Moher | 熊詩旻

Hello! I'm Moher Hsiung, a curious and creative person with a passion for brainstorming. Due to my interest in cyber security, I decided to push myself out of my comfort zone and pursue a career as an cyber security engineer. Although I am new to this field, I have completed some core courses in computer science. I have a basic understanding of computer architecture, which gives me the confidence to learn new technologies more quickly in the future.

       

Skill

  • Windows Security – Windows Registry malware detection, GS, SEH
  • Reverse Engineering – IDA, Gidra, Radare2
  • Pentesting – Nmap, Metasploit, John the Ripper, Burp suite, gobuster
  • Symbolic-Execution – Angr, z3
  • Programming language – Python, PowerShell, C++

Cyber Security Experience 

TAIWANHolyHigh - Trainees (Oct 2022 - Now)

教育部先進資通安全實務人才培育計畫─高階培訓模式

CTF  |  Team: NemoNemo (Sep 2020 - Sep 2021)

NemoNemo is the team consisting of the Information Security Lab members. 

  -AWARD-

     2021/11   金盾獎_嶄露頭角獎(大專院校組)

     2021/9      Trend Micro CTF 2021 _13th

     2021/9      DownUnderCTF 2021_145th

Course

The Attack and Defense of Computers : Learning reverse engineering and pwn.

Network Security Practices - Attack and Defense : Do some Lab like Fuzzing, Exploit CVE, Symbolic-Execution, etc.

Linux Kernel : Study to implement or modify some  kernel module.

Work Experience

Physics teacher  •  新民高中 Shin-Min high school

full-time teacher for general high school and vocational high school.

Jul 2017 - Aug 2019

Education

國立清華大學

Computer Science, Master's Degree

Information Security Lab

2020 - 2022

國立彰化師範大學

Physics, Bachelor's Degree

2012 - 2016

Certificate

CEH, TOEIC 690

Portfolio

My thesis - RegSegTool

I implemented a windows registry-based malware detection assistive tool. It can automatically compare the changes to the current registry with the last backup, check the changes for suspicious PowerShell or other script commands, and output the result into a web report according to the risk value.

win_pwn

It's the interim report of The Attack and Defense of Computers class.

I introduce the mitigation mechanism of windows and explain one pwn challenge for example.