Gordon Lyon
Gordon Lyon | |
---|---|
Born | 1977 (age 46–47) |
Other names | Fyodor Vaskovich |
Known for | Nmap |
Website | insecure |
Gordon Lyon(also known by his pseudonymFyodor Vaskovich)[1]is an Americannetwork securityexpert,[2]creator ofNmapand author of books, websites, and technical papers about network security. He is a founding member of theHoneynet Projectand was Vice President ofComputer Professionals for Social Responsibility.
Personal life
[edit]Lyon has been active in the network security community since the mid-1990s. His handle, "Fyodor", was taken from Russian authorFyodor Dostoyevsky.[3]Most of his programming is done in theC,C++,andPerlprogramming languages.
Opposition to grayware
[edit]In December 2011, Lyon published a post criticizing the fact thatDownloadstarted bundlinggraywarewith their installation managers and expressing concerns users confusing Download -offered content for software offered by original authors; his accusations included deception as well as copyright and trademark violation.[4][5]
Conferences
[edit]Lyon has presented atDEFCON,CanSecWest,FOSDEM,IT Security World, Security Masters' Dojo,ShmooCon,IT-Defense, SFOBug, and other security conferences.[6][7]
Websites
[edit]Lyon maintains several network security web sites:
- Nmap.Org – Host of theNmapsecurity scanner and its documentation
- SecTools.Org – The top 100 network security tools (ranked by thousands of Nmap users)
- SecLists.Org – Archive of the most common security mailing lists
- Insecure.Org – His main site, offering security news/updates, exploit world archive, and other misc. security resources
Published books
[edit]- Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community,[8]co-authored with other members of theHoneynet Project.
- Stealing the Network: How to Own a Continent,[9]co-authored withKevin Mitnickand other hackers.
- Nmap Network Scanning[10]
See also
[edit]References
[edit]- ^"!S a f e m o d e. o r g!".May 15, 2019. Archived fromthe originalon May 15, 2019.RetrievedNovember 24,2021.
- ^Leyden, John (October 5, 2012)."Experts troll 'biggest security mag in the world' with DICKish submission".The Register.RetrievedJanuary 17,2021.
- ^"About me".RetrievedJanuary 17,2021.
- ^Krebs, Brian(December 6, 2011)."Download Bundling Toolbars, Trojans?".Krebs on Security.RetrievedJanuary 17,2021.
- ^Lyon, Gordon (June 27, 2012)."Download Caught Adding Malware to Nmap & Other Software".RetrievedJanuary 17,2021.
- ^"Fyodor's Nmap Presentations".RetrievedJanuary 17,2021.
- ^DEFCONConference (February 7, 2014)."DEF CON 13 - Fyodor, Hacking Nmap".YouTube.Archivedfrom the original on December 13, 2021.RetrievedJanuary 17,2021.
- ^The Honeypot Project (2002).Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community.Addison-Wesley.ISBN0-201-74613-1.
- ^1131ah; Rogers, Russ; Beale, Jay;Grand, Joe;Fyodor; FX; Craig, Paul; Mullen, Timothy; Parker, Tom (2004).Stealing the Network: How to Own a Continent.Syngress.ISBN1-931836-05-1.
- ^Lyon, Gordon (2008).Nmap Network Scanning.Nmap Project.ISBN978-0-9799587-1-7.