Personal Information
Organization / Workplace
San Francisco Bay Area, California United States
Occupation
Senior Security Consultant
Industry
Technology / Software / Internet
Website
decal.sdf.org
About
Latest research paper: "Tickling CGI Problems"
Latest conference talk: "IPv6 Addressing Polymorphs and What's on the DNS Horizon.."
Previous conference talk: "Uncloaking IP Addresses on IRC"
CanSecWest 2009 Panel: "Binary Clone Wars"
Tags
security
cryptography
blockwatch
anti-virus
merkle hash trees
tiger
callaway
derek
derek callaway
infosec
forward secrecy
key exchange
university of arizona
curve22519
elleptic-curve
diffie-hellman
non-repudiation
integrity
digital signatures
cryptopp
malware
metamorphic
nist
hashdeep
polymorphism
packers
binary analysis
admmutate
message digest
information assurance
signature
equations
synthetic
genome
polymerase
chain
oligonucleotide
pcr
reaction
dna
primer
nucleotide
computing
intelligence
amsat
winlink
signals
satellite
sigint
packet
sdr
amateur
radio
nanticoke
ham
club
rfc1459
rfc1413
rfc2628
rfc1918
ircv3
sasl
irc
privacy
addresses
ip
on
uncloaking
md5
all in the family
3.0
kentucky
louisville
derbycon
static analysis
technical writing
gray box
white box
black box
project
testing
whitepaper
cycle
software
life
udel
sdlc
design
university of delaware
sdl
test
english
httpd
apache
shane macaulay
security objectives corporation
rain forrest puppy
expect
phrack
lyris list manager
cgi.tcl
tclhttpd
web
tk
cgi
tcl
application
See more
Presentations
(4)Documents
(4)Likes
(33)Check Your Privilege (Escalation)
Bishop Fox
•
5 years ago
Ferris Bueller’s Guide to Abuse Domain Permutations
Bishop Fox
•
5 years ago
Exploiting Deserialization Vulnerabilities in Java
CODE WHITE GmbH
•
8 years ago
Operating Systems - A Primer
Saumil Shah
•
12 years ago
All The Little Pieces
Andrei Zmievski
•
14 years ago
The Good, the Bad, and the Ugly: What Happened to Unicode and PHP 6
Andrei Zmievski
•
13 years ago
Andrei's Regex Clinic
Andrei Zmievski
•
13 years ago
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
Soroush Dalili
•
5 years ago
Cache Money Business
Mark Jaquith
•
9 years ago
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
HackIT Ukraine
•
6 years ago
Thotcon0x9 Presentation: Climb the infosec skill tree by revisiting past CVEs
Sandra Escandor-O'Keefe
•
5 years ago
A Forgotten HTTP Invisibility Cloak
Soroush Dalili
•
6 years ago
Waf bypassing Techniques
Avinash Thapa
•
7 years ago
XXE Exposed: SQLi, XSS, XXE and XEE against Web Services
Abraham Aranguren
•
9 years ago
SSL Pinning and Bypasses: Android and iOS
Anant Shrivastava
•
8 years ago
Rooting your internals - Exploiting Internal Network Vulns via the Browser Using BeEF Bind
Michele Orru
•
11 years ago
Bot Trends 2017
David Pichsenmeister
•
7 years ago
Bot Boom: What marketers need to know about chatbots now - Erin Bury - Tech Forum 2018
BookNet Canada
•
6 years ago
Will your intranet be replaced with a (chat) bot?
Thomas Maeder
•
6 years ago
React Native: How It Works
Blagoja Evkoski
•
6 years ago
Cross-Platform App Development with Flutter, Xamarin, React Native
Korhan Bircan
•
6 years ago
A tour of React Native
Tadeu Zagallo
•
7 years ago
React native by example by Vadim Ruban
Lohika_Odessa_TechTalks
•
6 years ago
Ruby on Rails Penetration Testing
3S Labs
•
9 years ago
50 data principles for loosely coupled identity management v1 0
Ganesh Prasad
•
10 years ago
X-XSS-Nightmare: 1; mode=attack XSS Attacks Exploiting XSS Filter
Masato Kinugawa
•
8 years ago
Hacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Imperva
•
7 years ago
In depth understanding network security
Thanawan Tuamyim
•
10 years ago
Linux Security for Developers
Michael Boelen
•
8 years ago
DNA Based Computing
Rohit Srivastava
•
9 years ago
Personal Information
Organization / Workplace
San Francisco Bay Area, California United States
Occupation
Senior Security Consultant
Industry
Technology / Software / Internet
Website
decal.sdf.org
About
Latest research paper: "Tickling CGI Problems"
Latest conference talk: "IPv6 Addressing Polymorphs and What's on the DNS Horizon.."
Previous conference talk: "Uncloaking IP Addresses on IRC"
CanSecWest 2009 Panel: "Binary Clone Wars"
Tags
security
cryptography
blockwatch
anti-virus
merkle hash trees
tiger
callaway
derek
derek callaway
infosec
forward secrecy
key exchange
university of arizona
curve22519
elleptic-curve
diffie-hellman
non-repudiation
integrity
digital signatures
cryptopp
malware
metamorphic
nist
hashdeep
polymorphism
packers
binary analysis
admmutate
message digest
information assurance
signature
equations
synthetic
genome
polymerase
chain
oligonucleotide
pcr
reaction
dna
primer
nucleotide
computing
intelligence
amsat
winlink
signals
satellite
sigint
packet
sdr
amateur
radio
nanticoke
ham
club
rfc1459
rfc1413
rfc2628
rfc1918
ircv3
sasl
irc
privacy
addresses
ip
on
uncloaking
md5
all in the family
3.0
kentucky
louisville
derbycon
static analysis
technical writing
gray box
white box
black box
project
testing
whitepaper
cycle
software
life
udel
sdlc
design
university of delaware
sdl
test
english
httpd
apache
shane macaulay
security objectives corporation
rain forrest puppy
expect
phrack
lyris list manager
cgi.tcl
tclhttpd
web
tk
cgi
tcl
application
See more