| 
 
 Here's a short summary of the less boring technical things I've done so far.
 I consider this my personal home page and feel like writing my boring history 
 on this page. If you fall asleep, you've been warned. :P Far from all of
 this is professional security work, some of it was done for fun and education.
 I started out in C with maintaining and contributing a bit to the development
 of eggdrop, the all-purpose IRC bot. My
 old Tcl script for eggdrop is entity, which is
 still available, now for 1.6 eggdrop bots. :) It's designed specially for
 large distributed eggdrop networks and has very efficient channel- and basic
 intrusion protection. Some people use and like it for its ease of use.
 This was my first experiences with programming distributed networks, sort of.
 
 The first C code I ever published was targa, which was a combination of
 existing DoS proof-of-concept attacks, much of it cut and paste. My latest DoS
 in that direction was targa3, which generates semi-random packets designed
 to bring down IP stacks. I've used and written tools like targa3, and
 attacks against the Solaris kernel and some versions of syslog and others
 professionally during my time at 2XS to test various products and firewalls.
 
 Some open-source security tools I wrote, most of them simple implementations,
 include spidernet, a distributed host-based
 intrusion detection system (such as tripwire), with a client/server
 infrastructure, Q, a cryptography-using remote access
 server over esoteric protocols, somewhat of an alternative to SSH, and
 some distributed sniffers, phantom sniffer and e4d. Later on, I've written
 LibMix, an archive of network, cryptography and other functions, mostly
 to re-use code that I commonly need in my projects. One of my favorite
 projects is NSAT (the Network Security Analysis Tool), a network scanner
 that can identify most common IP-based internet services and their versions.
 Unlike vulnerability scanner or penetration tools, NSAT does entirely passive
 information gathering, as it leaves interpretation of the gathered version
 information up to the user, which also makes less updates necessary. (By the
 way: if you ever have problems with getting all the results with NSAT, just
 try tuning up the timeouts in the config file. It's a feature, not a bug...).
 
 Some of the security whitepapers I've written
 so far include Protecting against the unknown,
 a buffer overflow howto, 
 Paranoia vs. Transparency, and Automation
 Potentials for IT security. Also, some c't articles (a german computer
 magazine) about the Linux firewall and detecting backdoors on UNIX, but
 they are not publicly available online.
 
 So far, I've worked for 2XS Security in Israel, doing vulnerability management,
 quality assurance, penetration testing, and development of SASS (StandAlone
 Security System, an uber-IDS). During the R&D, we did some short-term work for
 small israeli businesses and big institutions including banks, and ISPs, and
 assisting the FBI with tackling anti-american/anti-israeli defacers from
 Pakistan. We still retain a letter of honor from them. Oh well. Personally,
 I also assisted in Project SODA, a cooperative
 project with a few israeli white-hats, in which we notified the whole range
 of Israeli Internet sites of their security problems. The goal was to mitigate
 the effects of an early escalation of the new uprising in cyberspace. We also
 advised ISPs in Israel about Anti-DDoS measures, who, at that time (around
 November 2000) experienced some large-scale distributed DoS attacks. As of
 mid-2002 2XS Security is not an active company. Because of the political
 situation in Israel, many employees got drafted. Also, the CTO and founder,
 Ehud Tenenbaum (aka. Analyzer, the media-labeled "Pentagon Hacker"),
 has been jailed after four years of ongoing trials. For more information,
 please see this site that his friends have put up: freeanalyzer.org.
 
 One project I've been involved in, is vantronix,
 they offer wireless security services, and have an interesting project about providing wireless internet access in metropolitan areas.
 
 Since 2000, I work with the Hacktivismo group, a cDc-sponsored "non-profit
 research and development group", as I prefer to describe it. Hacktivismo
 focuses on freedom of information, human rights, and general freedom issues,
 internationally, around the globe. We try to investigate violations of
 those freedoms and rights and, as the cypherpunks, try to improve things
 primarily by technology rather than policy, and prefer the laws of mathematics
 to the laws of traditional political diplomacy to challenge the governments
 and supporters exercising totalitarian rule or censorship in their countries.
 Our first project was originally Peek-A-Booty, the anonymous browsing protocol,
 which people like Bronc Buster and me helped designing. It later became a
 private project of one of our ex-members, and is no longer associated with
 us. I have no overview about this project's development status anymore, but
 am focusing on current Hacktivismo projects, such as Camera/Shy and The Six/Four System, a successor of Hacktivismo concepts designed for privacy,
 stealth and anonymous, free access to information, while circumventing
 censorship. I was the main author to implement Six/Four peer-to-peer protocol,
 and am happy about anyone getting involved and taking it apart, writing
 applications for it, or improving it.
           |