whitehat

adi1391

IRL Name: 
Aditya Gupta
Biography: 

Aditya Gupta is the founder of Attify, and the creator of a training course entitled "Offensive IoT Exploitation". He is a frequent speaker and trainer at psecurity conferences such as BlackHat, OWASP AppSec, Syscan and phDays to name a few. He is also the author of the book "Learning Pentesting for Android Devices".

Pictures: 
References

Ye Yint Min Thu Htut

IRL Name: 
Ye Yint Min Thu Htut
Biography: 

Ye Yint is a security researcher who is one of the core members of of YGN Ethical Hacker Group (YEHG) and a former technical team member of the Myanmar Computer Emergency Response Team (mmCERT). He has attained around 20 Security Hall of Fames from various sites and applications including but not limited to DuckDuckgo, ROCeter, AppAnnie, Teamtailor, Okcupid, ConstantContact, ESET, Inflectra, Splistwise, Segment etc.

Pictures: 
References

Hal Finney

IRL Name: 
Hal Finney
Biography: 

Hal Finney is a renowned cryptographer, noted cryptographic activist, former developer for PGP Corporation, and was the second developer hired after Phil Zimmermann. In his early career, he was credited as lead developer on several console games. He also was an early bitcoin user and received the first bitcoin transaction from bitcoin's creator Satoshi Nakamoto. He died in Phoenix August 28, 2014 and was cryopreserved by the Alcor Life Extension Foundation.

Pictures: 
References

Esteban Martinez Fayo

IRL Name: 
Esteban Martinez Fayo
Biography: 

Esteban Martinez Fayo is a security researcher from Argentina who disclosed a security issue with the O5LOGON Oracle database authentication protocol (used in 11g – 11.1 & 11.2). This problem, known as CVE-2012-3137, makes it relatively simple for attackers to get hold of passwords using a brute-force attack on the encrypted (AES -192 bit) session key that is returned by the Oracle database when connecting. This means you don’t need the password hash (SHA-1 hash as of 11g) to brute force the password anymore. The information (the encrypted session key – AUTH_SESSKEY – and the password SALT value – AUTH_VFR_DATA) returned by the server at an very early state of the authentication process if enough.

Pictures: 
References

Mariusz Mlynski

IRL Name: 
Mariusz Mlynski
Biography: 

Mariusz Mlynski is a security researcher from Poland who was awarded with $55,000 at HP's Pwn2Own 2014 hacking contest for exploiting Firefox wherein he was able to execute a fundamental flaw to escalate to system privileges in Windows.

Pictures: 
References

djrbliss, Dan Rosenberg

IRL Name: 
Dan Rosenberg
Biography: 

Dan Rosenberg is a security researcher who is known for his kernel exploits. Together with Jon Oberheide, they demonstrated an exploit technique coined Stackjacking against a customized Linux kernel hardened with the grsecurity patchset. The attack was questionable since they used a modified kernel rather than a standard Grsecurity hardened kernel with a previously known exploit. He is also the author of FuzzDiff which is a tool that helps make crash analysis during file format fuzzing easier.

Pictures: 
References

Jon Oberheide

IRL Name: 
Jon Oberheide
Biography: 

Jon Oberheide is the co-founder of of Duo Security. He completed his PhD at the University of Michigan in the realm of cloud security. He has presented at a wide range of academic, industry, and hacker security conferences (DEFCON, BlackHat, etc.). In a prior life, Jon enjoyed offensive security research and exploiting *nix. Together with Dan Rosenberg, they demonstrated an exploit technique coined Stackjacking against a customized Linux kernel hardened with the grsecurity patchset. The attack was questionable since they used a modified kernel rather than a standard Grsecurity hardened kernel with a previously known exploit.

Pictures: 
References

Mario Heiderich

IRL Name: 
Mario Heiderich
Biography: 

Mario Heiderich is a self-proclaimed handsome heart-breaker but a skilled German security researcher (not to be messed with HTML5 Security). He leads a small pen-test company called Cure53 and works on projects such as the HTML5 Secruity Cheatsheet, DOMPurify, HTTPLeaks and others."

Pictures: 
References

g0tmi1k

IRL Name: 
Ben Wilson
Biography: 

Ben Wilson who is known as g0tmi1k has contributed to, and started, various open source projects and tools. Constantly pursuing further knowledge and challenges, his interests and professional studies have led to his role with Offensive Security as a student instructor, lab administrator, Exploit Database administrator, and Kali Linux forum moderator.

References

Matt Edman

IRL Name: 
Matt Edman
Biography: 

Matt Edman is a former Tor developer that helped the FBI to hack and de-anonymize Tor users in several court cases, including the clamorous Operation Torpedo and Silk Road.

Pictures: 
References
Syndicate content