请输入您要查询的百科知识:

 

词条 Peiter Zatko
释义

  1. Biography

  2. DARPA

  3. Awards

  4. Refereed papers

  5. L0pht Security Advisories and Software

  6. References

  7. External links

{{pp-sock|small=yes}}{{Infobox scientist
| name = Peiter "Mudge" Zatko
| image = Peiter Zatko at DARPA.jpg
| image_size = 200px
| caption = Mudge during his tenure at DARPA
| birth_date = {{Birth date and age|1970|12|01}}
| birth_place =
| death_date =
| death_place =
| residence = Mountain View, California
| citizenship = American
| field = Computer Science
Public administration
Hacker
| work_institutions = Google, Motorola, DARPA, L0pht
| alma_mater = Berklee College of Music
| known_for = L0pht, L0phtcrack, DARPA Cyber Fast Track, Testimony to the Senate, CULT OF THE DEAD COW
| prizes = Secretary of Defense Exceptional Civilian Service Award, Order of Thor
| religion =
| footnotes =
}}

Peiter C. Zatko, better known as Mudge, is a network security expert, open source programmer, writer, and a hacker. He was the most prominent member of the high-profile hacker think tank the L0pht[1]{{deadlink|date=December 2017}} as well as the long-lived computer and culture hacking cooperative the Cult of the Dead Cow.

While involved with the L0pht, Mudge contributed significantly to disclosure and education on information and security vulnerabilities. In addition to pioneering buffer overflow work, the security advisories he released contained early examples of flaws in the following areas: code injection, race condition, side-channel attack, exploitation of embedded systems, and cryptanalysis of commercial systems. He was the original author of the password cracking software L0phtCrack.[2]

In 2010 Mudge accepted a position as a program manager at DARPA where he oversaw cyber security research.[3] In 2013 Mudge went to work for Google in their Advanced Technology & Projects division.[4][5]

Biography

Born in December 1970, Mudge graduated from the Berklee College of Music at the top of his class[5] and is an adept guitar player.

Mudge was responsible for early research into a type of security vulnerability known as the buffer overflow. In 1995 he published "How to Write Buffer Overflows", one of the first papers on the topic.[6] He published some of the first security advisories and research demonstrating early vulnerabilities in Unix such as code injection, side-channel attacks, and information leaks, and was a leader in the full disclosure movement. He was the initial author of security tools L0phtCrack, AntiSniff, and l0phtwatch.

Mudge was one of the first people from the hacker community to reach out and build relationships with government and industry. In demand as a public speaker, he spoke at hacker conferences such as DEF CON[7] and academic conferences such as USENIX.[8] Mudge has also been a member of Cult of the Dead Cow since 1996.[9]

He was one of the seven L0pht members who testified before a Senate committee in 1998 about the serious vulnerabilities of the Internet at that time.[10] The L0pht became the computer security consultancy @stake in 1999, and Mudge became the vice president of research and development and later chief scientist.[11]

In 2000, after the first crippling Internet distributed denial-of-service attacks, he was invited to meet with President Bill Clinton at a security summit alongside cabinet members and industry executives.[12]

In 2004 he became a division scientist at government contractor BBN Technologies,[13] where he originally worked in the 1990s, and also joined the technical advisory board of NFR Security.[14] In 2010, it was announced that he would be project manager of a DARPA project focused on directing research in cyber security.[15] In 2013 he announced that he would leave DARPA for a position at Google ATAP.[5][18] In 2015 Zatko announced on Twitter he would join a project called #CyberUL, a testing organisation for computer security inspired by Underwriters Laboratories, mandated by the White House.[19]

On 11 August 2007 he married Sarah Lieberman, a co-worker at BBN.{{Citation needed|date=October 2008}}

DARPA

At DARPA he created the Cyber Analytical Framework the agency used to evaluate DoD investments in offensive and defensive cyber security. During his tenure he ran at least three DoD programs known as Military Networking Protocol (MNP), Cyber-Insider Threat (CINDER), and Cyber Fast Track (CFT).

Military Networking Protocol (MNP) provided network prioritization with full user-level attribution for military computer networks.[20]

Cyber-Insider Threat (CINDER) focused on identifying cyber espionage conducted by virtual insider threats such as future variants of Stuxnet or Duqu. CINDER is often mistakenly associated with WikiLeaks in the media.[22] This is possibly due to the confusion between DARPA programs focused on identifying human insider threat such as ADAMS [23] and the identification of software espionage posed by malware in the CINDER program.[24] This issue was clarified by Mudge in his Defcon 2011 keynote at 46 minutes and 11 seconds into the talk.[25]

Cyber Fast Track (CFT) provided resources and funding to security research, including programs run by hackers, hackerspaces, and makerlabs. The program provided an alternative to traditional government contracting vehicles that was accessible to individuals and small companies previously unable to work within the cumbersome and complicated DARPA process. The novel contracting effort had an averaging time of 7 days from receipt of proposal to funding being provided to the proposing research organization.[26] The program was initially announced at Shmoocon during his 2011 keynote.

Awards

  • 2013 Office of the Secretary of Defense Exceptional Public Service Award[27]
  • 2011 SC Magazine Top 5 influential IT security thinkers of the year[28]
  • 2007 Boston Business Journal 40 under 40[29]

Refereed papers

  • An Architecture for Scalable Network Defense, Proceedings of the 34th Annual IEEE Conference on Local Computer Networks (LCN), Strayer, Miliken, Watro, Heimerdinger, Harp, Goldman, Spicuzza, Schwartz, Mankins, Kong, and Zatko., Proceedings of the 34th Annual IEEE Conference on Local Computer Networks (LCN), October 2009.
  • SLINGbot: A System for Live Investigation of Next Generation Botnets, Alden Jackson, David Lapsley, Christine Jones, Mudge Zatko, Chaos Golubitsky, and W. Timothy Strayer, Proceedings of Cybersecurity Applications and Technologies Conference for Homeland Security (CATCH), Washington, D.C., March 2009.
  • Security Analysis of the Palm Operating System and its Weaknesses Against Malicious Code Threats, Joe Grand and Mudge, 10th Usenix Security Symposium, Washington, D.C., August 2001.
  • Cryptanalysis of Microsoft’s PPTP Authentication Extensions (MSCHAPv2), Bruce Schneier, Mudge, and David A. Wagner, Secure Networking CQRE [Secure] 1999, International Exhibition and Congress, Springer Lecture Notes in Computer Science, no. 1740, pp. 192–203, Nov/Dec, 1999.
  • Cryptanalysis of Microsoft’s Point-to-Point Tunneling Protocol (PPTP), Bruce Schneier and Mudge, Fifth ACM Conference on Communications and Computer Security, pages 132–141, March 1998.

L0pht Security Advisories and Software

Mudge published numerous papers and advisories detailing security problems across different applications and operating systems and was a pioneering champion of full disclosure.

  • Crontab buffer overflow vulnerabilities, Oct 2001[16]
  • Initial Cryptanalysis of the RSA SecurID Algorithm, Jan 2001[17]
  • AntiSniff: Identification of remote systems in promiscuous mode, May 2000[18]
  • Race conditions within RedHat Linux initscripts, Dec 2000[19]
  • Reverse Engineering Cactus Software shell-lock obfuscation techniques, Oct 1999[20]
  • Solaris /bin/su side channel attack, June 1999[21]
  • L0pht Watch: A tool for filesystem race condition attacks, Jan 1999[22]
  • Hash disclosure vulnerabilities in Quakenbush Windows NT Password Appraiser, Jan 1999[23]
  • suGuard privilege escalation attack, Jan 1999[24]
  • Embedded FORTH Hacking on Sparc Hardware, Phrack Magazine, Volume 8, Issue 53, July 1998[25]
  • Race Condition in Rational Systems ClearCase source control system, Jan 1998[26]
  • Imap 4.1 remote memory dump and retrieval of sensitive information, Oct 1997[27]
  • L0phtCrack: Technical rant on vulnerabilities in Microsoft encryption and passwords, July 1997[28]
  • Root Compromise through Solaris libc_getopt(3), Jan 1997[29]
  • BSD distributions of modstat allow compromise of DES keys, passwords, and ring 0 control, Dec 1996[30]
  • Kerberos 4 memory leaks provide sensitive credential information via remote attacks, Nov 1996[31]
  • Privilege escalation through Sendmail 8.7.5 GECOS buffer overflow vulnerability, Nov 1996[32]
  • cgi-bin/test-cgi parsing vulnerabilities allow remote directory traversal, April 1996[33]
  • Design weaknesses in the SecurID authentication system, 1996[34]
  • MONKey: An attack on the s/key one-time-password system, 1995[35]

References

1. ^Security Scene Errata {{webarchive |url=https://web.archive.org/web/20050502171648/http://attrition.org/errata/www/ao.016.html |date=2 May 2005}}
2. ^  {{Webarchive|url=https://web.archive.org/web/20120304124849/http://www.l0phtcrack.com/ |date=4 March 2012 }} L0phtCrack]
3. ^{{cite web|url=http://news.cnet.com/8301-27080_3-10450552-245.html|title=Hacker 'Mudge' gets DARPA job|date=10 February 2010|publisher=|access-date=12 February 2010|archive-url=https://web.archive.org/web/20110109160231/http://news.cnet.com/8301-27080_3-10450552-245.html|archive-date=9 January 2011|dead-url=no|df=dmy-all}}
4. ^{{cite web|url=https://mocana.com/blog/2013/04/17/peiter-mudge-zatko-to-join-motorola-mobilitys-advanced-technology-projects-atap/|title=Peiter “Mudge” Zatko To Join Motorola Mobility’s Advanced Technology & Projects (ATAP)|publisher=|access-date=9 September 2013|archive-url=https://web.archive.org/web/20131205100738/https://mocana.com/blog/2013/04/17/peiter-mudge-zatko-to-join-motorola-mobilitys-advanced-technology-projects-atap/|archive-date=5 December 2013|dead-url=no|df=dmy-all}}
5. ^{{cite web|url=http://www.berklee.edu/bt/192/other_paths.html|title=Other Paths - Berklee College of Music|website=www.berklee.edu|access-date=1 October 2014|archive-url=https://web.archive.org/web/20141010111509/http://www.berklee.edu/bt/192/other_paths.html|archive-date=10 October 2014|dead-url=no|df=dmy-all}}
6. ^{{cite web|url=http://insecure.org/stf/mudge_buffer_overflow_tutorial.html|title=L0pht Heavy Industries Services|website=insecure.org|access-date=24 August 2006|archive-url=https://web.archive.org/web/20060903180512/http://insecure.org/stf/mudge_buffer_overflow_tutorial.html|archive-date=3 September 2006|dead-url=no|df=dmy-all}}
7. ^{{cite web|url=http://www.defcon.org/html/defcon-5/defcon-5.html|title=DEF CON V Archives|website=www.defcon.org|access-date=18 April 2006|archive-url=https://web.archive.org/web/20060614081151/http://defcon.org/html/defcon-5/defcon-5.html|archive-date=14 June 2006|dead-url=no|df=dmy-all}}
8. ^{{cite web|url=http://www.usenix.org/publications/login/2000-4/features/mudge.html|title=USENIX - The Advanced Computing Systems Association|website=www.usenix.org|access-date=18 April 2006|archive-url=https://web.archive.org/web/20060924030100/http://www.usenix.org/publications/login/2000-4/features/mudge.html|archive-date=24 September 2006|dead-url=no|df=dmy-all}}
9. ^{{cite web|url=http://www.cultdeadcow.com/cms/team_bios.php3|title=CULT OF THE DEAD COW: CULT OF THE DEAD COW|website=www.cultdeadcow.com|access-date=18 April 2006|archive-url=https://web.archive.org/web/20060417125932/http://www.cultdeadcow.com/cms/team_bios.php3|archive-date=17 April 2006|dead-url=no|df=dmy-all}}
10. ^{{cite web|url=https://web.archive.org/web/20050331184730/http://hsgac.senate.gov/l0pht.htm|title=Press Releases|date=31 March 2005|publisher=}}
11. ^{{Cite web |url=http://www.webproxy.com/events_news/press_releases/template.html?usa%2F010600 |title=The L0pht, renowned 'hacker think-tank,' becomes @stake |access-date=7 September 2018 |archive-url=https://web.archive.org/web/20040630055231/http://www.webproxy.com/events_news/press_releases/template.html?usa%2F010600 |archive-date=30 June 2004 |dead-url=yes |df=dmy-all }}
12. ^Clinton fights hackers, with a hacker. {{webarchive |url=https://web.archive.org/web/20050910025831/http://archives.cnn.com/2000/TECH/computing/02/15/hacker.security/ |date=10 September 2005 }}
13. ^{{Cite web |url=http://www.infosecnews.org/hypermail/0502/9500.html |title=Hacker 'Mudge' Returns to BBN |access-date=6 July 2007 |archive-url=https://web.archive.org/web/20070928211244/http://www.infosecnews.org/hypermail/0502/9500.html |archive-date=28 September 2007 |dead-url=yes |df=dmy-all }}
14. ^{{Cite web |url=http://www.nfr.net/news/detail.php?id=225 |title=NFR Security Adds Leading Security Industry Experts to Technology Advisory Board |access-date=12 July 2006 |archive-url=https://web.archive.org/web/20060926143404/http://www.nfr.net/news/detail.php?id=225 |archive-date=26 September 2006 |dead-url=yes |df=dmy-all }}
15. ^{{cite web|url=http://news.cnet.com/8301-27080_3-10450552-245.html|title=Hacker 'Mudge' gets DARPA job|date=10 February 2010|publisher=|access-date=12 February 2010|archive-url=https://web.archive.org/web/20110109160231/http://news.cnet.com/8301-27080_3-10450552-245.html|archive-date=9 January 2011|dead-url=no|df=dmy-all}}
16. ^{{cite web|url=http://attrition.org/security/advisory/l0pht/l0pht.96-12-17.crontab|title=Crontab buffer overflow vulnerabilities, Oct 2001|publisher=|access-date=28 September 2014|archive-url=https://web.archive.org/web/20160303230337/http://attrition.org/security/advisory/l0pht/l0pht.96-12-17.crontab|archive-date=3 March 2016|dead-url=no|df=dmy-all}}
17. ^{{cite web|url=http://www.linuxsecurity.com/resource_files/cryptography/initial_securid_analysis.pdf|title=Initial Cryptanalysis of the RSA SecurID Algorithm|publisher=|access-date=28 September 2014|archive-url=https://web.archive.org/web/20151010052632/http://www.linuxsecurity.com/resource_files/cryptography/initial_securid_analysis.pdf|archive-date=10 October 2015|dead-url=no|df=dmy-all}}
18. ^{{cite web|url=http://www.nmrc.org/pub/review/antisniff-b2.html|title=NMRC L0pht Antisniff Product Review|publisher=|access-date=28 September 2014|archive-url=https://web.archive.org/web/20150304143943/http://www.nmrc.org/pub/review/antisniff-b2.html|archive-date=4 March 2015|dead-url=no|df=dmy-all}}
19. ^{{cite web|url=http://www.opennet.ru/base/linux/256.txt.html|title=OpenNET security: L0pht Advisory: initscripts-4.48-1 RedHat Linux 6.1|website=www.opennet.ru|access-date=28 September 2014|archive-url=https://web.archive.org/web/20160110210447/http://www.opennet.ru/base/linux/256.txt.html|archive-date=10 January 2016|dead-url=no|df=dmy-all}}
20. ^{{Cite web |url=http://www.securityfocus.com/advisories/1775 |title=L0pht Advisory: Cactus Software de-obfuscate and retrieve shell code |access-date=28 September 2014 |archive-url=https://web.archive.org/web/20160110210447/http://www.securityfocus.com/advisories/1775 |archive-date=10 January 2016 |dead-url=yes |df=dmy-all }}
21. ^{{cite web|url=http://diswww.mit.edu/menelaus.mit.edu/bt/10792|title=discuss@menelaus.mit.edu: [10792] in bugtraq|website=diswww.mit.edu|access-date=28 September 2014|archive-url=https://web.archive.org/web/20160110210447/http://diswww.mit.edu/menelaus.mit.edu/bt/10792|archive-date=10 January 2016|dead-url=no|df=dmy-all}}
22. ^{{cite web|url=http://attrition.org/security/advisory/l0pht/l0pht.99-01-08.tmp-watch|title=l0phtwatch Advisory|publisher=|access-date=28 September 2014|archive-url=https://web.archive.org/web/20160304022613/http://attrition.org/security/advisory/l0pht/l0pht.99-01-08.tmp-watch|archive-date=4 March 2016|dead-url=no|df=dmy-all}}
23. ^{{cite web|url=http://attrition.org/security/advisory/l0pht/l0pht.99-01-21.password_appraiser|title=NT Password Appraiser hash disclosure|publisher=|access-date=28 September 2014|archive-url=https://web.archive.org/web/20130417003752/http://attrition.org/security/advisory/l0pht/l0pht.99-01-21.password_appraiser|archive-date=17 April 2013|dead-url=no|df=dmy-all}}
24. ^{{cite web|url=http://attrition.org/security/advisory/l0pht/l0pht.99-01-03.suguard|title=IFS trojan path vulnerability|publisher=|access-date=28 September 2014|archive-url=https://web.archive.org/web/20160304060036/http://attrition.org/security/advisory/l0pht/l0pht.99-01-03.suguard|archive-date=4 March 2016|dead-url=no|df=dmy-all}}
25. ^{{cite web|url=http://phrack.org/issues/53/9.html#article|title=.:: Phrack Magazine ::.|website=phrack.org|access-date=28 September 2014|archive-url=https://web.archive.org/web/20141010124913/http://phrack.org/issues/53/9.html#article|archive-date=10 October 2014|dead-url=no|df=dmy-all}}
26. ^{{cite web|url=https://github.com/BuddhaLabs/PacketStorm-Exploits/blob/master/9902-exploits/ClearCase.txt|title=BuddhaLabs/PacketStorm-Exploits|website=GitHub|access-date=28 September 2014|archive-url=https://web.archive.org/web/20160110210446/https://github.com/BuddhaLabs/PacketStorm-Exploits/blob/master/9902-exploits/ClearCase.txt|archive-date=10 January 2016|dead-url=no|df=dmy-all}}
27. ^{{cite web|url=http://attrition.org/security/advisory/l0pht/l0pht.97-10-08.imapd|title=Imap core dump information disclosure|publisher=|access-date=28 September 2014|archive-url=https://web.archive.org/web/20160304002008/http://attrition.org/security/advisory/l0pht/l0pht.97-10-08.imapd|archive-date=4 March 2016|dead-url=no|df=dmy-all}}
28. ^{{cite web|url=http://dl.packetstormsecurity.net/Crackers/NT/l0phtcrack/l0phtcrack.rant.nt.passwd.txt|title=Vulnerabilities in Microsoft password encryption|publisher=|access-date=28 September 2014|archive-url=https://web.archive.org/web/20170211160532/https://dl.packetstormsecurity.net/Crackers/NT/l0phtcrack/l0phtcrack.rant.nt.passwd.txt|archive-date=11 February 2017|dead-url=no|df=dmy-all}}
29. ^{{cite web|url=http://web.textfiles.com/hacking/l0phtadv.txt|title=Solaris 2.5 libc exploitation|publisher=|access-date=28 September 2014|archive-url=https://web.archive.org/web/20130403074430/http://web.textfiles.com/hacking/l0phtadv.txt|archive-date=3 April 2013|dead-url=no|df=dmy-all}}
30. ^{{cite web|url=http://insecure.org/sploits/modstat.html|title=Modstat exploit|website=insecure.org|access-date=28 September 2014|archive-url=https://web.archive.org/web/20150923044402/http://insecure.org/sploits/modstat.html|archive-date=23 September 2015|dead-url=no|df=dmy-all}}
31. ^{{Cite web |url=http://archives.neohapsis.com/archives/bugtraq/1996_4/0272.html |title=L0pht Kerberos 4 remote memory leak |access-date=28 September 2014 |archive-url=https://web.archive.org/web/20160110210447/http://archives.neohapsis.com/archives/bugtraq/1996_4/0272.html |archive-date=10 January 2016 |dead-url=yes |df=dmy-all }}
32. ^{{cite web|url=http://attrition.org/security/advisory/l0pht/l0pht.96-09-01.sendmail|title=Sendmail 8.7.5 GECOS buffer overflow vulnerability|publisher=|access-date=28 September 2014|archive-url=https://web.archive.org/web/20160303232918/http://attrition.org/security/advisory/l0pht/l0pht.96-09-01.sendmail|archive-date=3 March 2016|dead-url=no|df=dmy-all}}
33. ^{{cite web|url=http://attrition.org/security/advisory/l0pht/l0pht.96-04-01.test-cgi|title=remote inventory via test-cgi vulnerability|publisher=|access-date=28 September 2014|archive-url=https://web.archive.org/web/20160304022609/http://attrition.org/security/advisory/l0pht/l0pht.96-04-01.test-cgi|archive-date=4 March 2016|dead-url=no|df=dmy-all}}
34. ^{{Cite web |url=http://www.tux.org/pub/security/secnet/papers/securid.ps |title=Weaknesses in the SecurID (RSA Token) authentication system |access-date=28 September 2014 |archive-url=https://web.archive.org/web/20160304024714/http://www.tux.org/pub/security/secnet/papers/securid.ps |archive-date=4 March 2016 |dead-url=yes |df=dmy-all }}
35. ^{{cite web|url=http://attrition.org/security/advisory/l0pht/l0pht.96-05-01.skey_cracker|title=S/Key password cracker|publisher=|access-date=28 September 2014|archive-url=https://web.archive.org/web/20160303232904/http://attrition.org/security/advisory/l0pht/l0pht.96-05-01.skey_cracker|archive-date=3 March 2016|dead-url=no|df=dmy-all}}
36. ^[https://www.forbes.com/sites/andygreenberg/2010/11/29/an-interview-with-wikileaks-julian-assange/ An Interview with WikiLeaks' Julian Assange] {{Webarchive|url=https://web.archive.org/web/20110816044023/http://www.forbes.com/sites/andygreenberg/2010/11/29/an-interview-with-wikileaks-julian-assange/ |date=16 August 2011 }}, Andy Greenberg, Forbes,November 29, 2010
37. ^Military Networking Protocol {{Webarchive|url=https://web.archive.org/web/20111217052131/http://www.darpa.mil/Our_Work/I2O/Programs/Military_Networking_Protocol_(MNP).aspx |date=17 December 2011 }}, retr 2012 2 12
38. ^Anomaly Detection at Multiple Scales {{Webarchive|url=https://web.archive.org/web/20120121113838/http://www.darpa.mil/Our_Work/I2O/Programs/Anomaly_Detection_at_Multiple_Scales_(ADAMS).aspx |date=21 January 2012 }}, retr 2012 2 12
39. ^Cyber Insider Threat {{Webarchive|url=https://web.archive.org/web/20120111230638/http://www.darpa.mil/Our_Work/I2O/Programs/Cyber-Insider_Threat_%28CINDER%29.aspx |date=11 January 2012 }}, retr 2012 2 12
40. ^[https://www.wired.com/dangerroom/2011/11/darpa-fast-track/ New Fast Track Program Okays Hacker Projects in Just Seven Days] {{Webarchive|url=https://web.archive.org/web/20140315102202/http://www.wired.com/dangerroom/2011/11/darpa-fast-track |date=15 March 2014 }}, Dawn Lim, Wired Magazine, November 14, 2011, retr 2012 2 12
41. ^[https://media.blackhat.com/bh-us-11/Zatko-Keynote/BlackHat-USA-2011-Peiter-Zatko-Keynote-Day2.mov BlackHat USA 2011 Keynote] {{Webarchive|url=https://web.archive.org/web/20120121011621/https://media.blackhat.com/bh-us-11/Zatko-Keynote/BlackHat-USA-2011-Peiter-Zatko-Keynote-Day2.mov |date=21 January 2012 }}, retr 2012 2 12
42. ^{{Cite web |url=https://twitter.com/dotMudge/status/320355234339770369 |title=Mudge receives Office of SecDef highest non-career civilian award |access-date=28 September 2014 |archive-url=https://web.archive.org/web/20150130022906/https://twitter.com/dotMudge/status/320355234339770369 |archive-date=30 January 2015 |dead-url=no |df=dmy-all }}
43. ^SC Magazine Top 5 Influential IT Security Thinkers of 2011 {{Webarchive|url=https://web.archive.org/web/20120309081519/http://www.scmagazine.com/top-5-influential-it-security-thinkers/article/217154/ |date=9 March 2012 }}, Angela Moscaritolo, December 1, 2011, retr 2012 2 12
44. ^  {{Webarchive|url=https://web.archive.org/web/20140705212602/http://bbn.com/news_and_events/press_releases/2007_press_releases/07_10_15 |date=5 July 2014 }}, BBN Press Release, October 15, 2007, retr 2014 9 27
45. ^[https://twitter.com/dotMudge/status/322914259732418561] {{Webarchive|url=https://web.archive.org/web/20150201200945/https://twitter.com/dotMudge/status/322914259732418561 |date=1 February 2015 }}, Mudge goes to Google, retr 2013 4 12
46. ^  {{Webarchive|url=https://web.archive.org/web/20141001154251/http://fortune.com/2014/08/14/google-goes-darpa/ |date=1 October 2014 }}, Google goes DARPA, retr 2014 9 27
47. ^  {{Webarchive|url=https://web.archive.org/web/20150703071417/http://recode.net/2015/06/29/famed-security-researcher-mudge-leaves-google-for-white-house-gig/ |date=3 July 2015 }}, Famed Security Researcher Mudge Leaves Google, retr 2015 7 2
, Spencer Ackerman, Wired, August 31, 2010, retr 2012 2 12[36][37][38][39][40][41][42][43][44][45][46][47]
}}

External links

  • L0phtCrack, Password Cracking Software
{{L0pht Footer}}{{Cult of the Dead Cow}}{{Use dmy dates|date=October 2010}}{{DEFAULTSORT:Zatko, Peiter}}

9 : 1970 births|Living people|Berklee College of Music alumni|People associated with computer security|Cult of the Dead Cow members|L0pht|People from Massachusetts|Google employees|People from Mountain View, California

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/9/27 17:25:22