![]() Dan regularly collects detailed data on the health of the worldwide Internet, and recently used this data to detect the worldwide proliferation of a major rootkit. Dan focuses on design level fault analysis, particularly against massive-scale network applications. He is also the only speaker who has attended and spoken at every single Blue Hat Microsoft internal training event. He is best known for his Black Ops series of talks at the well respected Black Hat Briefi ngs conferences. ![]() Previously of Cisco and Avaya, Dan has been operating professionally in the security space since 1999. IOActives consultants are members and active contributors to local and nationally recognized computer security organizations such as SANS, Agora, CRIME, ISSA, CTIN, WSA, HoneyNet Research Alliance, OWASP, and the University of Washington Information Assurance School.ĭan Kaminsky is the Director of Penetration Testing for IOActive. It has also been commissioned to work on IT disaster recovery and business continuity planning for major insurance companies, state organizations and energy companies. The company has helped various Fortune 500 organizations with services ranging from enterprise risk management to independent technical validations of security hardware and a wide range of applications. VEstablished in 1998, IOActive has successfully positioned itself as an industry leader in the Northwests computer security community, where it specializes in infrastructure assessment services, application security services, managed services, incident response services, and education services. Publisher: Andrew WilliamsTechnical Editor: Dan KaminskyProject Manager: Anne McGeePage Layout and Art: SPiįor information on rights, translations, and bulk sales, contact Matt Pedersen, Commercial Sales Director and Rights, at Syngress Publishing email page intentionally left blank Printed in the United States of America1 2 3 4 5 6 7 8 9 0 Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher, with the exception that the program listings may be entered, stored, and executed in a computer system, but they may not be reproduced for publication. Reverse Engineering Code with IDA ProCopyright 2008 by Elsevier, Inc. PUBLISHED BYSyngress Publishing, Inc.Elsevier, Inc.30 Corporate DriveBurlington, MA 01803 Brands and product names mentioned in this book are trademarks or service marks of their respective companies. Syngress: The Defi nition of a Serious Security Library, Mission Critical, and The Only Way to Stop a Hacker is to Think Like One are trademarks of Elsevier, Inc. Syngress Media, Syngress, Career Advancement Through Skill Enhancement, Ask the Author UPDATE, and Hack Proofi ng, are registered trademarks of Elsevier, Inc. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and fi les. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. In no event will Makers be liable to you for damages, including any loss of profi ts, lost savings, or other incidental or consequential damages arising out from the Work or its contents. You may have other legal rights, which vary from state to state. The Work is sold AS IS and WITHOUT WARRANTY. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents. Justin FergusonDan KaminskyJason LarsenLuis MirasWalter PearceĮlsevier, Inc., the author(s), and any person or fi rm involved in the writing, editing, or production (collectively Makers) of this book (the Work) do not guarantee or warrant the results to be obtained from the Work.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |