Personal Information
Unternehmen/Arbeitsplatz
Greater Minneapolis-St. Paul Area United States
Beruf
Principal Security Consultant - CISSP, QSA
Branche
Technology / Software / Internet
Info
Industry Experience
Scott has been working with medium and large companies in the information security space for over 10 years. He is currently responsible for the development, and execution of penetration testing at NetSPI. His role includes researching and developing tools, techniques, and methodologies used during network and application penetration tests. As part of that experience Scott has had the opportunity to provide technical and compliance security services for financial, healthcare, retail, nuclear, manufacturing, pharmaceutical, and educational organizations.
Community Activities
As an active participant in the information security community Scott performs security resear...
Tags
sql server
red team
penetration testing
hacking
powershell
pentest
powerupsql
netspi
excessive privileges
active directory
network shares
database
breach and attack simulation
detection engineering
ransomware detection
ransomware
troopers
msbuild
global temporary table
arsenal
blackhat
post exploitation
secure360
adversarial simulation
thotcon
application security
owasp
database hacking
detective controls
purple team
sql server database hacking metasploit powershell
hacking pentesting application network server expl
hacking pentest penetration testing layers applica
passwords hacking penetration testing pentest sql
pentest penetration testing hacking cracking audit
hacking pentest decompile reverse hook crack deskt
hacking penetration testing pentest secure360 arp
malware apt trends lifecycle hacking bot virus bac
brute force
windows hacking
password guessing
windows dictionary attacks
application
network
security
information security
sql server database hacking injection links appsec
Mehr anzeigen
Präsentationen
(25)Gefällt mir
(24)Splunk workshop-Threat Hunting
Splunk
•
Vor 6 Jahren
SACON - Threat Hunting Workshop (Shomiron Das Gupta)
Priyanka Aash
•
Vor 6 Jahren
Here Be Dragons: The Unexplored Land of Active Directory ACLs
Andy Robbins
•
Vor 6 Jahren
A Case Study in Attacking KeePass
Will Schroeder
•
Vor 7 Jahren
Pwning the Enterprise With PowerShell
Beau Bullock
•
Vor 7 Jahren
Invoke-Obfuscation DerbyCon 2016
Daniel Bohannon
•
Vor 7 Jahren
Outlook and Exchange for the bad guys
Nick Landers
•
Vor 7 Jahren
Six Degrees of Domain Admin - BloodHound at DEF CON 24
Andy Robbins
•
Vor 7 Jahren
Mind the gap - Troopers 2016
Casey Smith
•
Vor 8 Jahren
I Have the Power(View)
Will Schroeder
•
Vor 8 Jahren
Red team upgrades using sccm for malware deployment
enigma0x3
•
Vor 8 Jahren
DNS exfiltration using sqlmap
Miroslav Stampar
•
Vor 11 Jahren
44CON London 2015 - Old Dog, New Tricks: Forensics With PowerShell
44CON
•
Vor 8 Jahren
Application Instrumentation with WMI
Nicholas Schweitzer
•
Vor 13 Jahren
Building an Empire with PowerShell
Will Schroeder
•
Vor 8 Jahren
Go Hack Yourself - 10 Pen Test Tactics for Blue Teamers
jasonjfrank
•
Vor 8 Jahren
I Hunt Sys Admins
Will Schroeder
•
Vor 9 Jahren
Unicode - Hacking The International Character System
Websecurify
•
Vor 9 Jahren
Malware Analysis Using Free Software
Xavier Mertens
•
Vor 9 Jahren
Windows Attacks AT is the new black
Rob Fuller
•
Vor 10 Jahren
2010 2013 sandro suffert memory forensics introdutory work shop - public
Sandro Suffert
•
Vor 10 Jahren
Wce internals rooted_con2011_ampliasecurity
fangjiafu
•
Vor 11 Jahren
Presentation nix
fangjiafu
•
Vor 11 Jahren
mimikatz @ ossir
Benjamin Delpy
•
Vor 11 Jahren
Personal Information
Unternehmen/Arbeitsplatz
Greater Minneapolis-St. Paul Area United States
Beruf
Principal Security Consultant - CISSP, QSA
Branche
Technology / Software / Internet
Info
Industry Experience
Scott has been working with medium and large companies in the information security space for over 10 years. He is currently responsible for the development, and execution of penetration testing at NetSPI. His role includes researching and developing tools, techniques, and methodologies used during network and application penetration tests. As part of that experience Scott has had the opportunity to provide technical and compliance security services for financial, healthcare, retail, nuclear, manufacturing, pharmaceutical, and educational organizations.
Community Activities
As an active participant in the information security community Scott performs security resear...
Tags
sql server
red team
penetration testing
hacking
powershell
pentest
powerupsql
netspi
excessive privileges
active directory
network shares
database
breach and attack simulation
detection engineering
ransomware detection
ransomware
troopers
msbuild
global temporary table
arsenal
blackhat
post exploitation
secure360
adversarial simulation
thotcon
application security
owasp
database hacking
detective controls
purple team
sql server database hacking metasploit powershell
hacking pentesting application network server expl
hacking pentest penetration testing layers applica
passwords hacking penetration testing pentest sql
pentest penetration testing hacking cracking audit
hacking pentest decompile reverse hook crack deskt
hacking penetration testing pentest secure360 arp
malware apt trends lifecycle hacking bot virus bac
brute force
windows hacking
password guessing
windows dictionary attacks
application
network
security
information security
sql server database hacking injection links appsec
Mehr anzeigen