Jump to content

Gordon Lyon

From Wikipedia, the free encyclopedia

Gordon Lyon
Born1977 (age 46–47)
Other namesFyodor Vaskovich
Known forNmap
Websiteinsecure.org/fyodor

Gordon Lyon(also known by his pseudonymFyodor Vaskovich)[1]is an Americannetwork securityexpert,[2]creator ofNmapand author of books, websites, and technical papers about network security. He is a founding member of theHoneynet Projectand was Vice President ofComputer Professionals for Social Responsibility.

Personal life

[edit]

Lyon has been active in the network security community since the mid-1990s. His handle, "Fyodor", was taken from Russian authorFyodor Dostoyevsky.[3]Most of his programming is done in theC,C++,andPerlprogramming languages.

Opposition to grayware

[edit]

In December 2011, Lyon published a post criticizing the fact thatDownloadstarted bundlinggraywarewith their installation managers and expressing concerns users confusing Download -offered content for software offered by original authors; his accusations included deception as well as copyright and trademark violation.[4][5]

Conferences

[edit]

Lyon has presented atDEFCON,CanSecWest,FOSDEM,IT Security World, Security Masters' Dojo,ShmooCon,IT-Defense, SFOBug, and other security conferences.[6][7]

Websites

[edit]

Lyon maintains several network security web sites:

  • Nmap.Org – Host of theNmapsecurity scanner and its documentation
  • SecTools.Org – The top 100 network security tools (ranked by thousands of Nmap users)
  • SecLists.Org – Archive of the most common security mailing lists
  • Insecure.Org – His main site, offering security news/updates, exploit world archive, and other misc. security resources

Published books

[edit]
  • Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community,[8]co-authored with other members of theHoneynet Project.
  • Stealing the Network: How to Own a Continent,[9]co-authored withKevin Mitnickand other hackers.
  • Nmap Network Scanning[10]

See also

[edit]

References

[edit]
  1. ^"!S a f e m o d e. o r g!".May 15, 2019. Archived fromthe originalon May 15, 2019.RetrievedNovember 24,2021.
  2. ^Leyden, John (October 5, 2012)."Experts troll 'biggest security mag in the world' with DICKish submission".The Register.RetrievedJanuary 17,2021.
  3. ^"About me".RetrievedJanuary 17,2021.
  4. ^Krebs, Brian(December 6, 2011)."Download Bundling Toolbars, Trojans?".Krebs on Security.RetrievedJanuary 17,2021.
  5. ^Lyon, Gordon (June 27, 2012)."Download Caught Adding Malware to Nmap & Other Software".RetrievedJanuary 17,2021.
  6. ^"Fyodor's Nmap Presentations".RetrievedJanuary 17,2021.
  7. ^DEFCONConference (February 7, 2014)."DEF CON 13 - Fyodor, Hacking Nmap".YouTube.Archivedfrom the original on December 13, 2021.RetrievedJanuary 17,2021.
  8. ^The Honeypot Project (2002).Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community.Addison-Wesley.ISBN0-201-74613-1.
  9. ^1131ah; Rogers, Russ; Beale, Jay;Grand, Joe;Fyodor; FX; Craig, Paul; Mullen, Timothy; Parker, Tom (2004).Stealing the Network: How to Own a Continent.Syngress.ISBN1-931836-05-1.
  10. ^Lyon, Gordon (2008).Nmap Network Scanning.Nmap Project.ISBN978-0-9799587-1-7.
[edit]