Celil ÜNÜVER

Celil ÜNÜVER

KAMP EĞİTİM PROGRAMI
Web Güvenliği ve Web Sızma Teknikleri
Celil Üniver
6 saat

Biyografi

 

İSİM CELİL ÜNÜVER
DOĞUM YERİ TÜRKİYE
E POSTA celilunuver@gmail.com
ÜNVAN Information Security Researcher

EĞİTİM

KARİYER

Short Bio:

Celil Ünüver is a security researcher who is interested in software security, penetration testing and

reverse engineering. He discovered several critical vulnerabilities in popular applications. Some

software vendors affected by these vulnerabilities include: Microsoft, Adobe, Facebook, IBM,

Novell, HTC and Wonderware.

He has presented his research at international conferences. Some of these include CODE BLUE

(Japan), CONFidence (Poland) , Swiss Cyber Storm (Switzerland), Hackfest (Canada). Also he is

organizer of the first international hacker conference in Turkey which is called “NOPcon”.

Personal:

Nationality : Turkey

Marial Status : Single

Educational Background:

Bachelor Degree:

Marmara University , Economics

Languages:

Turkish (Native)

English (Advanced)

German (Beginner)

Career Summary:

Founder – SignalSEC Corp. (February 2012 – Present)

+ Vulnerability Research, Analysis and Intelligence:

Providing 0day feeds to world-wide clients

+ Penetration testing:

GSM, Banks, Government organizations

+ Trainings:

Vulnerability Research & Exploit Development trainings

Penetration Tester and Trainer , BGA Bilgi Guvenligi Ltd. (April 2011 – December 2011)

+ Responsible for web application penetration test projects

+ Instructor of Exploit Development training

Vulnerability Research Contributor – iDefense Labs of Verisign Inc. (2010 -2012)

+ Researching and reporting zero-day vulnerabilities

+ Threat Intelligence & Hacker Profiling

Jr. Security Researcher, HACKATTACK IT Security GmbH (2009-2010)

+ Researching vulnerabilities

+ Penetration testing

Technical Skills:

+Programming

C

Perl

Python

x86 Assembly

ARM Assembly

+Topics

Reverse Engineering (x86 & ARM)

Vulnerability Research

Exploit Development

Fuzzing

Penetration Testing

Mobile Security & Mobile Forensics

Malware Analysis

Threat Intelligence

Hacker Profiling

+Tools:

IDA Pro

WinDBG

Metasploit Framework

Burp Suite

International Conferences:

17 February 2014 Speaker at Defcamp – Romania

Presentation: SCADA Software or Swiss Cheese Software?

9 May 2013 Speaker at CODE BLUE – Tokyo, Japan

Presentation: SCADA Software or Swiss Cheese Software?

7 October 2011 Speaker at c0c0n 2011 – India

Presentation: Reversing Mobile

12/13 May 2011 Speaker at Swiss Cyber Storm 3 – Switzerland

Presentation: Bug Hunting in Windows Mobile

25 May 2010 Speaker at CONFidence 2010 – Poland

Presentation : Analysis of Software Vulnerabilities

Local Conferences:

27 November 2014 Speaker at Cyber International Cyber Warfare Conf, Ankara

Presentation: Cyber Espionage: Major threats caused by minor problems

14 May 2013 Speaker at Cyber Security Conference – Istanbul

Presentation: Mandarin: Zao Shang Tüerqi

22 December 2011 Speaker at Cyber Security Conference – ANKARA

Presentation: Industrial Chaos (SCADA Hacking)

4 June 2011 Speaker at IstSec 2011 – Istanbul

Presentation: Reversing Mobile

23 December 2010 Speaker at AnkaSec 2010 – Tubitak , ANKARA

Presentation: Threats on Your Mobile

Papers:

CVE-2014-1776 Internet Explorer 6-7-8-9-10-11 Zeroday Analysis:

This vulnerability has been detected as zero-day in the wild. My paper is the first -technical-
analysis of the vulnerability published on web and it has been referenced by CERT.org, NIST.GOV

etc.

Heap, Overflows and Exploiting [Turkish] :

http://www.signalsec.com/publications/TR-HeapExploiting.pdf

Discovering RPC Vulnerabilities [Turkish] :

http://www.exploit-db.com/wp-content/themes/exploit/docs/31417.pdf

An Introduction to ARM Exploitation [Turkish]:

http://www.signalsec.com/publications/arm_exploiting.pdf

CVE-2013-3906 Office Zero-day Analysis:

A quick analysis and intelligence report about the MS Office 0day exploit

Binary Analysis of Windows Mobile Double Free Vulnerability [English]:

http://blog.securityarchitect.org/alert-first-double-free-vulnerability-in-windows-mobile/

Internet Explorer Use After Free Vulnerability Analysis [Turkish]:

http://www.signalsec.com/publications/UAF-Analysis.pdf

Analysis of A Browser Malware/Exploit CVE-2012-0003 [Turkish] :

http://www.signalsec.com/publications/exploit-cve-2012-0003.pdf

Analysis of ZitMo Malware [Turkish] :

http://www.bilgiguvenligi.gov.tr/zararli-yazilimlar/zeus-in-the-mobile-zitmo-zararli-yazilimi.html

Bir APT ve Siber Istihbarat Saldirisinin Analizi:

http://www.signalsec.com/bir-apt-ve-siber-istihbarat-saldirisinin-anatomisi/

Security Advisories:

Vulnerabilities that I discovered and published:

HTC Touch2 Phone Media Player Memory Corruption:

http://www.securityfocus.com/archive/1/520800

Microsoft Windows Mobile Double Free Vulnerability:

http://www.securityfocus.com/archive/1/514398/30/60/threaded

Adobe Shockwave Player Memory Corruption Vulnerability:

http://www.securityfocus.com/bid/48297/info

Schneider Electric / 7-T IGSS SCADA Memory Corruption:

http://ics-cert.us-cert.gov/advisories/ICSA-11-355-01

CoDeSys v2.3 SCADA Buffer Overflow:

https://ics-cert.us-cert.gov/advisories/ICSA-12-006-01

Invensys WonderWare SCADA Multiple Vulnerabilities:

http://www.us-cert.gov/control_systems/pdf/ICSA-12-081-01.pdf

Facebook WhiteHat Bug Bounty:

www.facebook.com/whitehat

Novell eDirectory Httpstk Stack Overflow Vulnerability:

http://www.securityfocus.com/bid/37042

Tools / Codes:

Windows Mobile Forensic Tool (C# – .NET) : A basic forensic tool for windows mobile

http://www.signalsec.com/portfolio/winmobforensic/

Windows Mobile (WinCE) Dialer/PhoneCall Shellcode (ARM Asm):

http://www.securityarchitect.org/codes/ph.cpp

Windows Mobile (WinCE) MessageBox Shellcode (ARM Asm):

http://www.securityarchitect.org/codes/he.cpp

CoDeSys SCADA Buffer Overflow Exploit (C)

http://www.signalsec.com/publications/codesys.c

CVE-2011-4051 Proof of Concept (Perl):

http://blog.securityarchitect.org/?p=323

Novell eDirectory Dhost Exploit (Perl):

http://www.securityarchitect.org/exploits/novelbof.txt

Novell eDirectory HTTPSTK PoC (Perl):

http://www.securityarchitect.org/exploits/httpstk.txt

Win32 Shellcode (Cmd.exe) Winxp sp3 english (x86 ASM):

http://www.securityarchitect.org/codes/cmdshell.c

Social Activities:

Martial arts (Jujutsu) , Music , Playing the guitar

Memberships:

Dentokan Martial Arts Federation

References:

Mohammad Alexander Hluchan , Threat Intelligence Analyst – iDefense Labs of VeriSign Inc.

 

KAMP EĞİTİM PROGRAMI