Vous êtes sur la page 1sur 21

archive.today Saved from https://www.linkedin.

com/in/craigswright search 9 Dec 2015 02:44:38 UTC


webpage capture history
All snapshots from host www.linkedin.com

Webpage Screenshot share download .zip report error or abuse

What is LinkedIn? Join Today Sign In

Search by name
Craig Steven Wright 500+
connections
at Over 400 million professionals are already on
Sydney, Australia Information Technology and Services LinkedIn. Find who you know.

Current Private, DeMorgan Limited, Hotwire Pre- First Name Last Name !
Emptive Intelligence Group
Previous CSCSS / Centre for Strategic Cyberspace Example: Jeff Weiner
+ Security Science, Charles Sturt
University, iVolution Security
People Also Viewed
Education University of London
Recommendations 10 people have recommended Craig Luke Harvey-Palmer
Steven Chief Executive Officer - Alive
Websites Blog
Newspaper
Interview
Neil Currie
Chairman and CEO QFire Software

Jonathan Rubinsztein
Join LinkedIn and access Craig Steven’s full CEO at UXC Red Rock Consulting

profile. It’s free!


Rajiv Chaudhri
As a LinkedIn member, you’ll join 400 million other professionals who are Chairman, CEO, Editor, Visionary
sharing connections, ideas, and opportunities. Entrepreneur, Strategy Consultant,
Radio Presenter & Philanthropist.
• See who you know in common Rob Kingma
• Get introduced CEO at ICT Networks
• Contact Craig Steven directly

View Craig Steven's Full Profile Stephen Holland

Nick Beaugeard
Published by Craig Steven CEO and Founder at HubOne, Chair,
ANZ Community at CompTIA
See more

Sidney Minassian
Founder & CEO of Contexti | Big
Data Analytics

Tony Pittorino
CEO at isgroup.technology

Warwick Kirby
ACCELERATING THE Chief Executive Officer, Executive
SOUTHERN HEMISPHERE Director
May 8, 2015

Ads You May Be Interested In

Device Automation is here


Summary Monitoring , Alarming and
Validation info@kipaj.com

SENIOR MANAGEMENT EXECUTIVE INFORMATION SECURITY SPECIALIST


► CTO / CIO / CISO /CSO Elegant Masonic Watches
Designed after the famous Dudley Emblem
Multi-certified Expert in Enterprise Security and Cloud Strategies Masonic pocket watch circa 1918.

If you want to sell me SEO, look at what I do first.


Invitation from LinkedIn
http://www.top500.org/site/50547
Place ads on LinkedIn. Acquire
new customers for your
Respected executive and technology leader delivering proven ability to capitalize on enterprise-level
business. Try it now.
technologies and pioneering strategies. A sought-after internationally recognized author and public
speaker, delivering solutions to government and corporate departments in SCADA security, Cyber
Security and Cyber Defense, as well as leading the uptake of IPv6 and Cloud technologies. Drives
innovative strategies that result in the strategic redevelopment and invigoration of both startups and
established firms. Futurist, thought leader and expert with proven innovation in program leadership,
execution design and strategic redevelopment.
► Technology Leadership Results
Trusted member of senior executive team driving results driven innovation focused strategies that
take core business competencies and deliver profitable client centric results and growth.

► Centre of Excellence Leader delivering to government and corporate clients pathways to IPv6
and secure cloud based solutions.

► Led the migration of a new core banking platform based on .Net and cloud technologies
delivering a forward client centered banking platform.

► Oversight and governance in the profitable management of a $5 billion financial trust.

Distinguished by designing the security architecture and environment for Lasseter’s On-Line Casino
allowing approval by the NT Government for the first online gaming license globally.

Developed board level security policies and procedural practices within Mahindra and Mahindra,
India’s largest vehicle manufacturer. The Mahindra group employee over 50,000 people in total and
has numerous business interests from Car to Tractor manufacture, through to IT outsourcing.

Experience

Chief Scientist
Private
July 2015 – Present (6 months)

Writing papers,
Research,
Managing change.

Nothing but security and blockchain

Chief Executive Officer


DeMorgan Limited
September 2014 – Present (1 year 4 months)

DeMorgan is a pre-IPO Australian listed company focused on alternative currency, next generation
banking and reputational and educational products with a focus on security and creating a simple
user experience.

We control the following companies:


• Panopticrypt Pty Ltd
• Cloudcroft Pty Ltd
• Coin-Exch Pty Ltd
• C01N Pty Ltd
• CHAOS AND NONLINEAR FORECASTABILITY IN ECONOMICS AND FINANCE PTY. LTD.
• DASO Pty Ltd
• Denariuz Pty Ltd
• Denariuz Pte Ltd (Singapore)
• EzAs Pty Ltd
• Integyrz Pty Ltd
• DeMorgan Ltd (Panama)
• Pholus Pty Ltd
• Zuhl Pty Ltd
• Zuhl Corp Ltd (USA)
• Misfit Games Pty Ltd
• Denariuz Ltd (UK)

Our group of companies has received a series of Advance Findings from AusIndustry around the
two HPC systems we run and the AI and machine learning activities we conduct. In total, we have
received Core Technology and Advance Finding certificates for 110 million in research activities.

In the six years since the first company in the group started, we have completed several Bitcoin
based research projects that have lasted over and are now ready to start commercialising.

Chief Executive Officer


Hotwire Pre-Emptive Intelligence Group
June 2013 – Present (2 years 7 months) Sydney, Australia

Responsible for direction and business development as well as development of programs and
services.

We are a group of highly technical individuals that make up a growing team. This position is based
in our Sydney office, with travel to Brisbane and California.
The world grows through change and knowledge. To thrive, people need to develop wisdom in a
social web. To enable this, we must look ahead, understand the trends and forces that will shape
society and business in the future and move swiftly to prepare people for what's to come. We will
help the world to get ready for tomorrow today. That's what our 2020 Vision is all about. It creates a
long-term destination for our business and provides us with a "Roadmap" for winning together with
our community and the society we will help to foster through trust and assurance.

Our Mission
Our Roadmap starts with our mission, which is enduring. It declares our purpose as a company and
serves as the standard against which we weigh our actions and decisions.
• To make the world wiser and better...
• To inspire enduring optimism and trust...
• To create value and make a difference.

Hotwiring the world


The world grows through change and knowledge. To thrive, people need to develop wisdom in a
social web. To enable this, Hotwire PE must look ahead, understand the trends and forces that will
shape society and business in the future and move swiftly to prepare people for what's to come. We
will help the world to get ready for tomorrow today. That's what our 2020 Vision is all about. It
creates a long-term destination for our business and provides us with a "Roadmap" for winning
together with our community and the society we will help to foster through trust and assurance.

Trustee
The Uniting Church (NSW) Trust Association Limited
December 2007 – Present (8 years 1 month)

United Financial Services Trustee


Financial services are provided by The Uniting Church (NSW) Trust Association Limited ACN 000
022 480, ABN 89 725 654 978, AFSL 292186 and by The Uniting Church in Australia Property Trust
(NSW)

Author and Technical Editor


Various Publishers
December 1999 – Present (16 years 1 month)

I am working on the legal section of the CISSP/ISSMP handbook for ISC2 and a book on MMC
(Syngress) - Mobile Malicious Code. At the moment.

My latest book to be released is:


"The IT Regulatory and Standards Compliance Handbook:
How to Survive Information Systems Audit and Assessments"

Publisher: Syngress (June 21, 2008)


Language: English
ISBN-10: 1597492663
ISBN-13: 978-1597492669
http://www.amazon.com/Regulatory-Standards-Compliance-Handbook-Information/dp/1597492663

Executive Vice President, Strategic Development


CSCSS / Centre for Strategic Cyberspace + Security Science
January 2012 – July 2015 (3 years 7 months) London, United Kingdom

Responsible for direction and business development within the Asia Pacific region as well as
development of programs and services.

The Centre for Strategic Cyberspace + Security Science (CSCSS) is a multilateral, international not-
for-profit organization that conducts independent cyber-centric research, development, analysis, and
training in the areas of cyberspace, defence intelligence, cyber security, and science while
addressing the threats, trends, and opportunities shaping international security policies and national
cyberspace cyber security initiatives.

CSCSS, as a strategic leader in cyberspace, works jointly with key partners to address, develop,
and define cyber technologies, cyber defence force capabilities, information dominance, and
concept operations. We deliver practical recommendations and innovative solutions and strategies
to advance a secure cyberspace domain.

CSCSS focuses on research and development in cyberspace, cyber-science, and cyber-security to


find strategic insights and solutions. Our areas of operations are:

•The Cyberspace Group


•The Cyber Warfare Centre (CWC)
•The Cyberspace Science Research + Development (CSRD) Group
•The Cyberspace Modelling + Simulation Centre (CMSC)
•The Critical Infrastructure Protection (CIP) Group
•The Enterprise Technology + Security Consortium
•Cyber Security Training (Classified/Unclassified)
These groups focus on issues related to:

•Defence and Cyber Security


•Information Defence/Information Dominance
•Cyber Training, Education, and Science
•Cyber Crime/eCrime
•Cyberspace Science Operation
•Global Response for Cyberspace
•Cyber Incident Response
•International Cyberspace Relations
•Joint Cyber Unit (JCU) hosted by CSCSS
•Cyberspace Network Integration
•Public-Private Sector Collaboration on Cyberspace and Security
•Cyber Emergency Readiness
•Creation of National Cyber Security Programs
•Minerva Projects

Subject Coordinator/Lecturer
Charles Sturt University
January 2010 – June 2015 (5 years 6 months)

Developed and promoted the Masters degree in Digital Forensics at CSU.

I am the subject coordinator for several subjects including -


- ITE 50x Mobile Coding (Windows)
- ITE 504 Windows Communication Foundation (Visual Studio 2010, C#)
- ITE 512 Incident Handling
- ITE 513 Digital Forensic Investigation
- ITE 514 Professional Systems Security (CISSP)
- ITE 516 Penetration Testing
- ITE 525 Cyberlaw
- ITE 539 Mail Server Implementation & Administration
- ITI 535 Networking and Operating System Essentials
- MGT 513 Enterprise Project Management

I promote the IT Masters degree in digital forensics that I helped to create.This is a industry aligned
coursework masters degree.

On top of this I am in the final stages of completing and having a subject approved in Windows
Mobile and Cloud Coding. This is an innovative course in programming for the Windows Tablet and
Phone marketplace using cloud based technologies.

I offer the following cloud based and crowd sourced courses:


- Statistics
- Cyber Crime
- Reverse Engineering Software

Vice President, Forensics Services


iVolution Security
May 2009 – June 2015 (6 years 2 months)

As Vice President, Forensics Services, Dr. Craig Wright is responsible for setting iVOLUTION
Security’s strategic direction in the forensics field and is responsible for overseeing the
development, testing and deployment of all forensics services and products.

Technical Director
GIAC
2007 – 2015 (8 years)

I am a SANS Technical Director


I am on the GIAC Ethics Board until standing down and leaving room for new blood (2011)

Mentor and Stay Sharp Instructor


SANS Institute
2007 – 2015 (8 years)

Various security courses:


http://www.sans.org/instructors/craig-wright

I have taught:
SEC 504 http://www.sans.org/course/hacker-techniques-exploits-incident-handling

SEC 560 http://www.sans.org/course/network-penetration-testing-ethical-hacking


SEC 660 http://www.sans.org/course/advanced-penetration-testing-exploits-ethical-hacking

SEC 508 http://www.sans.org/course/advanced-computer-forensic-analysis-incident-response

SEC 401 http://www.sans.org/course/security-essentials-bootcamp-style

LEG 523 http://www.sans.org/course/law-data-security-investigations

AUD 507 http://www.sans.org/course/auditing-networks-perimeters-systems

VP, Asia Pac


Whitehats Conference
April 2008 – October 2012 (4 years 7 months)

Whitehats Conference brings together innovative, ground-breaking information security


technologies, and also provides access to leaders, experts, and luminaries in the IT security field.
Whitehats Conference delivers knowledge, critical insight, and awareness into current and emerging
whitehat technologies, organizations, and trends, and explores their potential impact on business
environments.

Asia Pacific Director, VP


GICSR | Global Institute for Cyber Security + Research
April 2011 – February 2012 (11 months)

Delivery of vision in Strengthening cyberspace at an organizational, national, and international level,


protecting key elements of the information and critical infrastructure which are crucial to the
continued delivery of essential services and national security.

Responsible for strategic direction and business development within the Asia Pacific region.
Establishment of executive level relationships with the National Security Agency (NSA), Department
of Homeland Security (DHS), North American Space Administration and DSD and regional
government bodies. Formation of a multinational cconsortium providing information systems
assurance and information security engineering and architecture services to promote the secure
design and development of information services, technologies, communications, products, and
systems. We deliver tactical IA solutions and frameworks. Executive management of the CSRD
Group leveraging strategic partnerships with the public-private sector, academia, and international
agencies to enable an innovative-collaborative approach to R&D.

CEO
GreyFog
November 2009 – January 2012 (2 years 3 months)

Greyfog developed security software and solutions to the digital media industry. We worked with
Watt Watchers and developed a small footprint security device for the transmission of digital media.

This company was sold for the licensing rights of the business after the successful deployment of a
national VPN and firewall infrastructure managing an international cinema chain was deployed.

Chief Software Officer, Director


Integyrs Pty Ltd
March 2009 – June 2011 (2 years 4 months)

Algorithmic and Secure Software design and code analysis.

Leading a software team in modeling of risk using hazard survival models. Creating a package of
.Net libraries for audit clients, Digital Forensics and design of statistical tests for accounting and
financial systems.

Responsible lead on a packer analysis project designed to improve the efficiency of malware
detection in the CA Vet Anti-Virus platform. Creation of DATs (Digital Analysis Technology) for a
Marine Sales Company in NSW. Static Code analysis for a major multinational gaming company.

Director
Information Defense Pty Ltd
January 2009 – June 2011 (2 years 6 months)

Information defense was sold to Cloudcroft in 2011.

Key achievements in this role:


- Project management and operational deployment of a nationwide (Australia and NZ) deployment
of a managed IDS, Firewall, SIEM and logging platform for an advanced media company across 45
geographically segmented locations each requiring a meshed series of network security devices.

- Core Banking review and implementation for a major credit union.

- Code security maintenance and project management on Database (SQL, SAS) and Web projects
for a major online sport's betting and casino operation.

Digital Forensics, Information and Data Protection Services.

Information Defense provides the knowledge and skills to ensure that your data remains safe,
secure and accurate. Like most companies of our class, we provide services to defend against
cyber crime and online fraud. Unlike most (if not all) we also have the skills to ensure that your data
is accurate. Combining the highest level of digital forensic, information security and statistical skills
in a single entity allows us to offer you the solution that you need to ensure that your data is safe.

Associate Director (Risk Services) BDO


BDO
October 2004 – January 2009 (4 years 4 months)

Security risk assessments, (Based on HIPPA, AS/NZS 4360 and various sections of the financial
services legislation),

Project managed the implementation of a secure remote access and token authentication system.

Implemented and lead a project to design and deploy ISO 17799 aligned policy and procedures
within numerous companies both in Australia and Internationally through a consultative process.

Developed ISO17799 and AS/NZS 4360 audit and review frameworks

Has produced academically published papers on IT, Mathematics, HR and Business Strategy

I Manage the following Business lines:


Data Analysis Team
Data Mining Team
IT Forensic Team
IT Audit Team
IT Security Team

I specialise in:
• Associative Rules Mining
• Memory Forensics
• Embedded device Forensics
• Network Forensics
• Cryptanalysis
• System incident recovery (“deep diving”)
• Steganography

Chief Research Officer (1-100 Employees, R and D Company)


Ridges Estate
February 2001 – September 2004 (3 years 8 months)

Implemented an AusIndustry approved Research Program involving the integration of technical


solutions to the information security and agribusiness arenas.

Creation of Firewall and Authentication Procedure documents for News Ltd


Mentoring at News Ltd in Security Technologies
Risk Assessments for News Ltd based on AS4360
Audit activity for News Ltd of the Internet systems and Firewalls
Staff training of the SecurID Authorisation systems
Network Security audit of the RIC Systems Internet Gateways
DNS and Mail Systems Security for RIC

Virus containment activities for RIC


Policy creation for Vodafone Ltd
Risk Assessments for Vodafone
Training and documentation of Security Audit and review procedures for Vodafone
Wireless research

Craig lead a research team that conducted technology research into -

Wireless systems research


IT Security Systems
Encryption Techniology
Agricultural Automation and monitoring systems
Farm Management Software
Malware Systems
Managing Director
DeMorgan
November 1997 – August 2003 (5 years 10 months)

MD, CTO, CIO and founder.

Founded one of the first providers of IT security services specializing in managed security and
secure systems design to the top 150 companies in Australia with a focus on the financial services,
banking and technology markets.

Executive management of IT consultants, administrative and helpdesk staff with between 20-26
direct reports in 15 global locations.

Information Security Australian Stock Exchange


Australian Stock Exchange
April 1997 – May 1998 (1 year 2 months)

Security, Firewalls and IDS.

Corporate Accounts Manager


OzEmail
1996 – 1997 (1 year)

Managing a bunch of engineers in the pre-dot.com bubble days

Network Manager
Corporate Express (WPA)
1992 – 1996 (4 years)

General gopher and person people blamed when computers failed

All sorts
WPA
1992 – 1995 (3 years)

Fixing stuff

Executive Chef
C&C Catering
March 1991 – November 1994 (3 years 9 months)

Specialty catering. Game, central European cuisine, 1 off banquets.

I was trained in French Provincial styles and Hute cuisine. I was a Sous chef for a time with a
speciality as a saucier, and brassier. I did specialty game meals for the most part.

My training was with continential kitchens and then others in the 80's.

Languages

French English
Limited working proficiency Native or bilingual proficiency

Skills

SPSS R C, C++ Programming Heteroscadestic analysis Forensics, Digital

Malware Analysis Information Security Management Financial Economics SAS70


Commercial Law Device Physics Chemistry, Fuel Sciences Encryption

ASM, Asembly Reverse Engineering See 35+

Publications

The IT regulatory and standards compliance handbook "


Syngress
July 2008

This book provides comprehensive methodology, enabling the staff charged with an IT security audit
to create a sound framework, allowing them to meet the challenges of compliance in a way that
aligns with both business and technical needs. This "roadmap" provides a way of interpreting
complex, often confusing, compliance requirements within the larger scope of an organization's
overall needs.

Key Features:

* The ulitmate guide to making an effective security policy and controls that enable monitoring and
testing against them
* The most comprehensive IT compliance template available, giving detailed information on testing
all your IT security, policy and governance requirements
* A guide to meeting the minimum standard, whether you are planning to meet ISO 27001, PCI-
DSS, HIPPA, FISCAM, COBIT or any other IT compliance requirement
* Both technical staff responsible for securing and auditing information systems and auditors who
desire to demonstrate their technical expertise will gain the knowledge, skills and abilities to apply
basic risk analysis techniques and to conduct a technical audit of essential information systems from
this book
* This technically based, practical guide to information systems audit and assessment will show how
the process can be used to meet myriad compliance issues
Authors: Craig Steven Wright

The Official CHFI Study Guide (Exam 312-49) For Computer Hacking
Forensics Investigators "
Elsevier
August 2007

Audience:
Police and law enforcement personnel, military personnel, security professionals, systems
administrators, legal professionals, banking, insurance, IT managers or people studying for the
CHFI certification.
Authors: Craig Steven Wright

Official (ISC)2 Guide to the CISSP(R)-ISSMP(R) CBK "


ISC2
May 2009

The Official (ISC)2® Guide to the ISSMP® CBK® provides an overview of management topics
related to information security. This iteration provides for a more expanded enterprise model of
security and management, one that delves into project management, risk management, and
continuity planning. Preparing the professional for certification, as well as for job readiness, this
resource promotes an understanding of what are now five ISSEP domains. These include
Enterprise Security Management Practices, Enterprise-Wide System Development Security, Law,
Investigations, Forensics and Ethics, Overseeing Compliance of Operations Security, and Business
Continuity and Disaster Recovery Planning.
Authors: Craig Steven Wright

Overwriting Hard Drive Data: The Great Wiping Controversy "


Information Systems Security: 4th International Conference, Iciss 2008, Hyderabad, India,
December 16-20, 2008, Proceedings
December 2008

Abstract. Often we hear controversial opinions in digital forensics on the re-


quired or desired number of passes to utilize for properly overwriting, some-
times referred to as wiping or erasing, a modern hard drive. The controversy has
caused much misconception, with persons commonly quoting that data can be
recovered if it has only been overwritten once or twice. Moreover, referencing
that it actually takes up to ten, and even as many as 35 (referred to as the Gut-
mann scheme because of the 1996 Secure Deletion of Data from Magnetic and
Solid-State Memory published paper by Peter Gutmann) passes to securely
overwrite the previous data. One of the chief controversies is that if a head posi-
tioning system is not exact enough, new data written to a drive may not be writ-
ten back to the precise location of the original data. We demonstrate that the
controversy surrounding this topic is unfounded.
Authors: Craig Steven Wright, Shyaam Sundhar, Dave Kleiman

Implementing an Information Security Management System (ISMS) Training


process "
GIAC
Authors: Craig Steven Wright

Analysis of a serial based digital voice recorder "


GIAC
Authors: Craig Steven Wright

A Taxonomy of Information Systems Audits, Assessments and Reviews "


GIAC
Authors: Craig Steven Wright

Electronic Contracting In An Insecure World "


GIAC
Authors: Craig Steven Wright

Requirements For Record Keeping and Document Destruction in a Digital


World "
GIAC
Authors: Craig Steven Wright

Detecting Hydan: Statistical Methods For Classifying The Use Of Hydan


Based Stegonagraphy In Executable Files "
GIAC
Authors: Craig Steven Wright

CURRENT ISSUES IN DNS "


GIAC
Authors: Craig Steven Wright

A comparative study of attacks against Corporate IIS and Apache Web


Servers "
GIAC
Authors: Craig Steven Wright

Rationally Opting for the Insecure Alternative: Negative Externalities and


the Selection of Security Controls "
GIAC
Authors: Craig Steven Wright

A Preamble Into Aligning Systems Engineering and Information Security


Risk "
GIAC
Authors: Craig Steven Wright

There’s Nothing But Data Out There "


Hakin9
July 2012

In all of this, we have a society that is reliant on systems and data. Here, we see a new need to be
even more vigilant than we have been in the past. When food systems are based on SCADA style
controls, there is far less room for allowing rouge access to the databases and systems that run the
controls that enable this future? Security has always been important, but as a future career, it is one
that is not going to disappear. We may see automated systems replace even skilled jobs (such as a
pilot), but it will be a long time before we start to have secure systems that do not involve people.
Authors: Craig Steven Wright

Secure commerce in the Mist "


Hakin9
May 2012

We are starting to move to IPv6 and the cloud. Right now, the uptake is minimal at best with very
few early adopters for all of the hype. The climate is changing. Soon, IP addresses will be on
everything and even the concept of non-disclosure agreements and contracts designed to protect
intellectual property will require that we consider the nature of the cloud and the Internet as a
platform for contractual negotiation.
Authors: Craig Steven Wright

Searching For Exploits, SCAPY Fuzzing "


Hakin9
July 2012

SCAPY is a series of python based scripts that are designed for network level packet manipulation.
With it, we can sniff network traffic, interactively manipulate it, and fuzz services. More, SCAPY
decodes the packets that it receives without interpreting them. The article is going into some of the
fundamentals that you will need in order to understand the shellcode and exploit creation process,
how to use Python as a launch platform for your shellcode and what the various system
components are.
Authors: Craig Steven Wright

Extending Control, API Hooking "


Hakin9
May 2012

API hooking the malicious code is used to vary the library function calls and returns by replacing the
valid function calls with one of the attackers choosing. The article follows from previous articles as
well as goes into some of the fundamentals that you will need in order to understand the shellcode
creation process, how to use Python as a launch platform for your shellcode and that the various
system components are. This article includes a section on functions and calls, extending DLL
injection and then move to the actual API hooking process (that we will extend) in coming articles.
With these skills you will have the foundations for creating shellcode for exploits and hence an
understanding of the process that penetration testers and hackers use in exploiting systems. You
will see how it is possible to either create your own exploit code from scratch or even to modify
existing exploit code to either add functionality or in order to bypass signature based IDS/IPS filters.
Authors: Craig Steven Wright

Exploiting Format Strings with Python "


Hakin9
June 2012

Format string attacks are not particularly new. Since


their widespread public release in 2000, format string
vulnerabilities have picked up in intensity as buffer
overflows become less common and more widely known.
From an unknown start a decade ago, they have become
a common means to exploiting system applications.
These vulnerabilities remain an issue as we still teach
them. It is not uncommon for format string vulnerabilities
to allow the attacker to view all the memory contained
within a process. This is useful as it aids in locating
desired variables or instructions within memory. With
this knowledge, an attacker can exploit the vulnerability
to successfully exploit code and even bypass control
such as Address Space Layout Randomization. In this
article Craig will discuss crafting attacks using python
in order to attack through DPA (Direct Parameter Access)
such that you can enact a 4-byte overwrite in the DTORS
and GOT (Global Access Table) and prepares the reader
for a follow-up article on exploiting the GOT and injecting
shell code.
Authors: Craig Steven Wright

DPA Exploitation and GOTs with Python "


Hakin9
June 2012

This article is a follow-up and second part of a look at format strings in the C and C++ programming
languages; in particular, how these may be abused. The article goes on to discuss crafting attacks
using Python in order to attack through DPA (Direct Parameter Access) such that you can enact a 4-
byte overwrite in the DTORS and GOT (Global Access Table).
Authors: Craig Steven Wright

Starting to Write Your Own Linux Schellcode "


Haking
June 2012

We have seen more and more people become reliant on


tools such as Metasploit in the last decade. This ability to
use these tools has empowered many and has created a
rise in the number of people who can research software
vulnerabilities. It has created more security professionals
who cannot only scan a target for vulnerabilities using
a tool such as Nessus, but who can complete tests
involving system exploitations and hence validate the
results presented to them by a scanner. But, this ends
when a new application with unexpected calls or controls
is found. What do we do when presented with a special
case? This makes it extremely difficult for signature
based systems to stop or detect shellcode created for
a specific purpose and hence more likely that the tester
will succeed in testing the vulnerability without other
controls interfering. If we remain at this level, we will
stop the lower level attacker, but fail in stopping more
sophisticated attacks. You will learn how to write your
own shellcode, how to fix all the nulls and how to validate
your shellcode.
Authors: Craig Steven Wright

Beyond Automated Tools and Frameworks: the shellcode injection process "
Hakin9
June 2012

Automated frameworks (including Metasploit) have simplified the testing and exploitation process.
This of course comes with a price. Many penetration testers
have become tool jockeys with little understanding of
just how software functions. This script kiddie approach
to code testing does have its place. It has allowed us to
drastically increase the number of people working on
testing systems for vulnerabilities and in assessing the
risks these pose. At the same time, if these individuals
do not progress further, simply relying on the ability to
leverage the efforts of others, we will hit bottlenecks in
the creation of new tests and processes. This article is
going to follow from previous articles as well as going
into some of the fundamentals that you will need in order
to understand the shellcode creation process, how to use
Python as a launch platform for your shellcode and that
the various system components are.
Authors: Craig Steven Wright
Understanding conditionals in shellcode "
Hakin9
June 2012

This article is going to follow from previous articles as well


as going into some of the fundamentals that you will need
in order to understand the shellcode creation process. In
this article, we are looking at extending our knowledge
of assembly and shellcoding. This is a precursor to the
actual injection and hooking process to follow. You will
investigate how you can determine code loops, the uses
of loops as well as acting as an introduction into how
you can reverse engineer assembly or shellcode into a
higher level language and even pseudo-code, all of which
forms an essential component of creating and executing
one’s own exploit successfully. By gaining a deep
understanding just how code works and to know where to
find the fundamentals shellcode programming language
we hope to take the reader from a novice to being able to
create and deploy their own shellcode and exploits.
Authors: Craig Steven Wright

Taking control, Functions to DLL injection "


Hakin9
June 2012

DLL injection is one of the most common methods


used by malware such as a rootkit to load it into the
host’s privileged processes. Once injected, code can
be inserted into functions being transmitted between
the compromised code and a library function. This
step is frequently followed with API hooking where
the malicious code is used to vary the library function calls and returns. This article is part of a
monthly series
designed to take the reader from a novice to being able
to create and deploy their own shellcode and exploits.
With this knowledge, you will learn just how easy it is for
sophisticated attackers to create code that can bypass
many security tools. More, armed with this knowledge
you will have the ability to reverse engineer attack code
and even malware allowing you to determine what the
attacker was intending to launch against your system.
Authors: Craig Steven Wright

THE ECONOMICS OF DEVELOPING SECURITY EMBEDDED SOFTWARE "


SECAU

Abstract Market models for software vulnerabilities have been disparaged in the past citing how
these do little to lower the risk of insecure software. In this paper we argue that the market models
proposed are flawed and not the concept of a market itself. A well-defined software risk derivative
market would improve the information exchange for both the software user and vendor removing the
often touted imperfect information state that is said to believe the software industry. In this way,
users could have a rational means of accurately judging software risks and costs and as such the
vendor could optimally apply their time between delivering features and averting risk in a manner
demanded by the end user. It is of little value to increase the cost per unit of software by more than
an equal compensating control in an attempt to create secure software. This paper argues that if the
cost of an alternative control that can be added to a system is lower than the cost improving the
security of the software itself, then it is uneconomical to spend more time and hence money
improving the security of the software. It is argued that a software derivative market will provide the
mechanism needed to determine these costs.
Keywords – Security, Derivatives, vulnerability market, software development, game theory
Authors: Craig Steven Wright, Tanveer A Zia

A quantitative analysis into the economics of correcting software bugs "


CISIS'11 Proceedings of the 4th international conference on Computational intelligence in
security for information systems
October 2011

Using a quantitative study of in-house coding practices, we demonstrate the notion that
programming needs to move from "Lines of Code per day" as a productivity measure to a measure
that takes debugging and documentation into account. This could be something such as "Lines of
clean, simple, correct, well-documented code per day", but with bugs propagating into the 6th
iteration of patches, a new paradigm needs to be developed. Finding flaws in software, whether
these have a security related cost or not, is an essential component of software development. When
these bugs result in security vulnerabilities, the importance of testing becomes even more critical.
Many studies have been conducted using the practices of large software vendors as a basis, but
few studies have looked at in-house development practices. This paper uses an empirical study of
in-house software coding practices in Australian companies to both demonstrate that there is an
economic limit to how far testing should proceed as well as noting the deficiencies in the existing
approaches.
Authors: Craig Steven Wright, Tanveer A. Zia

Certifications

GIAC Security Expert (GSE)


GIAC, License 16
September 2009 – September 2013

GIAC Security Expert Malware (GSE-Malware)


GIAC, License 22
October 2008 – October 2012

GIAC Security Expert Compliance (GSE-Compliance)


GIAC, License 1
September 2007 – September 2011

GIAC Security Essentials GSEC (GOLD)


GIAC http://www.giac.org/certified-professional/craig-wright/107335, License 10056
July 2007 – September 2013

GIAC Certified Firewall Analyst GCFW (GOLD)


GIAC http://www.giac.org/certified-professional/craig-wright/107335, License 1891
December 2007 – September 2013

GIAC Certified Windows Security Administrator GCWN


GIAC, License 1234
January 2008 – September 2013

GIAC Certified ISO-27000 Specialist G2700 (GOLD)


GIAC http://www.giac.org/certified-professional/craig-wright/107335, License 39
April 2005 – Present

GIAC Certified Intrusion Analyst GCIA


GIAC http://www.giac.org/certified-professional/craig-wright/107335, License 2913
January 2008 – Present

GIAC Certified Windows Security Administrator GCWN


GIAC http://www.giac.org/certified-professional/craig-wright/107335, License 1234
January 2008 – Present

SANS Cyber Guardian Program (https://www.sans.org/cyber-


guardian/listings.php)
SANS Cyber Guardian Program https://www.sans.org/cyber-guardian/, License Red/Blue
January 2009 – Present
GIAC Information Security Fundamentals GISF
GIAC http://www.giac.org/certified-professional/craig-wright/107335, License 1444
January 2011 – Present

GIAC Certified Incident Handler GCIH (GOLD)


GIAC http://www.giac.org/certified-professional/craig-wright/107335, License 5896
November 2011 – Present

GIAC Certified UNIX Security Administrator GCUX


GIAC http://www.giac.org/certified-professional/craig-wright/107335, License 587
October 2007 – Present

GIAC Certified Forensic Analyst GCFA (GOLD)


GIAC http://www.giac.org/certified-professional/craig-wright/107335, License 265
September 2005 – Present

GIAC Systems and Network Auditor GSNA (GOLD)


GIAC http://www.giac.org/certified-professional/craig-wright/107335, License 571
September 2006 – Present

GIAC Security Leadership GSLC (GOLD)


GIAC http://www.giac.org/certified-professional/craig-wright/107335, License 2178
April 2008 – Present

GIAC Reverse Engineering Malware GREM (GOLD)


GIAC http://www.giac.org/certified-professional/craig-wright/107335, License 586
June 2006 – Present

CISSP Certified Information Security Professional


ISC2, License 47304
January 2003 – Present

CISSP-ISSMP Information Systems Security Management Professional


ISC2, License 47304
January 2003 – Present

CISSP ISSAP Information Systems Security Architecture Professional


ISC2, License 47304
January 2003 – Present

CISA Certified Information Systems Auditor


ISACA

CISM Certified Information Security Manager


ISACA
GIAC Assessing and Auditing Wireless Networks GAWN
GIAC http://www.giac.org/certified-professional/craig-wright/107335, License 894
December 2007 – Present

GIAC Information Security Professional GISP


GIAC http://www.giac.org/certified-professional/craig-wright/107335, License 1978
February 2011 – Present

GIAC Legal Issues in Information Technology & Security GLEG (GOLD)


GIAC http://www.giac.org/certified-professional/craig-wright/107335, License 6
June 2007 – Present

GIAC Certified Project Manager GCPM (GOLD)


GIAC http://www.giac.org/certified-professional/craig-wright/107335, License 128
May 2009 – Present

GIAC Penetration Tester GPEN


GIAC http://www.giac.org/certified-professional/craig-wright/107335, License 7262
July 2011 – Present

GIAC Secure Software Programmer- .NET GSSP-.NET


GIAC http://www.giac.org/certified-professional/craig-wright/107335, License 263
February 2011 – Present

GIAC Web Application Penetration Tester GWAPT


GIAC http://www.giac.org/certified-professional/craig-wright/107335, License 2358
January 2011 – Present

GSAE
GIAC, License 141
September 2007 – Present

GNET
GIAC, License 129
June 2008 – Present

GIAC Law of Fraud


GIAC

GIAC Reverse Engineering Malware


GIAC

GIAC Intrusion Prevention


GIAC
SANS Stay Sharp Master Packet Analysis
GIAC

Stay Sharp: Defeating Rogue Access Points


GIAC

GIAC Web Application Security


GIAC

Stay Sharp - Google Hacking and Defense


GIAC

GIAC Security Policy and Awareness


GIAC

GPCI GIAC Payment Card Industry


GIAC

GIAC Leadership Management


GIAC

CCE Certified Computer Examiner


ISFCE http://www.isfce.com/ccelist.htm, License 480

Education

University of London
Master of Science (MSc), Finance (Quantitative Finance)
2015 – 2017

Econometrics

SANS Institute
Master of Science (M.Sc.), Information Security Management
2010 – 2012

SANS Technology Institute


Master of Science Degree in Information Security Engineering (MSISE), Information Systems
- Security
2010 – 2012

The Master of Science Degree in Information Security Engineering Curriculum:

http://www.sans.edu/academics/curricula/msise

All of the papers and primary work is complete.

http://www.giac.org/certified-professional/craig-wright/107335

Charles Sturt University


Charles Sturt University
PhD, Computer Science
2009 – 2012

Incorporates:
• Economic theory,
• Quantitative financial modelling,
• Algorithmic game theory and
• Statistical hazard/survival models.
The models will account for Heteroscadastic confounding variables and include appropriate
transforms such that variance heterogeneity is assured in non-normal distributions. Process
modelling for integrated Poisson continuous-time process for risk through hazard will be developed
using a combination of:
• Business financial data (company accountancy and other records),
• Legal databases for tortuous and regulatory costs and
• Insurance datasets.
This data will be coupled with hazard models created using Honeynets (e.g. Project Honeynet),
reporting sites such as the storm centre. The combination of this information will provide the
framework for the first truly quantitative security risk framework.
Activities and Societies: The Quantification of Information Systems Risk The goal of this research
project is to create a series of quantitatively models for information security. Mathematical modelling
techniques that can be used to model and predict information security risk will be developed using a
combination of techniques.

Charles Sturt University


MSD, Masters in Systems Development
2009 – 2010

See
http://www.itmasters.edu.au/WhichQualification/MasterofSystemsDevelopment/MicrosoftMCSDNet3
5Stream.aspx
Activities and Societies: Java, C#, C, C++

Charles Sturt University


Psychology, Psychology
2007 – 2010

Activities and Societies: Associate Student at present. Have completed. Foundations of Psychology

University of Newcastle
Master of Statistics (MSTAT), Quantitative Statistics
2005 – 2009

Longitudinal Data Analysis


Statistical Inference
Data Mining
Business Research Methods
Regression and Forecasting
Decision Analysis
Statistical Computing
Heteroscedastic Modelling
Financial time series
Bayesian Analysis
Generalised Linear Models
Activities and Societies: This programme involves undertaking skills training programmes, and
learning through originality in solving problems offering the ability to plan and implement tasks at a
professional level. Topics include: regression and ANOVA, mathematical statistics, research
methods, statistical inference, generalised linear models, time series and stochastic processes,
statistical computing, total quality management, Bayesian methods, data mining, surveys and
experiments, multivariate statistics.

Northumbria University
LLM, Law (International Commercial Law)
2006 – 2008

LLM (eCommerce Law)International Commercial Law


* Competition Law
* International Trade Finance Law
* International Finance Law
* Banking Law
* Law of International Trade
* Competition Law
* Contract Law (advanced)
* Tort and Negligence Online
Activities and Societies: LLM (eCommerce Law)International Commercial Law

Charles Sturt University


Master of Information Systems Security (MInfoSysSec), IT Security
2005 – 2008

Design Secure Distributed Networks


IT Risk Management
Network Security Fundamentals
Theory of Computation
IT Management Issues
Network and Security Admin
Information Security
Principles of Database Development
Object Modelling
SysDev Project Management
Activities and Societies: Advanced skills in the design, implementation and management of secure
networks Higher order network design An informed and reflexive perspective on IT Security issues
Problem-solving and troubleshooting and documenting complex problems The ability to analyse
complex client business security requirements and select appropriate solutions Skills in the
development of leading edge security solutions that meets customer business objectives for
functionality and performance

Sans Institute
GSE-Compliance, GSE-Malware, GIAC Security Expert (Compliance Stream)
2007 – 2007

Charles Sturt University


Master of Management (MMgt), Management, Finance
2004 – 2006

HRM571 Managing People in the Information Age


ITC563 IT Management Issues
MKT571 Marketing for IT Managers
FIN571 Managerial Finance
MGT572 Managing Organisational Change
MGT573 Strategic Practice
Activities and Societies: The aim of this course is to prepare students to succeed in management
positions that leverage computing technology to operate and expand business endeavours. The
needs of existing IT managers, programmers, developers, network engineers, and other IT workers
who aspire to move upward into technical management positions will be catered to with the
emphasis on exploiting information technologies for productivity and competitiveness.

Charles Sturt University


Master of Network and Systems Administration (MNSA), IT Networking
2003 – 2004

Subject: ITC-511 Networking Concepts 1


Subject: ITC-512 Networking Concepts 2
Subject: ITC-513 Wireless Networking Concepts
Subject: ITC-514 Network and Security Administration
Subject: ITC-593 Network security
Subject: ITC-506 Topics in IT Ethics
Subject: ITI-555: Operating System Essentials
Subject: ITI-556: Supporting a Network Infrastructure (I)
Subject: ITI-557: Supporting a Network Infrastructure (II)
Subject: ITI-558: Active Directory Infrastructure
Subject: ITI-559: Designing Active directories and Network Infrastructure
Activities and Societies: Advanced design, implementation and network management skills Higher
order system administration skills Advanced skills in identifying network security risk profiles,
defining security policies and maintaining secure global networks Problem-solving methodologies to
troubleshoot and document global internetworking problems Analyse complex client business and
technical requirements Development of solutions that meets customer business objectives for
functionality, performance, and cost

Guess (I am an ex-chatholic who is now involved in the UC)


Doctor of Theology, Comparitive Religous and Classical Studies
1998 – 2003

Ask me and I may share. I act as a lay pastor and I do not always desire to argue with people who
Ask me and I may share. I act as a lay pastor and I do not always desire to argue with people who
have no concept of religion. I was a catholic, became an atheist, and moved towards the uniting
church as I learnt more in science and mathematics.

If you need to ever need to know of Dionysus, Vesta, Menrva, Ceres (Roman Goddess of the Corn,
Earth, Harvest) or other Mythological characters - I am your man. I could even hold a conversation
on Eileithyia, the Greek Goddess of Childbirth and her roman rebirth as Lucina.

I bet you did not know that Asklepios Aesculapius is the Greek God of Health and Medicine or that
Lucifer is the name of the Roman Light-bearer, the God and Star that brings in the day.
Activities and Societies: A comparitive study of Greko-Roman foundations to the Judeo-Christian
origins of the Eve belief and myth structure. If you are really lucky (or unlucky as the case my be) I
may let you read my dissertation: "Gnarled roots of a creation theory".

Fuel Sciences
Associate of Science (Organic Chemistry)
1995 – 1997

Nuclear Physics
Nuclear Physics, Nuclear magnetic resonance (NMR)
1993 – 1995

University of Queensland
Engineering, Computer Systems Engineering (incomplete - changed to
Comp Sci in 4th year - I was young)
1988 – 1992

Padua College
HIgh School, Senior Certificate
1986 – 1987

IT - Summary of qualifications and achievements


A summary of some (some mind you) of my Certifications, Information Technology (Security)

GSE-Compliance # 0001 [Platinum] GIAC Security Compliance


GSEC # 10506
G7799 # 0039
GCFA # 0265
GSNA # 0571
GSAE # 0141
GLEG # 0006
GLFR # 0016 GIAC Law of Fraud (GLFR)
GREM # 0586 GIAC Reverse Engineering Malware (GREM)
GPCI # 0086 GIAC Payment Card Industry (GPCI)
GSPA # 0101 GIAC Security Policy and Awareness (GSPA)
GLDR # 0101 GIAC Leadership (GLDR)
GWAS # 0535 GIAC Web Application Security (GWAS)
GIPS # 0036 GIAC Intrusion Prevention (GIPS)
GCUX # 0587 GIAC Certified UNIX Security Administrator

MCSA # 3062393 Microsoft Certified Systems Administrator


MCSE # 3062393 Microsoft Certified Systems Engineer
MCSE # 3062393 Microsoft Certified Systems Engineer (Mail)
MCSE # 3062393 Microsoft Certified Systems Engineer (Security)
MCDBA # 3062393 Microsoft Certified Database Administrator

MIEEE # 87028913 Member IEEE


AFAIM # PM133844 Associate Fellow Aust Inst. Management
MACS # 3015822 Senior Member Aust Computer Society
Activities and Societies: CISSP # 47302 (ICS)2 Security Professional ISSMP # 47302 (ICS)2
Security - Management Professional ISSAP # 47302 (ICS)2 Security - Architecture Professional
CISA # 0542911 Certified Information Systems Auditor CISM # 0300803 Certified Information
Security Manager CCE # 480 ISFCE - Certified Computer Examiner ISSPCS # 051 International
Systems Security Professional Certification Scheme

Interests
Music (Piano) Research Learning

Patents

Application number: 20140359291 "


United States 20140359291
Issued December 2014
Inventors: Craig Steven Wright

Recommendations

A preview of what LinkedIn members have to say about Craig Steven:

# Craig is a little bit crazy, as in Orville & # Craig has a vast array of knowledge and
Wilbur Wright craziness of deciding to add experience at his disposal. He keeps his
an engine to a glider. ... a true visionary. commitments and gets along with with
See more other team members. He does quality…
See more

Sign up to see who recommended Craig Steven

Groups

Aurora Cybercrime &ASX


Cyberconflict
Network Research
Venture
Group
Capital – Public
Global
Equity
OWASP
– Funding
Foundation
– Investment
Aurora Cybercrime &… ASX Network Venture Capital – Pu… Global OWASP Foun…

Information Security Community


Information Systems Information
Security Association
Security Network
(ISSA) Discussion Forum
Information Security … Information Systems… Information Security … See 7 more

View Craig Steven’s full profile to...


• See who you know in common
• Get introduced
• Contact Craig Steven directly

View Craig Steven's Full Profile

LinkedIn member directory: a b c d e f g h i j k l m n o p q r s t u v w x y z more Browse members by country

© 2015 User Agreement Privacy Policy Community Guidelines Cookie Policy Copyright Policy Unsubscribe

Vous aimerez peut-être aussi