whitehat

Eric Evenchick

IRL Name: 
Eric Evenchick
Biography: 

Eric Evenchick has worked in development and reverse engineering roles for hardware and software companies for the past eight years. He has specialized in embedded devices, automotive systems, and bespoke tool development.

Eric's work with embedded systems began with development of research vehicles at the University of Waterloo, in partnership with General Motors and the US Environmental Protection Agency. This experience led to roles in developing automotive firmware and reverse engineering vehicle systems at companies including Tesla Motors and Faraday Future.

Pictures: 
References

xwings

IRL Name: 
KaiJern Lau
Biography: 

KaiJern (xwings) is a Malaysian hacker, security researcher and speaker who is into embedded device, hardware security, blockchain security, reverse engineering and various security topics. He presented his findings in different international security conferences like Defcon, HITB, Codegate, QCon, KCon, Brucon, H2HC and etc. He conducted hardware Hacking course in various places around the globe. He is also the owner of hackersbadge.com and actively involved in Unicorn (http://unicorn-engine.org) development.

Pictures: 
References

Daehee Jang

IRL Name: 
Daehee Jang
Biography: 

Daehee Jang obtained his Ph.D. in Information Security from KAIST in 2019 and worked as a postdoctoral researcher at Georgia Tech until 2020. He has participated in various global hacking competitions, including DEFCON CTF, and has won several awards. He received a special prize from the 2016 KISA annual event for discovering 0-day security vulnerabilities in multiple software products. His research area is "System Security" including topics such as 'Fuzzing', 'Container Security', and so forth.

Pictures: 
References

Insu Yun

IRL Name: 
Insu Yun
Biography: 

Insun Yun's work has been published to the major computer conferences such as IEEE Security & Privacy, USENIX Security, and USENIX OSDI. Particularly, his research won the best paper award from USENIX Security and OSDI in 2018.

In addition to research, he has been participating in several hacking competitions as a hacking expert. In particular, he won Pwn2Own 2020 by compromising Apple Safari and won DEFCON CTF in 2015 and 2018.

Pictures: 
References

Hobbit

Biography: 

*Hobbit* is the original developer of the venerable Netcat (nc) in 1996. The original nc contained a simple port scanner. The clearest definition of Netcat is from *Hobbit* himself: a simple "utility which reads and writes data across network connections, using TCP or UDP protocols.

References

Bernd Fix

IRL Name: 
Bernd Fix
Biography: 

Bernd Fix (born 19 March 1962 in Wittingen, Lower Saxony) is a German hacker and computer security expert.

In 1986 Fix joined the Chaos Computer Club (CCC) in Hamburg and started to work on computer security issues, focussing on computer virus research.

From 1987 to 1989 Fix was one of the spokespersons for the Chaos Computer Club and author for the "Hacker Bible 2".

After the death of his friend Wau Holland (co-founder of the Chaos Computer Club) in 2001 Fix helped to establish the Wau Holland Foundation and serves as a founding member of the Board of Directors ever since.

According to Fix, when the Wau Holland Foundation started official operations in 2003, he and other founding members were in contact with Julian Assange and in 2009 they decided to support WikiLeaks. According to an interview from 2011, he got fired from his job at SIX Financial Information because of the foundation's support for WikiLeaks.

In July 2016, on the same day "Guccifer 2.0" sent Assange an encrypted 1 GB file containing stolen DNC emails, German hackers Andrew Müller-Maguhn and Bernd Fix met with Assange for at least four hours. Müller-Maguhn, the Wau Holland Foundation Vice President, is named in the Mueller report as a possible conduit for delivering hacked emails to Assange.According to The Washington Post, a former WikiLeaks associate said that year Müller-Maguhn and a colleague oversaw submissions to WikiLeaks server that year, which Müller-Maguhn denied. According to court documents, Müller-Maguhn and Bernd Fix were identified as priority targets of UC Global's spying.

Pictures: 
References

Tijme Gommers

IRL Name: 
Tijme Gommers
Biography: 

Tijme Gommers is a security researcher, red teamer and polyglot software engineering professional who devotes time to research related to cybernetic security. Over the past years, his research mainly focused on Adversary Tactics and Red Team Operations and works on the development of current exploit code and malware, used to simulate APT’s penetrating target organizations.

He has contributed to enterprise software applications using a large variety of programming languages. But what he appreciates most is developing non-commercial open-source software such as Raivo OTP (link); a one-time-password manager.

Pictures: 
References

Eviatar Gerzi

IRL Name: 
Eviatar Gerzi
Biography: 

Eviatar Gerzi worked in a range of professions in the security industry (malware analysis, security researcher, mobile hacking, etc.). During this time, he developed open-source projects (security tools). His projects include: Ketshash, Manifesto, KubiScan, Kubeltctl, and Kubesploit. His research is on DevOps security, focusing on Docker and Kubernetes.

Pictures: 
References

Hardik Shah

IRL Name: 
Hardik Shah
Biography: 

Hardik Shah is a security researcher who is known for presenting fuzzing and vulnerability discovery and analysis workshops in conferences. He has discovered 35+ vulnerabilities in Microsoft and various open source software. He had conducted workshops at conferences such as Defcon, Bsides, RSA dark arts, and many others.

Pictures: 
References

maxpl0it

IRL Name: 
Max Van Amerongen
Biography: 

Max Van Amerongen aka maxpl0it is a vulnerability researcher who focuses on finding security holes in critical software and is an occasional Pwn2Owner. He had previously worked and SentinelOne and F-Secure Labs, where he successfully participated in the Pwn2Own hacking contest a number of times.

Pictures: 
References
Syndicate content