whitehat

Dan Melamed

IRL Name: 
Dan Melamed
Biography: 

Dan Melamed is a a security researcher, web developer, self-employed internet marketer, and entrepreneur who is a Facebook Whitehat Hall of Famer for disclosing a lot of vulnerabilities to Facebook. He is known for these two vulnerabilities:

- Facebook Fanpage Invite Exploit to invite any Facebook user to like a Fanpage even if they are not your friend
- A Cross Site Request Forgery (CSRF) flaw

Pictures: 
References

Neal Poole

IRL Name: 
Neal Poole
Biography: 

Neal Poole is an American bug bounty hunter and a security engineer at Facebook. Prior to working at Facebook, he has reported close to a dozen flaws to Facebook, and also recently received a White Hat card. Poole has earned cash reporting flaws to Google and Mozilla,and blogs about each vulnerability he finds after they are fixed, detailing every step of his discovery and interaction with the affected vendor.

Pictures: 
References

Jakub Galczyk

IRL Name: 
Jakub Galczyk
Biography: 

Jakub Galczyk is a Polish bug hunter and security researcher who owns hauntit.blogspot.com which contains his vulnerability research works and exploits. Not much public information is available for this guy but if you google his name then you can find his full disclosures in some exploit databases.

References

Khalil

IRL Name: 
Khalil Shreateh
Biography: 

Khalil Shreateh is a Palistinian bug hunter who discovered a Facebook vulnerability that allows a user to post to other user's timeline even if he/she is not in his/her friend list. He reported this bug to www.facebook.com/whitehat but Emrakul of Facebook Security team denied his bug despite reporting the bug twice.Knowing he had a legitimate exploit and Facebook wasn’t going to fix it, Khalil decided to take much more drastic and public action. He proceeded to use the exploit to post his bug report on Mark Zuckerberg’s own wall. As you’d expect, it only took a few minutes for Facebook to notice the post and contact Khalil to find out more about how he’d managed to circumvent the user account security.

Pictures: 
References

Nir Goldshlager

IRL Name: 
Nir Goldshlager
Biography: 

Nir Goldshlager is an Israeli bug bounty hunter who is the CEO of Break Security. He has been acknowledged and rewarded by Google, Facebook, Paypal, etc. for his responsible disclosures. He has topped the list of Whitehat Hackers in Facebook Security’s hall of fame and Google Application Security mentions him on their list of “sustained support” whitehat hackers.

Pictures: 
References

Dead Addict

IRL Name: 
Eli Omen Jackson
Biography: 

Dead Addict, a mainstay of DefCon, is one of the few hackers who has been with the conference from year one when he helped founder Jeff Moss organize the first gathering and secure the participation of Arizona Assistant Attorney General Gail Thackeray to speak to the hackers following her work on the notorious Operation Sun Devil case.

Dead Addict says that many of the hackers that gave DefCon its renegade reputation in earlier days have now grown up and, like himself, launched legitimate careers in security with big-name tech companies. But a lucrative day job leaves DefCon’s hackers to focus on what Dead Addict says is the original sense of hacking. He has worked for several companies - to include (but not limited to) Microsoft, Globeset, Visa, Ubizen, and Research in Motion. His real name was discovered by SX researchers via patents that he filed, in combination with him giving out that his first name was "Eli".

Pictures: 
References

AD3L, ADEL

Biography: 

Has a masters in Computer Networks at Amirkabir University of Technology and currently is a member of the honeynet project.

References

Mehdi Afsari

IRL Name: 
Mehdi Afsari
Biography: 

Java developer on ITSecTeam, has knowledge of basic Microsoft servers & cisco networking.

References

Private

r3dm0v3

IRL Name: 
Farshad Shahbazi
Biography: 

Builds web application tools in his spare time.

Pictures: 
References

Chris John Riley

IRL Name: 
Chris John Riley
Biography: 

Chris John Riley is a penetration tester, blogger, and a podcaster who is the co-host of Eurotrash Security Podcast. He is also the owner of the security blog blog.c22.cc and has written open source security tools and scripts which can be found here: http://blog.c22.cc/toolsscripts/.

Pictures: 
References
Syndicate content