Jump to content

Greg Hoglund

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Neelix (talk | contribs) at 01:31, 14 March 2011 (Fixed link). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Greg Hoglund
NationalityAmerican
SpousePenny C. Leavy[1]
Websitehbgary.com
rootkit.com

Michael Gregory Hoglund, better known as Greg Hoglund, is a security researcher and a published author on the subject of computer security and computer hacking. He wrote Exploiting Online Games, speaks regularly on security conferences and wrote several books. Hoglund drew the attention of the media when he exposed the functionality of Blizzard Entertainment's Warden software.[2] He is perhaps best known for founding a cyber security company (HBGary) vandalized by a group of hackers calling themselves "Anonymous" in February 2011.[3] The consequent theft of his personal emails exposed criminal legal and ethical practices.[4][5]

Hoglund founded several security startup companies which are still in operation today:

  • HBGary, Inc.[6]
  • Cenzic, Inc. (formerly known as ClickToSecure, Inc.[7]) Focused on web application security for the Fortune-500. [8]
  • Bugscan, Inc. Developed an appliance that would scan software for security vulnerabilities without sourcecode. Acquired in 2004 by LogicLibrary, Inc.[9]

Hoglund also founded and operates rootkit.com, a popular site devoted to the subject of rootkits. Rootkit.com was compromised in 2011 by the internet hacktivism group Anonymous.

Work

Hoglund has published numerous works in the field of security:

Patents

He filed a WIPO patent for a Fuzzy logic Hash function method with a registration in the United States and Europe. It was published on 29th of December 2010.[10]

Books

  • Exploiting Online Games: Cheating Massively Distributed Systems, Addison-Wesley, 2007, ISBN 0132271915. [11][12]
  • Rootkits: Subverting the Windows Kernel, Addison-Wesley, 2005, ISBN 0321294319. [13]
  • Exploiting Software: How to Break Code, Addison-Wesley, 2004, ISBN 0201786958. [14][15]

Articles

  • A *REAL* NT Rootkit, patching the NT Kernel, Phrack magazine, 1999 [16]

Conference presentations

  • Advanced Buffer Overflow Techniques, BlackHat 2000 USA/Asia [17]
  • Kernel Mode Rootkits, BlackHat 2001 USA/Europe/Asia [18]
  • Application Testing Through Fault Injection Techniques, BlackHat Windows Security 2002 USA/Asia [19]
  • Exploiting Parsing Vulnerabilities, BlackHat 2002 USA/Asia [20]
  • Runtime Decompilation, BlackHat Windows Security 2003 Asia [21]
  • Active Reversing: The Next Generation of Reverse Engineering, BlackHat 2007 USA/Europe [22]
  • VICE - Catch the Hookers!, BlackHat 2004 USA [23]
  • Hacking World of Warcraft: An Exercise in Advanced Rootkit Design, BlackHat 2005/2006 USA/Europe/Asia [24]

References

  1. ^ Nate Anderson (February 10, 2011). "How one man tracked down Anonymous—and paid a heavy price". Ars Technica.
  2. ^ Mark Ward (31 October 2005). "Warcraft game maker in spying row". BBC News.
  3. ^ Eric Lipton (11 February 2011). "Hackers Reveal Offers to Spy on Corporate Rivals". New York Times.
  4. ^ Nate Anderson (19 February 2011). "Black ops: how HBGary wrote backdoors for the government". Ars Technica.
  5. ^ Tim Greene (19 February 2011). "Stolen HBGary e-mails indicate it was planning a "new breed of rootkit"". Network World.
  6. ^ http://hbgary.com
  7. ^ http://www.blackhat.com/html/bh-usa-08/train-bh-usa-08-hbgary-rootkit3.html
  8. ^ http://www.cenzic.com
  9. ^ http://www.infoworld.com/article/04/09/14/HNlogiclibrary_1.html
  10. ^ WO application 2010151332, Michael Gregory Hoglund, "Fuzzy Hash Algorithm", published 2010-12-29, assigned to HBGary Inc. 
  11. ^ http://www.pearsonhighered.com/educator/product/Exploiting-Online-Games-Cheating-Massively-Distributed-Systems/9780132271912.page
  12. ^ http://www.exploitingonlinegames.com
  13. ^ http://www.pearsonhighered.com/educator/product/Rootkits-Subverting-the-Windows-Kernel/9780321294319.page
  14. ^ http://www.pearsonhighered.com/educator/product/Exploiting-Software-How-to-Break-Code/9780201786958.page
  15. ^ http://www.exploitingsoftware.com
  16. ^ http://phrack.org/issues.html?issue=55&id=5
  17. ^ http://www.blackhat.com/html/bh-usa-00/bh-usa-00-speakers.html#Greg%20Hoglund
  18. ^ http://www.blackhat.com/html/win-usa-01/win-usa-01-speakers.html#Greg%20Hoglund
  19. ^ http://www.blackhat.com/html/bh-usa-02/bh-usa-02-speakers.html#Greg%20Hoglund
  20. ^ http://www.blackhat.com/html/bh-asia-02/bh-asia-02-speakers.html#Greg%20Hoglund
  21. ^ http://www.blackhat.com/html/bh-usa-03/bh-usa-03-speakers.html#Greg%20Hoglund
  22. ^ http://www.blackhat.com/html/bh-usa-07/bh-usa-07-speakers.html#hoglund
  23. ^ http://www.blackhat.com/html/bh-usa-04/bh-usa-04-speakers.html#Butler
  24. ^ http://www.blackhat.com/html/bh-usa-06/bh-usa-06-speakers.html#Hoglund

Template:Persondata