whitehat

Mariusz Mlynski

IRL Name: 
Mariusz Mlynski
Biography: 

Mariusz Mlynski is a security researcher from Poland who was awarded with $55,000 at HP's Pwn2Own 2014 hacking contest for exploiting Firefox wherein he was able to execute a fundamental flaw to escalate to system privileges in Windows.

Pictures: 
References

djrbliss, Dan Rosenberg

IRL Name: 
Dan Rosenberg
Biography: 

Dan Rosenberg is a security researcher who is known for his kernel exploits. Together with Jon Oberheide, they demonstrated an exploit technique coined Stackjacking against a customized Linux kernel hardened with the grsecurity patchset. The attack was questionable since they used a modified kernel rather than a standard Grsecurity hardened kernel with a previously known exploit. He is also the author of FuzzDiff which is a tool that helps make crash analysis during file format fuzzing easier.

Pictures: 
References

Jon Oberheide

IRL Name: 
Jon Oberheide
Biography: 

Jon Oberheide is the co-founder of of Duo Security. He completed his PhD at the University of Michigan in the realm of cloud security. He has presented at a wide range of academic, industry, and hacker security conferences (DEFCON, BlackHat, etc.). In a prior life, Jon enjoyed offensive security research and exploiting *nix. Together with Dan Rosenberg, they demonstrated an exploit technique coined Stackjacking against a customized Linux kernel hardened with the grsecurity patchset. The attack was questionable since they used a modified kernel rather than a standard Grsecurity hardened kernel with a previously known exploit.

Pictures: 
References

Mario Heiderich

IRL Name: 
Mario Heiderich
Biography: 

Mario Heiderich is a self-proclaimed handsome heart-breaker but a skilled German security researcher (not to be messed with HTML5 Security). He leads a small pen-test company called Cure53 and works on projects such as the HTML5 Secruity Cheatsheet, DOMPurify, HTTPLeaks and others."

Pictures: 
References

g0tmi1k

IRL Name: 
Ben Wilson
Biography: 

Ben Wilson who is known as g0tmi1k has contributed to, and started, various open source projects and tools. Constantly pursuing further knowledge and challenges, his interests and professional studies have led to his role with Offensive Security as a student instructor, lab administrator, Exploit Database administrator, and Kali Linux forum moderator.

References

Matt Edman

IRL Name: 
Matt Edman
Biography: 

Matt Edman is a former Tor developer that helped the FBI to hack and de-anonymize Tor users in several court cases, including the clamorous Operation Torpedo and Silk Road.

Pictures: 
References

bwall, botnet_hunter

IRL Name: 
Brian Wallace
Biography: 

Brian Wallace a.k.a bwall / botnet_hunter is a software engineeer, security researcher, malware analyzer, and investigator of advanced threat actors. He acted as the leader and primary investigator for the Operation Cleaver investigation which resulted in the Operation Cleaver report coauthored with Stuart McClure.

Pictures: 
References

WebBreacher

IRL Name: 
Micah Hoffman
Biography: 

He is also known as @WebBreacher in Twitter. He is an active member in the NoVAHackers community, writes Recon-ng modules, SANS Certified Instructor and enjoys tackling issues with the Python scripting language.

Pictures: 
References

Sanoop Thomas

IRL Name: 
Sanoop Thomas
Biography: 

Sanoop Thomas is a moderator for Null Singapore chapter, and working as security consultant mainly involved with security assessment of web application, mobile, network, and servers. His area of interests lie in threat research, mobile security and automating pentest/analysis methodologies.

Pictures: 
References

Jacob West

IRL Name: 
Jacob West
Biography: 

He co-authored the book "Secure Programming with Static Analysis" with colleague and Fortify founder, Brian Chess, in 2007. Today, the book remains one of the comprehensive guide to how developers can use static analysis to avoid the most prevalent and dangerous vulnerabilities in code.

Pictures: 
References
Syndicate content