Chris Sullo is a security expert known as the author of Nikto Web Scanner. He is specialized in web-security and pen-testing. He was the co-founder, CFO and Treasurer of Open Security Foundation, and creator of the RVAsec security conference. He currently works as a penetration testing specialist for the IT risk firm Focal Point Data Risk.

OSVDB

Sullo was acting as a Moderator, Vulnerability Manager, and Lead Developer of OSVDB.[1] He was a mentor for OSVDB's participation in the Google Summer of Code 2006 and 2007.[2] He handled and approved all new vulnerabilities that are added to the database as well as manages the web checks. In addition, Chris was co-founder and Treasurer of the Open Security Foundation.

Nikto

Sullo is the author of Nikto, the leading open source web security assessment tool. It is an open source web server scanner. Nikto is known to perform comprehensive tests against web servers for multiple items, including over thousands of potentially dangerous files or CGI scripts, etc. Nikto was voted the #16 top security tool in 2003, and #12 in 2006 in Fyodor's Top Security Tools Survey.[3][4]

In his work on Nikto, Sullo also helped pioneer the concept of Google hacking (or Google "dorking") in 2002.

RVAsec

He is co-founder of the RVAsec security conference held in Richmond, Virginia, USA.

Security advisories

Sullo has long been involved with the world of electronic crime and security. He has also published a few security advisories. One of his noteworthy advisories was an advisory on Verity Ultraseek, a search engine used by dozens of government agencies and universities.[5]

References

  1. "OSVDB Contributors". Archived from the original on December 11, 2002.
  2. "Google Summer Code Projects".
  3. "Anti Hacker Toolkit" (PDF).
  4. "Article from Sandhills Publishing Company".
  5. "Advisory: Verity Ultraseek Request Proxying Vulnerability".


This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.