whitehat

Igor Muttik

IRL Name: 
Igor Muttik
Biography: 

Prof. Igor Muttik Prof. Igor Muttik (PhD) (born 1962 in Russia) is a computer security professional, researcher and inventor. He started researching computer malware in the 1980s when the anti-virus industry was in its infancy. He is based in the UK and worked as a virus researcher for Dr. Solomon's Software. From 1998 he ran McAfee's malware research in EMEA and switched to his architectural role in 2002. He takes particular interest in applied security research and design of new security software and hardware. Igor holds a Ph.D. degree in physics and mathematics from the Moscow University. Igor has worked for Intel Corporation since McAfee was acquired in 2011.

References

IllWill

IRL Name: 
William Genovese
Biography: 

IllWill is a security consultant and claims to be a cyber felon (greyhat) back then. In the early 2000s, Genovese was a former figure in a loose-knit group of computer hackers who called themselves illmob.

In 2003, Genovese's website was the first to release 0day code that exploited the MS03-026 which was later used by unknown hackers to create variants of the W32/Blaster Worm. In response, Genovese released a tool he coded to remove the worm from infected Windows PC's.

He was also a co-founder and speaker at security conferences eXcon and BSides Connecticut (BSidesCT) in 2011, 2014, 2016, 2017, and 2018. In 2015 he was a panelist at DEF CON 23 in Las Vegas for a charity fundraiser to help a fellow hacker who was stricken with terminal cancer.

In October 2023, he delivered a talk at BSides CT 2023. This presentation delved into the story behind mobman, revealing several unknown facts about the mysterious developer. The talk concluded with IllWill releasing the official and genuine source code of SubSeven 2.1.2/3 in his Gitlab. This release was made possible by mobman's direct contribution and with his blessing.

References

Harri Hursti

IRL Name: 
Harri Hursti
Biography: 

Harri Hursti is a Finnish computer programmer and former chairman of the board and co-founder of ROMmon, where he supervised in the development of the world's smallest 2-gigabit traffic analysis product that was later acquired by F-Secure Corporation. Hursti participates in the Black Box Voting hack studies, along with Dr. Herbert "Hugh" Thompson. The memory card hack demonstrated in Leon County is popularly known as "the Hursti Hack". This hack was part of a series of four voting machine hacking tests organized by the nonprofit election watchdog group Black Box Voting in collaboration with the producers of HBO documentary Hacking Democracy (2006). The studies demonstrated serious security flaws in the voting systems of Diebold Election Systems. Hursti also appeared in the HBO documentary Kill Chain: The Cyber War on America's Elections (2020).

References

Lorenzo Faletra

IRL Name: 
Lorenzo Faletra
Biography: 

Lorenzo "Palinuro" Faletra is the core dev of ParrotOS (another pentesting distro) and founder of Parrot Security. He actively contributes to open-source projects. You can find his code on GitHub where he’s just another @ParrotSec developer.

References

Daniel Micay

IRL Name: 
Daniel Micay
Biography: 

Daniel Micay is a security researcher working on mobile privacy/security and is the founder of GrapheneOS. He originally worked on CopperheadOS, until a schism over software licensing between the co-founders of Copperhead Limited led to Micay's dismissal from the company in 2018.

In May 2023, Micay announced he would step down as lead developer of GrapheneOS and as GrapheneOS Foundation director. Micay wrote "I'm unable to handle the escalating level of harassment including recent swatting attacks. There will be a smooth migration." As of January 2024, Micay was contributing to GrapheneOS GitHub repositories, and the GrapheneOS Foundation's registration listed Micay as one of its directors.

References

Eric Evenchick

IRL Name: 
Eric Evenchick
Biography: 

Eric Evenchick has worked in development and reverse engineering roles for hardware and software companies for the past eight years. He has specialized in embedded devices, automotive systems, and bespoke tool development.

Eric's work with embedded systems began with development of research vehicles at the University of Waterloo, in partnership with General Motors and the US Environmental Protection Agency. This experience led to roles in developing automotive firmware and reverse engineering vehicle systems at companies including Tesla Motors and Faraday Future.

Pictures: 
References

xwings

IRL Name: 
KaiJern Lau
Biography: 

KaiJern (xwings) is a Malaysian hacker, security researcher and speaker who is into embedded device, hardware security, blockchain security, reverse engineering and various security topics. He presented his findings in different international security conferences like Defcon, HITB, Codegate, QCon, KCon, Brucon, H2HC and etc. He conducted hardware Hacking course in various places around the globe. He is also the owner of hackersbadge.com and actively involved in Unicorn (http://unicorn-engine.org) development.

Pictures: 
References

Daehee Jang

IRL Name: 
Daehee Jang
Biography: 

Daehee Jang obtained his Ph.D. in Information Security from KAIST in 2019 and worked as a postdoctoral researcher at Georgia Tech until 2020. He has participated in various global hacking competitions, including DEFCON CTF, and has won several awards. He received a special prize from the 2016 KISA annual event for discovering 0-day security vulnerabilities in multiple software products. His research area is "System Security" including topics such as 'Fuzzing', 'Container Security', and so forth.

Pictures: 
References

Insu Yun

IRL Name: 
Insu Yun
Biography: 

Insun Yun's work has been published to the major computer conferences such as IEEE Security & Privacy, USENIX Security, and USENIX OSDI. Particularly, his research won the best paper award from USENIX Security and OSDI in 2018.

In addition to research, he has been participating in several hacking competitions as a hacking expert. In particular, he won Pwn2Own 2020 by compromising Apple Safari and won DEFCON CTF in 2015 and 2018.

Pictures: 
References

Hobbit

Biography: 

*Hobbit* is the original developer of the venerable Netcat (nc) in 1996. The original nc contained a simple port scanner. The clearest definition of Netcat is from *Hobbit* himself: a simple "utility which reads and writes data across network connections, using TCP or UDP protocols.

References
Syndicate content