XFORCE

zip

IRL Name: 
Neel Mehta
Biography: 

Accredited for finding numerous vulnerabilities for IBM Internet Security Systems; while working on their team code named XFORCE. He is now a Google Engineer.

Examples of vulnerabilities worked on: (either by himself or with his group):
Found Heap based buffer overflow of Common Management Agent
ClamAV Library Remote Heap Overflows Security Advisory
Multiple Remote Vulnerabilities in BIND4 and BIND8

Most famous for his skills with Reverse Engineering, finding the Heartbleed bug and binary source code auditing.

References

duke

IRL Name: 
Mark Dowd
Biography: 

Accredited for finding numerous vulnerabilities for IBM Internet Security Systems; while working on their team code named XFORCE.

Found Adobe flash player invalid pointer vulnerability, as well as buffer overflows in the following software: Sendmail, Microsoft Exchange, OpenSSH, Internet Explorer, Mozilla, Checkpoint VPN, and Windows Encryption software.

Proved that you can exploit NULL pointer dereferences in applications coded in high-level programming languages.

Pictures: 
References
Syndicate content