Hacker

Blake

IRL Name: 
Blake Self
Biography: 

Blake Self was initially most widely known for co-authoring the first commercial encrypted instant messenger with Dr. Cyrus Peikari while at VirusMD in the late 90s. He has since become known for his various talks at information security conferences. He has been attending Defcon since high school and has given several talks. He has also spoken at the SERC Showcase, CERIAS Symposium, S^2ERC Showcase, and Hackcon. He has worked as a SIPRNET Administrator, Department of Defense Red Team Analyst, Director of Information Technology, and R&D at various corporations. He currently works in the financial sector and was directly involved in defending against the DDoS attacks of Operation Ababil. Blake holds a M.S. in Computer Science from Purdue University.

Pictures: 
References

Bob Thomas

IRL Name: 
Bob Thomas
Biography: 

Bob Thomas, a programmer from BBN Technologies wrote the first accepted computer virus 'Creeper' which was an experimental self-replicating program in 1971. His program was designed not to damage but to demonstrate a mobile application. Creeper gained access via the ARPANET and copied itself to the remote system where the message, "I'm the creeper, catch me if you can!" was displayed. The Reaper program was later created to delete Creeper.

References

Tarakancoder

IRL Name: 
Joel Jul (Jo Hikaru)
Biography: 

A member of the Indonesian Coder team. He lives in Tarakan, Kalimantan Timur, Indonesia who was Born on July 18, 1988. He is partly responsible for defacing websites, many of the Malaysian.

Pictures: 
References

Slavik, Monstr, Umbro

Biography: 

Slavik is a Russion hacker who is the author of the Zeus, a trojan horse that steals banking information by Man-in-the-browser keystroke logging and Form Grabbing. In June 2009, security company Prevx discovered that Zeus had compromised over 74,000 FTP accounts on websites of such companies as the Bank of America, NASA, Monster.com, ABC, Oracle, Play.com, Cisco, Amazon, and BusinessWeek.

References

BlackLight

IRL Name: 
Fabio Manganiello
Biography: 

Received a bachelors degree in computer engineering in 2008, and a masters degree in the same subject in 2010. He is currently working both as software developer for market trading applications, and as volunteer researcher in academic contexts, mainly over machine learning algorithms applied to Intrusion Detection Systems. His master degree thesis, "Machine Learning Algorithms for Clustering and Correlating Alerts in Intrusion Detection Systems", took part at the Clusit prize, 2010 edition, as best Italian thesis in computer security, and the software project on which it was based (Snort_AIPreproc, available in the "Software" section of this website) brought to the publication of two research papers: "Multistep Attack Detection And Alert Correlation In Intrusion Detection Systems", presented at the 5th International Conference on Information Security and Assurance in Brno, 2011, and "Pseudo-Bayesian Algorithm for Correlating NIDS Intrusion Alerts", presented at the 3rd international workshop on Cyberspace Safety and Security in Milan, 2011.

His main interests range from computer security to everything related to machine learning and artificial intelligence topics. He developed several tools related to computer security (shellcode generator, tools for ARP poisoning a local network or log this kind of attacks, IRC bots, several tools for shellcode injection, in executable files or in memory resident code), several libraries (for managing neural networks, CGI applications in C, parsing math expressions and equations in C++) and applications related to image manipulation (border highlighting through Sobel's maps and other filters for images). He also wrote several manuals and guides, related to computer security, general programming, electronics, communications, math and artificial intelligence, and founded HacKnowledge project (a successful project that used to be available on this site, that aimed to become a complete reference in computer science, computer security, computer forensics, electronics, communications and math).

Pictures: 
References

Simple Nomad

Biography: 

Simple Nomad is an old(skool) hacker and founder of NMRC.
He did some phreaking and black hat hacking back in the day on an Apple II.
He has spoken at DefCon, BlackHat and ToorCon, and he is known for his somewhat paranoid mindset.

He has written tools such as NCrypt and NCovert.

Pictures: 
References

Trevor Eckhart

IRL Name: 
Trevor Eckhart
Biography: 

Currently works as a sys admin at Intergis LLC. Famous for uncovering the Carrier IQ root-kit and key-logger software running on Android smart phones.

References

The Analyzer

IRL Name: 
Ehud Tenenbaum
Biography: 

An Israeli hacker originally from Hod HaSharon. He would first gain notoriety at the age of 19 for his arrest in 1998 by the FBI for accessing unclassified computer systems being used by NASA, The Pentagon, and the Knesset (The legislative branch of the Israeli government.) as a part of a group known as the 'Israeli Internet Underground.' He would receive one year of probation, a two year suspended prison sentence which would have been enforced if he committed another computer crime in the 3 year duration, and an $18,000 fine. After this he would start working as a computer security consultant for various Israeli companies.

In September 2008, he was arrested by Canadian authorities in Montreal along with for 6 counts of Credit Card fraud. The charges originate from him hacking into the computer system of a Calgary financial institution, inflating the value of several pre-paid debit cards, and withdrawing approximately 1.7 million dollars from the cards from various countries. Two out of the three Canadians suspected of aiding his efforts have been cleared of all charges, with his girlfriend still being charged with aiding him in his crimes. Tenenbaum was released on $30,000 bail, but in October 2008 a New York grand jury indicted him on charges of conspiracy and fraud. As of February 2009 he is sought by the US for extradition to face these charges.

Pictures: 
References

bitemytaco

IRL Name: 
Christopher McLean Dixon
Biography: 

bitemytaco was a root admin of Surfboard Hacker (www.sbhacker.net), the largest modem hacking website and forum. He is an expert on DOCSIS and Motorola cable modem modification, especially the SB5100 and SB5101. He also made possible and funded the development of the first hacked firmware for the SB5101, SBH Haxorware (by Rajkosto). bitemytaco has been involved in cable modem hacking for quite awhile and was one of the speakers on the Anonymous Internet (DOCSIS: Insecure by Design) speech at Defcon 16. He died on January 1, 2012.

Pictures: 
References

Stealth

IRL Name: 
Sebastian Krahmer
Biography: 

A hacker that is known for his expertise in software and network trickery.

In 2000, found a vulnerability in kreatecd, a local root compromise for SuSE 6.x and Halloween Linux Version 4.

In 2009, Sebastian Krahmer identified a vulnerability in udevd where it incorrectly assumed that messages arriving on its NETLINK socket would always come from the kernel. Any local unprivileged user may send a unicast or multicast NETLINK message to udevd, which it will treat as a privileged message from the kernel. This would allow a user to (for example) instruct udevd to create a /dev/random device file with chosen minor and major device numbers, giving RWX permissions to any device that the attacker chooses. That's game over, kids.

Among other things, he wrote a paper entitled "Hardened OS exploitation techniques"; speaking of "PaX", and "GRSECURITY".

References
Syndicate content