whitehat

Abhi M Balakrishnan

IRL Name: 
Abhi M Balakrishnan
Biography: 

Abhi M Balakrishnan is an Indian electronics hobbyist turned security evangelist who is working as an information security consultant.

Pictures: 
References

CorryL

IRL Name: 
Corrado Liotta
Biography: 

Corrado Liotta a.k.a CorryL is a vulnerability bug hunter from Italy. He is the founder of x0n3-h4ck Italian Security Team and has submitted vulnerability disclosures, scripts, and exploits in websites like Packet Storm, Exploit Database, Seclists.org, etc.

Pictures: 
References

Lawrence Hughes

IRL Name: 
Lawrence Hughes
Biography: 

Lawrence Hughes is a computer security expert with more than 35 years of experience in creating and developing security products. He was the co-founder of CipherTrust (along with Jay Chaudhry), which became the leading company in E-mail security, including corporate Anti-Spam. In 2006, CipherTrust was sold to SecureComputing for $273M. SecureComputing was later bought by McAfee, which is now part of Intel. He is the Founder, Chairman, CTO of InfoWeapons in Cebu, Philippines and Chairman & CTO at DualStak Networks, Sdn. Bhd. in Malaysia. These companies are creating a new line of secure Internet appliances that implement critical network infrastructure.and fully support IPv6.

Overall, his specialties include: creation of new companies, niche analysis and product creation, Internet security, cryptography, PKI, IPv6, E-mail, DNS, etc.

Pictures: 
References

phillips321

IRL Name: 
Matthew Phillips
Biography: 

Matthew Phillips was born in Wales on February 5, 1985. On the Christmas of 1995, he received his 1st Desktop computer pre-installed with Windows 95 which is a Gateway 2000. This very computer changed his life after constantly breaking the family PC and fixing it. He realized that computing was just his thing and felt that he had been able to be good at something at such a young age. But so much for his life story, this guy was the developer of GnackTrack which used to be the Gnome version of BackTrack 4 (but not part of the project of the BackTrack Linux Team) and an initiative he started because there were a lot of pentesters who preferred Gnome than KDE. With the release of BackTrack 5, he stopped developing GnackTrack because BT5 had already a Gnome DE. He is now using BackTrack v5 Gnome for penetration testing. Because he found out that BackTrack5 have many missing tools that he used in GnackTrack, he developed bt5-fixit.sh script in order to add the missing programs and convert BackTrack into a bleeding edge distro. His script bt5-fixit.sh fixes BackTrack 5 installation and adds more open source penetration testing tools. The tools / packages will be installed / converted to svn installs. He also maintains a blog at phillips321.co.uk which has cool tutorials, videos, cheat sheets, and his projects focused on penetration testing, Linux, Open Source, hacking and security.

Pictures: 
References

pof

IRL Name: 
Pau Oliva Fora
Biography: 

Pau is a Telecom engineer, Linux sysadmin, developer, security enthusiast, open source advocate with a strong passion for Android smartphones and a chiptune music lover. He is from Barcelona, Spain. Maintains a cool blog with advanced guides and tools at http://pof.eslack.org/. Back in the WinMo days, he did a lot of work reversing and hacking them.

Pictures: 
References

blackbytes, matugm

IRL Name: 
Jesus Castello Lupon
Biography: 

Jesus Castello Lupon a.k.a blackbytes or matugm is a geek from Spain who is interested in linux, programming and computer security. Owns the blackbytes.wordpress.com and the eLearnSecurity community manager. Also involved in the creation of educational videos and participating in different community projects.

References

Dan Kaminsky

IRL Name: 
Dan Kaminsky
Biography: 

Dan Kaminsky is a security researcher, and has spent his career advising Fortune 500 companies such as Cisco, Avaya, and Microsoft. Dan spent three years working with Microsoft on their Vista, Server 2008, and Windows 7 releases.

Dan is best known for his work finding a critical flaw in the Internet’s Domain Name System (DNS), and for leading what became the largest synchronized fix to the Internet’s infrastructure of all time. Of the seven Recovery Key Shareholders who possess the ability to restore the DNS root keys, Dan is the American representative. Dan is presently developing systems to reduce the cost and complexity of securing critical infrastructure.

Kaminsky received a substantial amount of mainstream press after disclosing a flaw in DNS, but experienced some backlash from the computer security community for not immediately disclosing his attack.

Pictures: 
References

decal

IRL Name: 
Derek Callaway
Biography: 

Whitehat? security research most known for his findings in Lenovo laptops.

Pictures: 
References

0xcharlie

IRL Name: 
Charlie Miller
Biography: 

Charles Miller is a computer security researcher. He spent five years working for the National Security Agency. Miller demonstrated his hacks publicly on products manufactured by Apple. In 2008 he won a $10,000 cash prize at the hacker conference Pwn2Own in Vancouver Canada for being the first to find a critical bug in the ultrathin MacBook Air. The next year, he won $5,000 for cracking Safari. In 2009 he also demonstrated an SMS processing vulnerability that allowed for complete compromise of the Apple iPhone and denial-of-service attacks on other phones. In 2011 he found a security hole in an iPhone's or iPad's security, whereby an application can contact a remote computer to download new unapproved software that can execute any command that could steal personal data or otherwise using iOS applications functions for malicious purposes. As a proof of concept, Miller created an application called Instastock that got approved by Apple's App Store. He then informed Apple about the security hole, who then promptly expelled him from the App Store.

Pictures: 
References

http://en.wikipedia.org/wiki/Charlie_Miller_(security_researcher)

@0xcharlie

snagg

IRL Name: 
Vincenzo Iozzo
Biography: 

Vincenzo Iozzo leads the collection and analysis of vulnerability intelligence at Trail of Bits. Prior to Trail of Bits, Vincenzo founded Tiqad, an information security consulting firm, worked as a penetration tester for Secure Network srl and was a reverse engineer for Zynamics GmbH. His specialized research in Mac OS X security, smartphone exploitation, and exploit payloads has been presented at information security conferences around the world including Black Hat, CanSecWest and Microsoft BlueHat. In 2008, he was selected to participate in the Google Summer of Code and developed a testing infrastructure for TrustedBSD, the Mandatory Access Control system that became the foundation for sandboxing technologies included in Mac OS X. Vincenzo serves as a committee member on the Black Hat Review Board and is a co-author of the "iOS Hacker's Handbook" (Wiley, 2012). He is perhaps best known for his participation in Pwn2Own, where he co-wrote the exploits for BlackBerryOS and iOS that won the contest in 2010 and 2011 and where he co-wrote exploits for Firefox, Internet Explorer, and Safari that placed second in 2012.

Pictures: 
References
Syndicate content