Speaker

SeonDong Yu

SeonDong Yu

RaonSecure, Core Research Team (Offensive Researcher)

Actions

SeonDong Yu is a Researcher of the Core Research Team at RAON SECURE, specializing in security research and penetration testing, with a particular interest in embedded hacking. As a dedicated Offensive Researcher based in South Korea, SeonDong is committed to advancing cybersecurity until the digital world is safe from threats. He is also an active member of the 'SaturnX' team, participating in Capture The Flag (CTF) competitions.

[Education]
Master’s Degree in Information Security Engineering, Konkuk University (GRADUATE SCHOOL OF INFORMATIO)
Master's Degree: A Study on the Design and Improvement of Single Thread by Multi-Processing Using Docker Container : Deploying a Web Attack Log Analysis System with ModSecurity

[Hacking Research Team Activities]
NOAR, July 2019 – February 2021
SaturnX, February 2021 – Present

[Penetration Tester]
Raonsecure Core Research Team, South Korea (July 2019 – Present)

[Presentation]
- KISIA 2025 (KOR) - Ahnlab Tack, DATABASE Hacking Lecture
- CodeEnge 2025 (KOR) - Embedded Hacking to Red Teaming (Router Hacking)
- Codegate 2024 (KOR) - Embedded Hacking and Analysis (IoT)
- Howon University - Penetration Testing Lecture (Web/IoT/Reverse)
- Seoul Women's University - Gifted Education Center Lecture (Android/iOS Frida Hooking)
- Kangwon National University Cybersecurity Competition - CTF Problem-Solving Lecture
- Woosuk University - Penetration Testing & CTF Problem-Solving Lecture
- Seoul Women's University 9th Lemon Seminar - Red Team Penetration Testing Lecture

[CTF Challenge Creation]
- South Korea ( Best of The Best 9 - King musae (Web) )
- South Korea ( Best of The Best 9 - Fun Fun Game (Web) )

"For more details, refer to https://d0ngd0nge.xyz/";

SeonDong Yu

RaonSecure, Core Research Team (Offensive Researcher)

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top