whitehat

duke

IRL Name: 
Mark Dowd
Biography: 

Accredited for finding numerous vulnerabilities for IBM Internet Security Systems; while working on their team code named XFORCE.

Found Adobe flash player invalid pointer vulnerability, as well as buffer overflows in the following software: Sendmail, Microsoft Exchange, OpenSSH, Internet Explorer, Mozilla, Checkpoint VPN, and Windows Encryption software.

Proved that you can exploit NULL pointer dereferences in applications coded in high-level programming languages.

Pictures: 
References

caddis

IRL Name: 
Chris Spencer
Biography: 

Accredited for finding numerous vulnerabilities for IBM Internet Security Systems;
while working on their team code named XFORCE.
Found buffer overflows in such applications as Sun Solaris's CDE (common desktop environment)
and HP's HP-UX printer daemon (rlpdaemon).
A previous speaker of Blackhat where in 2002 spoke on "Professional Source Code Auditing".

References

Dave Aitel

IRL Name: 
David Antonio Zapata Aitel
Biography: 

Dave Aitel is a computer security professional. He joined the NSA as a research scientist aged 18 where he worked for six years before being employed as a consultant at @stake for three years. In 2002 he founded a software security company, Immunity, where he is now the CTO up until December 31st 2020.

Aitel co-authored several books:

* The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks. ISBN 978-0849308888
* The Shellcoder's Handbook. ISBN 978-0764544682
* Beginning Python. ISBN 978-0764596544

He is also well known for writing several security tools:
* CANVAS, an automated exploitation system
* SPIKE, a block-based fuzzer
* SPIKE Proxy, a man-in-the-middle web application assessment tool
* Unmask, a tool to do statistical analysis on text to determine authorship

Pictures: 
References

Paperghost

IRL Name: 
Christopher Boyd
Biography: 

Christopher Boyd, better known as his online pseudonym Paperghost, is webmaster of computer security organization Vitalsecurity.org, a Microsoft Security MVP, and Director of Malware Research for security company FaceTime.

In July 2004, Boyd launched Vitalsecurity.org and he has been instrumental in uncovering and bringing to the public attention issues of privacy and spyware.

In November 2004, a modular hacking technique was employed to compromise Windows end-users by hacking Apache servers. When hacked, the servers would redirect a user on any of the server's websites, leading them to a set of ever-changing infection pages. These pages employed recoded viruses, trojans, malware and spyware. This technique is used heavily today by the groups behind the spyware CoolWebSearch (CWS).

The idea that alternative browsers such as Opera and Firefox could somehow enhance end-user security was cut down in March 2005 with the discovery of a Java applet that, if agreed to, would install a large (and varied) adware bundle onto the end-user's PC. It was found that having the "rogue" site in the user's blocklists and security tools would do nothing, the install bypassing these tactics completely if the end-user clicked "Yes". An updated Firefox .XPI installer (which infected Internet Explorer) was also deployed in some of these installs.

Pictures: 
References

djb

IRL Name: 
Daniel J. Bernstein
Biography: 

Daniel Julius Bernstein (sometimes known simply as djb; born October 29, 1971) is a professor at the University of Illinois at Chicago, a mathematician, a cryptologist, and a programmer. Bernstein is the author of the computer software qmail, publicfile and djbdns. He has a Bachelor's degree in Mathematics from New York University (1991), and a PhD in Mathematics from University of California, Berkeley (1995), studying under Hendrik Lenstra.

Bernstein brought the court case Bernstein v. United States. The ruling in the case declared software as protected speech under the First Amendment, and national restrictions on encryption software were overturned. Bernstein was originally represented by the EFF, but later represented himself despite having no formal training as a lawyer.

In the autumn of 2004, Bernstein taught a course about computer software security, titled "UNIX Security Holes". The 16 members of the class discovered 91 new UNIX security holes. Bernstein, long a promoter of the idea that full disclosure is the best method to promote software security and founder of the securesoftware mailing list, publicly announced 44 of them with sample exploit code. This received some press attention and rekindled a debate over full disclosure.

Bernstein has recently explained that he is pursuing a strategy to "produce invulnerable computer systems". Bernstein plans to achieve this by putting the vast majority of computer software into an "extreme sandbox" that only allows it to transform input into output, and by writing bugfree replacements (like qmail and djbdns) for the remaining components that need additional privileges. He concludes: "I won’t be satisfied until I've put the entire security industry out of work."

In spring 2005 Bernstein taught a course on "High Speed Cryptography". Bernstein demonstrated new results against implementations of AES (cache attacks) in the same time period.

Pictures: 
References

Martín Abadi

IRL Name: 
Martín Abadi
Biography: 

Martín Abadi is a computer scientist, currently working at the University of California, Santa Cruz. He earned his Ph.D. from Stanford University in 1987 as a student of Zohar Manna.

He is well-known for his work on computer security and on programming languages, including his paper (with Michael Burrows and Roger Needham) on the Burrows-Abadi-Needham logic for analyzing authentication protocols, and his book (with Luca Cardelli) A Theory of Objects, laying out formal calculi for the semantics of object-oriented programming languages.

References

Wietse Venema

IRL Name: 
Wietse Zweitze Venema
Biography: 

Dr. Wietse Zweitze Venema (born 1951) is a Dutch programmer and physicist best known for writing the Postfix mail system. He has also written numerous other security related tools such as the Coroner's Toolkit, written with Dan Farmer, primarily for the post-mortem analysis of computer break-ins. He wrote these at the IBM Thomas J. Watson Research Center, in the USA, where he currently works.

Older widely-known software includes TCP Wrapper, and SATAN (written with Dan Farmer). He wrote these while he lived in the Netherlands.

He was awarded an IBM technical accomplishment in 2007, a Sendmail innovation award in 2006, the NLUUG Award 2000 in recognition of outstanding achievements for the users of UNIX and Open Systems, the SAGE 1999 outstanding achievement award, and the security summit hall of fame award in 1998.

He completed my 2+ year term as chair of the FIRST, an international association of computer security teams with over 150 members world-wide in government, industry, and academia.

Pictures: 
References

Caezar

IRL Name: 
Aiden Riley Eller
Biography: 

Caezar found himself flirting with the dark side. But after playing around with a telephone card scheme that let him make unlimited calls, a visit from two anonymous officials telling him to stop abusing the phone network scared him enough that he stopped. Now, he pegs himself as knowledge-driven and hopes to save like-minded hackers from his experience, or worse.

Pictures: 
References

Frank Heart

IRL Name: 
Frank Heart
Biography: 

Considered one of the, 'Fathers of the Internet', along with Leonard Kleinrock, Vinton Cerf, Lawrence Roberts and Robert Kahn due to their work on ARPANET.

References

Vint Cerf

IRL Name: 
Vinton Cerf
Biography: 

Co-designer of the Internet TCP/IP networking protocol. He's also considered one of the, 'Fathers of the Internet', along with Leonard Kleinrock, Lawrence Roberts, Robert Kahn and Frank Heart.

Pictures: 
References
Syndicate content