I work for Contraste Europe.
I founded my own company Didier Stevens Labs to provide training and other IT Security services.
I’m a SANS ISC Handler.
My Microsoft Certified Professional Transcript.
Use Transcript ID 677470 and Access Code didierstevens
Check my CISSP status: click here and type my last name: Stevens
SANS/GIAC: GSSP-C (retired), GCIA, GREM and GCIH: click here and search for my name Didier Stevens
Check my RHCT status: click here
Check my RHCSA status: click here
My Cisco certifications: CCENT, CCNA, CCNA Security, CCNP Security, CCSS
I have an OSWP certification.
I’m a Wireshark Certified Network Analyist.
- ISSA Journal April 2016 page 24: The Rise Of Malicious Documents
- ISSA Journal July 2015 page 20: Malicious Microsoft Office Documents: An Analyst’s View
- ISSA Journal May 2015 page 26: Wireshark
- (IN)SECURE Magazine Issue 39 page 60: Digital Graphology: It’s All In The Signature
- ISSA Journal December 2012 page 12: Network Device Forensics
- (IN)SECURE Magazine Issue 35 page 11: Administrative scripting with Nmap
- Virus Bulletin July 2012: Malicious PDFs served by exploit kits
- (IN)SECURE Magazine Issue 33 page 26: White Hat Shellcode: Not For Exploits
- Windows IT Pro magazine September 2011 page 39: PDF Malware Mitigation
- (IN)SECURE Magazine Issue 30 page 6: Microsoft’s Enhanced Mitigation Experience Toolkit
- IEEE Security & Privacy magazine January/February 2011 page 80: Malicious PDF Documents Explained
- HITB Magazine 4th issue 2010 page 32: Stepping Through a Malicious PDF Document
- ISSA Journal July 2010 page 41: Malicious PDF Documents
- (IN)SECURE Magazine Issue 26 page 29: Launch arbitrary code from Excel in a restricted environment
- Hakin9 Issue 4/2010 page 28: Writing WIN32 shellcode with a C-compiler
- (IN)SECURE Magazine Issue 24 page 38: Preventing malicious documents from compromising Windows machines
- Into The Boxes Issue 0x0 page 2: Windows 7 UserAssist Registry Keys
- (IN)SECURE Magazine Issue 23 page 29: Q&A: Didier Stevens on malicious PDFs
- Hakin9 Issue 6/2009: Anatomy of Malicious PDF Documents Part 2
- Hakin9 Issue Best of 2008: Basic Process Manipulation Tool Kit
- (IN)SECURE Magazine Issue 21 page 8: Malicious PDF: get owned without opening
- Hakin9 Issue 3/2009: Anatomy of Malicious PDF Documents Part 1
- (IN)SECURE Magazine Issue 20 page 70: Playing with Authenticode and MD5 collisions
- Hakin9 Issue 1/2009: Basic Process Manipulation Tool Kit
- (IN)SECURE Magazine Issue 15 page 87: Hiding Inside a Rainbow
- (IN)SECURE Magazine Issue 10 page 72: ROT13 is used in Windows? You’re joking!
- Reviewer of a Microsoft whitepaper: Applying the Principle of Least Privilege to User Accounts on Windows XP