I work for Contraste Europe.
I founded my own company Didier Stevens Labs to provide training and other IT Security services.
My Microsoft Certified Professional Transcript.
Use Transcript ID 677470 and Access Code didierstevens
Check my CISSP status: click here and type my last name: Stevens
Check my GSSP-C status: click here and look for my name Didier Stevens
Check my RHCT status: click here
Check my RHCSA status: click here
My Cisco certifications: CCENT, CCNA, CCNA Security, CCNP Security
I have an OSWP certification.
- (IN)SECURE Magazine Issue 39 page 60: Digital Graphology: It’s All In The Signature
- ISSA Journal December 2012 page 12: Network Device Forensics
- (IN)SECURE Magazine Issue 35 page 11: Administrative scripting with Nmap
- Virus Bulletin July 2012: Malicious PDFs served by exploit kits
- (IN)SECURE Magazine Issue 33 page 26: White Hat Shellcode: Not For Exploits
- Windows IT Pro magazine September 2011 page 39: PDF Malware Mitigation
- (IN)SECURE Magazine Issue 30 page 6: Microsoft’s Enhanced Mitigation Experience Toolkit
- IEEE Security & Privacy magazine January/February 2011 page 80: Malicious PDF Documents Explained
- HITB Magazine 4th issue 2010 page 32: Stepping Through a Malicious PDF Document
- ISSA Journal July 2010 page 41: Malicious PDF Documents
- (IN)SECURE Magazine Issue 26 page 29: Launch arbitrary code from Excel in a restricted environment
- Hakin9 Issue 4/2010 page 28: Writing WIN32 shellcode with a C-compiler
- (IN)SECURE Magazine Issue 24 page 38: Preventing malicious documents from compromising Windows machines
- Into The Boxes Issue 0x0 page 2: Windows 7 UserAssist Registry Keys
- (IN)SECURE Magazine Issue 23 page 29: Q&A: Didier Stevens on malicious PDFs
- Hakin9 Issue 6/2009: Anatomy of Malicious PDF Documents Part 2
- Hakin9 Issue Best of 2008: Basic Process Manipulation Tool Kit
- (IN)SECURE Magazine Issue 21 page 8: Malicious PDF: get owned without opening
- Hakin9 Issue 3/2009: Anatomy of Malicious PDF Documents Part 1
- (IN)SECURE Magazine Issue 20 page 70: Playing with Authenticode and MD5 collisions
- Hakin9 Issue 1/2009: Basic Process Manipulation Tool Kit
- (IN)SECURE Magazine Issue 15 page 87: Hiding Inside a Rainbow
- (IN)SECURE Magazine Issue 10 page 72: ROT13 is used in Windows? You’re joking!
- Reviewer of a Microsoft whitepaper: Applying the Principle of Least Privilege to User Accounts on Windows XP