Archives: Speakers

zalbeniz
Ziyahan Albeniz

In today’s world, nested services apparently make our life easier. You can easily log in a service by using an account you already have; you can synchronize your devices with easily with one shared account. However, the attack surface gets bigger and bigger. Many companies’ bounty programs exclude CSRF and especially don’t accept Login/Logout CSRF….

Bio Details →
Nikita Tarakanov
Nikita Tarakanov
Nikita Tarakanov Independent Security Researcher Biography Nikita Tarakanov is security researcher, who has worked for Intel, Positive Technologies, VUPEN Security, CISS and independently. He likes writing exploits, especially for Windows NT Kernel and won the PHDays Hack2Own contest in 2011 and 2012. He also tried to hack Google Chrome during Pwnium 2 at HITB2012KUL but...
Bio Details →
Ignat
Ignat Korchagin

USB/IP is a framework for sharing USB devices over the network: it encapsulates USB I/O messages into TCP/IP payloads and transmits them between network-connected hardware. This way, USB devices, plugged into one machine, appear as if they are plugged into another connected machine and can be used without any additional drivers or software. Being part…

Bio Details →
Daniel Bohannon
Daniel Bohannon

Biography Daniel Bohannon is a Senior Incident Response Consultant at MANDIANT with over six years of operations and information security experience. His particular areas of expertise include enterprise-wide incident response investigations, host-based security monitoring, data aggregation and anomaly detection, and PowerShell-based attack research and detection techniques. As an incident response consultant, Mr. Bohannon provides emergency…

Bio Details →
AbdulAziz Hariri
AbdulAziz Hariri

The inclusion of 3rd party components into large applications has become a common practice in modern software. Vendors would obviously benefit from the features they get without the need to invest costly engineering effort. However, leveraging 3rd party components for a quick functionality boost comes with security side effects that might not be understood by…

Bio Details →
Jasiel
Jasiel Spelman

The inclusion of 3rd party components into large applications has become a common practice in modern software. Vendors would obviously benefit from the features they get without the need to invest costly engineering effort. However, leveraging 3rd party components for a quick functionality boost comes with security side effects that might not be understood by…

Bio Details →
moti-circle
Moti Joseph
Moti Joseph Security Researcher https://twitter.com/gamepe Biography Moti Joseph is currently an independent security researcher. He was Senior Security Researcher with the Vulnerability Research Lab (VRL) of COSEINC. He has been involved in computer security since 2000 and has been working on reverse engineering exploit code and developing security products for CheckPoint and WebSense Secuirty Labs....
Bio Details →
Onur Alanbel
Onur Alanbel
Onur ALANBEL Security Researcher http://twitter.com/onuralanbel Biography Onur Alanbel is an application security researcher whose main focus is developing tools to solve binary analysis problems in addition to write exploits. He graduated from Izmir Institute of Technology, Department of Computer Engineering. He worked for BGA Bilgi Güvenliği Akademisi as an application security specialist between 2013 and...
Bio Details →
Celil Unuver
Celil Ünüver

Biography Celil Unuver is co-founder and principal researcher of TRAPMINE Inc. Prior to founding TRAPMINE, Celil has worked as vulnerability researcher, malware analyst and independent security researcher for several organizations. His areas of expertise include vulnerability research, SCADA security and reverse engineering. He enjoys hunting software bugs and has discovered many critical vulnerabilities in widely…

Bio Details →
mehmet
Mehmet Ince
Mehmet İnce Security Researcher http://pentest.blog Biography Mehmet INCE still continues his duty as the Senior Penetration Tester of PRODAFT / INVICTUS. İnce is known to be involved in the field of cyber security since 2004. Especially, he has been recognized with his researches and experience in web applications/servers. He has also worked in a wide...
Bio Details →
back to top