Michał Zalewski

For people with similar names, see Michael Zalewski (disambiguation).

Michał Zalewski (born 19 January 1981), also known by the user name lcamtuf is a "white hat" hacker, computer security expert from Poland and a former Google Inc. employee.

He has been a prolific vulnerability researcher and a frequent Bugtraq poster since the mid-1990s, and has authored a number of programs for Unix-like operating systems. In 2005, Zalewski authored Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks, a computer security book published by No Starch Press and subsequently translated into a number of languages. In 2011, Zalewski authored The Tangled Web: A Guide to Securing Modern Web Applications, also published by No Starch Press.

For his continued research on browser security, he was named one of the 15 most influential people in security[1] and among the 100 most influential people in IT.[2]

Zalewski was one of the original creators of Argante, a virtual open source operating system. Among other projects, he also created p0f and American fuzzy lop.

Reported bugs

  • "Manipulation of framed content can allow cross-site scripting". Opera Advisories. Archived from the original on January 28, 2012. Retrieved January 24, 2012.
  • "CA-2003-25 Buffer Overflow in Sendmail". CERT Advisories. Retrieved August 22, 2005.
  • "CA-2003-12 Buffer Overflow in Sendmail". CERT Advisories. Retrieved August 22, 2005.
  • "CA-2001-09 Statistical Weaknesses in TCP/IP Initial Sequence Numbers". CERT Advisories. Retrieved August 22, 2005.
  • "VU#945216 SSH CRC32 (...) Contains Remote Integer Overflow". CERT Advisories. Retrieved August 22, 2005. This vulnerability made an appearance[3] on The Matrix Reloaded.
  • "VU#965206 Microsoft Internet Explorer (...) vulnerable to buffer overflow". CERT Advisories. Retrieved August 22, 2005.
  • "VU#984473 Microsoft Internet Explorer contains overflow in processing script action handlers". CERT Advisories. Retrieved August 22, 2005.
  • Firefox wyciwyg:// cache vulnerability

References

  1. "15 Most Influential People in Security Today". Retrieved December 11, 2008.
  2. "100 Most Influential People in IT". Retrieved December 11, 2008.
  3. "Matrix Sequel Has Hacker Cred". Retrieved August 29, 2016.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.