would wait until reaching the back yard with a glass of lemonade and then say

Ooooh, a swingset. I know a little about these. Is it anchored properly? May I check?

and

You know these days deck rails are supposed to be Y inches ... It looks like yours might be older ... I can grab my measuring tape and confirm if you like?

Now you're showing your deep knowledge of backyard safety and that you possess tools, but you're not hurting anyone.

Now the point of this metaphor/analogy is not to correspond perfectly with the act of checking out an open wifi and discovering some machine names. It is to show you the emotional response this behavior can elicit. They invited you to their offices for an interview. You did something that is outside the norm of an interview, without permission or invitation, when they were not there to see you do it. And you criticized their operations in the same paragraph in which you told them what you had done. At least one of them was shocked and upset. The thought experiment above is to lead you to an understanding of those feelings of being shocked and upset.

To leave the metaphor/analogy behind, how could you have handled this better? Instead of blurting out your results early in the interview, you could have waited until discussing the security aspect and then said "a lot of good companies have no idea that their networks are vulnerable to some of the newer attacks. I could run a 5 minute scan on your guest wifi if you like." You could of course make this offer with confidence because you already did it in the lobby :-). Now you're showing your skills and your tools, in the right context, and with permission. You even set them up a face-save that it doesn't mean they're idiots if you find something. When you find it, you can tell them that you know how to change things so that vulnerability will be closed. Now they want to hire you instead of being offended.

Kate Gregory
  • 150,088
  • 64
  • 339
  • 452
  • 4
    Comments are not for extended discussion; this conversation has been moved to chat. – Jane S May 21 '18 at 22:25
  • 48
    Disagreed. The correct analogy would be inviting someone to check out your house for issues (like the ones you mentioned), but before getting to know your guest or getting a chance to talk about the job, your guest already checked everything out, more than you expected. OP wasn't invited for a chit-chat, he was invited for a job. – John Weisz May 24 '18 at 18:11
  • 11
    I like this answer best because the fundamental flaw is doing this without permission. "Mind if I connect to your open wifi?" "Mind if I poke around and show you what I can find?". Do that before showing off and it's much less hostile. Also, insisting that it's a security failure when you don't actually know what is being secured is a newbie mistake as bad as insisting my backyard fence is failing to secure my front lawn. – candied_orange May 26 '18 at 11:56
  • 2
    Take it to chat. I have left one comment from each "side" in this argument (based on votes and convenience, 'cause I'm not digging through all that again), as an indicator of the longer discussion that was moved to chat where it belongs. Further discussion will be summarily deleted. – Monica Cellio May 28 '18 at 18:19
77

I told them that this is a serious issue and should not wait until I or anyone else be hired.

Was I right in telling them that I did that?

Lecturing an interviewer is seldom a good way to get a job.

Did I kill my chances with them?

There's no way to know the answer to that unless you hear from them directly.

Should I do it again with other job opportunities (if something was discovered by accident)?

Wait until your assessment is specifically solicited, or until you are hired.

Joe Strazzere
  • 382,456
  • 185
  • 1,077
  • 1,492
  • 1
    Wanted to verify, "lecturing an interview is seldom a good way to get a job"... is this sarcasm or a typo? Maybe an explanation would be clearer? I don't think interviewers like being lectured... – Kevin Xu May 24 '18 at 21:28
  • 6
    @KevinXu Seldom means rarely so that Sentence could say "Lecturing an interviewer is rarely a good way to get a job." While an odd phrasing it is still a correct way to say Interviewers won't like a lecture. – James Khoury May 24 '18 at 23:02
  • In either case, its light sarcasm. Lecturing an interviewer will almost always get you rejected from the job. – Shawn V. Wilson May 29 '18 at 04:31
  • @ShawnV.Wilson - Lecturing an interviewer may (rarely) yield some positive points if the lecture is correct in every point and super relevant in the context; and if the interviewer has time and excellent resources to be able to verify and appreciate the facts involved post-interview, before sharing their evaluation of the candidate internally. But communication skills including politeness will be evaluated, too. "He lectured me near-rudely, he'll tend to lecture colleagues and customers on everything. Will I be able to control that risk?" – Jirka Hanika May 29 '18 at 08:07
  • @JirkaHanika Exactly right. That's why I said "almost". – Shawn V. Wilson May 29 '18 at 15:15
63

Running a scan on their network was very ill-advised, and in some locations could have gotten you charged with a crime.

You may want to read up on the case of Randall Schwarz, a well known tech author. In the 1990's he was a contract system administrator for the super computer group at Intel. He was concerned about security in the group, so he ran a password cracker on some of his colleague's accounts. Though he was an Intel contractor, security and penetration testing were not officially in his duties, and he ended up being convicted of two felonies for his activities. Many thought the convictions were an injustice, and in 2007 the convictions were sealed. Regardless, it shows you the kind of deep water you can end up in, when you decide to help out with security vulnerabilities, without actually being asked to do so.

Charles E. Grant
  • 8,313
  • 4
  • 25
  • 32
  • There is more to the Schwarz story than described on Wikipedia. See https://www.nytimes.com/1995/11/27/business/technology-net-intel-computer-security-expert-runs-afoul-law-so-much-for-hacker.html –  May 20 '18 at 20:45
  • 18
    ran a password cracker While I sort of sympathize with Schwarz, there's no comparison with running a password cracker (invasive and dumb without authorization) and scanning an open network because, (surprise) the sole purpose of leaving a network open is to let people scan it. – StephenG - Help Ukraine May 21 '18 at 02:08
  • 18
    @StephenG Yes there is, those are about the same level of invasiveness and dumbness. – user253751 May 21 '18 at 04:17
  • 26
    @StephenG the only purpose of leaving a network open you can be sure of is to let its intended users connect to it. That may be because any member of the public is invited to connect to it but simply providing the network is not an explicit invitation. Not to connect, and certainly not to use the network for every possible purpose. It is up to the network operator how robustly they prevent unwanted uses of the network. Using a network in a way you can't reasonably assume the network's owner to have invited still crosses an ethical line. – Will May 21 '18 at 10:43
  • 1
    @StephenG So leaving the wifi open is something very different to leaving a login screen open, because.. ? In both cases there are legitimate use cases for doing so and in both cases they were used for something that was clearly not intended by the creator. This is 101 of pen testing. Either everyone who's arguing against this never took courses on the topic or some universities do a grave disservice to their students by not going through basic ethical and legal requirements for pentesting. – Voo May 21 '18 at 18:06
  • 9
    I remember in highschool a classmate cracked the easily guessed password to a teacher's computer and accessed a sensitive excel containing all of the student's grade. He told her and got suspended for a week since while he had good intentions, she had no way to know if he modified anything. It's sort of like telling a friend he got a weak door and should by a 2 inch door screw by kicking in his back door to show him. Does it make the point? Yes, but now you committed a crime. – Dan May 21 '18 at 18:30
  • 1
    @Will It is up to the network operator how robustly they prevent unwanted uses of the network. Does it then not follow that they did not want to prevent network scanning, if they chose to not prevent it? – Flater May 22 '18 at 14:21
  • 2
    @Dan Guessing a trivial password guarding something secure is: "I walked up to your door and pressed the 'quick lock' button on your door. It unlocked. You installed the locking mechanism upside down, and now it has quick-unlock instead of quick-lock. You should fix that." Nothing in what you did made the door easier to exploit nor did it to damage; it made the person aware of the damage already done by the badly installed lock. And yes, the person in the house has no idea if the person noticing the problem walked into the house and stole stuff in this case either. – Yakk May 22 '18 at 17:32
  • 2
    @Flater just because someone doesn't "want to prevent" something doesn't mean it's acceptable to do the thing that's not prevented. A hotel could escort all guests to their rooms if they "wanted to prevent" wannabe pentesters from walking down the corridor trying every door handle, but you're still not getting your deposit back if you try that nonsense in my hotel. – Will May 23 '18 at 08:32
  • 7
    In most parts of the U.S., it's illegal to "access" any network for any "unauthorized" use. Most courts interpret that to mean either the network advertises itself as open to all users, or else there's some non-electronic permission required. People have been convicted of using restaurants' open WiFi from their cars in the parking lot, because only people inside the restaurant were considered authorized users. – Jeffiekins May 23 '18 at 17:35
  • 1
    @Jeffiekins how are you even supposed to know that you not are authorized? – njzk2 May 24 '18 at 05:50
  • 1
    @Yakk is right. Running a password cracker is a good idea. Everybody should do it occasionally, on their network and others'. Making it punishable is a terrible idea. Feynman already laughed about people fearing the messenger instead of the security flaws. It is utterly stupid. – Peter - Reinstate Monica May 24 '18 at 14:47
  • 2
    @njzk2 Legally, the owner of a network is afforded wide latitude to determine who is "authorized" to use their network, and for what. Many courts assume that, unless you are "authorized" by some positive action (like a sign on the wall, at least), you are not authorized. I'm guessing that calling a WiFi "Guest" or "Public" in the SID may be considered authorization to use the network for web browsing, but most courts would probably not extend "authorized use" to scanning the network in any case. And it's a principle of U.S. law that ignorance of the law is no excuse. – Jeffiekins May 24 '18 at 22:15
36

I'll take a counter viewpoint to most of the answers here. The other answers are correct, from a strictly corporate viewpoint, you are in the wrong. However, I think you did what you did because you are confident in your abilities, and you go looking for issues to fix, which are great traits to have, but will not fit in every corporate culture.

There will be some places that will be fine with this, but such an independence streak is also great for entrepreneurship. You might be well suited to starting your own business.

So, I would say you are 3 options: 1. Try to conform more to corporate culture, 2. Don't conform, but risk not getting some jobs, 3. Go the small business route.

Issel
  • 1,254
  • 8
  • 8
  • 3
    most businesses still have clients though, and companies will probably not take kindly to this sort of thing just as much from a consultant as from a prospective employee – user371366 May 20 '18 at 17:08
  • 40
    This is the typical corporate mind set: Worried about how things appear, rather than the fact that those computers were a real liability to their clients. This is why large corporations constantly leak customer information. On the other hand, actually solving the problem is the type of great work that small businesses offer and makes them successful. – Issel May 20 '18 at 19:30
  • 13
    I think a lot of start ups would hire you on the spot. On the other hand, they probably wouldn't have multiple hr employees to Snoop on – sudo rm -rf slash May 21 '18 at 02:03
  • 3
    Said otherwise : what is good in terms of skills is bad in corporate terms. The eternal cultural problem of IT in the corporate world. What makes you good for the job means you're unfit to the environment, what makes you fit for the environment makes you bad for the job. – gazzz0x2z May 21 '18 at 10:17
  • 13
    Some people in IT have the social chops to do what we need to do without needlessly pissing people off, ya know. – Monica Apologists Get Out May 21 '18 at 19:18
  • 1
    Adonalsium - But those people already have the job. He was trying to prove he has technical skills above and beyond what they were looking for that will be of great value to the company. How would he have done that other than mention it? Besides, they shouldn't be mad, they should be embarrassed they left vulnerabilities open like that. – Issel May 21 '18 at 22:10
  • 12
    @Issel He could've done it in one of the ways recommended by the others. Kids fresh out of colleague always seem to think that the only important thing are technical skills and that good social skills are beneath them. In reality it doesn't matter how clever you are if you can't work well with others. – Voo May 22 '18 at 05:41
  • 2
  • Keep doing this, and get hired by a company that tolerates and encourages the candidate's individualism. I think in that case he/she may just find a more satisfying job.
  • – user3819867 May 22 '18 at 11:48
  • 10
    @Issel Or maybe they're worried about both. I know I would be. Were I sitting in on this interview, I'd have done two things: 1) Make sure that open network gets shut down or secured. 2) Make sure this guy is not hired. If he doesn't have the discretion not to perform network scans on someone else's network without permission while waiting for an interview with that company, what on Earth is he going to do without permission once he's hired?! If this is an IT position, is he going to pen test the CEO's e-mail account without permission? Maybe spear phish an executive, or worse, a customer? – reirab May 23 '18 at 22:18
  • 1
    Security, even in light of recent trends like the GDPR, is almost never AN END IN ITSELF in business IT. It is a tool for managing business risks and/or achieving business goals. – rackandboneman May 24 '18 at 23:29
  • 2
    @Issel "how things appear" is, strangely, what might actually matter at the end of the day. – rackandboneman May 24 '18 at 23:30
  • @Issel in my answer, I explained the reasons behind that "corporate mindset" that are more than sound. – ivan_pozdeev May 31 '18 at 00:49