Info from his Defcon 8 speech:
Demonstration and presentation of the Autonomous Nodes that Batz and Caezar presented in concept at Black Hat Singapore.
I am working in conjunction with them on this project and plan on a lengthy on site demonstration of the nodes' functions and AI. It's purpose mainly to demostrate that the theory of these nodes is highly functional in both network research, for exploitation and protection.
To give you a quick surmise. A small LAN will be setup. NodeH (node hacker) will be inserted and printed documents of the timing and actions that NodeH will take, will be passed out to the crowd. The node will perform actions and an oversight of it's AI will be presented to the crowd describing the reasons and purposes behind it's decisions.
Automated exploitation with an attack tree backbone (Bruce Shniers idea from DR Dobb's Journal) are some of the main features. I have currently a 13 page overview which I am working on with Caezar. I have already begun development, the first run being MS compatible, with a Linux port possibly before DefCon.
Ender is an embedded system software coder and tester for 4+ years. He has coded in solutions engineering group for customers world wide, he specializes in C and x86 assembly. Interests include Prime Number Theory, Cryptonalysis, DSPs, Music, and Ruling the World. Motto: Be good, be bad, just be good at it.
Robert spent approximately 11 years in the Army working in intelligence. He is currently working as a systems engineer for a fire department and has been very active in the Defcon community (including photography). From our interactions with him at Defcon, he's always been a very friendly guy who supports open discussion about information security.
He lists his specialities as:
CMSCE training 1999. Deployment for OIF/OEF 2005-2008. Immediately deployable for worldwide missions with little or no notice. Civil Affairs/PSYOP Instructor. Diplomacy, public speaking, intelligence, FID/UW., system administration, network design, policy review, technical writing, analysis.
docwho competes at hacker jeopardy with phreck & nz0
He's a network engineer who claims to have only 7 years of experience yet he's been doing this stuff since at least 1998
Ivan Montilla Miralles is a security analyst who has been into the security field actively since 2005. He also works for "Global Evolution" Research Team, moderating the contents of the Vulnerability-Lab. He has joined the Evolution Security Research Team 2004. He is also active in the private internal contest team & has solved several contests like "Create The Future" with the ESDP Simulation Project.
Alexander Fuch is a member of the Evolution Security Team / Vulnerability Research Lab Team since 2010. He started finding security vulnerabilites in web applications since 2010 and has discovered multiple vulnerabilities in some web apps like in RTL (GamesCom Bug), Prosieben (ProSieben Stefan Raab), La Poste FR.
Ismail Kaleem is a web application penetration tester. He started his career by working for the Maldivian government as an IT Security Consultant. He has conducted greybox penetration testing for sensitive government organizations in Maldives which include the central prison network, Offender Management System (Police), Government Email Management System or Trade Information System.
Ebrahim Hegazy a.k.a Zigoo is a vulnerability hunter and penetration tester from Egypt. He started his career as a linux server engineer in a Saudi Arabian hosting company. After that, he moved to web application penetration testing. He is one of the members (former?) of the Vulnerability Lab Research Team.
Ateeq Khan is a Bachelor in computer science from Karachi University, Pakistan. He is an active member of Pakistan’s infosec community and is regularly invited as a distinguished speaker at various international events including CSP’12, CSP’13, The Social Media Convention or the ICTN Asia.
Ibrahim M. El-Sayed finished his B.S. in Computer Engineering on the American University of Cairo on 2012 and is a Vulnerability Lab Security Research Team member since March 2012.
Benjamin Kunz Mejri a.k.a rem0ve is a a penetration tester and security analyst for private and public security firms, hosting entities, banks, isp(telecom) and ips. In 1997, he founded a non-commercial and independent security research group called, "Global Evolution - Security Research Group". In 2010 he founded the company "Evolution Security" and Vulnerability Lab established as the transparent legal European initiative for vulnerability researchers, analysts, bug bounty hunters, penetration testers and serious hacker groups.