Cybersecurity Explorer

Male | 1984 | Bachelor | Chengdu, China | unclenull@gmail.com | GitHub


Summary

Former Web front-end developer with cross-corporate experiences, including multiple listed ones, such as Phoenix New Media, Tibco CDC (China Development Center), Lenovo, HNA Group, NetDragon Overseas R&D.

Fueled by insatiable curiosity, any unexpected system behaviors compel me to peel back layers to unravel the underhood mechanisms. I lean towards command-line tools with explicit flags over opaque black boxes managed by such as an IDE.

Possessing calm persistence, I can't stop until the root causes of peculiar bugs are identified, until solutions for technical challenges emerge.

The explorations led me through low-level domains: Binary, Opcodes, formats, encodings, protocols, OS internals, executables, etc. Ultimately they guided me down the rabbit hole of Cybersecurity.

Now I'm ready to make it my primary focus.


Education

Bachelor of Business Administration

Shihezi University – Xinjiang, China 09/2003 – 07/2007

Minor in Computer Science & Technology

Shihezi University – Xinjiang, China 09/2004 – 07/2006


Last Job

NetDragon Overseas R&D Feb 2020 - Jan 2025

Frontend Architect

Technical Lead


Technical Knowledge & Skills & Practices

Opcodes/Assembly/Binary

Windows

Linux

Reverse Engineering

Penetration

Cryptography

Machine Learning

Tried to crack a CAPTCHA system in two approaches:

Network

Languages


Miscellaneous

References

Footnotes

  1. Intel® 64 and IA-32 Architectures Software Developer’s Manual ↩

  2. David Solomon and Mark Russinovich, Windows Internals ↩

  3. Analysis Report on Lazarus Group's Rootkit Attack Using BYOVD ↩

  4. Walter Oney, Programming the Microsoft Windows Driver Model ↩

  5. Tarik Soulami, Inside Windows Debugging ↩

  6. Chris Eagle, The IDA Pro Book ↩

  7. Justin Ferguson and et al., Reverse Engineering Code with IDA Pro ↩

  8. Mark Vincent Yason, The Art of Unpacking ↩

  9. Michael Hale Ligh, Andrew Case, Jamie Levy and AAron Walters, The Art of Memory Forensics ↩

  10. Jonathan Katz and Yehuda Lindell, Introduction to Modern Cryptography ↩

  11. Jean-Philippe Aumasson, Serious Cryptography ↩

  12. Pranshu Bajpai, Extracting Ransomware’s Keys by Utilizing Memory Forensics ↩

  13. Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach. ↩