whitehat

Alexander Sotirov

IRL Name: 
Alexander Sotirov
Biography: 

Alexander Sotirov has more than ten years of experience with vulnerability research, reverse engineering and advanced exploitation techniques. His works include exploiting MD5 collisions to create a rogue Certificate Authority, bypassing the exploitation mitigations on Windows Vista and developing the Heap Feng Shui browser exploitation technique. His professional experience includes positions as a security researcher at Determina and VMware. He is a regular speaker at security conferences around the world, including CanSecWest, BlackHat and Recon. Alexander served as a program chair of the USENIX Workshop on Offensive Technologies and is one of the founders of the Pwnie Awards.

Pictures: 
References

albino

IRL Name: 
James Kettle
Biography: 

James Kettle is a Student sla.cker, vulnerability bounty hunter, and the creator of game called Hackxor which is a webapp hacking game where players must locate and exploit vulnerabilities to progress through the story. He also owns the skeletonscribe.blogspot.com.

References

nergal

IRL Name: 
Rafal Wojtczuk
Biography: 

Rafal Wojtczuk specializes primarily in kernel and virtualization security. Over the years he has disclosed many security vulnerabilities in popular operating system kernels (Linux®, SELinux, *BSD, Windows™), virtualization software (Xen®, VMWare® and Microsoft® virtualization products), and low-level system technologies (Intel TXT, Intel AMT, Intel BIOS). He is also well known for his articles on advanced exploitation techniques, including novel methods for exploiting buffer overflows in partially randomized address space environments. Rafal holds a Master’s Degree in Computer Science from University of Warsaw.

Pictures: 
References

Alexander Tereshkin

IRL Name: 
Alexander Tereshkin
Biography: 

Alexander Tereshkin is an experienced reverse engineer and an expert into Windows® kernel and hardware virtualization, specializing in rootkit technology and kernel exploitation. He is known for his research on sophisticated ideas for novel rootkit creation and personal firewall bypassing in the past years. Recently he has done significant work in the field of virtualization based malware and Microsoft® Vista™ kernel security. He is a co-author of "Understanding Stealth Malware" course. Alex holds the Russian equivalent of a Master's Degree in Applied Mathematics, and also the Russian equivalent of a PhD degree in Information Security from Taganrog State University Of Radioengineering (Southern Federal University).

Pictures: 
References

Joanna Rutkowska

IRL Name: 
Joanna Rutkowska
Biography: 

Joanna Rutkowska leads a team of researchers who focus on system-level security. This includes kernel, hypervisor, chipset and CPU security issues. The recent achievements of the team include: bypassing Intel TXT, attacks on SMM, Intel AMT and BIOS, and demonstration of practical Xen hypervisor compromises. She is also known for writing Blue Pill -- the first virtualization-based rootkit with nested hypervisors support, and also for her work on various kernel mode malware for Windows and Linux. Joanna holds a Master’s Degree in Computer Science from Warsaw University of Technology.

Pictures: 
References

adesnos, Pouik

IRL Name: 
Anthony Desnos
Biography: 

Anthony Desnos is an Android geek and coder who works at VirusTotal. He created the infamous Androguard toolset for reversing Android malware, malware analysis and goodware analysis of Android applications. He is very active in releasing tools.

References

impeldown

Biography: 

impeldown is a Filipino programmer who loves to code automation tools and scanners. He is one of the contributors and writers of The ProjectX Blog and all his posts are the tools he coded from scratch. He loves to hang out in the underground depths of DALnet and Undernet IRC (Internet Relay Chat) Servers.

Pictures: 
References

epinna, Emilio

IRL Name: 
Emilio
Biography: 

Emilio is an Italian programmer and coder who is one of the contributors of BackBox Linux. He finished his Computer Engineering degree from the Politecnico di Torino. He is currently working as an embedded Linux developer in the automotive industry. He is the owner of disse.cting.org which is a blog about information and computer security.

References

Maximiliano Soler

IRL Name: 
Maximiliano Soler
Biography: 

Maximiliano Soler is from Argentina who is a Security Analyst working in an International Bank and participating in some Projects like Vulnerability Database, Zero Science Lab, OWASP. Fanatic of open standards. He is the owner of Toolswatch.org which is an online resource for new tools that are released in the pentesting and whitehat scene. He has also discovered vulnerabilities in different applications in Web and Microsoft's products.

Pictures: 
References

Dino Dai Zovi

IRL Name: 
Dino Dai Zovi
Biography: 

Dino Dai Zovi has been working in information security for over a decade with experience in red teaming, penetration testing, software security, information security management, and cybersecurity R&D. Dino is also a regular speaker at information security conferences having presented his independent research on memory corruption exploitation techniques, 802.11 wireless client attacks, and Intel VT-x virtualization rootkits over the last 10 years at conferences around the world including DEFCON, BlackHat, and CanSecWest. He is a co-author of the books "The iOS Hacker's Handbook" (Wiley, 2012), "The Mac Hacker’s Handbook" (Wiley, 2009), and “The Art of Software Security Testing” (Addison-Wesley, 2006). In 2008, eWEEK named him one of the 15 Most Influential People in Security. In 2012, NYU-Poly named him a Hacker in Residence and he now oversees security research at the university.

Pictures: 
References
Syndicate content