Stepan Besklubov
Angestellt, Software Engineer, Special Technology Center (STC)
St Petersburg, Russische Föderation
Über mich
Reverse engineer with 5 years of experience. Experience in reverse engineering of Windows and Linux OS executable files, firmware of routers and embedded devices running Embedded Linux and real-time operating systems. Experience in developing programs on C/C++ and Python (WinAPI, Linux, Capstone/Keystone/Unicorn, wxWidgets/Qt, IDA Pro/mitmproxy plugins, network applications). Work with tools such as IDA Pro, WinDbg, Wireshark, BurpSuite.
Werdegang
Berufserfahrung von Stepan Besklubov
Bis heute 6 Jahre und 1 Monat, seit Sep. 2018
Software Engineer
Special Technology Center (STC)
Developing Windows drivers, researching Windows kernel, working with undocumented kernel features. Developing Windows Ring-0 exploits. Reverse engineering of routers and embedded devices firmware (Linux, VxWorks, Renesas RTOSes). Development of software agents with a management network. Viruses reverse engineering. Developing IDA Pro plugins. Reverse engineering Ruby programs.
3 Monate, Juni 2018 - Aug. 2018
"Summer of hack" traineeshep
Digital Security
Working with CoreSight and TrustZone technologies on ARM DragonBoard 410c and Hikey 960 development boards.
11 Monate, Aug. 2017 - Juni 2018
Analyst
Neobit
Developing Windows drivers, researching Windows kernel, working with undocumented kernel features. Developing C programs using WinAPI. Research of the mechanisms of executable code injection in Windows, fileless software agents development. Development of automation tools in Python.
Ausbildung von Stepan Besklubov
3 Jahre und 10 Monate, Sep. 2016 - Juni 2020
Information Security
Saint Petersburg State University of Economics and Finance
Sprachen
Russisch
Muttersprache
Englisch
Gut
Deutsch
Grundlagen