Adam Zabrocki

Security Researcher, security consultant, pentester, M.Sc., Eng.
Redmond, zagranica

Języki

polski
ojczysty
angielski
biegły
białoruski
podstawowy
francuski
podstawowy
rosyjski
podstawowy

Doświadczenie zawodowe

Logo
Principal Software Development Engineer
Linux Kernel Runtime Guard
I've designed and fully developed Linux Kernel Runtime Guard project currently defended by Openwall.

http://openwall.com/lkrg/
Microsoft Polska sp. z o.o.
Senior Security Engineer
Member of Microsoft Offensive Security Research Team (OSR).
Member of Science team (Research) in the Microsoft Security Engineering Center.
Member of Detection and Defense team in the Microsoft MSRC.
Logo
Developer
The ERESI Reverse Engineering Software Interface
I'm developer responsible for supporting MIPS architecture. I'm supporting the smart disassembling engine that gives both syntactic and semantic attributes to instructions and their operands (libasm) and the control flow analysis and fingerprinting library (libmjollnijr).
Logo
Security Consultant
Cigital
As a Security Consultant at Cigital, I'm currently working at a large financial institution as part of the Application Security Architecture team. Working on many different projects alongside the development teams within the organization to ensure security is thought about at the requirements stage of the SDLC. Then I work with the development team throughout the development, testing and deployment phase to ensure the application is secure.
*) Experience with conducting application security design reviews on applications at a coding level and the architectural level.
*) Communicating with the development leads and business representatives within the organization to find a secure solution that meets the Firm’s policies.
*) Developing security reviews which highlight the systems functionality, its security and any risks introducing the system may pose to the firm.
European Organization for Nuclear Research (CERN)
User Office
I am responsible for create, design and write own project – Rootkit detector for kernel 2.6 (32 and 64 bits). This detector can find any kernel rootkit including Phalanx (not public rootkit – all versions), and Debug Register rootkits. It has self-defence code based on Debug Register features which implies almost impossible to bypass for now.
Logo
Security expert
Wroclaw Centre for Networking and Supercomputing
I was responsible for doing security testing and code review. Analysis techniques for attacks and defence ways on PL-GRID project - Polish Infrastructure for Supporting Computational Science in the European Research Space.
European Organization for Nuclear Research (CERN)
Technical Student
Cooperating with CERN computer security department (Reverse Engeneering). Create and developing own project - framework used for automatic generating Unit, Functionality and Regression tests (Master of Degree thesis topic) using fuzzing technique. Writing tests for DPM, LFC and RFIO software used in Large Hadron Collider (LHC) project.
Logo
Lecturer
SecDay 2009
I gave a lecture about: “Unusual bugs” - essence of bughunting.
Logo
Lecturer
Forum Informatyki Sledczej 2009 (computer's forensic forum)
I gave a lecture about: “Invisible hacking in practice” - bypassing IDS/IPS, firewalls and other security analysers.
Logo
Security expert
Wrocław University of Technology
Project “New IT technologies for the electronic economy and
information society based on the SOA paradigm” Research Area 7-6 “Security evaluation of SOA and SOKU systems” https://www.soa.edu.pl/
Logo
Security expert
HISPASEC
I was responsible for doing pentests (blackbox testing), auditing code (whitebox testing), bughunting in opensource software and reverse engineering malware.
Logo
Lecturer
Sysday 2009
I gave a lecture about: “IP spoofing is still alive” - presenting own program which implement IP Hijacking attack which is still possible (new attack).
Logo
Lecturer
Sekit 2008
I gave a lecture about: “Hacking Linux systems on x86 architecture”.
Logo
Security expert
AVET Information and Network Security
I was responsible for doing pentests in banking systems - blackbox testing, auditing code (whitebox testing), bughunting.
Logo
Author of the article
XploiT magazine
Publish article “Remote DoS attacks for Windows Vista/XP” in XploiT magazine
Logo
Lecturer
Confidence 2007
I gave a lecture about: “Shellcodes for MIPS architecture on IRIX systems”.
Logo
Security expert
Wroclaw Centre for Networking and Supercomputing
I was responsible for doing security testing and code review. IT security consultant. Analysis techniques for attacks and defence ways for ClusteriX project.
Mercedes-Benz Polska sp. z o.o.
Security expert and administrator
I was responsible for setup and full secure one of the main
computable server in south western Poland.
Logo
Security expert and administrator
RKL Inkasso Polska
I was responsible for setup, full secure and take care about all servers in the company. Recovery data from formated disks.
Logo
Security expert and administrator
Lawyer office
I was responsible for setup, full secure and take care about all servers in the office. Recovery data from formated disks.
Logo
Remote security expert
iDEFENSE Labs
I was remote security expert (bughunter – code review) for Security and Vulnerability Research Labs.

Szkolenia i kursy

+ “Szkolny klub przedsiebiorczosci” (School
Entrepreneurship Club) – project supported by Polish
National Bank (NBP)
+ Final of Information Technology Competition in WSB-NLU
in Nowy Sacz.

Edukacja

Logo
Pedagogical Course at Wroclaw University of Technology, studia podyplomowe
Politechnika Wrocławska
Logo
Computer Science, magisterskie
Politechnika Wrocławska
Logo
Electronics and Telecommunication at Wroclaw University of Technology, inżynierskie
Politechnika Wrocławska

Specjalizacje

IT - Administracja
Bezpieczeństwo/Audyt

Zainteresowania

+ Computer security – methods of cracking systems
and preventing computer attacks.
+ Biblical studies – in any form, including exegesis.
+ Classical music – formerly playing the piano
+ Psychology – cause-consequence correlations

Grupy

6 wszystkich wypowiedzi
3 plusy
ABI
ABI
Administratorzy Bezpieczeństwa Informacji
Bezpieczeństwo i audyt IT www.locos.pl
Bezpieczeństwo i audyt IT www.locos.pl
Bezpieczeńtwo i Audyt IT ( www.locos.pl ) to grupa dla wszystkich zainteresowanych tematyką bezpieczeństwa, kontroli (audytu) bezpieczeństwa.
Bezpieczeństwo IT -- IHACK.pl
Bezpieczeństwo IT -- IHACK.pl
Bezpieczeństwo danych w Internecie spędza sen z powiek specjalistom i przeciętnym użytkownikom. Każdy z nas może niespodziewanie stać się ofiarą ataku hakera. A tu mamy wielu hakerów wśr&oac
Bielsk Podlaski
Bielsk Podlaski
Ludzie w jakikolwiek sposób związani z tym cudownym miasteczkiem :-))))
C and C plus plus
C and C plus plus
Grupa dla miłośników programowania w językach C and C++
Certyfikaty IT
Certyfikaty IT
Jakie certyfikaty warto zrobić w branży IT.
CONFidence
CONFidence
Wszyscy specjaliści ds. bezpieczeństwa IT mile widziani
IT Security
IT Security
Specjalisci dziedziny IT Security łączcie się!
Niebezpiecznik
Niebezpiecznik
http://niebezpiecznik.pl :: Grupa dla specjalitów ds. bezpieczeństwa i osób hobbystycznie zainteresowanych tematyką IT Security.
IT – Praca dla osób z charakterem
IT – Praca dla osób z charakterem
Grupa zrzesza informatyków oraz konsultantów branży IT. Dyskusje oraz możliwości współpracy to cel tej grupy.
Projekty start-up
Projekty start-up
internetowe start-upy, wszystko co zwiazane z nowymi projektami, ich finansowaniem i zarzadzaniem
Reverse Engineering
Reverse Engineering
dezasemblacja, dekompilacja, debugging, IDA PRO, SoftIce, OllyDBG etc..