Whoami

I’m a computer addict from Iraq, and below is a short answer to whoami.

Education:

  • PhD, research was on a new Port Knocking Technique called Tariq. (Scapy)
  • MS, research was on Software Maintenance using a new Plugin Engine technique. (Visual C++)
  • BS, research was on a new Form Shape Designer and an MP3 Player with Robotic Effects. (Visual C++)

Current Job:

  • I am currently working as University Assistant Professor for the Dept. of Computer Science.
  • Consultant and Instructor for ArabNIX (Freelance). I do consultation related to security and infrastructure deployment. Also, I’m the main Instructor for ArabNIX’s Information Security and Linux Training Courses.

Publications (Books, Papers, Courses, Whitepapers):


Certificates:


Training Courses Taken:

  • OpenStack Bootcamp, Mirantis
  • SourceFire Security Education Program – Snort IDS/IPS Technology v2.8
  • Project Management
  • Business Continuity & Disaster Recovery
  • SolarisTM 9 Operating Environment – 6 Months Track
  • Cisco Networking Academy Program, CCNA – 3 Months Track

Technical Profile (old and not updated!):

  • Operating Systems
    Linux (Red Hat, CentOS, Fedora, Debian, Ubuntu)
  • Unix IBM AIX, and Unix Sun Solaris
    Microsoft Win2K, Win2003, Win2008, WinXP, Vista, and Windows7

  • Hardware
    Intel Based x86/x86-64 Servers (HP/Dell), IBM Power Servers, Sun SPARC Servers

  • Development
    Shell Scripting, Python, C/C++, Java, Pascal/Delphi, Assembly (Linux/Windows), PHP, and HTML

  • DBMS
    MySQL, PostgreSQL, MSSQL, IBM DB2, and SQLite

  • Network Services
  • Installing, Configuring, Hardening, and Tuning any of the following services:
    DHCP, DNS (BIND), Apache, Tomcat, Subversion (SVN), SMB/CIFS, NFS, SSH, openLDAP, NIS, NTP, Squid, FTP, Sendmail, Postfix, Exim, IPTables, openVPN, Microsoft ISA, Active Directory, and Web Hosting (WHM/CPanel Web Hosting Control Panel, Plesk, and WHMCS).

  • Virtualization Hypervisor
  • VMware WorkStation, VMware Server, Xen, XenServer, Virtuozzo, OpenVZ and VirtualBox.

  • Infosec, Digital Forensics, and Malware Analysis
  • – Linux Kernel Patching, Compilation, Tunning, and Hardening.
    – Linux System Integrity, Data and Filesystem Encryption,
    – Hardening and Auditing Linux Services, Web Applications, and Firewalls.
    – Install, configure, and maintain IDS/IPS (Snort, OSSEC, etc) systems.
    – Install, configure, and maintain network security devices (Firewalls, VPN concentrators, routers, Internet Gateways, and content filtering systems).
    – Vulnerability Assessment and Patch Management (NeXpose, Nessus, SAINT Exploit, GFI LanGuard, Shavlik, MBSA, etc).
    – Exploit Development and Analysis (Spike, Ollydbg, Immunity Debugger, GNU Debugger (gdb), IDA Pro, etc).
    – Doing both Static and Dynamic Malware Analysis (Ollydbg, Immunity Debugger, IDA Pro, Sysinternals Suite, etc).
    – Penetration Testing using Metasploit Framework, Nmap, Maltego, etc.
    – Perform Network Security Auditing using Scapy.
    – Investigate network attacks and Traffic Analysis (Security Onion, tcpdump, Wireshark, Xplico, Snort, NetworkMiner, NetWitness Investigator, NetSniff-NG, TCPFlow, tcptrack, tcpreplay, etc).
    – Memory and Data Aquisition (Memoryze, DumpIt, FastDump, FTK Imager, ddcfld, dd, etc).
    – Retrieve and Analyze Data from a Suspect’s Computer (The Sleuth Kit (TSK), Autopsy, Forensic Toolkit (FTK), Digital Forensics Framework (DFF), ProDiscover, Foremost, Scalpel, MFTAnalyzer, Hex Workshop, Sysinternals Suite, P2 eXplorer, Dependency Walker, Windows File Analyzer, RegShot, RegRipper, different EXIF Viewers, etc).
    – Windows Memory Forensics using Volatility
    – Event and Log monitoring (Splunk, Syslog, Ntop, Nagios, munin, EventLog Analyzer, etc).
    – Writing Different Security Tools using Python
    – Implement and Enforce Security Policies and Procedures (PCI Compliance, etc).
    – Develop and maintain Business Continuity and Disaster Recovery plans.


To Achieve List (Challenges):


Contribution:


Standards:


Scientific Hobbies:

  • A computer addict, who just can’t leave his desk.
  • Reading about Digital Forensic, Incident Response, Malware & Network Traffic Analysis, Social Engineering, and Writing Simple Python Tools.

Sports:

  • Trained Kickboxing for more than two years under the coach Omar Enayah (Holds Blackbelts in the follwoing: Kickboxing “5″, Mauy Thai “1″, Ji Jitsu “1″, Seylat “1″, Arabic Sword Fighter, and Qoowat Al-Rami “5 Qabtha”),
  • Left training for around two years, then got back to work, but as a Mauy Thai and Brazilian Ji Jitsu practitioner, under the same coach Omar Enayah,
  • A big fan of MMA and combat competitions (UFC, K-1, Strikeforce, DREAM, PRIDE),
  • Best fighter of all time: Fedor Emelianenko (MMA)
  • Also a fan of other fighters: Anderson Silva, Frankie Edgar, Carlos Condit, Renan Barão (all MMA) and Badr Hari (K-1),
  • Favourite fighting style is: Muay Thai,
  • Might be the biggest Real Madrid Football Club fan in the Middle East!
  • Used to present my University in Billiard competitions.

Social Activities: