I've been fascinated by hacking skill since student time. I feel extremely curious what i can see from attacker view so i learned it through different forums. After i graduated from University i joined a trading company which was facing cyber attack. After i reviewed the environment i immediately understand how did the adversary work and able to reproduce the attack. After trading company i joined ASTRI to perform various edge technology security research including facial recognition, blockchain application security research, malware analysis for cyber threat intelligence report. I also prepare material for banking industry to perform live demonstration on trending attack to visualise the attack impact. What is more, i am also a bug bounty hunter who submitted vulnerability report to ASUS, Apple, eBay and Yahoo. At the same time, i joined several CTF game with my VXRL security research group members. I finished all offensive security certificate within two years as i love to challenge myself. After i finished OSCP in ASTRI, i got the rest certificates within two years including OSEE, which is one of few testers with this certificate in HK. I love to build my own experiment lab to test interesting latest exploit. It can help me understand more in what condition the exploit work and how serious if the exploit success. I also write my own script for my penetration testing or proof of concept. During these years, I do presentation, session sharing and panel discussion or become helper to different security events including international event like hitcon and defcon. I'm also two CVEs owner on critical vulnerabilities on school education system which may able to bypass authentication and exfiltrate data.
Head of Cyber Security Research at UDomain
Bachelor of Arts (B.A.), Criminology with Psychology