whitehat

T.J. O'Connor

IRL Name: 
T.J. O'Connor
Biography: 

TJ O'Connor is a Department of Defense professional on information security and a US Army paratrooper. He twice co-coached the winning team at the National Security Agency's annual Cyber Defense Exercise and won the National Defense University's first annual Cyber Challenge. He has served on multiple red teams, including twice on the Northeast Regional Team for the National Collegiate Cyber Defense Competition.

References

int eighty, int80

IRL Name: 
David Martinjak
Biography: 

David Martinjak a.k.a int eighty (sometimes "int80") is an information security engineer, American nerdcore rapper, programmer, GNU/Linux addict, and the director of 2600 from Cincinnati, Ohio. He is one of the members of Dual Core (nerdcore hip hop duo). He can be seen on DEF CON drinking all the boozes during his performances.

Pictures: 
References

Paulino Calderon

IRL Name: 
Paulino Calderon
Biography: 

Paulino Calderon is the cofounder of Websec, a company offering information security consulting services in Mexico and Canada. In the summer of 2011, Paulino joined the Nmap team as part of Google's Summer of Code to work as a NSE developer. He focused on improving the web scanning capabilities of Nmap and has kept on contributing to the project since then.

Pictures: 
References

Chris Evans

IRL Name: 
Chris Evans
Biography: 

Chris Evans previously head of Google's Chrome security team and founder of Project Zero. He is known for his research / work on Chrome Security and for authoring vsftpd. He is not to be confused with the actor of Captain America (seriously).

Pictures: 
References

h3xstream

IRL Name: 
Philippe Arteau
Biography: 

Philippe Arteau is a security researcher who is the author of the Java static analysis tool Find Security Bugs. He has also built many plugins for Burp and ZAP proxy tools.

Pictures: 
References

DJ Manila Ice

IRL Name: 
Matt Molinyawe
Biography: 

Matt Molinyawe a.k.a DJ Manila Ice (@djmanilaice) is a former vulnerability analyst and exploit developer for the Zero Day Initiative (ZDI) program. In this role, Molinyawe analyzes and performs root-cause analysis on hundreds of vulnerabilities submitted to the Zero Day Initiative (ZDI) program, which represents the world's largest vendor-agnostic bug bounty program. His focus includes vulnerability research along with analyzing and performing root-cause analysis on hundreds of zero-day vulnerabilities submitted by ZDI researchers from around the world.

Pictures: 
References

https://ruxcon.org.au/speakers/#Matt Molinyawe & Jasiel Spelman & Abdul-Aziz Hariri

Brent Cook

IRL Name: 
Brent Cook
Biography: 

Brent Cook is a Metasploit developer / contributor. He also maintains the portable version of OpenNTPD and the portable version of LibreSSL

Pictures: 
References

bushing

IRL Name: 
Ben Byer
Biography: 

Ben "bushing" Byer is a member of fail0verflow, and before that, Team Twiizers and the iPhone Dev Team. He has presented talks about console hacking in the Chaos Communication Congress. Bushing has a blog, called HackMii.

Pictures: 
References

CTurt

Biography: 

CTurt is a security researcher who is primarily interested in FreeBSD kernel. He has discovered critical and security bugs to the FreeBSD kernel like CVE-2016-1886 - SETFKEY FreeBSD kernel vulnerability, CVE-2016-1887 - sendmsg FreeBSD kernel heap overflow, and some stack disclosure vulnerabilities in FreeBSD compatibility layers. He has also written a collection of PS4 tools and experiments using the WebKit exploit because he was able to successfully jailbreak the PlayStation 4 (works with version 1.76 of PS4 firmware but it can be made to run on a newer firmware.). He used a FreeBSD kernel exploit to attain the jailbreak.

References

Cyberjunky, Cjunky, CJ

IRL Name: 
Marc Rogers
Biography: 

He is known as "Cyberjunky", "Cjunky" or just "CJ" in the hacker community. Marc is the Head of Security and part of the CFP review board for DEF CON, the worlds largest hacker conference. After spending more than 15 years wrangling hackers, criminals and spooks Marc has seen it all. A proud SVC card holder Marc can often be seen speaking at security conferences in random exotic locations.

Pictures: 
References
Syndicate content