HOME

TheInfoList



OR:

Peiter C. Zatko, better known as Mudge, is an American network security expert,
open source Open source is source code that is made freely available for possible modification and redistribution. Products include permission to use the source code, design documents, or content of the product. The open-source model is a decentralized sof ...
programmer, writer, and
hacker A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term ''hacker'' has become associated in popu ...
. He was the most prominent member of the high-profile hacker
think tank A think tank, or policy institute, is a research institute that performs research and advocacy concerning topics such as social policy, political strategy, economics, military, technology, and culture. Most think tanks are non-governmenta ...
the
L0pht L0pht Heavy Industries (pronounced "loft") was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area. The L0pht was one of the first viable hackerspaces in the US, and a pioneer of responsible disclosur ...
Security Scene Errata
as well as the computer and culture hacking cooperative the
Cult of the Dead Cow Cult of the Dead Cow, also known as cDc or cDc Communications, is a computer Hacker (term), hacker and Do it yourself, DIY mass media, media organization founded in 1984 in Lubbock, Texas. The group maintains a blog, weblog on its site, also ti ...
. While involved with the
L0pht L0pht Heavy Industries (pronounced "loft") was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area. The L0pht was one of the first viable hackerspaces in the US, and a pioneer of responsible disclosur ...
, Mudge contributed to disclosure and education on information and security vulnerabilities. In addition to pioneering
buffer overflow In information security and programming, a buffer overflow, or buffer overrun, is an anomaly whereby a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations. Buffers are areas of memory ...
work, the security advisories he released contained early examples of flaws in the following areas:
code injection Code injection is the exploitation of a computer bug that is caused by processing invalid data. The injection is used by an attacker to introduce (or "inject") code into a vulnerable computer program and change the course of execution. The re ...
,
race condition A race condition or race hazard is the condition of an electronics, software, or other system where the system's substantive behavior is dependent on the sequence or timing of other uncontrollable events. It becomes a bug when one or more of t ...
,
side-channel attack In computer security, a side-channel attack is any attack based on extra information that can be gathered because of the fundamental way a computer protocol or algorithm is implemented, rather than flaws in the design of the protocol or algorit ...
, exploitation of embedded systems, and
cryptanalysis Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic sec ...
of commercial systems. He was the original author of the
password cracking In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system in scrambled form. A common approach (brute-force attack) is to repeatedly try ...
software
L0phtCrack L0phtCrack is a password auditing and recovery application originally produced by Mudge from L0pht Heavy Industries. It is used to test password strength and sometimes to recover lost Microsoft Windows passwords, by using dictionary, brute-for ...
. In 2010 Mudge accepted a position as a program manager at
DARPA The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military. Originally known as the Adv ...
where he oversaw cyber security research. In 2013 Mudge went to work for
Google Google LLC () is an American multinational technology company focusing on search engine technology, online advertising, cloud computing, computer software, quantum computing, e-commerce, artificial intelligence, and consumer electronics. ...
in their
Advanced Technology & Projects Google's Advanced Technology and Projects group (ATAP) is a skunkworks team and in-house technology incubator, created by former DARPA director Regina Dugan. ATAP is similar to X, but works on projects, granting project leaders time—previou ...
division. In 2020, he was hired as head of security at
Twitter Twitter is an online social media and social networking service owned and operated by American company Twitter, Inc., on which users post and interact with 280-character-long messages known as "tweets". Registered users can post, like, and ...
, and now works at
Rapid7 The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. It is owned by Boston, Massachusetts-based security company Rapid7. It ...
.


Biography

Born in December 1970, Mudge graduated from the
Berklee College of Music Berklee College of Music is a private music college in Boston, Massachusetts. It is the largest independent college of contemporary music in the world. Known for the study of jazz and modern American music, it also offers college-level cours ...
at the top of his class and is an adept
guitar The guitar is a fretted musical instrument that typically has six strings. It is usually held flat against the player's body and played by strumming or plucking the strings with the dominant hand, while simultaneously pressing selected stri ...
player. Mudge was responsible for early research into a type of security
vulnerability Vulnerability refers to "the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally." A window of vulnerability (WOV) is a time frame within which defensive measures are diminished, com ...
known as the
buffer overflow In information security and programming, a buffer overflow, or buffer overrun, is an anomaly whereby a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations. Buffers are areas of memory ...
. In 1995 he published "How to Write Buffer Overflows", one of the first papers on the topic. He published some of the first security advisories and research demonstrating early vulnerabilities in Unix such as code injection, side-channel attacks, and information leaks, and was a leader in the full disclosure movement. He was the initial author of security tools
L0phtCrack L0phtCrack is a password auditing and recovery application originally produced by Mudge from L0pht Heavy Industries. It is used to test password strength and sometimes to recover lost Microsoft Windows passwords, by using dictionary, brute-for ...
, AntiSniff, and l0phtwatch. Mudge was one of the first people from the hacker community to reach out and build relationships with government and industry. In demand as a public speaker, he spoke at hacker conferences such as
DEF CON DEF CON (also written as DEFCON, Defcon or DC) is a hacker convention held annually in Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include computer security professionals, journalists, lawyer ...
and academic conferences such as USENIX. Mudge has also been a member of Cult of the Dead Cow since 1996. He was one of the seven L0pht members who testified before a
Senate A senate is a deliberative assembly, often the upper house or chamber of a bicameral legislature. The name comes from the ancient Roman Senate (Latin: ''Senatus''), so-called as an assembly of the senior (Latin: ''senex'' meaning "the el ...
committee in 1998 about the serious vulnerabilities of the Internet at that time. The L0pht became the computer security consultancy
@stake ATstake, Inc. was a computer security professional services company in Cambridge, Massachusetts, United States. It was founded in 1999 by Battery Ventures (Tom Crotty, Sunil Dhaliwal, and Scott Tobin) and Ted Julian. Its initial core team of techno ...
in 1999, and Mudge became the vice president of research and development and later chief scientist. In 2000, after the first crippling
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
distributed denial-of-service In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connect ...
attacks, he was invited to meet with President
Bill Clinton William Jefferson Clinton ( né Blythe III; born August 19, 1946) is an American politician who served as the 42nd president of the United States from 1993 to 2001. He previously served as governor of Arkansas from 1979 to 1981 and agai ...
at a security summit alongside cabinet members and industry executives.Clinton fights hackers, with a hacker
In 2004 he became a division scientist at government contractor
BBN Technologies Raytheon BBN (originally Bolt Beranek and Newman Inc.) is an American research and development company, based next to Fresh Pond in Cambridge, Massachusetts, United States. In 1966, the Franklin Institute awarded the firm the Frank P. Brown ...
, where he originally worked in the 1990s, and also joined the technical advisory board of NFR Security. In 2010, it was announced that he would be project manager of a DARPA project focused on directing research in cyber security. In 2013 he announced that he would leave DARPA for a position at Google ATAP. In 2015 Zatko announced on Twitter he would join a project called #CyberUL, a testing organisation for computer security inspired by
Underwriters Laboratories The UL enterprise is a global safety science company headquartered in Northbrook, Illinois, composed of three organizations, UL Research Institutes, UL Standards & Engagement and UL Solutions. Established in 1894, the UL enterprise was founded a ...
, mandated by the White House.


Career


DARPA

At DARPA he created the Cyber Analytical Framework the agency used to evaluate DoD investments in offensive and defensive cyber security. During his tenure he ran at least three
Department of Defense Department of Defence or Department of Defense may refer to: Current departments of defence * Department of Defence (Australia) * Department of National Defence (Canada) * Department of Defence (Ireland) * Department of National Defense (Philipp ...
(DoD) programs known as Military Networking Protocol (MNP), Cyber-Insider Threat (CINDER), and Cyber Fast Track (CFT). Military Networking Protocol (MNP) provided network prioritization with full user-level attribution for military computer networks. CINDER focused on identifying cyber espionage conducted by virtual insider threats such as future variants of
Stuxnet Stuxnet is a malicious computer worm first uncovered in 2010 and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition ( SCADA) systems and is believed to be responsible for causing su ...
or
Duqu Duqu is a collection of computer malware discovered on 1 September 2011, thought by Kaspersky Labs to be related to the Stuxnet worm and to have been created by Unit 8200. Duqu has exploited Microsoft Windows's zero-day vulnerability. The Lab ...
. CINDER is often mistakenly associated with
WikiLeaks WikiLeaks () is an international Nonprofit organization, non-profit organisation that published news leaks and classified media provided by anonymous Source (journalism), sources. Julian Assange, an Australian Internet activism, Internet acti ...
in the media. This is possibly due to the confusion between DARPA programs focused on identifying human insider threat such as ADAMS and the identification of software espionage posed by malware in the CINDER program. This issue was clarified by Mudge in his Defcon 2011 keynote at 46 minutes and 11 seconds into the talk. Cyber Fast Track (CFT) provided resources and funding to security research, including programs run by
hackers A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term ''hacker'' has become associated in popu ...
,
hackerspaces A hackerspace (also referred to as a hacklab, hackspace, or makerspace) is a community-operated, often "not for profit" (501(c)(3) in the United States), workspace where people with common interests, such as computers, machining, technology, sc ...
, and makerlabs. The program provided an alternative to traditional government contracting vehicles that was accessible to individuals and small companies previously unable to work within the cumbersome and complicated
DARPA The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military. Originally known as the Adv ...
process. The novel contracting effort had an averaging time of 7 days from receipt of proposal to funding being provided to the proposing research organization. The program was initially announced at
Shmoocon ShmooCon is an American hacker convention organized by The Shmoo Group. There are typically 40 different talks and presentations on a variety of subjects related to computer security and cyberculture. Multiple events are held at the convention re ...
during his 2011 keynote.


Twitter

Zatko was hired by
Jack Dorsey Jack Patrick Dorsey (born November 19, 1976) is an American Internet entrepreneur and programmer who is a co-founder and former CEO of Twitter, Inc., as well as a co-founder and the CEO and chairperson of Block, Inc., the developer of the Squar ...
 – then
Twitter Twitter is an online social media and social networking service owned and operated by American company Twitter, Inc., on which users post and interact with 280-character-long messages known as "tweets". Registered users can post, like, and ...
's CEO – in November 2020 to lead the company's information security approach, after a July 2020 hack that compromised multiple high-profile accounts. He was terminated by the company in January 2022, with Twitter claiming it was after "an assessment of how the organization was being led and the impact on top priority work". On 23 August 2022, the contents of a whistleblower complaint made by Zatko to the
United States Congress The United States Congress is the legislature of the federal government of the United States. It is bicameral, composed of a lower body, the House of Representatives, and an upper body, the Senate. It meets in the U.S. Capitol in Washing ...
were published. The complaint alleges Twitter committed multiple violations of
United States securities regulation Securities regulation in the United States is the field of U.S. law that covers transactions and other dealings with securities. The term is usually understood to include both federal and state-level regulation by governmental regulatory agencies, ...
s, the
Federal Trade Commission Act of 1914 The Federal Trade Commission Act of 1914 was a United States federal law which established the Federal Trade Commission. The Act was signed into law by US President Woodrow Wilson in 1914 and outlaws unfair methods of competition and unfair acts ...
, and a 2011 enforceable consent decree reached with the Federal Trade Commission after several issues between 2007 and 2010. He also accused Twitter of "extreme, egregious deficiencies" in its handling of user information and spam bots. Zatko accused several Twitter executives, including
Parag Agrawal Parag Agrawal (; born 21 May 1984) is an Indian-American software engineer who was the CEO of Twitter, Inc. from November 2021 to October 2022. He was fired, along with three other top executives, on October 27, 2022, following Elon Musk’s Ac ...
and certain board members, of making false or misleading statements about privacy, security, and content moderation on the platform in violation of the
Federal Trade Commission Act of 1914 The Federal Trade Commission Act of 1914 was a United States federal law which established the Federal Trade Commission. The Act was signed into law by US President Woodrow Wilson in 1914 and outlaws unfair methods of competition and unfair acts ...
and SEC disclosure rules. These included misrepresentations to
Elon Musk Elon Reeve Musk ( ; born June 28, 1971) is a business magnate and investor. He is the founder, CEO and chief engineer of SpaceX; angel investor, CEO and product architect of Tesla, Inc.; owner and CEO of Twitter, Inc.; founder of The Bori ...
made during the course of his acquisition bid, with the complaint specifically calling Agrawal's May 16 thread deceptive. ''
The Wall Street Journal ''The Wall Street Journal'' is an American business-focused, international daily newspaper based in New York City, with international editions also available in Chinese and Japanese. The ''Journal'', along with its Asian editions, is published ...
'' reported that Twitter reached a confidential $7million settlement with Zatko in June, following his firing. The settlement prohibits Zatko from speaking publicly about his time at Twitter or disparaging the company, with the exception of Congressional hearings and governmental whistleblower complaints. On 13 September 2022, Zatko testified before the
Senate Judiciary Committee The United States Senate Committee on the Judiciary, informally the Senate Judiciary Committee, is a standing committee of 22 U.S. senators whose role is to oversee the Department of Justice (DOJ), consider executive and judicial nominations, a ...
.


Personal life

On 11 August 2007 he married Sarah Lieberman, a co-worker at BBN and former mathematician at the
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
. Remarking about her husband’s time at Twitter in an article in Time Magazine, she said, "dishonesty is definitely something that frustrates him."


Awards

* 2013 Office of the Secretary of Defense Exceptional Public Service Award * 2011 ''SC Magazine'' Top 5 influential IT security thinkers of the year * 2007 ''
Boston Business Journal The ''Boston Business Journal'' is a weekly, business-oriented newspaper published in Boston, Massachusetts. It is published by the American City Business Journals. The newspaper was founded by Robert Bergenheim and launched its first issue on ...
'' 40 under 40


Refereed papers

* An Architecture for Scalable Network Defense, Proceedings of the 34th Annual IEEE Conference on Local Computer Networks (LCN), Strayer, Miliken, Watro, Heimerdinger, Harp, Goldman, Spicuzza, Schwartz, Mankins, Kong, and Zatko., Proceedings of the 34th Annual IEEE Conference on Local Computer Networks (LCN), October 2009. * SLINGbot: A System for Live Investigation of Next Generation Botnets, Alden Jackson, David Lapsley, Christine Jones, Mudge Zatko, Chaos Golubitsky, and W. Timothy Strayer, Proceedings of Cybersecurity Applications and Technologies Conference for Homeland Security (CATCH), Washington, D.C., March 2009. * Security Analysis of the Palm Operating System and its Weaknesses Against Malicious Code Threats,
Joe Grand Joe Grand is an American electrical engineer, inventor and hardware hacker known in the hacker community as Kingpin. He achieved mainstream popularity after his appearance on '' Prototype This!'', a Discovery Channel television show. He spec ...
and Mudge, 10th Usenix Security Symposium, Washington, D.C., August 2001. * Cryptanalysis of Microsoft's PPTP Authentication Extensions (MSCHAPv2),
Bruce Schneier Bruce Schneier (; born January 15, 1963) is an American cryptographer, computer security professional, privacy specialist, and writer. Schneier is a Lecturer in Public Policy at the Harvard Kennedy School and a Fellow at the Berkman Klein Cente ...
, Mudge, and
David A. Wagner David A. Wagner (born 1974) is a professor of computer science at the University of California, Berkeley and a well-known researcher in cryptography and computer security. He is a member of the Election Assistance Commission's Technical Guidelin ...
, Secure Networking CQRE ecure1999, International Exhibition and Congress, Springer Lecture Notes in Computer Science, no. 1740, pp. 192–203, Nov/Dec, 1999. * Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol (PPTP),
Bruce Schneier Bruce Schneier (; born January 15, 1963) is an American cryptographer, computer security professional, privacy specialist, and writer. Schneier is a Lecturer in Public Policy at the Harvard Kennedy School and a Fellow at the Berkman Klein Cente ...
and Mudge, Fifth ACM Conference on Communications and Computer Security, pages 132–141, March 1998.


L0pht Security advisories and software

Mudge published numerous papers and advisories detailing security problems across different applications and operating systems and was a pioneering champion of full disclosure. * Crontab buffer overflow vulnerabilities, Oct 2001 * Initial Cryptanalysis of the RSA SecurID Algorithm, Jan 2001 * AntiSniff: Identification of remote systems in promiscuous mode, May 2000 * Race conditions within RedHat Linux initscripts, Dec 2000 * Reverse Engineering Cactus Software shell-lock obfuscation techniques, Oct 1999 * Solaris /bin/su side channel attack, June 1999 * L0pht Watch: A tool for filesystem race condition attacks, Jan 1999 * Hash disclosure vulnerabilities in Quakenbush Windows NT Password Appraiser, Jan 1999 * suGuard privilege escalation attack, Jan 1999 * Embedded FORTH Hacking on Sparc Hardware, Phrack Magazine, Volume 8, Issue 53, July 1998 * Race Condition in Rational Systems ClearCase source control system, Jan 1998 * Imap 4.1 remote memory dump and retrieval of sensitive information, Oct 1997 * L0phtCrack: Technical rant on vulnerabilities in Microsoft encryption and passwords, July 1997 * Root Compromise through Solaris libc_getopt(3), Jan 1997 * BSD distributions of modstat allow compromise of DES keys, passwords, and ring 0 control, Dec 1996 * Kerberos 4 memory leaks provide sensitive credential information via remote attacks, Nov 1996 * Privilege escalation through Sendmail 8.7.5 GECOS buffer overflow vulnerability, Nov 1996 * cgi-bin/test-cgi parsing vulnerabilities allow remote directory traversal, April 1996 * Design weaknesses in the SecurID authentication system, 1996 * MONKey: An attack on the s/key one-time-password system, 1995


References


External links


L0phtCrack
Password Cracking Software {{DEFAULTSORT:Zatko, Peiter 1970 births Living people Berklee College of Music alumni People associated with computer security Cult of the Dead Cow members L0pht People from Massachusetts Google employees People from Mountain View, California Twitter, Inc. people