applied security conferences and training: CanSecWest | PacSec | EUSecWest |

Security Masters Dojo

Advanced and intermediate security training and technology enhancement for information security professionals.

Security Masters Dojo


Dave Aitel

Dave Aitel is CEO and founder of Immunity Inc., and his past includes stints at @Stake, and the National Security Agency. As a long-time security researcher Dave has a long and visionary history of warning the industry about major security vulnerabilities. Dave is recognized world authority on attack techniques, and is the author of many famous tools including SPIKE, Spike proxy, and sharefuzz. He is co-author of two books ("The Hacker's Handbook" from Aurbach Press and "The Shellcoder's Handbook" from John Wiley and Sons) and is a frequent presenter of technical papers at conferences.

Ashfaq Ansari

Ashfaq Ansari is the founder of HackSys Team code named "Panthera". He is a Security Researcher with experience in various aspects of Information Security. He has authored "HackSys Extreme Vulnerable Driver" and "Shellcode of Death". He has also written and published various whitepapers on low level software exploitation. His core interest lies in "Low Level Exploitation", "Reverse Engineering", "Program Analysis" and "Hybrid Fuzzing". He is a fanboy of Artificial Intelligence and Machine Learning. He is the chapter lead for null (Pune).

Andrea Barisani

Andrea Barisani is an internationally known security researcher. Since owning his first Commodore-64 he has never stopped studying new technologies, developing unconventional attack vectors and exploring what makes things tick...and break. His experiences focus on large-scale infrastructure administration and defense, forensic analysis, penetration testing and software development, with more than 14 years of professional experience in security consulting. Being an active member of the international Open Source and security community he contributed to several projects, books and open standards. He is now the founder and coordinator of the oCERT effort, the Open Source Computer Security Incident Response Team. He has been a speaker and trainer at BlackHat, CanSecWest, DEFCON, Hack In The Box, PacSec conferences among many others, speaking about TEMPEST attacks, SatNav hacking, 0-days, OS hardening and many other topics.

Philippe Biondi

Philippe Biondi is a research engineer and security expert working at the IT security lab of EADS Corporate Research Center. He is a member of the French Honeynet Project. He was co-author of LIDS. He is the author of Scapy and Shellforge and a lot of other tools. His Scapy tutorial at CanSecWest/core05 was rated one of the best talks of the conference by attendees.

Cédric Blancher

Cédric Blancher has spent the last 7 years working in netwo security field, performing audits and penetration tests. In 2004, he joined EADS Innovation Works and now runs the Computer Security Research Lab in Suresnes, France. His research focuses on network security, especially wireless links. He is an active member of Rstack team and French Honeynet Project with studies on honeynet containment, honeypot farms and network traffic analysis. He delivered technical presentations and trainings worldwide, and written papers and articles on network security. Cédric's website:

Crispin Cowan

Crispin Cowan has been in the computer business for 25 years, and security for 10 years. He was the CTO and founder of Immunix, Inc., acquired by Novell in 2005. Dr. Cowan is now the Security Architect for SUSE Linux, and applications that Novell offers for Linux. Dr. Cowan developed several host security technologies under DARPA funding, including prominent technologies like the StackGuard compiler defense against buffer overflows, and the LSM (Linux Security Modules) interface in Linux 2.6. Dr. Cowan also co-invented the "time-to-patch" method of assessing when it is safe to apply a security patch. Prior to founding Immunix, he was a professor with the Oregon Graduate Institute. He is the program co-chair for the 2007 and 2008 Network and Distributed System Security conferences. He holds a Ph.D. from the University of Western Ontario and a Masters of Mathematics from the University of Waterloo, and yellow belts in 3 different styles of Aikido.

Renaud Deraison

Renaud is the Chief Research Officer at Tenable Network Security. Founder and the primary author of the open-source Nessus vulnerability scanner project. He has worked for SolSoft, and founded his own computing security consulting company, 'Nessus Consulting S.A.R.L.' Nessus detects network vulnerabilities and is in use at more than 50,000 worldwide organizations. Under Renaud's leadership, the Nessus project has won numerous awards, including the 2002 Network Computing 'Well Connected' award and PC Magazine's 2003 'Open Source Product of the Year' award. Mr. Deraison also is an editorial board member of the Common Vulnerabilities and Exposures Organization, has presented at a variety of security conferences and has had his work published in several magazines and books.

Maximillian Dornseif

Maximillian Dornseif has studied laws and computer science at the University of Bonn, Germany where he wrote his PhD Thesis about the "Phenomenology of Cybercrime". He has been doing IT security consulting since the mid nineties and today focuses mostly on penetration-testing. In early 2004 he joined the Laboratory for Dependable Distributed Systems at RWTH Aachen University where he bootstrapped the computer forensics education program and the German honeynet project and the now famous "Summerschool Applied IT-Security". Since Fall 2005 he works as a post-doc researcher at the University of Mannheim. Dornseif is a sought after speaker at international security conferences and has published in the legal and computer science fields on a wide range of topics.

Sinan "noir" Eren

Sinan Eren is a reverse engineer and a casual exploit developer. At Immunity Inc, he performs code/binary audits and exploit development for the CANVAS platform. Architectures and platforms of interest include x86/Win32, Unix on any cpu flavor and popular 3rd party applications (MTAs, HIPS, AV, VPN, Remote Desktop etc.). He recently gave auditing courses for the RPC layer of the Windows OS to several audiences around the USA.

Guillaume Valadon

Guillaume is security engineer and researcher at the French Network and Information and Security Agency. He obtained his Ph.D. on optimizations of the Mobile IPv6 protocol. From fall 2004 to fall 2006, he was doing research at the University of Tokyo where he worked on the security of the Mobile IPv6 protocol, and co-authored the IPv6 extension for Scapy. He gave technical presentations, classes and live demonstrations, and wrote research papers for conferences and magazines.

Nico Fischbach

Nico is a Senior Manager, in charge of the European Network Security Engineering team at COLT Telecom, a leading pan-European provider of end-to-end business communications services.

He holds an Engineer degree in Networking and Distributed Computing and is a recognized authority on Service Provider infrastructure security and denial-of-service attacks mitigation.

Nicolas is co-founder of Securite.Org a French speaking portal on computer and network security, of eXperts and mystique, an informal security research group and think tank, and of the French chapter of the Honeynet project.

He has presented at numerous technical and security conferences, teaches networking and security courses at various universities and engineering schools, and is a regular contributor to the french security magazine MISC. More details and contact information on his homepage.

Joseph FitzPatrick

Joe (@securelyfitz) is an Instructor, Consultant, and Researcher at Joe specializes in low-cost attacks, hardware tools, and hardware design for security. He has a special knack for expressing hardware security concepts to both software security experts with no hardware background, as well as to hardware experts with no security background. Joe holds a master's degree in Electrical Engineering with a focus on information security from Worcester Polytechnic Institute. Before starting, he was a Security Researcher with Intel's Security Center of Excellence where he conducted hardware penetration testing of desktop and server microprocessors, as well as security validation training for functional validators worldwide.


Fyodor authored the popular Nmap Security Scanner, which was named security tool of the year by Linux Journal, Info World, and the Codetalker Digest. It was also featured in the hit movie "Matrix Reloaded" as well as by the BBC, CNet, Wired, Slashdot, Securityfocus, and more. He also maintains the Insecure.Org and Seclists.Or g security resource sites and has authored seminal papers detailing techniques for stealth port scanning, remote operating system detection via TCP/IP stack fingerprinting, version detection, and the IPID Idle Scan. He is a member of the Honeynet project and a co-author of the books "Know Your Enemy: Honeynets" and "Stealing the Network: How to Own a Continent".

Halvar Flake

Originating in the fields of copy protection and digital rights management, he gravitated more and more towards network security over time as he realized that constructive copy protection is more or le ss fighting windmills. After writing his first few exploits he was hooked and realized that reverse engineering experience is a very handy asset when dealing with COTS software. With extensive experience in reverse engineering, network security, penetration testing, and exploit development, Halvar consults on reverse engineering and is a graduate student of mathematics in Germany.

Martin Herfurt

Martin Herfurt is the founder of the He completed his Telecommunications Engineering Degree at the Salzburg University of Applied Sciences and Technologies in 2001. Alongside his study Martin was involved in numerous industry projects, providing him with commercial programming practice. In 2000 Martin followed up his formal study with a four-month internship at the telecommunications institute of TELCOT institute in San Ramon, California, USA. Since the second half of 2000 Martin has been working as a full time researcher at an Austrian Research facility. His project responsibilities there were ranging from the co-ordination of a European IST project with a total budget of over 5 million Euro to software agents development. Together with a colleague, Martin began giving a class on mobile data services at the Salzburg University of Applied Sciences and Technologies in the summer of 2003. In February 2004, Martin discovered a major security loophole in several popular cellphones which is referred to as BlueBug in the media. As part of his fascination with the rapid development in computer programming Martin has become a regular participant in the Chaos Communication Congress which is a yearly meeting of the German hacker association CCC.

Marcel Holtman

Marcel Holtmann is the maintainer and the core developer of the official Linux Bluetooth stack which is called BlueZ. He started working with the Bluetooth technology back in 2001. His work includes new hardware drivers, upper layer protocol implementations and the integration of Bluetooth into other subsystems of the Linux kernel. In January 2004 he overtook the maintainer role from the original developer Max Krasnyansky. Together with Jean Tourrilhes he maintains the OpenOBEX project. He is also responsible for the IrDA and Bluetooth integrations of the Gnokii project.

Thorsten Holz

Thorsten Holz is a Ph.D. student at the Laboratory for Dependable Distributed Systems. He is one of the founders of the German Honeynet Project and has extensive background in the area of honeypots and bots/botnets. His research interests include the practical aspects of secure systems, but he is also interested in more theoretical considerations of dependable systems. In addition, he is the editor-in-chief of the German IT-security magazine MISC.

Doug Hoyte

Doug is a prolific Nmap developer who authored the asynchronys DNS subsystem and greatly improved the version detection system for Nmap 4.00. He wrote the open source Anti-Web httpd server as well as other projects that he hosts at

Adam Laurie

Adam Laurie is Chief Security Officer and a Director of The Bunker Secure Hosting Ltd. He started in the computer industry in the late Seventies, working as a computer programmer on PDP-8 and other mini computers, and then on various Unix, Dos and CP/M based micro computers as they emerged in the Eighties. He quickly became interested in the underlying network and data protocols, and moved his attention to those areas and away from programming, starting a data conversion company which rapidly grew to become Europe's largest specialist in that field (A.L. downloading Services). During this period, he successfully disproved the industry lie that music CDs could not be read by computers, and, with help from his brother Ben, wrote the world's first CD ripper, 'CDGRAB'. At this point, he and Ben became interested in the newly emerging concept of 'The Internet', and were involved in various early open source projects, the most well known of which is probably their own'Apache-SSL'which went on to become the de-facto standard secure web server. Since the late Nineties they have focused their attention on security, and have been the authors of various papers exposing flaws in Internet services and/or software, as well as pioneering the concept of re-using military data centres (housed in underground nuclear bunkers - as secure hosting facilities. Adam has been a senior member of staff at DEFCON since 1997, and also acted as a member of staff during the early years of the Black Hat Briefings.

James "Professor" Messer

James "Professor" Messer is the founder of and, online resources for network and security professionals. His twenty years of experience in the computer and networking industry have taken him from liquid nitrogen-cooled supercomputers to enterprise network analysis and security solutions. His published works include articles on,, his own online "Nmap Secrets" training course and his book, "Secrets of Network Cartography: A Comprehensive Guide to Nmap." He also maintains the comp.dcom.lans.ethernet and comp.dcom.lans.token-ring Frequently Asked Questions (FAQ) files.

James holds a Bachelor's degree in Business Management from Florida State University, and his technology interests revolve around security, networking, and electronic privacy. James resides in Tallahassee, Florida, with his wife and three children.

Laurent OUDOT

Laurent is a French senior IT Security consultant, who founded TEHTRI-Security in 2010. Last 15 years, he has been hired as a security expert to protect and pentest networks and systems of highly sensitive places like the French Nuclear Warhead Program, the French Ministry of Defense, the United Nations, etc. He has been doing research on defensive technologies and underground activities with numerous security projects handled, and he was a member of the team RstAck and of the Steering Committee of the Honeynet Research Alliance. Laurent has been a frequent presenter and instructor at computer security and academic conferences like Cansecwest, Pacsec, Black Hat USA-Asia-Europe, US DoD/US DoE, Defcon, Hope, Honeynet, PH-Neutral, Hack.LU, as well as a contributor to several research papers for SecurityFocus, MISC Magazine, IEEE, etc.

Gerardo 'gera' Richarte

Gera is widely regarded as one of the world's most brilliant "shellcode ninjas" and responsible for countless innovations in technique. A short look at his famous "Insecure Programming by Example" page at the Insecure Programming site should convince you that he is about 31337 as you get. Gera is one of the technical wizards at Core Security Technologies.

Martin Roesch

Marty is a respected authority on intrusion detection technology and forensics, and today works at Sourcefire where he is the founder and CTO. Martin, who has 17 years industry experience in network security and embedded systems engineering, is also the author and lead developer of the Snort Intrusion Detection System.

Over the past eight years, Martin has developed various network security tools and technologies, including intrusion detection systems, honeypots, network scanners, and policy enforcement systems for organizations such as GTE Internetworking, Stanford Telecommunications, Inc., and the Department of Defense. He has applied his knowledge of network security to penetration testing and network forensics for numerous government and large corporate customers. Martin has been interviewed as an industry expert in multiple technology publications, as well as print and online news services such as MSNBC, Wall Street Journal, CNET, ZDNet, and numerous books. Snort has been featured in Scientific American, on A&E's Secret Places: Inside the FBI, and in several books, such as Network Intrusion Detection: An Analysts Handbook, Intrusion Signatures and Analysis, Maximum Security, Hacking Exposed, and others.

Martin holds a B.S. in Electrical and Computer Engineering from Clarkson University.

Vikram Salunke

Vikram is the Information Security Researcher, Consultant and Founder at Vmaskers. Vmaskers provide network, wireless, web, Android and iOS applications penetration testing services and training for corporates. His main responsibilities are to look after application security, lead security automation and provide training. He has also developed several internal security tools for the organization to handle the security issues. Vmaskers provide training for organisation’s internal team that includes developers and penetration testers to improve quality of the applications.

He has also discovered serious web application security flaws in many unique product giants all over the world. He enjoys finding and exploiting software vulnerabilities via reverse engineering, source code auditing, fuzzing. He researches primarily focused Web App, Android, iOS App Pentesting. He is responsible for Pentesting, Code Review and Security Certification of Hybrid Mobile Applications. Responsible for breaking and fixing business critical Web Applications, Web Services, and client facing applications built with HTML5 and JS. He has previously trained in CHCon and will be training in OWASP Morocco.

Saumil Shah

Saumil Shah is the founder and CEO of Net-Square, providing cutting edge information security services to clients around the globe. Saumil is an internationally recognized speaker and instructor, having regularly presented at conferences like Blackhat, RSA, CanSecWest, PacSec, EUSecWest,, Hack-in-the-box and others. He has authored two books titled "Web Hacking: Attacks and Defense" and "The Anti-Virus Book".

Saumil graduated with an M.S. in Computer Science from Purdue University, USA and a B.E. in Computer Engineering from Gujarat University. He spends his leisure time breaking software, flying kites, traveling around the world and taking pictures.

Nicolas Waisman

Nicolas Waisman is a Senior Security Researcher at Immunity, Inc. Nico is one of the driving forces behind the CANVAS exploit framework. The majority of his recent work has focused on win32 vulndev, specifically reliable heap exploitation. He also likes to sneak in the odd reverse engineering project from time to time. His most current passion is implementing MOSDEF for the PPC architecture.

Matthew Watchinski

Mr. Watchinski is presently the Director of Vulnerability Research at Sourcefire. In 1998 Mr. Watchinski started his career in security at a up and coming company called Hiverworld (later named nCircle). There he was responsible for network penetration tests, physical security audits, and security related professional services. Additionally Mr. Watchinski was responsible for exploit development, IDS signature development, and code audits. In 2000 Mr. Watchinski moved on to became the Manager of Professional Services for farm9, Inc. Where he was responsible for all ongoing security professional services engagements. This included security audits, code reviews, exploit development, and custom IDS signature development. In 2003 Mr. Watchinski came on board at Sourcefire to eventually become the Director of Vulnerability Research. His responsibilities at Sourcefire include; managing the development of snort rules, code audits, and additional security related research. Mr. Watchinski's entire career has been heavily focused on security research, exploit development, and the development of effective security measures that work in large enterprise environments.

Nicolas Bareil

Nicolas Bariel is a 26 years old french security researcher working at EADS Innovation Works (between Cédric Blancher and Philippe Biondi :) He is in charge of pentesting networks, application audits (blackbox/whitebox), training and research. His interests are OS hardening, network security, VoIP and sandboxing. He is also a free software developper, authored a few security tools (ilty, a phone interception system on Cisco VoIP; ipt_scrub, a Linux implementation of OpenBSD's scrub) and takes part in several projects (scapy, Linux kernel, Debian packages). Furthermore, he is in the organization and program committee of the SSTIC conference (the biggest event in France about computer security) since 2007. He also gives classes in engineering schools and college where I enjoy giving them "Capture the flag" exercises

Guillaume Delugre and Jean-Baptiste Bedrune

Guillaume Delugre and Jean-Baptiste Bedrune are security researchers working at the Sogeti ESEC R&D lab. Guillaume has been working on the PDF file format security issues for some time and is the lead developer of Origami, a Ruby framework for malicious PDF analysis and creation. His researchs on PDF security have been presented to several conferences including PacSec, HITB, Jean-Baptiste has analyzed targeted attacks involving malicious documents for the last 3 years. He also gives reverse engineering and computer virology courses in several engineering schools in France.

Yoann Guillot

Yoann Guillot works in the field of computer security for the french R&D lab of Sogeti/ESEC. They have given presentations on binary deobfuscation in a few ITsec conferences. Yoann is the main author of the Metasm framework.

Scott Lambert

Scott Lambert is the VP of Security Research for Click Security where he leads a team of highly skilled threat hunters, security researchers and data scientists. This role calls upon his more than 15 years of progressive experience in cybersecurity. Scott’s expertise is in building and leading security research, intelligence and operations organizations that support the protection of enterprise customers.

Prior to Click Security, Lambert was the director of Threat Research for HP Security Research (HPSR) where he was responsible for developing and driving the overall threat research strategy in the domains of malware, vulnerability and rapid threat information exchange. This included the Zero Day Initiative (ZDI) program, which augmented DVLabs with zero-day research by a growing network of researchers in the IT community at large.

In addition he has developed, maintained and supported numerous computer security applications ranging from vulnerability assessment and risk management software to network and host-based intrusion detection/prevention systems, and related technologies for companies such as L-3 Network Security, Veridian Information Solutions, Symantec Corporation and Microsoft.

Jason Geffner

Jason Geffner joined CrowdStrike in 2012 as a Sr. Security Researcher, where he performs in-depth reverse engineering of highly complex malware and exploits developed by nation-states and organized crime groups. His intelligence research attributes malware, exploits, lateral movement tools, and command-and-control protocols to unique actors. Jason authors comprehensive reports for the technology, industrial, financial, energy, and government sectors to provide actionable intelligence for customers to understand who is attacking them, how they're being attacked, what information is being stolen, and how to defend their systems and raise the bar against the attackers.

Before joining CrowdStrike, Jason worked for NGS Secure from 2007-2012 as a Principal Security Consultant. He focused on performing security reviews of source code and designs, reverse engineering software protection methods and DRM protection methods, penetration testing web applications and network infrastructures, and developing automated security analysis tools.

Prior to joining NGS, Jason spent three years as a Reverse Engineer on Microsoft Corporation's Anti-Malware Team, where his work involved analyzing malware samples, de-obfuscating binaries, and writing tools for analysis and automation. He was the Security Research & Response Team owner of the Windows Malicious Software Removal Tool (MSRT). During his stewardship of this tool, which was and continues to be deployed to all Windows users around the world every month, Jason chose which new malware families the MSRT was to detect and clean each month based on his analysis of the telemetry and trends of the underground malware community. Jason has authored tens of thousands of malware signatures and dozens of malware analyses based on static and dynamic analyses of obfuscated binaries. His work on the MSRT helped hundreds of millions of Windows users each month keep their computers safe and secure. While at Microsoft, Jason was recognized for his reverse engineering skills and for his efforts to drive awareness of reverse engineering practices throughout the company by being given the formal job title "Reverse Engineer." He was the only Microsoft employee with this title.

Jason holds several patents in the fields of reverse engineering and network security. He's a Program Committee member of the Reverse Engineering Conference (REcon) and of the International Conference on Malicious and Unwanted Software. He's a regular trainer at Black Hat and other industry conferences, is often credited in industry talks and publications, and has been actively reverse engineering and analyzing software protection methods since 1995.

Alexander Sotirov

Alexander Sotirov is an independent security researcher with more than ten years of experience with vulnerability research, reverse engineering and advanced exploitation techniques. His recent work includes exploiting MD5 collisions to create a rogue Certificate Authority, bypassing the exploitation mitigations on Windows Vista and developing the Heap Feng Shui browser exploitation technique. His professional experience includes positions as a security researcher at Determina and VMware. Currently he is working as an independent security consultant in New York. He is a regular speaker at security conferences around the world, including CanSecWest, BlackHat and Recon. Alexander served as a program chair of the USENIX Workshop on Offensive Technologies and is one of the founders of the Pwnie Awards.

Matthieu Suiche

Matthieu Suiche is a security researcher who focuses on reverse code engineering and volatile memory analysis. His previous researches/utilities include Windows hibernation file, Windows physical memory acquisition (Win32dd/Win64dd), Mac OS X Physical Memory Analysis and LiveCloudKd which is an utility that makes possible to dump the memory and to debug an Hyper-V Virtual Machine from the Host even if the debug mode is not activated. Matthieu has been a speaker at various security conferences such as PacSec, BlackHat USA, EUROPOL High Tech Crime Meeting, Shakacon, CanSecWest etc. Prior to starting MoonSols in 2010 (a computer security and kernel code consulting and software company), Matthieu worked for companies such as E.A.D.S. (European Aeronautic Defence and Space Company) and the Netherlands Forensics Institute of the Dutch Ministry of Justice.

Marc "van Hauser" Heuse

Marc "van Hauser" Heuse is the founder of The Hacker's Choice ( and author of the thc-ipv6 IPv6 attack suite. Since 2006 he researches IPv6 for security issues and reports vulnerabilities for all major OS on a regular basis. He also spoke at numerous conferences about his findings, e.g. CansecWest, Pacsec, Hack-in-the-Box, CCC Congress, etc. He is also known for the famous tools hydra, amap and THC-Scan among others. Marc is an independant security reseacher and consultant.

He is performing security research on IPv6 since 2005 and has spoken on many conferences on this topic since then, among these are the CCC congress (Germany), Cansecwest (Canada), PacSec (Japan) and many more international conferences, and additionally has programmed the solely available pentest toolkit for ipv6: the thc-ipv6 protocol attack suite.

In 1995 he founded the renowned security research group "The Hacker's Choice", which was the first group to e.g. crack A5 GSM in 2006 within a minute. Since 1997 he is working as a security consultant in the top-5 enterprise consultant companies, since 2007 he is working as an independant security consultant.

Sebastian Porst

After finishing his Masters degree in Computer Science in 2007, Sebastian joined zynamics GmbH as lead developer of the reverse BinCrowd, and the malware PDF analysis tool PDF Inspector. After four years of working at zynamics, Sebastian moved on to become a vulnerability researcher on a joint project between Microsoft and Adobe that focuses on improving the security of Adobe products. Sebastian has been a speaker at various IT security conferences including CanSecWest, SOURCE Barcelona, RECon, Hack in the Box, and

Mariano Nunez Di Croce

Director of research and development for Onapsis.

Mark Schoenefeld

Marc Schönefeld came first into contact with computers by exposure to a C64. Since then he is infected by bits and bytes. He studied Business Informatics and joined a banking computer centre in 1997 where he worked as Software Security Architect. In 2007 he joined the Red Hat Security Response Team. Early 2010 he graduated with a Dr. rer. nat. degree in computer science (comparable to PhD). He spoke about Java Bytecode Security at Blackhat 2002, since then he also spoke and gave trainings at the major conferences like CanSecWest, Blackhat, RSA, PacSec, XCon, Confidence , HITB and Java One. He wrote a book about Java security, showing attack and defense techniques on the JDK and Java software. He is member of the Oracle Java Vulnerability Team.

Joseph Karpenko

Joseph Karpenko is a Senior Security Engineer in Cisco's Security Research and Operations Group. Joseph is a 12-year veteran of technology with expertise in networking, security, data center, and the systems administration fields. Currently Joseph is responsible for developing security solutions that deter, detect, and prevent existing, current, and emerging threats and attacks. Throughout his career, Joseph has presented security topics at various industry events (BayThreat, Black Hat, CanSecWest, Cisco Live USA and Europe). During his career, Joseph has worked with customers on the design and implementation of large-scale enterprise and data center network and security architectures. Prior to joining Cisco, Joseph worked as a system administrator and senior escalation engineer handling and troubleshooting complex security and network incidents.

Randy Ivener

Randy Ivener, CCIE No. 10722 Emeritus, is a Security Manager with Cisco's Security Research and Operations Group. Randy has spent many years as a network security specialist helping companies secure their networks. Randy has presented security topics at industry events such as Blackhat and Cisco Live. Before becoming immersed in information security, he served in the Navy and spent time in software development and as a training instructor.

Peter Silberman

Peter Silberman works at MANDIANT on the research and development team. For a number of years, Peter has specialized in offensive and defensive kernel technologies, reverse engineering, and vulnerability discovery. He enjoys automating solutions to problems in the domain of reverse engineering and analysis. Although he is college educated, Peter does not believe formal education should interfere with learning.

Jamie Butler

Jamie Butler is a highly respected member of the information security community with over a decade of experience in Windows operating system security. Mr. Butler is a Director at MANDIANT and leads the agent team on the MIR product. Prior to joining MANDIANT, Jamie was the CTO of Komoku, Inc. His experience also includes Windows Host Intrusion Detection development at Enterasys Networks and over five years experience at the National Security Agency. Mr. Butler is also co-author of the bestseller, "Rootkits: Subverting the Windows Kernel." (Addison-Wesley, 2005). In addition, Jamie has authored numerous papers and is a frequent speaker at computer security conferences. He is the co-author and instructor of the popular courses Advanced 2nd Generation Digital Weaponry, Offensive Aspects of Rootkit Technology, and Advanced Memory Forensics in Incident Response.

Nicolas Bareil

Nicolas Bareil is a research security engineer at EADS Innovation Works. He is the author of many layers in scapy. He likes contributing patches in security tools and in the Linux kernel.

Dino Dai Zovi

Dino Dai Zovi, currently an independent security consultant and researcher, has been working in information security for over 9 years with experience in red teaming, penetration testing, software security, information security management, and cybersecurity R&D. Mr. Dai Zovi is also a regular speaker at information security conferences having presented his independent research on memory corruption exploitation techniques, 802.11 wireless client attacks, and Intel VT-x virtualization rootkits over the last 10 years at conferences around the world including DEFCON, BlackHat, and CanSecWest. He is a co-author of the books "The Mac Hackers Handbook" (Wiley, 2009) and "The Art of Software Security Testing" (Addison-Wesley, 2006). In 2008, eWEEK named him one of the 15 Most Influential People in Security. He is perhaps best known in the information security and Mac communities for winning the first PWN2OWN contest at CanSecWest 2007.

Michael Eddington

Michael Eddington is the Chief Technical Officer at Deja vu Security LLC and its Principal Consultant. He has over ten years of experience in providing security services to Fortune 500 companies in the US. Michael is a recognized thought leader in the fields of application security, network security, threat modeling, and fuzz testing. He routinely speaks and provides training at the top security conferences including CanSecWest, Blackhat and RSA.

Michael is a passionate leader in the open-source security development community, contributing to projects including Trike (Threat Modeling), Outlook Privacy plug-in, and Peach Fuzz. Michael is the creator of the widely used Peach Fuzzing framework which is used by many top technology companies to find complex security vulnerabilities. His current research efforts are pushing security vulnerability testing and fuzzing to the next level with innovative tools and techniques.

Aaron Portnoy

Aaron Portnoy is the VP of Research and a co-founder of Exodus Intelligence where he spends most of his time discovering and exploiting vulnerabilities in widely-deployed enterprise and consumer software. Aaron specializes in reverse engineering and has given numerous presentations on the topic, most recently on the project he authored that won the 2012 Hex-Rays IDA Pro Plugin Contest. Prior to Exodus, Aaron was the manager of security research at the Zero Day Initiative and was responsible for architecting and overseeing the Pwn2Own contest since its inception.

Zef Cekaj

Zef Cekaj is a security researcher specializing in vulnerability reversing and discovery. He has reversed and documented hundreds of vulnerabilities and has a history of vehemently arguing with vendors over email regarding exploitability of bugs in their products. Consequently, he enjoys winning such arguments by demonstrating exploits on live systems.

His primary interests are in the exploitation of server side vulnerabilities and mitigation circumvention. Zef is a founding member of Exodus Intelligence (Exodus Intel Website) where his primary duties include vulnerability discovery and analysis.

Mike Murray

A managing partner of MAD Security and the lead instructor of The Hacker Academy. Mike has focused his career on the offensive side of security, having started as a penetration tester and vulnerability researcher during the dot-com boom of the 1990s. In more than a decade in the industry, he has lead penetration testing, vulnerability research and social engineering teams in engagements against some of the largest and most advanced clients in the industry. His expertise in building penetration test teams and delivering large-scale and highly technical penetration tests will lead students in this class to understand far more about the process of penetration testing than they ever thought possible.

Stephen A. Ridley

Stephen A. Ridley is a security researcher with more than 10 years of experience in software development, software security, and reverse engineering. Before becoming an independent researcher, Mr. Ridley served as Senior Researcher at Matasano. Prior to that: Senior Security Architect at McAfee, and before that he was a founding member of ManTech International's Security and Mission Assurance (SMA) where he did vulnerability research and reverse engineering in support of the U.S. intelligence community. He has spoken about reverse engineering and software security at BlackHat, ReCon,EuSecWest, Syscan and others. Mr. Ridley currently lives in Manhattan and frequently guest lectures at New York area universities such as NYU and Rensselaer Polytechnic Institute.

Stephen Lawler

Stephen Lawler is the Founder and President of a small computer software and security consulting firm. Mr. Lawler has been actively working in information security for over 7 years, primarily in reverse engineering, malware analysis, and exploit development. While working at Mandiant he was a principal malware analyst for high-profile computer intrusions affecting several Fortune 100 companies.

Prior to this, as a founding member of ManTech International's Security and Mission Assurance (SMA) division he discovered numerous 0-day vulnerabilities in COTS software and pioneered several exploitation techniques that have only been recently published.

Prior to his work at ManTech, Stephen Lawler was the lead developer for the AWESIM sonar simulator as part of the US Navy SMMTT program.

James "egyp7" Lee

egypt is a software developer for Rapid7 where he is a core developer for the Metasploit Framework. Before devoting all his time to Metasploit, he was a Cybersecurity researcher for Idaho National Laboratory where he discovered numerous vulnerabilities in SCADA and Industrial Control Systems. egypt has presented at Defcon, BSidesLV, Blackhat, Derbycon and other venues. Note that egypt is not Egypt. The two can be distinguished easily by their relative beards Egypt has millions, while egypt only has the one.

Rob "mubix" Fuller

mubix is a Senior Red Teamer. His professional experience starts from his time on active duty as United States Marine. He has worked with devices and software that run gambit in the security realm. He has a few certifications, but the titles that he holds above the rest is FATHER, HUSBAND and United States Marine

Patrick Szeto

Patrick Szeto is a Senior Security Consultant at Security Compass with extensive background in information security spanning over a decade. He is a specialist in application security reviews, source code analysis and secure coding methodologies. Patrick has brought this expertise to the mobile application security space through security assessments, research and training. Patrick's portfolio of experience includes comprehensive security reviews for institutions in the financial, energy, insurance, medical, travel, retail, entertainment, telecommunications and software markets

Subu Ramanathan

Subu Ramanathan is a Senior Security Consultant at Security Compass. With his wide array of experience in the application security space, Subu plays a valuable part in Security Compasses Software and Enterprise Assessment Service practice. He is a senior application security professional with extensive experience in secure SDLC, application security assessments, framework level threat models and security source code reviews. Subu is also a secure software application development SME with experience in developing content for multiple ASP.NET secure development courses including SANS DEV544. Subu also spearheads Security Compass's mobile application security service offering.

Subu brings to the table relevant experience in rendering exceptional quality application security services to the financial, energy, consumer business and telecommunication sectors. His experience in leading various teams, both onshore and offshore, combined with his core technical background are his most valuable assets. Subu is also an integral part of Security Compass's training services. In addition to developing and teaching Security Compass's Building Secure Web Applications in ASP.NET, Subu regularly teaches courses in Exploiting and Defending Web Applications, Advanced Application Attacks and Mobile Hacking to Security Compass's client across the globe.

Dmitry Nedospasov

Dmitry Nedospasov is a PhD student and researcher in the field of IC security at the Security in Telecommunications (SECT) research group at the Berlin University of Technology (TU Berlin) and the Telekom Innovation Laboratories. Dmitry's research interests include hardware and IC reverse-engineering as well as physical attacks against ICs and embedded systems. His academic research focuses on developing new and novel techniques for semi and fully-invasive IC analysis. Most recently, Dmitry was involved in identifying vulnerabilities in the most wide-spread Phyiscally Unclonable Function (PUF) schemes.

Thorsten Schroeder

Thorsten Schroder has been active as a technical consultant in the field of applied IT-Security for many years. His areas of expertise lie in the verification of software in either source or binary form. More recently, Thorsten's research has resulted in several open source hardware projects, most notably the "Keykeriki", an RF-analysis tool for sniffing and attacking 2.4GHz based radio devices such as wireless keyboards. Thorsten has also been involved in several software reverse-engineering projects such as the CCC's analysis of the German Federal Trojan known as "0zapftis". Thorsten is the co-founder of the Swiss modzero AG, established in 2011, as well as the German branch, modzero GmbH, established in January 2013.

Stefan Esser

Stefan Esser, is a German security researcher. He developed Antid0te, an ASLR for jailbroken iPhones in fall 2010, but never released it, because iOS since 4.3 includes an implementation of ASLR. He developed an untethering exploit for iOS 4.3. He gave a version of the exploit that worked on iOS 4.3.1 to the iPhone Dev Team which updated redsn0w and PwnageTool to use it and released the new tools on 4 April 2011. sn0wbreeze was also updated to include his untether. As the vulnerability went unpatched in iOS 4.3.2 and 4.3.3, he updated his code later to support those firmwares. An iOS 4.3-compatible version was never released. His exploit was used in Pangu jailbreak.

Saurabh Harit

Saurabh brings to Security Compass, a strong background in Web Application & Network penetration testing. He has diversified experience in vulnerability assessment and penetration testing across various domains such as access control, building solutions, aerospace, financial services, telecommunications, banking and so on. Additionally, he is also apt in source code review, threat modeling and binary reverse engineering. He has extensively worked on developing methodologies & practices for achieving secure code for various applications, which includes web applications, web services, client / server applications and standalone applications. Saurabh has contributed towards proof of concept exploits and white papers on binary reverse engineering and ethical hacking. Saurabh has delivered security trainings to various fortune 500 clients globally and at reputed security conferences such as BlackHat.

John Butterworth

John Butterworth specializes in low level system security. He is applying his electrical engineering background and firmware engineering background to investigate UEFI/BIOS security. Over the past year his "BIOS Chronomancy" work in a number of venues including NoSuchCon, BlackHat, EkoParty, Breakpoint,, ToorCon, SecTor, and others. This work analyzed an implementation of the Static-Core Root of Trust for Measurement (S-CRTM) and showed how it was not properly measuring the full BIOS before storing that measurement into the TPM. It also showed how even if a full measurement was performed it could still not be trusted, because a "tick" malware could still attach itself to the BIOS and forge measurements. Or a "flea" could infect the BIOS and hop between BIOS revisions to persist. But this work also proposed a solution by doing a better measurement of the BIOS using TPM-timing-based attestation. John is also wrote the initial version of Copernicus (, a tool for checking the security of your BIOS on Windows.

John Bambenek

John Bambenek is Chief Forensic Examiner for Bambenek Consulting and an Incident Handler with the Internet Storm Center. He has been working in security for 15 years researching emerging security threats. He is a published author of several articles, book chapters and one book, and has contributed to IT security courses and certification exams covering subjects such as: penetration testing, reverse engineering malware, forensics and network security. He has participated in many incident investigations spanning the globe. He has spoken in conferences around the world and runs several private intelligence groups focusing on takedowns and disruption of criminal entities.

Georgia Weidman

Georgia Weidman is a penetration tester, security researcher, and trainer. She holds a Master of Science degree in computer science, secure software engineering, and information security as well as holding CISSP, CEH, NIST 4011, and OSCP certifications. Her work in the field of smartphone exploitation has been featured in print and on television internationally. She has presented her research at conferences around the world including Shmoocon, Blackhat, Hack in the Box, and Derbycon. Georgia has delivered highly technical security training for conferences, schools, and corporate clients to excellent reviews. Building on her experience, Georgia recently founded Bulb Security LLC , a security consulting firm specializing in security assessments/penetration testing, security training, and research/development. She was awarded a DARPA Cyber Fast Track grant to continue her work in mobile device security culminating in the release of the open source project the Smartphone Pentest Framework (SPF). She is the author of Penetration Testing: A Hands-on Introduction to Hacking from No Starch Press.

Jay Beale

Jay Beale has created a number of security tools, including Bastille UNIX and the CIS Unix Scoring Tool, both of which have been widely used throughout industry and government. He has served as an invited speaker at many industry and government conferences, a columnist for Information Security Magazine, SecurityPortal and SecurityFocus, and a contributor to nine books, including those in his Open Source Security Series and the "Stealing the Network" series. Jay is the COO at security consulting firm InGuardians.

Adam Laurie
Bluetooth Auditing and Technology

Adam Laurie is Chief Security Officer and a Director of The Bunker Secure Hosting Ltd. He started in the computer industry in the late Seventies, working as a computer programmer on PDP-8 and other mini computers, and then on various Unix, Dos and CP/M based micro computers as they emerged in the Eighties. He quickly became interested in the underlying network and data protocols, and moved his attention to those areas and away from programming, starting a data conversion company which rapidly grew to become Europe's largest specialist in that field (A.L. downloading Services). During this period, he successfully disproved the industry lie that music CDs could not be read by computers, and, with help from his brother Ben, wrote the world's first CD ripper, 'CDGRAB'. At this point, he and Ben became interested in the newly emerging concept of 'The Internet', and were involved in various early open source projects, the most well known of which is probably their own'Apache-SSL'which went on to become the de-facto standard secure web server. Since the late Nineties they have focused their attention on security, and have been the authors of various papers exposing flaws in Internet services and/or software, as well as pioneering the concept of re-using military data centres (housed in underground nuclear bunkers - as secure hosting facilities. Adam has been a senior member of staff at DEFCON since 1997, and also acted as a member of staff during the early years of the Black Hat Briefings.

Dawid Czagan

Dawid Czagan (@dawidczagan) is an internationally recognized security researcher and trainer. He is listed among Top 10 Hackers (HackerOne). Dawid Czagan has found security vulnerabilities in Google, Yahoo, Mozilla, Microsoft, Twitter and other companies. Due to the severity of many bugs, he received numerous awards for his findings.

Dawid Czagan shares his security bug hunting experience in his very well-received hands-on training "Hacking web applications - case studies of award-winning bugs in Google, Yahoo, Mozilla and more". He delivered security training courses at key industry conferences such as Hack In The Box (Amsterdam), CanSecWest (Vancouver), Hack In Paris (Paris), DeepSec (Vienna), HITB GSEC (Singapore), BruCON (Ghent) and for many corporate clients. His students include security specialists from Oracle, Adobe, ESET, ING, Red Hat, Trend Micro, Philips and government sector (recommendations:

He presented his research at Security Seminar Series (University of Cambridge), HITB GSEC (Singapore), DeepSec (Vienna) and published over 20 security articles (InfoSec Institute).

Dawid Czagan is founder and CEO at Silesia Security Lab, which delivers specialized security auditing and training services. He is also Security Advisor at Future Processing.

To find out about the latest in Dawid Czagan's work, you are invited to visit his blog ( and follow him on Twitter (@dawidczagan).

Nikhil Mittal

Nikhil Mittal is a hacker, infosec researcher, speaker and enthusiast. His area of interest includes penetration testing, attack research, defence strategies and post exploitation research. He has 7+ years of experience in Penetration Testing for his clients which include many global corporate giants. He is also a member of Red teams of selected clients. He specializes in assessing security risks at secure environments which require novel attack vectors and "out of the box" approach. He has worked extensively on using Human Interface Device in Penetration Tests and PowerShell for post exploitation. He is creator of Kautilya, a toolkit which makes it easy to use HIDs in penetration tests and Nishang, a post exploitation framework in PowerShell. In his spare time, Nikhil researches on new attack methodologies and updates his tools and frameworks. Nikhil has held trainings and boot camps for various corporate clients (in US, Europe and SE Asia), and at the world's top information security conferences.

Brandon Niemczyk

Brandon Niemczyk was born in Chicago. He has been writing code since he was a child with his first 386 modifying the QBASIC game gorillas.bas. He later moved on to write GIS software in Orlando, FL and then wandered into information security after a brief stint writing accounting software. His interests are machine learning, mathematics, motorcycles, games, reverse engineering, and family. Brandon has spoken at multiple information security conferences about machine learning, security, and privacy. Basically, he's a nerd.

Xeno Kovah

Xeno Kovah is interested in stealth malware. Specifically how it can lie to a system, and what trusted computing tools can be leveraged to not allow the system to lie. He has led Windows security and BIOS security projects along this theme. In 2015 he co-founded LegbaCore with Corey Kallenberg to focus full time on low level attacks and defense. Xeno is the founder of, and current leading contributor, having posted 8 days of classes on deep system security (x86 assembly & architecture, PE and ELF binary executable formats, and rootkit detection), with an additional 2 day class on Intel TXT (Trusted Execution Technology) to be added soon. Xeno is also a little bit broke in the brain, in that way that makes him feel the need to collect things. Most recently he has taken to collecting conference speaker's badges. He has presented at BlackHat USA/EUR, IEEE S&P, ACM CCS, Defcon, CanSecWest, PacSec, Hack in the Box KUL, Microsoft BlueHat, Shmoocon,, NoSuchCon, SummerCon, ToorCon, DeepSec, VirusBulletin, MIRCon, AusCERT, Trusted Infrastructure Workshop, NIST NICE Workshop, DOD Information Assurance Symposium, and MTEM.

Corey Kallenberg

Corey Kallenberg is a security researcher who has spent several years investigating operating system and firmware security on Intel computers. In 2012, he co-authored work on using timing-based attestation to detect Windows kernel hooks. In 2013, he helped discover critical problems with current implementations of the Trusted Computing Group's "Static Root of Trust for Measurement." Later, he discovered several vulnerabilities which allowed bypassing of "signed BIOS enforcement" on a number of systems, allowing an attacker to make malicious modifications to the platform firmware. In 2014, after breaking UEFI Secure Boot, Corey turned his attention to UEFI firmware updates and discovered a prolific UEFI reflash vulnerability affecting most UEFI systems. Corey's firmware attacks have been presented internationally at the top industry and academic conferences. Corey is currently continuing to research the security of UEFI and the Intel architecture.

Geoffrey Vaughan

Geoffrey is an IT Security Consultant with Security Compass, an industry leading information security firm that provides professional services and training to security-conscious companies. Geoff brings a unique mix of experiences in IT security and technology education. Geoff is a well-seasoned computer science educator having taught eager technology learners at all levels of learning, from university students, corporate clients, high school students, and even students in prison. As an IT Security Consultant Geoff has extensive experience working with Tier 1 Financial Institutes and Fortune 500 companies helping them find, fix, and prevent security risks throughout their companies.

Pratik Amin

Pratik is a security consultant at Security Compass. He has spent the last five years working on a wide array of security projects focusing on infrastructure reviews and mobile assessments. He has also worked on mobile security projects for several industries such financial services, banking, energy and entertainment industry. While working on projects he has had the opportunity to assess emerging technologies such as NFC, Secure Element Storage and IoT products. He has worked extensively internally at Security Compass in helping develop methodology and train internal staff members.

Blessen Thomas

Blessen Thomas is an Independent Security Researcher & Security Consultant working in EY where he delivers Web Application Penetration Test, Mobile Penetration Test (iOS and Android platform), Vulnerability Assessment and Network Penetration Test for several enterprise companies and financial institutions. He is a B.Tech in Information Technology from Anna University and holds certifications such as OSCP - Offensive Security Certified Professional, C|EH - EC-COUNCIL Certified Ethical Hacker and C|HFI - Computer Hacking Forensics Investigator. He has been listed and acknowledged in various “HALL OF FAMES” for various companies such as Sony, Kayako, Appcelerator, Hotgloo, Meldium, Splunk and many more for responsible disclosure. He is a Synack Red Team Security Researcher and an active contributor for the OWASP Mobile Testing Guide Project. He has been a speaker in Hackbeach 2015 conference. His research has been accepted into various security conferences like OWASP Appsec Europe, Italy 2016, RootCon, Philippines 2016 etc. He spends his leisure time exploring security tools, fuzzing, playing drumkit.

Gordon Gonsalves

Gordon Gonsalves is a Certified Ethical hacker & ECSA from EC-Council and a Microsoft certified technology specialist. He has more than 10 years’ experience in IT, network and applications security testing and has been a speaker and trainer in INTEROP conference, India. His research has been accepted into various security conferences like OWASP Appsec Europe 2016, RootCon 2016 etc. He is interested in exploring security tools and enhancing security testing.