whitehat

bushing

IRL Name: 
Ben Byer
Biography: 

Ben "bushing" Byer is a member of fail0verflow, and before that, Team Twiizers and the iPhone Dev Team. He has presented talks about console hacking in the Chaos Communication Congress. Bushing has a blog, called HackMii.

Pictures: 
References

CTurt

Biography: 

CTurt is a security researcher who is primarily interested in FreeBSD kernel. He has discovered critical and security bugs to the FreeBSD kernel like CVE-2016-1886 - SETFKEY FreeBSD kernel vulnerability, CVE-2016-1887 - sendmsg FreeBSD kernel heap overflow, and some stack disclosure vulnerabilities in FreeBSD compatibility layers. He has also written a collection of PS4 tools and experiments using the WebKit exploit because he was able to successfully jailbreak the PlayStation 4 (works with version 1.76 of PS4 firmware but it can be made to run on a newer firmware.). He used a FreeBSD kernel exploit to attain the jailbreak.

References

Cyberjunky, Cjunky, CJ

IRL Name: 
Marc Rogers
Biography: 

He is known as "Cyberjunky", "Cjunky" or just "CJ" in the hacker community. Marc is the Head of Security and part of the CFP review board for DEF CON, the worlds largest hacker conference. After spending more than 15 years wrangling hackers, criminals and spooks Marc has seen it all. A proud SVC card holder Marc can often be seen speaking at security conferences in random exotic locations.

Pictures: 
References

Charlie Campbell

IRL Name: 
Charlie Campbell
Biography: 

Charlie Campbell started his career as a pre-school teacher and then an InfoSec wannabe who became an information security manager / security professional. He writes some decent articles in his own blog at fvaahe.com.

Pictures: 
References

Yifan Lu

IRL Name: 
Yifan Lu
Biography: 

Yifan Lu is one of the members of molecule Team - guys who released an easy-to-use homebrew solution / first HEN for PS Vita named HENkaku. He likes to hack video consoles as a hobby. He did some of these stuffs; Kindle jailbreak and mods, PSXperia (running PSX games on Xperia Play), 3DS hacks, and Vita hacks.

References

Ruben Unteregger

IRL Name: 
Ruben Unteregger
Biography: 

Ruben Unteregger is a Swiss programmer who creates Trojans for the Swiss authorities to intercept Voice-over-IP (VoIP) phone calls which inject code into the Skype process in order to convert the incoming and outgoing voice data into an encrypted MP3 available at the disposal of the attacker. He has also released the source code of his trojan horses ('MiniPanzer' and 'MegaPanzer').

Pictures: 
References

jackal

IRL Name: 
Fotis Loukos
Biography: 

Fotis Loukos received his BSc in Applied Mathematics from the Aristotle University of Thessaloniki, followed by an MSc in Computer and Communication Engineering from the University of Thessaly and a PhD in Computer Science from the Aristotle University of Thessaloniki. He wrote PreZ injector, a PoC for injecting a code at a running process and running it as a separate thread.

Pictures: 
References

xnec

IRL Name: 
Brock Tellier
Biography: 

Brock Tellier used to work for NAI Covert Labs (now McAfee). He is a security researcher and an exploit developer who has published exploits in Exploit-DB and Packet Storm. Author the following exploits (just to prove that he is 1337):

- FreeBSD 3.3,Linux Mandrake 7.0 - 'xsoldier' Buffer Overflow Vulnerability (1)
- FreeBSD 3.3 gdc Symlink Vulnerability
- Mandriva Linux Mandrake 6.0,Gnome Libs 1.0.8 espeaker - Local Buffer Overflow
- Oracle <= 8 8.1.5 Intelligent Agent Vulnerability (1)
- Solaris 7.0 /usr/bin/mail -m - Local Buffer Overflow Vulnerability
- and many more to mention...

References

t00nces

IRL Name: 
Dean Turner
Biography: 

Dean Turner was one of the co-founders of SecurityFocus in 1999 and served as its Director of Operations and Content until the company’s acquisition by Symantec in 2002. Prior to forming SecurityFocus, Turner worked for Network Associates as their Competitive Analysis Manager for their security product line. Turner has a broad range of expertise from Operations and Network Security to Incident Analysis.

Pictures: 
References

adi1391

IRL Name: 
Aditya Gupta
Biography: 

Aditya Gupta is the founder of Attify, and the creator of a training course entitled "Offensive IoT Exploitation". He is a frequent speaker and trainer at psecurity conferences such as BlackHat, OWASP AppSec, Syscan and phDays to name a few. He is also the author of the book "Learning Pentesting for Android Devices".

Pictures: 
References
Syndicate content