whitehat

saurik

IRL Name: 
Jay Freeman
Biography: 

Jay Freeman or saurik is the developer of Cydia which is a an alternative to Apple's App Store for "jailbroken" devices, at this time including iPhones, iPads, and iPod Touches, specializing in the distribution of all that is not an "app".

Pictures: 
References

MaXe

Biography: 

Has published many papers and exploits in within the community.

References

Pusscat

IRL Name: 
Lurene Grenier
Biography: 

[need to add bio]

References

@pusscat

jduck

IRL Name: 
Joshua Drake
Biography: 

Joshua focuses on original research in areas such as vulnerability discovery and analysis, exploitation technologies and reverse engineering. He has over 10 years of experience in the information security field. Prior to joining Accuvant, he served as the lead exploit developer for the Metasploit team at Rapid7, where he analyzed and successfully exploited numerous publicly disclosed vulnerabilities in widely deployed software such as Exim, Samba, Microsoft Windows, Office, and Internet Explorer. Prior to that, he spent four years at VeriSign's iDefense Labs conducting research, analysis and coordinated disclosure of hundreds of unpublished vulnerabilities.

Pictures: 
References

@jduck1337

purehate, pure_hate

IRL Name: 
Martin Bos
Biography: 

Specializes in certain areas of security including red team engagements, goal oriented pen testing, post exploitation techniques, vulnerability assessments, and pentesting wireless networks.

Pictures: 
References

http://twitter.com/#!/purehate_

Mister_x

IRL Name: 
Thomas d'Otreppe
Biography: 

Thomas d'Otreppe is the author of aircrack-ng, a graduate of the Haute Ecole de Bruxelles (informatics high school in in Brussels). He has also designed WiFu, a proactive wireless security course, with Mati Aharoni (muts). Thomas speaks and teaches in the Americas and Europe and is a well-known speaker at DefCon, BlackHat, DerbyCon, SharkFest, Mundo Hacker Day, BruCON and other venues

References

http://twitter.com/#!/aircrackng

ryujin

IRL Name: 
Matteo Memelli
Biography: 

Has been involved with systems administration, networking and information security for 12 years. Since his first experiences with security issues, he has been “hacked” by his passion for remote exploitation, vulnerability research and covert channels analysis. Matteo went on to write the OSCE Certification along with muts. Now he is the core developer and trainer of “Advanced Windows Exploitation Techniques (AWE)”.

Pictures: 

loneferret

IRL Name: 
Steven McElrea
Biography: 

Has been working in IT professionally since 2005 mostly as a Windows and Exchange Administrator. His curiosity for information security became a full-time hobby when he was first exposed to PWB and has been a part of the Exploit Database administration team since 2009. A proud OSCP and OSCE, he is currently tasked with lab development and administration along with student support.

Pictures: 
References

sickness

IRL Name: 
Alexandru Uifalvi
Biography: 

Sickness has been passionate about networking, information security, vulnerability research, and especially exploit development from a very young age. Since his first successful exploit, passion for security changed into an obsession. Alex currently helps to build, maintain, and generally improve upon the Offensive Security labs. He also helps students that encounter lab and course issues.

Pictures: 
References

corelanc0d3r

IRL Name: 
Peter Van Eeckhoutte
Biography: 

Born in 1975 and spent his childhood in a small town called Vichte, Belgium. 14 years later, he obtained his first computer and about 5 years later started working in a computer shop where he was responsible for the technical department, servers/network installations, etc… Around the same time finished his Bachelors degree in IT.

In 2000, right after the Y2K hype, he was hired by a big company to serve as Systems Administrator with his main responsibility being to take care of the servers and network, and shortly after became part of the Center of Excellence for Security and Messaging. About one year later, he became a member of the Core Active Directory Team and Security Competence Center for the entire corporation (worldwide) and was appointed “IT Security Officer”. In January 2012, he became the CISO | Corporate IST Security Officer at the company he had been working for over the last 12 years.

In September 2009, Peter founded the Corelan Security Team, gathering a group of security enthusiasts, who all share the same common interests : research, learn and share. Since that date, the team has been working with tons of vendors, reporting numerous bugs, requesting vendors to fix, and performing coordinated disclosure, with the aim to make this digital world a little bit safer.

References
Syndicate content