whitehat

Richard Mitton

IRL Name: 
Richard Mitton
Biography: 

Richard Mitton is a a freelancing British software engineer and part-time beard-grower, now based in Los Angeles. He got started in coding on the 1980's triumph of minimalist engineering, the ZX Spectrum. He is the owner of the blog "codersnotes.com" which has some good technical writings and rants about anything related to computers and that he has given a good review about TempleOS.

References

geeknik

IRL Name: 
Brian Carpenter
Biography: 

Brian 'geeknik' Carpenter is a bug bounty hunter and exploit developer who has more than 15+ CVEs generated by his bug reports to PHP, OpenSSL, FIrefox, etc. He has been listed on Google's Security Hall of Fame multiple times for finding various security bugs on Google web properties.

Pictures: 
References

MaXX

IRL Name: 
Michel Kaempf
Biography: 

MaXX (Michel Kaempf ) published Vudo Malloc Tricks in Phrack 57 [29]. The paper could have been sub-titled "How to smash the Heap for fun and profit". The paper documented techniques against libcʼs native Doug Leeʼs malloc and demonstrated the generic unlink() write4 technique against the published vulnerability in sudo-1.6.1-1. MaXXʼs article went on however to document the DLmalloc allocator in great detail.

References

klog

Biography: 

klog published “The Frame Pointer Overwrite” in Phrack 55 [16]. He showed how to gain execution by using a single byte overwrite to overwrite the last byte of %esp. In some situations this can result in the calling function retrieving its saved EIP from an attacker defined location resulting in altered execution flow.

References

Crispin Cowan

IRL Name: 
Crispin Cowan
Biography: 

Crispin Cowan is the security philosopher behind StackGard, the Immunix Linux distro, SubDomain and AppArmor which are said to be respected Linux-based security technologies. He entered the security arena in 1998 at the Seventh USENIX Security Symposium with the StackGuard paper, which introduced stack canaries for buffer overflow protection, a technique now used on nearly all platforms. From 1999 to 2007 he was the founding CTO of Immunix, which was acquired by Novell in 2005 to incorporate AppArmor into SUSE Linux.

Pictures: 
References

Thomas Lopatic

IRL Name: 
Thomas Lopatic
Biography: 

Thomas Lopatic published in 1995 a stack overflow exploit for NCSA httpd (NCSA HTTPD 1.3 on WWW server) on HP-UX which was an excellent piece of work, but on an obscure OS and CPU. His posting clearly walked through the steps needed for successful exploitation and included an exploit that creates a file named ʻGOTCHAʼ in the /tmp directory.

Pictures: 
References

Christopher Truncer

IRL Name: 
Christopher Truncer
Biography: 

Christopher Truncer is a penetration tester and red teamer by profession. He is a co-founder and current developer of the Veil-Framework, a project aimed to bridge the gap between advanced red team and penetration testing toolsets, EyeWitness, Just-Metadata, Egress-Assess, and more. Chris began developing toolsets that are not only designed for the offensive community, but can enhance the defensive community's ability to defend their network as well.

References

Barton Miller

IRL Name: 
Barton Miller
Biography: 

Barton Miller is an American computer professor who is credited for the modern term "fuzz" or "fuzzing" because of his 1988 class project. He (et al) published "An empirical study of the reliability of the UNIX Utilities in the ACM." With relatively simply (by todays standards) fuzzing, they were "able to crash 25-33% of the utility programs on any version of UNIX that was tested".

He received his B.A. degree from the University of California, San Diego in 1977, and M.S. and Ph.D. degrees in Computer Science from the University of California, Berkeley in 1980 and 1984. Professor Miller is a Fellow of the ACM.

Pictures: 
References

Keith Bostic

IRL Name: 
Keith Bostic
Biography: 

Keith Bostic is an American Software Engineer and one of the key people in the history of Berkeley Software Distribution UNIX and Open Source software. In 1986, Bostic joined the Computer Systems Research Group (CSRG) at the University of California, Berkeley.[2] He was one of the principal architects of the Berkeley 2BSD, 4.4BSD and 4.4BSD-Lite releases. Among many other tasks, he led the effort at CSRG to create a free software version of BSD UNIX, which helped allow the creation of FreeBSD, NetBSD and OpenBSD.

Bostic was a founder of Berkeley Software Design Inc. (BSDi), which produced BSD/OS, a proprietary version of BSD.

Pictures: 
References

dark spyrit

IRL Name: 
Barnaby Michael Douglas Jack
Biography: 

Barnaby Jack was a New Zealand hacker, programmer and computer security expert. He was known for his presentation at the Black Hat computer security conference in 2010, during which he exploited (also called jackpotting) two ATMs and made them dispense fake paper currency on the stage. Among his other most notable works were the exploitation of various medical devices, including pacemakers and insulin pumps.

Pictures: 
References
Syndicate content