5 hackers make a mark for world security 2006

In the global security eye, 2006 was the year of zero-day attacks and malicious code. But 2006 was also the year of the community of security research and hacker goodwill.

This community has contributed a lot of effort in detecting and announcing deadly security errors. They not only helped software vendors detect errors, but also put pressure on them to react faster in troubleshooting security bugs to protect users.

And they are the same people who have contributed to the "boat" to study the security of a completely new "ocean".

EWeek Magazine has voted and published a list of the 5 most representative faces of the security industry in 2006. These are also the characters who laid the foundation for important industry innovations in 2007.

HD Moore

Picture 1 of 5 hackers make a mark for world security 2006

HD Moore

HD Moore has become a familiar name among global hackers. And perhaps he is equally famous as music stars.

As a security researcher and error-prone expert, HD Moore has built the Metasploit Framework project, which provides advanced penetration testing tools for research professionals. Professional security rescue.

Over the past year, Moore has created a new open source attack testing tool with tricks to automate script-based security exploits, simplifying the process of writing error-exploiting and enhancing code. performance reuse code exploiting security bugs.

Some of Moore's research projects have garnered much attention from the community over the past year as the Month of Browser Bugs and the monthly project of security bugs (Month of Kernel Bugs).

The monthly project of browser security flaws has helped detect a lot of bugs in today's popular web browsers and discovered how to use Google to search for hackers' source code.

Meanwhile, the Monthly Security Project has helped to detect deadly Wi-Fi driver security flaws in a range of wireless devices and a host of other serious kernel-level errors.

Whether you love or hate Moore, you still have to admit one thing: "Moore's skill is really amazing." Hackers greatly appreciate that skill, while security firms condemn Moore.

Moore's success has been repeatedly mentioned in newspaper pages and it was these successes that laid a solid foundation for this security study in 2007.

Jon "Johnny Cache" Ellch and David Maynor

Picture 2 of 5 hackers make a mark for world security 2006 Jon "Johnny Cache" Ellch

At the Black Hat Briefings conference held in Las Vegas (USA) last year, Jon "Johnny Cache" Ellch joined David Maynor, a former security researcher at SecureWorks, to warn about security errors. can be exploited in the wireless device driver software.

The presentation by the two researchers sparked a wave of doubts about the Wi-Fi safety of Macs and the "wave" that revealed a host of other wireless security flaws that so far. has not been overcome.

For Ellch and Maynor, such presentations are a double-edged sword. They were condemned by Apple and SecureWorks because the two companies could not control the process of announcing their security flaws and could not force them to follow the pro-security process.

Picture 3 of 5 hackers make a mark for world security 2006

David Maynor

And at some corner of the blogosphere, Ellch and Maynor were also condemned when they dared to say that the Mac PC was no longer safe. This goes against the thought that is deeply ingrained in the user world: " PC Mac is very safe ."

Security researchers greatly appreciate Ellch and Maynor's work. They are honored and named in the list of people who laid the groundwork for the project's monthly bugs with HD Moore. Their most outstanding contribution was the discovery of a Wi-Fi wireless device driver security error.

Maynor later decided to leave SecureWorks and set up herself, security firm Errata Security, which provides security advice and security testing tools.

Mark Russinovich

Picture 4 of 5 hackers make a mark for world security 2006

Mark Russinovich

Before Mark Russinovich announced Sony BMG's digital music piracy software scandal using high-end fingerprint technology inherent in the types of malware, the world had never known "rootkits." Perhaps at that time the rootkit was still just a term of the security industry.

But now that term has become a familiar word for most users and has also become a marketing term for many security software vendors.

That helped to strengthen Russinovich's position as a senior expert in depth Windows security.

The scandal Sony BMG Rootkit also contributed to the alarm ring about the majority of security software vendors still not aware of the dangers of technology applications hiding extremely dangerous rootkits. Pressure from the public and the user community has forced them to quickly add to existing products.

Russinovich has now become a Microsoft employee after the world's number one software company bought the company where he worked - Sysinternals.

Russinovich won the whole year 2006 to continue the work of developing malware hunting tools with rootkit applications and warning the world about this extremely malicious technology.

Joanna Rutkowska

Picture 5 of 5 hackers make a mark for world security 2006

Joanna Rutkowska

This Polish security researcher has become a focus of the Black Hat Briefings Conference 2006 with the presentation of completely new research results on a new type of rootkit malware that is considered "invisible". .

In her presentation before the conference, Joanna Rutkowska bluntly stated that even Windows Vista's new device driver sign mechanism was hard to prevent from discovering her new malware. She even demonstrated how to remove Vista's mechanism to inject malware into the operating system.

In addition, Rutkowska also introduced the Blue Pill virtual machine rootkit mechanism, claiming to be 100% invisible rootkit, even for 64-bit Windows systems.

In the past year, Rutkowska has also repeatedly pointed out deadly weaknesses in antivirus security software and warns operating system operating companies that their products are not fully ready to apply virtual technology. hardware chemistry.

Joanna Rutkowska identified the threat that security software has the ability to hide herself from an operating system that will continue to be the biggest security threat.

Trang Dung