PACific SECurity - applied security conferences and training in Pacific Asia: CanSecWest | PacSec | EUSecWest |

Security Masters Dojo

Advanced and intermediate security training and technology enhancement for information security professionals.

Security Masters Dojo

Previous Years Instructors/Sensei

Dave Aitel

Dave Aitel is CEO and founder of Immunity Inc., and his past includes stints at @Stake, and the National Security Agency. As a long-time security researcher Dave has a long and visionary history of warning the industry about major security vulnerabilities. Dave is recognized world authority on attack techniques, and is the author of many famous tools including SPIKE, Spike proxy, and sharefuzz. He is co-author of two books ("The Hacker's Handbook" from Aurbach Press and "The Shellcoder's Handbook" from John Wiley and Sons) and is a frequent presenter of technical papers at conferences.

Philippe Biondi
Mastering the network with Scapy

Philippe Biondi is a research engineer and security expert working at the IT security lab of EADS Corporate Research Center. He is a member of the French Honeynet Project. He was co-author of LIDS. He is the author of Scapy and Shellforge and a lot of other tools. His Scapy tutorial at CanSecWest/core05 was rated one of the best talks of the conference by attendees.

CÚdric Blancher
Practical 802.11 WiFi (In)Security

CÚdric has been working in network security field for 6 years. In 2004, he joined EADS Corporate Research Center in France and now runs the IT Security Research Lab. As network security expert, he is focusing on wireless networks.
He is one of Rstack team core members and is part of French Honeynet Project with studies on honeynet containment, honeypot farms and network traffic analysis. He's been delivering technical presentations, workshops, trainings (Recon, Syscan, Pacsec/core05, Bellua), papers and articles on wireless networks security, and authored Wifitap, a Wi-Fi traffic injection based tool.
CÚdric's website:

Renaud Deraison
Network Vulnerability Scanning: Turning Nessus into Metasploit

Renaud is the Chief Research Officer at Tenable Network Security. Founder and the primary author of the open-source Nessus vulnerability scanner project. He has worked for SolSoft, and founded his own computing security consulting company, 'Nessus Consulting S.A.R.L.' Nessus detects network vulnerabilities and is in use at more than 50,000 worldwide organizations. Under Renaud's leadership, the Nessus project has won numerous awards, including the 2002 Network Computing 'Well Connected' award and PC Magazine's 2003 'Open Source Product of the Year' award. Mr. Deraison also is an editorial board member of the Common Vulnerabilities and Exposures Organization, has presented at a variety of security conferences and has had his work published in several magazines and books.

Maximillian Dornseif

Maximillian Dornseif has studied laws and computer science at the University of Bonn, Germany where he wrote his PhD Thesis about the "Phenomenology of Cybercrime". He has been doing IT security consulting since the mid nineties and today focuses mostly on penetration-testing. In early 2004 he joined the Laboratory for Dependable Distributed Systems at RWTH Aachen University where he bootstrapped the computer forensics education program and the German honeynet project and the now famous "Summerschool Applied IT-Security". Since Fall 2005 he works as a post-doc researcher at the University of Mannheim. Dornseif is a sought after speaker at international security conferences and has published in the legal and computer science fields on a wide range of topics.

Sinan "noir" Eren

Sinan Eren is a reverse engineer and a casual exploit developer. At Immunity Inc, he performs code/binary audits and exploit development for the CANVAS platform. Architectures and platforms of interest include x86/Win32, Unix on any cpu flavor and popular 3rd party applications (MTAs, HIPS, AV, VPN, Remote Desktop etc.). He recently gave auditing courses for the RPC layer of the Windows OS to several audiences around the USA.

Nico Fischbach
Securing your critical Cisco network infrastructure.

Nico is a Senior Manager, in charge of the European Network Security Engineering team at COLT Telecom, a leading pan-European provider of end-to-end business communications services.

He holds an Engineer degree in Networking and Distributed Computing and is a recognized authority on Service Provider infrastructure security and denial-of-service attacks mitigation.

Nicolas is co-founder of SÚcuritÚ.Org a French speaking portal on computer and network security, of eXperts and mystique, an informal security research group and think tank, and of the French chapter of the Honeynet project.

He has presented at numerous technical and security conferences, teaches networking and security courses at various universities and engineering schools, and is a regular contributor to the french security magazine MISC. More details and contact information on his homepage.

Halvar Flake
Reverse Engineering: Rapid Bug Discovery and Input Crafting

Originating in the fields of copy protection and digital rights management, he gravitated more and more towards network security over time as he realized that constructive copy protection is more or le ss fighting windmills. After writing his first few exploits he was hooked and realized that reverse engineering experience is a very handy asset when dealing with COTS software. With extensive experience in reverse engineering, network security, penetration testing, and exploit development, Halvar consults on reverse engineering and is a graduate student of mathematics in Germany.

Network Reconnaissance with Nmap 4

Fyodor authored the popular Nmap Security Scanner, which was named security tool of the year by Linux Journal, Info World, and the Codetalker Digest. It was also featured in the hit movie "Matrix Reloaded" as well as by the BBC, CNet, Wired, Slashdot, Securityfocus, and more. He also maintains the Insecure.Org and Seclists.Or g security resource sites and has authored seminal papers detailing techniques for stealth port scanning, remote operating system detection via TCP/IP stack fingerprinting, version detection, and the IPID Idle Scan. He is a member of the Honeynet project and a co-author of the books "Know Your Enemy: Honeynets" and "Stealing the Network: How to Own a Continent".

Martin Herfurt
Bluetooth Auditing and Technology

Martin Herfurt is the founder of the He completed his Telecommunications Engineering Degree at the Salzburg University of Applied Sciences and Technologies in 2001. Alongside his study Martin was involved in numerous industry projects, providing him with commercial programming practice. In 2000 Martin followed up his formal study with a four-month internship at the telecommunications institute of TELCOT institute in San Ramon, California, USA. Since the second half of 2000 Martin has been working as a full time researcher at an Austrian Research facility. His project responsibilities there were ranging from the co-ordination of a European IST project with a total budget of over 5 million Euro to software agents development. Together with a colleague, Martin began giving a class on mobile data services at the Salzburg University of Applied Sciences and Technologies in the summer of 2003. In February 2004, Martin discovered a major security loophole in several popular cellphones which is referred to as BlueBug in the media. As part of his fascination with the rapid development in computer programming Martin has become a regular participant in the Chaos Communication Congress which is a yearly meeting of the German hacker association CCC.

Marcel Holtman
Bluetooth Auditing and Technology

Marcel Holtmann is the maintainer and the core developer of the official Linux Bluetooth stack which is called BlueZ. He started working with the Bluetooth technology back in 2001. His work includes new hardware drivers, upper layer protocol implementations and the integration of Bluetooth into other subsystems of the Linux kernel. In January 2004 he overtook the maintainer role from the original developer Max Krasnyansky. Together with Jean Tourrilhes he maintains the OpenOBEX project. He is also responsible for the IrDA and Bluetooth integrations of the Gnokii project.

Thorsten Holz
Advanced Honeypot Tactics

Thorsten Holz is a Ph.D. student at the Laboratory for Dependable Distributed Systems. He is one of the founders of the German Honeynet Project and has extensive background in the area of honeypots and bots/botnets. His research interests include the practical aspects of secure systems, but he is also interested in more theoretical considerations of dependable systems. In addition, he is the editor-in-chief of the German IT-security magazine MISC.

Doug Hoyte
Network Reconnaissance with Nmap 4

Doug is a prolific Nmap developer who authored the asynchronys DNS subsystem and greatly improved the version detection system for Nmap 4.00. He wrote the open source Anti-Web httpd server as well as other projects that he hosts at

Adam Laurie
Bluetooth Auditing and Technology

Adam Laurie is Chief Security Officer and a Director of The Bunker Secure Hosting Ltd. He started in the computer industry in the late Seventies, working as a computer programmer on PDP-8 and other mini computers, and then on various Unix, Dos and CP/M based micro computers as they emerged in the Eighties. He quickly became interested in the underlying network and data protocols, and moved his attention to those areas and away from programming, starting a data conversion company which rapidly grew to become Europe's largest specialist in that field (A.L. downloading Services). During this period, he successfully disproved the industry lie that music CDs could not be read by computers, and, with help from his brother Ben, wrote the world's first CD ripper, 'CDGRAB'. At this point, he and Ben became interested in the newly emerging concept of 'The Internet', and were involved in various early open source projects, the most well known of which is probably their own'Apache-SSL'which went on to become the de-facto standard secure web server. Since the late Nineties they have focused their attention on security, and have been the authors of various papers exposing flaws in Internet services and/or software, as well as pioneering the concept of re-using military data centres (housed in underground nuclear bunkers - as secure hosting facilities. Adam has been a senior member of staff at DEFCON since 1997, and also acted as a member of staff during the early years of the Black Hat Briefings.

Laurent Oudot

Laurent is a security expert at the Commissariat a l'Energie Atomique in France, which is the equivalent of the US Dept Of Energy. He is an instructor about network and system security in french schools, and has managed numerous security projects for about ten years. He's been doing research on defensive technologies highly closed to blackhats activities like honeypots, IPS/IDS, firewalls, sandboxes, etc. He co-founded the French Honeynet along with Nicolas Fischbach, and is a member of the Steering Committee ot the Honeynet Research Alliance. Laurent is also a frequent contributor to several research papers like Security Focus and MISC magazine, as well as a presenter at computer security and academic conferences like Cansecwest, Pacsec, Black Hat USA-Asia-Europe, Defcon, Hope.

In his spare time, he is a member of a team called RstAck composed of security addicts and geeks. Homepage:

Gerardo 'gera' Richarte
Assembly for Exploit Writing

Gera is widely regarded as one of the world's most brilliant "shellcode ninjas" and responsible for countless innovations in technique. A short look at his famous "Insecure Programming by Example" page at the Insecure Programming site should convince you that he is about 31337 as you get. Gera is one of the technical wizards at Core Security Technologies.

Martin Roesch

Marty is a respected authority on intrusion detection technology and forensics, and today works at Sourcefire where he is the founder and CTO. Martin, who has 17 years industry experience in network security and embedded systems engineering, is also the author and lead developer of the Snort Intrusion Detection System.

Over the past eight years, Martin has developed various network security tools and technologies, including intrusion detection systems, honeypots, network scanners, and policy enforcement systems for organizations such as GTE Internetworking, Stanford Telecommunications, Inc., and the Department of Defense. He has applied his knowledge of network security to penetration testing and network forensics for numerous government and large corporate customers. Martin has been interviewed as an industry expert in multiple technology publications, as well as print and online news services such as MSNBC, Wall Street Journal, CNET, ZDNet, and numerous books. Snort has been featured in Scientific American, on A&E's Secret Places: Inside the FBI, and in several books, such as Network Intrusion Detection: An Analysts Handbook, Intrusion Signatures and Analysis, Maximum Security, Hacking Exposed, and others.

Martin holds a B.S. in Electrical and Computer Engineering from Clarkson University.

Nicolas Waisman

Nicolas Waisman is a Senior Security Researcher at Immunity, Inc. Nico is one of the driving forces behind the CANVAS exploit framework. The majority of his recent work has focused on win32 vulndev, specifically reliable heap exploitation. He also likes to sneak in the odd reverse engineering project from time to time. His most current passion is implementing MOSDEF for the PPC architecture.

Matthew Watchinski

Mr. Watchinski is presently the Director of Vulnerability Research at Sourcefire. In 1998 Mr. Watchinski started his career in security at a up and coming company called Hiverworld (later named nCircle). There he was responsible for network penetration tests, physical security audits, and security related professional services. Additionally Mr. Watchinski was responsible for exploit development, IDS signature development, and code audits. In 2000 Mr. Watchinski moved on to became the Manager of Professional Services for farm9, Inc. Where he was responsible for all ongoing security professional services engagements. This included security audits, code reviews, exploit development, and custom IDS signature development. In 2003 Mr. Watchinski came on board at Sourcefire to eventually become the Director of Vulnerability Research. His responsibilities at Sourcefire include; managing the development of snort rules, code audits, and additional security related research. Mr. Watchinski's entire career has been heavily focused on security research, exploit development, and the development of effective security measures that work in large enterprise environments.

Marc Schönefeld

Marc Schönefeld came first into contact with computers by exposure to a C64. Since then he is infected by bits and bytes. He studied Business Informatics and joined a banking computer centre in 1997 where he worked as Software Security Architect. In 2007 he joined the Red Hat Security Response Team. Early 2010 he graduated with a Dr. rer. nat. degree in computer science (comparable to PhD). He spoke about Java Bytecode Security at Blackhat 2002, since then he also spoke and gave trainings at the major conferences like CanSecWest, Blackhat, RSA, PacSec, XCon, Confidence , HITB and Java One. In 2011 he released a book about JVM security, showing attack and defense techniques on the JDK and Java software. He is member of the Oracle Java Vulnerability Team.