whitehat

claudijd

IRL Name: 
Jonathan Claudius
Biography: 

Jonathan Claudius is a Security Researcher at Trustwave. He is a member of Trustwave's SpiderLabs -the advanced security team focused on penetration testing, incident response, and application security. His weapon of choice is Ruby but also familiar with Perl, Python, C, C++ and the like. He is a A regular presenter at various information security conferences including B-Sides, THOTCON, SOURCE, DEFCON, BlackHat and others.

Pictures: 
References

Alban Diquet

IRL Name: 
Alban Diquet
Biography: 

Alban Diquet is a security researcher whose interest include web and mobile security as well as SSL and PKI. He released an open source SSL scanner written in Python called SSLyze which was also added to the Backtrack Linux distribution.

Pictures: 
References

Mark Yason

IRL Name: 
Mark Vincent Yason
Biography: 

Mark Vincent Yason is a security researcher on IBM's X-Force Advanced Research team. He authored the paper "The Art of Unpacking" and co-authored the papers "Reversing C++" and "Playing In The Reader X Sandbox", all of which were previously presented at BlackHat.

Pictures: 
References

Paul Sabanal

IRL Name: 
Paul Sabanal
Biography: 

Paul Sabanal is a Filipino security researcher on IBM ISS's X-Force Advanced Research Team. He has spent most of his career as a reverse engineer, initially as a malware researcher and now focusing mainly on vulnerability analysis and exploit development. He has presented at Blackhat with Mark Yason on the subject of C++ reversing and Adobe Reader's Protected Mode Sandbox.

Pictures: 
References

Ehraz Ahmed

IRL Name: 
Ehraz Ahmed
Biography: 

Ehraz Ahmed is a bug bounty hunter and self-proclaimed security analyst and security expert at the age of 17 as of this writing(circa September 2013). He has been listed in the Hall of Fames of most companies listed in Bugcrowd and Bugsheet. Recently, he claims that he filed a bug to Facebook that would allow an attacker to delete any Facebook account. Ahmed said he sent a video to demonstrate the critical flaw, but Facebook has again refused to pay the bug bounty because he tested the flaw on his friend’s account. He’s not happy, and wrote that he really needed the bounty. However, Facebook has fixed the flaw.

But the truth about this incident is that Ahmed's claim is actually a hoax. He manually used facebook.com/deactivate.php to deactivate the account that was used in his PoC.

References

Christopher Elisan

IRL Name: 
Christopher C. Elisan
Biography: 

Christopher C. Elisan is the author of "Malware, Rootkits and Botnets: A Beginner’s Guide". He is currently the Principal Malware Scientist at RSA. Elisan is one of the pioneers of Trend Micro’s TrendLabs where he held multiple technical and managerial positions. After Trend Micro, he led and established F-Secure's Asia R&D where he spearheaded multiple security research projects. He then joined Damballa where he specialized in malware research, analysis and reversing.

Pictures: 
References

Collin Mulliner

IRL Name: 
Collin Mulliner
Biography: 

Collin Mulliner's main interest is in the area of security and privacy of mobile and embedded devices with an emphasis on mobile and smart phones. Since 1997 Collin has developed software and did security work for Palm OS, J2ME, Linux, Symbian OS, Windows Mobile, Android, and the iPhone. In 2006 he published the first remote code execution exploit based on the multimedia messaging service (MMS).

Pictures: 
References

Prakhar Prasad

IRL Name: 
Prakhar Prasad
Biography: 

Prakhar Prasad is an Indian web app security researcher who has been acknowledged and credited by Facebook, Whitehat, Google, Paypal, Dropbox, Adobe, etc. His first bug bounty reward was from Google for finding a clickjacking bug in Google Website Translator Toolkit, that allowed him to add arbitrary "Admin/Editor" on someone's account by redressing page.

Pictures: 
References

Lukas Reschke

IRL Name: 
Lukas Reschke
Biography: 

Lukas Reschke is a security researcher and developer who has responsibly disclosed vulnerabilities and exploits to Google, Apple, GitHub, Microsoft, Owncloud, Tiki Wiki, Facebook, Adobe, Dropbox, Swisscom, svg-edit, etc.

Pictures: 
References

fin1te

IRL Name: 
Jack W
Biography: 

fin1te is a UK based Security Researcher who has discovered valid bug vulnerabilities and exploits for PayPal, Etsy, eBay, Google, Facebook, Netflix, etc. and has been rewarded / credited by these companies.

Pictures: 
References
Syndicate content