5 hackers make a mark for world security 2006
In the global security eye, 2006 was the year of zero-day attacks and malicious code. But 2006 was also the year of the community of security research and hacker goodwill.
In the global security eye, 2006 was the year of zero-day attacks and malicious code. But 2006 was also the year of the community of security research and hacker goodwill.
This community has contributed a lot of effort in detecting and announcing deadly security errors. They not only helped software vendors detect errors, but also put pressure on them to react faster in troubleshooting security bugs to protect users.
And they are the same people who have contributed to the "boat" to study the security of a completely new "ocean".
EWeek Magazine has voted and published a list of the 5 most representative faces of the security industry in 2006. These are also the characters who laid the foundation for important industry innovations in 2007.
HD Moore
HD Moore
HD Moore has become a familiar name among global hackers. And perhaps he is equally famous as music stars.
As a security researcher and error-prone expert, HD Moore has built the Metasploit Framework project, which provides advanced penetration testing tools for research professionals. Professional security rescue.
Over the past year, Moore has created a new open source attack testing tool with tricks to automate script-based security exploits, simplifying the process of writing error-exploiting and enhancing code. performance reuse code exploiting security bugs.
Some of Moore's research projects have garnered much attention from the community over the past year as the Month of Browser Bugs and the monthly project of security bugs (Month of Kernel Bugs).
The monthly project of browser security flaws has helped detect a lot of bugs in today's popular web browsers and discovered how to use Google to search for hackers' source code.
Meanwhile, the Monthly Security Project has helped to detect deadly Wi-Fi driver security flaws in a range of wireless devices and a host of other serious kernel-level errors.
Whether you love or hate Moore, you still have to admit one thing: "Moore's skill is really amazing." Hackers greatly appreciate that skill, while security firms condemn Moore.
Moore's success has been repeatedly mentioned in newspaper pages and it was these successes that laid a solid foundation for this security study in 2007.
Jon "Johnny Cache" Ellch and David Maynor
Jon "Johnny Cache" Ellch
At the Black Hat Briefings conference held in Las Vegas (USA) last year, Jon "Johnny Cache" Ellch joined David Maynor, a former security researcher at SecureWorks, to warn about security errors. can be exploited in the wireless device driver software.
The presentation by the two researchers sparked a wave of doubts about the Wi-Fi safety of Macs and the "wave" that revealed a host of other wireless security flaws that so far. has not been overcome.
For Ellch and Maynor, such presentations are a double-edged sword. They were condemned by Apple and SecureWorks because the two companies could not control the process of announcing their security flaws and could not force them to follow the pro-security process.
David Maynor
And at some corner of the blogosphere, Ellch and Maynor were also condemned when they dared to say that the Mac PC was no longer safe. This goes against the thought that is deeply ingrained in the user world: " PC Mac is very safe ."
Security researchers greatly appreciate Ellch and Maynor's work. They are honored and named in the list of people who laid the groundwork for the project's monthly bugs with HD Moore. Their most outstanding contribution was the discovery of a Wi-Fi wireless device driver security error.
Maynor later decided to leave SecureWorks and set up herself, security firm Errata Security, which provides security advice and security testing tools.
Mark Russinovich
Mark Russinovich
Before Mark Russinovich announced Sony BMG's digital music piracy software scandal using high-end fingerprint technology inherent in the types of malware, the world had never known "rootkits." Perhaps at that time the rootkit was still just a term of the security industry.
But now that term has become a familiar word for most users and has also become a marketing term for many security software vendors.
That helped to strengthen Russinovich's position as a senior expert in depth Windows security.
The scandal Sony BMG Rootkit also contributed to the alarm ring about the majority of security software vendors still not aware of the dangers of technology applications hiding extremely dangerous rootkits. Pressure from the public and the user community has forced them to quickly add to existing products.
Russinovich has now become a Microsoft employee after the world's number one software company bought the company where he worked - Sysinternals.
Russinovich won the whole year 2006 to continue the work of developing malware hunting tools with rootkit applications and warning the world about this extremely malicious technology.
Joanna Rutkowska
Joanna Rutkowska
This Polish security researcher has become a focus of the Black Hat Briefings Conference 2006 with the presentation of completely new research results on a new type of rootkit malware that is considered "invisible". .
In her presentation before the conference, Joanna Rutkowska bluntly stated that even Windows Vista's new device driver sign mechanism was hard to prevent from discovering her new malware. She even demonstrated how to remove Vista's mechanism to inject malware into the operating system.
In addition, Rutkowska also introduced the Blue Pill virtual machine rootkit mechanism, claiming to be 100% invisible rootkit, even for 64-bit Windows systems.
In the past year, Rutkowska has also repeatedly pointed out deadly weaknesses in antivirus security software and warns operating system operating companies that their products are not fully ready to apply virtual technology. hardware chemistry.
Joanna Rutkowska identified the threat that security software has the ability to hide herself from an operating system that will continue to be the biggest security threat.
Trang Dung
- Why do hackers like to wear hooded shirts, sitting in the dark?
- Microsoft opens its own website for hackers
- Security software is about to turn into the main target of hackers
- Transform, fragment, hide: new mantra for hackers
- Web site hacker world No. 1 was ... hacked
- QuickTime 'abetted' hackers to attack users
- Samba error opens the door for hackers to attack Mac
- Hackers spread malicious code to attack Winamp
- Users are the central target of hackers
- See network security struggles like the front
What is the Snapdragon SiP chip? How to create a yellow circle around the mouse cursor on Windows Edit the Boot.ini file in Windows XP 3 ways to restart the remote computer via the Internet Vietnam computer market: Looking back a year How to restore deleted applications on Android How to increase the capacity of C drive on Windows 10, 8, 7 ... 8 security features of Windows operating system