applied security conferences and training: CanSecWest | PacSec | EUSecWest |

Security Masters Dojo

Advanced and intermediate security training and technology enhancement for information security professionals.

Security Masters Dojo

Instructors/Sensei

Dave Aitel

Dave Aitel is CEO and founder of Immunity Inc., and his past includes stints at @Stake, and the National Security Agency. As a long-time security researcher Dave has a long and visionary history of warning the industry about major security vulnerabilities. Dave is recognized world authority on attack techniques, and is the author of many famous tools including SPIKE, Spike proxy, and sharefuzz. He is co-author of two books ("The Hacker's Handbook" from Aurbach Press and "The Shellcoder's Handbook" from John Wiley and Sons) and is a frequent presenter of technical papers at conferences.

Andrea Barisani

Andrea Barisani is a system administrator and security consultant. His professional career began 8 years ago but all really started when a Commodore-64 first arrived in his home when he was 10. Now, 16 years later, Andrea is having fun with large-scale IDS/Firewalls deployment and administration, forensic analysis, vulnerability assessment, penetration testing, security training and his Open Source projects. He eventually found that system and security administration are the only effective way to express his need for paranoia. He's currently involved with the Gentoo project managing infrastructure server security being a member of the Gentoo Security and Infrastructure Teams along with distribution development. Being an active member of the international Open Source and security community he's maintainer/author of the tenshi, ftester and openssh-lpk projects and he's been involved in the Open Source Security Testing Methodology Manual, becoming a ISECOM Core Team member. Outside the community he has been a security consultant for Italian firms and he's now the co-founder and Chief Security Engineer of Inverse Path Ltd.

Philippe Biondi

Philippe Biondi is a research engineer and security expert working at the IT security lab of EADS Corporate Research Center. He is a member of the French Honeynet Project. He was co-author of LIDS. He is the author of Scapy and Shellforge and a lot of other tools. His Scapy tutorial at CanSecWest/core05 was rated one of the best talks of the conference by attendees.

Cédric Blancher

Cédric Blancher has spent the last 7 years working in netwo security field, performing audits and penetration tests. In 2004, he joined EADS Innovation Works and now runs the Computer Security Research Lab in Suresnes, France. His research focuses on network security, especially wireless links. He is an active member of Rstack team and French Honeynet Project with studies on honeynet containment, honeypot farms and network traffic analysis. He delivered technical presentations and trainings worldwide, and written papers and articles on network security. Cédric's website: http://sid.rstack.org/

Crispin Cowan

Crispin Cowan has been in the computer business for 25 years, and security for 10 years. He was the CTO and founder of Immunix, Inc., acquired by Novell in 2005. Dr. Cowan is now the Security Architect for SUSE Linux, and applications that Novell offers for Linux. Dr. Cowan developed several host security technologies under DARPA funding, including prominent technologies like the StackGuard compiler defense against buffer overflows, and the LSM (Linux Security Modules) interface in Linux 2.6. Dr. Cowan also co-invented the "time-to-patch" method of assessing when it is safe to apply a security patch. Prior to founding Immunix, he was a professor with the Oregon Graduate Institute. He is the program co-chair for the 2007 and 2008 Network and Distributed System Security conferences. He holds a Ph.D. from the University of Western Ontario and a Masters of Mathematics from the University of Waterloo, and yellow belts in 3 different styles of Aikido.

Renaud Deraison

Renaud is the Chief Research Officer at Tenable Network Security. Founder and the primary author of the open-source Nessus vulnerability scanner project. He has worked for SolSoft, and founded his own computing security consulting company, 'Nessus Consulting S.A.R.L.' Nessus detects network vulnerabilities and is in use at more than 50,000 worldwide organizations. Under Renaud's leadership, the Nessus project has won numerous awards, including the 2002 Network Computing 'Well Connected' award and PC Magazine's 2003 'Open Source Product of the Year' award. Mr. Deraison also is an editorial board member of the Common Vulnerabilities and Exposures Organization, has presented at a variety of security conferences and has had his work published in several magazines and books.

Maximillian Dornseif

Maximillian Dornseif has studied laws and computer science at the University of Bonn, Germany where he wrote his PhD Thesis about the "Phenomenology of Cybercrime". He has been doing IT security consulting since the mid nineties and today focuses mostly on penetration-testing. In early 2004 he joined the Laboratory for Dependable Distributed Systems at RWTH Aachen University where he bootstrapped the computer forensics education program and the German honeynet project and the now famous "Summerschool Applied IT-Security". Since Fall 2005 he works as a post-doc researcher at the University of Mannheim. Dornseif is a sought after speaker at international security conferences and has published in the legal and computer science fields on a wide range of topics.

Sinan "noir" Eren

Sinan Eren is a reverse engineer and a casual exploit developer. At Immunity Inc, he performs code/binary audits and exploit development for the CANVAS platform. Architectures and platforms of interest include x86/Win32, Unix on any cpu flavor and popular 3rd party applications (MTAs, HIPS, AV, VPN, Remote Desktop etc.). He recently gave auditing courses for the RPC layer of the Windows OS to several audiences around the USA.

Guillaume Valadon

Guillaume is security engineer and researcher at the French Network and Information and Security Agency. He obtained his Ph.D. on optimizations of the Mobile IPv6 protocol. From fall 2004 to fall 2006, he was doing research at the University of Tokyo where he worked on the security of the Mobile IPv6 protocol, and co-authored the IPv6 extension for Scapy. He gave technical presentations, classes and live demonstrations, and wrote research papers for conferences and magazines.

Nico Fischbach

Nico is a Senior Manager, in charge of the European Network Security Engineering team at COLT Telecom, a leading pan-European provider of end-to-end business communications services.

He holds an Engineer degree in Networking and Distributed Computing and is a recognized authority on Service Provider infrastructure security and denial-of-service attacks mitigation.

Nicolas is co-founder of Securite.Org a French speaking portal on computer and network security, of eXperts and mystique, an informal security research group and think tank, and of the French chapter of the Honeynet project.

He has presented at numerous technical and security conferences, teaches networking and security courses at various universities and engineering schools, and is a regular contributor to the french security magazine MISC. More details and contact information on his homepage.

Fyodor

Fyodor authored the popular Nmap Security Scanner, which was named security tool of the year by Linux Journal, Info World, and the Codetalker Digest. It was also featured in the hit movie "Matrix Reloaded" as well as by the BBC, CNet, Wired, Slashdot, Securityfocus, and more. He also maintains the Insecure.Org and Seclists.Or g security resource sites and has authored seminal papers detailing techniques for stealth port scanning, remote operating system detection via TCP/IP stack fingerprinting, version detection, and the IPID Idle Scan. He is a member of the Honeynet project and a co-author of the books "Know Your Enemy: Honeynets" and "Stealing the Network: How to Own a Continent".

Halvar Flake

Originating in the fields of copy protection and digital rights management, he gravitated more and more towards network security over time as he realized that constructive copy protection is more or le ss fighting windmills. After writing his first few exploits he was hooked and realized that reverse engineering experience is a very handy asset when dealing with COTS software. With extensive experience in reverse engineering, network security, penetration testing, and exploit development, Halvar consults on reverse engineering and is a graduate student of mathematics in Germany.

Martin Herfurt

Martin Herfurt is the founder of the trifinite.group. He completed his Telecommunications Engineering Degree at the Salzburg University of Applied Sciences and Technologies in 2001. Alongside his study Martin was involved in numerous industry projects, providing him with commercial programming practice. In 2000 Martin followed up his formal study with a four-month internship at the telecommunications institute of TELCOT institute in San Ramon, California, USA. Since the second half of 2000 Martin has been working as a full time researcher at an Austrian Research facility. His project responsibilities there were ranging from the co-ordination of a European IST project with a total budget of over 5 million Euro to software agents development. Together with a colleague, Martin began giving a class on mobile data services at the Salzburg University of Applied Sciences and Technologies in the summer of 2003. In February 2004, Martin discovered a major security loophole in several popular cellphones which is referred to as BlueBug in the media. As part of his fascination with the rapid development in computer programming Martin has become a regular participant in the Chaos Communication Congress which is a yearly meeting of the German hacker association CCC.

Marcel Holtman

Marcel Holtmann is the maintainer and the core developer of the official Linux Bluetooth stack which is called BlueZ. He started working with the Bluetooth technology back in 2001. His work includes new hardware drivers, upper layer protocol implementations and the integration of Bluetooth into other subsystems of the Linux kernel. In January 2004 he overtook the maintainer role from the original developer Max Krasnyansky. Together with Jean Tourrilhes he maintains the OpenOBEX project. He is also responsible for the IrDA and Bluetooth integrations of the Gnokii project.

Thorsten Holz

Thorsten Holz is a Ph.D. student at the Laboratory for Dependable Distributed Systems. He is one of the founders of the German Honeynet Project and has extensive background in the area of honeypots and bots/botnets. His research interests include the practical aspects of secure systems, but he is also interested in more theoretical considerations of dependable systems. In addition, he is the editor-in-chief of the German IT-security magazine MISC.

Doug Hoyte

Doug is a prolific Nmap developer who authored the asynchronys DNS subsystem and greatly improved the version detection system for Nmap 4.00. He wrote the open source Anti-Web httpd server as well as other projects that he hosts at hcsw.org.

Adam Laurie

Adam Laurie is Chief Security Officer and a Director of The Bunker Secure Hosting Ltd. He started in the computer industry in the late Seventies, working as a computer programmer on PDP-8 and other mini computers, and then on various Unix, Dos and CP/M based micro computers as they emerged in the Eighties. He quickly became interested in the underlying network and data protocols, and moved his attention to those areas and away from programming, starting a data conversion company which rapidly grew to become Europe's largest specialist in that field (A.L. downloading Services). During this period, he successfully disproved the industry lie that music CDs could not be read by computers, and, with help from his brother Ben, wrote the world's first CD ripper, 'CDGRAB'. At this point, he and Ben became interested in the newly emerging concept of 'The Internet', and were involved in various early open source projects, the most well known of which is probably their own'Apache-SSL'which went on to become the de-facto standard secure web server. Since the late Nineties they have focused their attention on security, and have been the authors of various papers exposing flaws in Internet services and/or software, as well as pioneering the concept of re-using military data centres (housed in underground nuclear bunkers - http://www.thebunker.net) as secure hosting facilities. Adam has been a senior member of staff at DEFCON since 1997, and also acted as a member of staff during the early years of the Black Hat Briefings.

James "Professor" Messer

James "Professor" Messer is the founder of ProfessorMesser.com and NetworkUptime.com, online resources for network and security professionals. His twenty years of experience in the computer and networking industry have taken him from liquid nitrogen-cooled supercomputers to enterprise network analysis and security solutions. His published works include articles on WorldVillage.com, Lockergnome.com, his own online "Nmap Secrets" training course and his book, "Secrets of Network Cartography: A Comprehensive Guide to Nmap." He also maintains the comp.dcom.lans.ethernet and comp.dcom.lans.token-ring Frequently Asked Questions (FAQ) files.

James holds a Bachelor's degree in Business Management from Florida State University, and his technology interests revolve around security, networking, and electronic privacy. James resides in Tallahassee, Florida, with his wife and three children.

H D Moore

HD Moore is the director of security research at BreakingPoint Systems, where he focuses on the content and security testing features of the BreakingPoint product line. Prior to BreakingPoint, HD spent seven years providing vulnerability assessments, leading penetration tests, and developing exploit code. HD is the founder of the Metasploit Project and one of the core developers of the Metasploit Framework, the leading open- source exploit development platform. In his spare time, HD searches for new vulnerabilities, develops security tools, and contributes to open- source security projects.

Laurent OUDOT

Laurent is a French senior IT Security consultant, who founded TEHTRI-Security in 2010. Last 15 years, he has been hired as a security expert to protect and pentest networks and systems of highly sensitive places like the French Nuclear Warhead Program, the French Ministry of Defense, the United Nations, etc. He has been doing research on defensive technologies and underground activities with numerous security projects handled, and he was a member of the team RstAck and of the Steering Committee of the Honeynet Research Alliance. Laurent has been a frequent presenter and instructor at computer security and academic conferences like Cansecwest, Pacsec, Black Hat USA-Asia-Europe, US DoD/US DoE, Defcon, Hope, Honeynet, PH-Neutral, Hack.LU, as well as a contributor to several research papers for SecurityFocus, MISC Magazine, IEEE, etc.

Gerardo 'gera' Richarte

Gera is widely regarded as one of the world's most brilliant "shellcode ninjas" and responsible for countless innovations in technique. A short look at his famous "Insecure Programming by Example" page at the Insecure Programming site should convince you that he is about 31337 as you get. Gera is one of the technical wizards at Core Security Technologies.

Martin Roesch

Marty is a respected authority on intrusion detection technology and forensics, and today works at Sourcefire where he is the founder and CTO. Martin, who has 17 years industry experience in network security and embedded systems engineering, is also the author and lead developer of the Snort Intrusion Detection System.

Over the past eight years, Martin has developed various network security tools and technologies, including intrusion detection systems, honeypots, network scanners, and policy enforcement systems for organizations such as GTE Internetworking, Stanford Telecommunications, Inc., and the Department of Defense. He has applied his knowledge of network security to penetration testing and network forensics for numerous government and large corporate customers. Martin has been interviewed as an industry expert in multiple technology publications, as well as print and online news services such as MSNBC, Wall Street Journal, CNET, ZDNet, and numerous books. Snort has been featured in Scientific American, on A&E's Secret Places: Inside the FBI, and in several books, such as Network Intrusion Detection: An Analysts Handbook, Intrusion Signatures and Analysis, Maximum Security, Hacking Exposed, and others.

Martin holds a B.S. in Electrical and Computer Engineering from Clarkson University.

Saumil Shah

Saumil Shah is the founder and CEO of Net-Square, providing cutting edge information security services to clients around the globe. Saumil is an internationally recognized speaker and instructor, having regularly presented at conferences like Blackhat, RSA, CanSecWest, PacSec, EUSecWest, Hack.lu, Hack-in-the-box and others. He has authored two books titled "Web Hacking: Attacks and Defense" and "The Anti-Virus Book".

Saumil graduated with an M.S. in Computer Science from Purdue University, USA and a B.E. in Computer Engineering from Gujarat University. He spends his leisure time breaking software, flying kites, traveling around the world and taking pictures.

Nicolas Waisman

Nicolas Waisman is a Senior Security Researcher at Immunity, Inc. Nico is one of the driving forces behind the CANVAS exploit framework. The majority of his recent work has focused on win32 vulndev, specifically reliable heap exploitation. He also likes to sneak in the odd reverse engineering project from time to time. His most current passion is implementing MOSDEF for the PPC architecture.

Matthew Watchinski

Mr. Watchinski is presently the Director of Vulnerability Research at Sourcefire. In 1998 Mr. Watchinski started his career in security at a up and coming company called Hiverworld (later named nCircle). There he was responsible for network penetration tests, physical security audits, and security related professional services. Additionally Mr. Watchinski was responsible for exploit development, IDS signature development, and code audits. In 2000 Mr. Watchinski moved on to became the Manager of Professional Services for farm9, Inc. Where he was responsible for all ongoing security professional services engagements. This included security audits, code reviews, exploit development, and custom IDS signature development. In 2003 Mr. Watchinski came on board at Sourcefire to eventually become the Director of Vulnerability Research. His responsibilities at Sourcefire include; managing the development of snort rules, code audits, and additional security related research. Mr. Watchinski's entire career has been heavily focused on security research, exploit development, and the development of effective security measures that work in large enterprise environments.

Nicolas Bareil

Nicolas Bariel is a 26 years old french security researcher working at EADS Innovation Works (between Cédric Blancher and Philippe Biondi :) He is in charge of pentesting networks, application audits (blackbox/whitebox), training and research. His interests are OS hardening, network security, VoIP and sandboxing. He is also a free software developper, authored a few security tools (ilty, a phone interception system on Cisco VoIP; ipt_scrub, a Linux implementation of OpenBSD's scrub) and takes part in several projects (scapy, Linux kernel, Debian packages). Furthermore, he is in the organization and program committee of the SSTIC conference (the biggest event in France about computer security) since 2007. He also gives classes in engineering schools and college where I enjoy giving them "Capture the flag" exercises

Guillaume Delugre and Jean-Baptiste Bedrune

Guillaume Delugre and Jean-Baptiste Bedrune are security researchers working at the Sogeti ESEC R&D lab. Guillaume has been working on the PDF file format security issues for some time and is the lead developer of Origami, a Ruby framework for malicious PDF analysis and creation. His researchs on PDF security have been presented to several conferences including PacSec, HITB, Hack.lu... Jean-Baptiste has analyzed targeted attacks involving malicious documents for the last 3 years. He also gives reverse engineering and computer virology courses in several engineering schools in France.

Yoann Guillot

Yoann Guillot works in the field of computer security for the french R&D lab of Sogeti/ESEC. They have given presentations on binary deobfuscation in a few ITsec conferences. Yoann is the main author of the Metasm framework.

Scott Lambert

Scott Lambert is director of Threat Research for HP Security Research (HPSR). In this role, he is responsible for developing and driving the overall threat research strategy in the domains of malware, vulnerability and rapid threat information exchange. This includes HP’s Zero Day Initiative program, which augments HP DVLabs with zero-day research by a growing network of researchers in the IT community at large.

In his current role, Lambert focuses on developing and implementing strategies that enable HP to mine large data sets and generate actionable threat intelligence to power the HP Security Intelligence and Risk Management platform. Lambert’s current research centers around reducing the time of breach detection and response.

Prior to joining HP, Lambert developed, maintained and supported numerous computer security applications ranging from vulnerability assessment and risk management software to network and host-based intrusion detection/prevention systems, and related technologies for companies such as L-3 Network Security, Veridian Information Solutions, Symantec Corporation and Microsoft.

Jason Geffner

Jason Geffner joined CrowdStrike in 2012 as a Sr. Security Researcher, where he performs in-depth reverse engineering of highly complex malware and exploits developed by nation-states and organized crime groups. His intelligence research attributes malware, exploits, lateral movement tools, and command-and-control protocols to unique actors. Jason authors comprehensive reports for the technology, industrial, financial, energy, and government sectors to provide actionable intelligence for customers to understand who is attacking them, how they're being attacked, what information is being stolen, and how to defend their systems and raise the bar against the attackers.

Before joining CrowdStrike, Jason worked for NGS Secure from 2007-2012 as a Principal Security Consultant. He focused on performing security reviews of source code and designs, reverse engineering software protection methods and DRM protection methods, penetration testing web applications and network infrastructures, and developing automated security analysis tools.

Prior to joining NGS, Jason spent three years as a Reverse Engineer on Microsoft Corporation's Anti-Malware Team, where his work involved analyzing malware samples, de-obfuscating binaries, and writing tools for analysis and automation. He was the Security Research & Response Team owner of the Windows Malicious Software Removal Tool (MSRT). During his stewardship of this tool, which was and continues to be deployed to all Windows users around the world every month, Jason chose which new malware families the MSRT was to detect and clean each month based on his analysis of the telemetry and trends of the underground malware community. Jason has authored tens of thousands of malware signatures and dozens of malware analyses based on static and dynamic analyses of obfuscated binaries. His work on the MSRT helped hundreds of millions of Windows users each month keep their computers safe and secure. While at Microsoft, Jason was recognized for his reverse engineering skills and for his efforts to drive awareness of reverse engineering practices throughout the company by being given the formal job title "Reverse Engineer." He was the only Microsoft employee with this title.

Jason holds several patents in the fields of reverse engineering and network security. He's a Program Committee member of the Reverse Engineering Conference (REcon) and of the International Conference on Malicious and Unwanted Software. He's a regular trainer at Black Hat and other industry conferences, is often credited in industry talks and publications, and has been actively reverse engineering and analyzing software protection methods since 1995.

Alexander Sotirov

Alexander Sotirov is an independent security researcher with more than ten years of experience with vulnerability research, reverse engineering and advanced exploitation techniques. His recent work includes exploiting MD5 collisions to create a rogue Certificate Authority, bypassing the exploitation mitigations on Windows Vista and developing the Heap Feng Shui browser exploitation technique. His professional experience includes positions as a security researcher at Determina and VMware. Currently he is working as an independent security consultant in New York. He is a regular speaker at security conferences around the world, including CanSecWest, BlackHat and Recon. Alexander served as a program chair of the USENIX Workshop on Offensive Technologies and is one of the founders of the Pwnie Awards.

Matthieu Suiche

Matthieu Suiche is a security researcher who focuses on reverse code engineering and volatile memory analysis. His previous researches/utilities include Windows hibernation file, Windows physical memory acquisition (Win32dd/Win64dd), Mac OS X Physical Memory Analysis and LiveCloudKd which is an utility that makes possible to dump the memory and to debug an Hyper-V Virtual Machine from the Host even if the debug mode is not activated. Matthieu has been a speaker at various security conferences such as PacSec, BlackHat USA, EUROPOL High Tech Crime Meeting, Shakacon, CanSecWest etc. Prior to starting MoonSols in 2010 (a computer security and kernel code consulting and software company), Matthieu worked for companies such as E.A.D.S. (European Aeronautic Defence and Space Company) and the Netherlands Forensics Institute of the Dutch Ministry of Justice.

Marc "van Hauser" Heuse

Marc "van Hauser" Heuse is performing security research since 1993, having found vulnerabilities in software like firewalls, DNS servers, SAP middleware, etc. and is the author of various famous security and pentest tools like hydra, amap, THC-Scan, secure_delete, SuSEFirewall and many more.

He is performing security research on IPv6 since 2005 and has spoken on many conferences on this topic since then, among these are the CCC congress (Germany), Cansecwest (Canada), PacSec (Japan) and many more international conferences, and additionally has programmed the solely available pentest toolkit for ipv6: the thc-ipv6 protocol attack suite.

In 1995 he founded the renowned security research group "The Hacker's Choice", which was the first group to e.g. crack A5 GSM in 2006 within a minute. Since 1997 he is working as a security consultant in the top-5 enterprise consultant companies, since 2007 he is working as an independant security consultant.

Sebastian Porst

After finishing his Masters degree in Computer Science in 2007, Sebastian joined zynamics GmbH as lead developer of the reverse BinCrowd, and the malware PDF analysis tool PDF Inspector. After four years of working at zynamics, Sebastian moved on to become a vulnerability researcher on a joint project between Microsoft and Adobe that focuses on improving the security of Adobe products. Sebastian has been a speaker at various IT security conferences including CanSecWest, SOURCE Barcelona, RECon, Hack in the Box, and hack.lu.

Mariano Nunez Di Croce

Director of research and development for Onapsis.

Mark Schoenefeld

Marc Schoenefeld came first into contact with computers by exposure to a C64. Since then he is infected by bits and bytes. He studied Business Informatics and joined a banking computer centre in 1997 where he worked as Software Security Architect. In 2007 he joined the Red Hat Security Response Team. Early 2010 he graduated with a Dr. rer. nat. degree in computer science (comparable to PhD). He spoke about Java Bytecode Security at Blackhat 2002, since then he also spoke and gave trainings at the major conferences like Blackhat, RSA, CanSecWest, HITB, PacSec, XCon, Confidence , HITB and Java One. In 2011 he first released a book about JVM security, showing defense and attack techniques on Java software and then joined the Oracle Java Vulnerability Team.

Joseph Karpenko

Joseph Karpenko is a Senior Security Engineer in Cisco's Security Research and Operations Group. Joseph is a 12-year veteran of technology with expertise in networking, security, data center, and the systems administration fields. Currently Joseph is responsible for developing security solutions that deter, detect, and prevent existing, current, and emerging threats and attacks. Throughout his career, Joseph has presented security topics at various industry events (BayThreat, Black Hat, CanSecWest, Cisco Live USA and Europe). During his career, Joseph has worked with customers on the design and implementation of large-scale enterprise and data center network and security architectures. Prior to joining Cisco, Joseph worked as a system administrator and senior escalation engineer handling and troubleshooting complex security and network incidents.

Randy Ivener

Randy Ivener, CCIE No. 10722 Emeritus, is a Security Manager with Cisco's Security Research and Operations Group. Randy has spent many years as a network security specialist helping companies secure their networks. Randy has presented security topics at industry events such as Blackhat and Cisco Live. Before becoming immersed in information security, he served in the Navy and spent time in software development and as a training instructor.

Peter Silberman

Peter Silberman works at MANDIANT on the research and development team. For a number of years, Peter has specialized in offensive and defensive kernel technologies, reverse engineering, and vulnerability discovery. He enjoys automating solutions to problems in the domain of reverse engineering and analysis. Although he is college educated, Peter does not believe formal education should interfere with learning.

Jamie Butler

Jamie Butler is a highly respected member of the information security community with over a decade of experience in Windows operating system security. Mr. Butler is a Director at MANDIANT and leads the agent team on the MIR product. Prior to joining MANDIANT, Jamie was the CTO of Komoku, Inc. His experience also includes Windows Host Intrusion Detection development at Enterasys Networks and over five years experience at the National Security Agency. Mr. Butler is also co-author of the bestseller, "Rootkits: Subverting the Windows Kernel." (Addison-Wesley, 2005). In addition, Jamie has authored numerous papers and is a frequent speaker at computer security conferences. He is the co-author and instructor of the popular courses Advanced 2nd Generation Digital Weaponry, Offensive Aspects of Rootkit Technology, and Advanced Memory Forensics in Incident Response.

Nicolas Bareil

Nicolas Bareil is a research security engineer at EADS Innovation Works. He is the author of many layers in scapy. He likes contributing patches in security tools and in the Linux kernel.

Dino Dai Zovi

Dino Dai Zovi, currently an independent security consultant and researcher, has been working in information security for over 9 years with experience in red teaming, penetration testing, software security, information security management, and cybersecurity R&D. Mr. Dai Zovi is also a regular speaker at information security conferences having presented his independent research on memory corruption exploitation techniques, 802.11 wireless client attacks, and Intel VT-x virtualization rootkits over the last 10 years at conferences around the world including DEFCON, BlackHat, and CanSecWest. He is a co-author of the books "The Mac Hackers Handbook" (Wiley, 2009) and "The Art of Software Security Testing" (Addison-Wesley, 2006). In 2008, eWEEK named him one of the 15 Most Influential People in Security. He is perhaps best known in the information security and Mac communities for winning the first PWN2OWN contest at CanSecWest 2007.

Michael Eddington

Michael Eddington is the Chief Technical Officer at Deja vu Security LLC and its Principal Consultant. He has over ten years of experience in providing security services to Fortune 500 companies in the US. Michael is a recognized thought leader in the fields of application security, network security, threat modeling, and fuzz testing. He routinely speaks and provides training at the top security conferences including CanSecWest, Blackhat and RSA.

Michael is a passionate leader in the open-source security development community, contributing to projects including Trike (Threat Modeling), Outlook Privacy plug-in, and Peach Fuzz. Michael is the creator of the widely used Peach Fuzzing framework which is used by many top technology companies to find complex security vulnerabilities. His current research efforts are pushing security vulnerability testing and fuzzing to the next level with innovative tools and techniques.

Aaron Portnoy

Aaron Portnoy is the VP of Research and a co-founder of Exodus Intelligence where he spends most of his time discovering and exploiting vulnerabilities in widely-deployed enterprise and consumer software. Aaron specializes in reverse engineering and has given numerous presentations on the topic, most recently on the project he authored that won the 2012 Hex-Rays IDA Pro Plugin Contest. Prior to Exodus, Aaron was the manager of security research at the Zero Day Initiative and was responsible for architecting and overseeing the Pwn2Own contest since its inception.

Zef Cekaj

Zef Cekaj is a security researcher specializing in vulnerability reversing and discovery. He has reversed and documented hundreds of vulnerabilities and has a history of vehemently arguing with vendors over email regarding exploitability of bugs in their products. Consequently, he enjoys winning such arguments by demonstrating exploits on live systems.

His primary interests are in the exploitation of server side vulnerabilities and mitigation circumvention. Zef is a founding member of Exodus Intelligence (Exodus Intel Website) where his primary duties include vulnerability discovery and analysis.

Mike Murray

A managing partner of MAD Security and the lead instructor of The Hacker Academy. Mike has focused his career on the offensive side of security, having started as a penetration tester and vulnerability researcher during the dot-com boom of the 1990s. In more than a decade in the industry, he has lead penetration testing, vulnerability research and social engineering teams in engagements against some of the largest and most advanced clients in the industry. His expertise in building penetration test teams and delivering large-scale and highly technical penetration tests will lead students in this class to understand far more about the process of penetration testing than they ever thought possible.

Stephen A. Ridley

Stephen A. Ridley is a security researcher with more than 10 years of experience in software development, software security, and reverse engineering. Before becoming an independent researcher, Mr. Ridley served as Senior Researcher at Matasano. Prior to that: Senior Security Architect at McAfee, and before that he was a founding member of ManTech International's Security and Mission Assurance (SMA) where he did vulnerability research and reverse engineering in support of the U.S. intelligence community. He has spoken about reverse engineering and software security at BlackHat, ReCon,EuSecWest, Syscan and others. Mr. Ridley currently lives in Manhattan and frequently guest lectures at New York area universities such as NYU and Rensselaer Polytechnic Institute.

Stephen Lawler

Stephen Lawler is the Founder and President of a small computer software and security consulting firm. Mr. Lawler has been actively working in information security for over 7 years, primarily in reverse engineering, malware analysis, and exploit development. While working at Mandiant he was a principal malware analyst for high-profile computer intrusions affecting several Fortune 100 companies.

Prior to this, as a founding member of ManTech International's Security and Mission Assurance (SMA) division he discovered numerous 0-day vulnerabilities in COTS software and pioneered several exploitation techniques that have only been recently published.

Prior to his work at ManTech, Stephen Lawler was the lead developer for the AWESIM sonar simulator as part of the US Navy SMMTT program.

James "egyp7" Lee

egypt is a software developer for Rapid7 where he is a core developer for the Metasploit Framework. Before devoting all his time to Metasploit, he was a Cybersecurity researcher for Idaho National Laboratory where he discovered numerous vulnerabilities in SCADA and Industrial Control Systems. egypt has presented at Defcon, BSidesLV, Blackhat, Derbycon and other venues. Note that egypt is not Egypt. The two can be distinguished easily by their relative beards Egypt has millions, while egypt only has the one.

Rob "mubix" Fuller

mubix is a Senior Red Teamer. His professional experience starts from his time on active duty as United States Marine. He has worked with devices and software that run gambit in the security realm. He has a few certifications, but the titles that he holds above the rest is FATHER, HUSBAND and United States Marine

Patrick Szeto

Patrick Szeto is a Senior Security Consultant at Security Compass with extensive background in information security spanning over a decade. He is a specialist in application security reviews, source code analysis and secure coding methodologies. Patrick has brought this expertise to the mobile application security space through security assessments, research and training. Patrick's portfolio of experience includes comprehensive security reviews for institutions in the financial, energy, insurance, medical, travel, retail, entertainment, telecommunications and software markets

Subu Ramanathan

Subu Ramanathan is a Senior Security Consultant at Security Compass. With his wide array of experience in the application security space, Subu plays a valuable part in Security Compasses Software and Enterprise Assessment Service practice. He is a senior application security professional with extensive experience in secure SDLC, application security assessments, framework level threat models and security source code reviews. Subu is also a secure software application development SME with experience in developing content for multiple ASP.NET secure development courses including SANS DEV544. Subu also spearheads Security Compass's mobile application security service offering.

Subu brings to the table relevant experience in rendering exceptional quality application security services to the financial, energy, consumer business and telecommunication sectors. His experience in leading various teams, both onshore and offshore, combined with his core technical background are his most valuable assets. Subu is also an integral part of Security Compass's training services. In addition to developing and teaching Security Compass's Building Secure Web Applications in ASP.NET, Subu regularly teaches courses in Exploiting and Defending Web Applications, Advanced Application Attacks and Mobile Hacking to Security Compass's client across the globe.

Dmitry Nedospasov

Dmitry Nedospasov is a PhD student and researcher in the field of IC security at the Security in Telecommunications (SECT) research group at the Berlin University of Technology (TU Berlin) and the Telekom Innovation Laboratories. Dmitry's research interests include hardware and IC reverse-engineering as well as physical attacks against ICs and embedded systems. His academic research focuses on developing new and novel techniques for semi and fully-invasive IC analysis. Most recently, Dmitry was involved in identifying vulnerabilities in the most wide-spread Phyiscally Unclonable Function (PUF) schemes.

Thorsten Schroeder

Thorsten Schroder has been active as a technical consultant in the field of applied IT-Security for many years. His areas of expertise lie in the verification of software in either source or binary form. More recently, Thorsten's research has resulted in several open source hardware projects, most notably the "Keykeriki", an RF-analysis tool for sniffing and attacking 2.4GHz based radio devices such as wireless keyboards. Thorsten has also been involved in several software reverse-engineering projects such as the CCC's analysis of the German Federal Trojan known as "0zapftis". Thorsten is the co-founder of the Swiss modzero AG, established in 2011, as well as the German branch, modzero GmbH, established in January 2013.

Stefan Esser

Saurabh Harit

Saurabh brings to Security Compass, a strong background in Web Application & Network penetration testing. He has diversified experience in vulnerability assessment and penetration testing across various domains such as access control, building solutions, aerospace, financial services, telecommunications, banking and so on. Additionally, he is also apt in source code review, threat modeling and binary reverse engineering. He has extensively worked on developing methodologies & practices for achieving secure code for various applications, which includes web applications, web services, client / server applications and standalone applications. Saurabh has contributed towards proof of concept exploits and white papers on binary reverse engineering and ethical hacking. Saurabh has delivered security trainings to various fortune 500 clients globally and at reputed security conferences such as BlackHat.

John Butterworth

John Butterworth specializes in low level system security. He is applying his electrical engineering background and firmware engineering background to investigate UEFI/BIOS security. Over the past year his "BIOS Chronomancy" work in a number of venues including NoSuchCon, BlackHat, EkoParty, Breakpoint, Hack.lu, ToorCon, SecTor, and others. This work analyzed an implementation of the Static-Core Root of Trust for Measurement (S-CRTM) and showed how it was not properly measuring the full BIOS before storing that measurement into the TPM. It also showed how even if a full measurement was performed it could still not be trusted, because a "tick" malware could still attach itself to the BIOS and forge measurements. Or a "flea" could infect the BIOS and hop between BIOS revisions to persist. But this work also proposed a solution by doing a better measurement of the BIOS using TPM-timing-based attestation. John is also wrote the initial version of Copernicus (http://www.mitre.org/capabilities/cybersecurity/overview/cybersecurity-blog/copernicus-question-your-assumptions-about), a tool for checking the security of your BIOS on Windows.

John Bambenek

John Bambenek is Chief Forensic Examiner for Bambenek Consulting and an Incident Handler with the Internet Storm Center. He has been working in security for 15 years researching emerging security threats. He is a published author of several articles, book chapters and one book, and has contributed to IT security courses and certification exams covering subjects such as: penetration testing, reverse engineering malware, forensics and network security. He has participated in many incident investigations spanning the globe. He has spoken in conferences around the world and runs several private intelligence groups focusing on takedowns and disruption of criminal entities.

Georgia Weidman

Georgia Weidman is a penetration tester, security researcher, and trainer. She holds a Master of Science degree in computer science, secure software engineering, and information security as well as holding CISSP, CEH, NIST 4011, and OSCP certifications. Her work in the field of smartphone exploitation has been featured in print and on television internationally. She has presented her research at conferences around the world including Shmoocon, Blackhat, Hack in the Box, and Derbycon. Georgia has delivered highly technical security training for conferences, schools, and corporate clients to excellent reviews. Building on her experience, Georgia recently founded Bulb Security LLC , a security consulting firm specializing in security assessments/penetration testing, security training, and research/development. She was awarded a DARPA Cyber Fast Track grant to continue her work in mobile device security culminating in the release of the open source project the Smartphone Pentest Framework (SPF). She is the author of Penetration Testing: A Hands-on Introduction to Hacking from No Starch Press.

Jay Beale

Jay Beale has created a number of security tools, including Bastille UNIX and the CIS Unix Scoring Tool, both of which have been widely used throughout industry and government. He has served as an invited speaker at many industry and government conferences, a columnist for Information Security Magazine, SecurityPortal and SecurityFocus, and a contributor to nine books, including those in his Open Source Security Series and the "Stealing the Network" series. Jay is the COO at security consulting firm InGuardians.