Preface: My Journey Into The Security World
Preface: My Journey Into The Security World
JOINING ALIBABA
Joining Alibaba caused a dramatic change in my life—I was recommended for an inter-
view by a close friend to Alibaba. The interview was funny: When the interviewer wanted
me to show my talent, I acquired access to the router of an operator and turned it off, which
caused the internal network to shut down. After the interview, the director who inter-
viewed me asked the operator to re-sign the availability agreement with Alibaba.
xvii
xviii ◾ Preface
As fate would have it, my hobby in college turned out to be my profession. The fact that
no universities provided majors in network security only strengthened my resolve to take
up security as a career.
In Alibaba, I soon gained prominence. I spoofed the e-mail password of our develop-
ment manager in the internal network, paralyzed the company network in a pressure test,
obtained the privilege of the domain-controlled server several times, and was able to access
any computer as an administrator.
But, apart from these, what I am most proud of is the piles of security assessment reports,
because I am well aware that every vulnerability in a network affects millions of users. I get
immense job satisfaction by ensuring that the benefits reach so many users. While I was
starting out, the web was becoming immensely popular as the core of the Internet; I thus
feel happy to have been involved in the wave of web research.
I became the youngest technical expert in the history of Alibaba at 23, even though there
are no official records maintained. In 2010, I took part in the development of the security
department from scratch. At around the same time, Taobao and Alipay also started from
scratch, and I was invited to be one of the security experts to set up the foundation for their
security development process.
With the right way of thinking, every problem can be solved. A security engineer’s strength
lies not in his skills or in the number of 0 days attacks he knows, but in the intensity of his
understanding about security issues. I have always believed in this idea and have put this into
practice. Therefore, the value of the book is not in the solutions it provides but rather in the
thinking that goes behind these solutions. We want not just solutions, but excellent solutions.
SECURITY ENLIGHTENMENT
Internet companies do not attach much importance to security issues. Statistics reveal that
Internet companies invest not more than 1% on security.
At the end of 2011, Chinese Internet companies were overwhelmed by one of the big-
gest security crises in the history of the Internet. On December 21, 2011, the biggest online
community for developers, the Chinese Software Developer Network (CSDN), was hacked,
and 6 million registered user’s data were released. The worst part was that CSDN saved all
user passwords in plaintext. The ensuing events were catastrophic, with all the databases
such as Netease, Renren, Tianya, Mop, Duowan, and so on being hacked. Within a short
period of time, everyone became alert to the risks that breach of privacy posed.
The data that had been hacked had been transported in the black market for years,
forming a black industry chain. This exposed the lack of preparedness of Chinese Internet
security.
I did not comment on this at the time because this was the consequence that Internet
companies had to face for neglecting security; second, in order to solve the problem of drag
library, we have to solve the problem of the whole Internet industry. Securing one database
is certainly not enough to address this just as one paragraph or one article is not enough to
explain (refer to the details in this book for better solutions).
I hope that this crisis serves as a warning to the Chinese Internet industry and forces
it to come out of its slumber. It could also serve as a new beginning and inspire a security
revolution in the industry.
This is my first book, and I hold myself responsible for any errors. Writing is not an easy
job. Due to my busy schedule, I wrote this book in my spare time, but this could never have
been achieved without the help of my family and friends.
ACKNOWLEDGMENTS
I thank my wife for all her support. During the last few days of the completion of this book,
I was by her sick bed, memories of which will be with me for the rest of my life.
I thank my parents for their encouragement and for allowing me to pursue my career
freely. This is what has given me the opportunity to write a book.
I am grateful to my company Alibaba, which has provided me a platform to display
my talent. I am also grateful to the following colleagues for their support: Wei Xingguo,
Tang Cheng, Liu Zhisheng, Hou Xinjie, Lin Songying, Nie Wanqua, Xie Xiongqin, Xu Min,
Liu Qun, Li Zeyang, Xiao Li, and Ye Yikai.
I thank Ji Xinhua for writing the foreword. He has always been a great model for all
security workers.
I thank Zhang Chunyu and his team, who worked together to make this book a reality.
Their suggestions were very helpful.
Preface ◾ xxi
Last but not least, I am indebted to my colleague Zhou Tuo, whose ideas inspired me
tremendously.
Contact:
Email: [email protected]
Blog: http://hi.baidu.com/aullik5
Weibo: http://t.qq.com/aullik5
Wu Hanqing
Hangzhou, China