Personal Information
Organización/Lugar de trabajo
Washington D.C. Metro Area United States
Sector
Technology / Software / Internet
Acerca de
Chris has extensive experience in network and web application penetration testing as well as other Information Operations experience working as an operator for a DoD Red Team and other Full Scope penetration testing teams (regular pentesting teams too). Chris holds a BS in Computer Science and Geospatial Information Science from the United States Military Academy at West Point and holds his...[see certs below]. In the past, he has spoken at the United States Military Academy, BlackHat, DefCon, Derbycon, Toorcon, Brucon, Troopers, SOURCE Boston, OWASP AppSec DC, ChicagoCon, NotaCon, and CSI. He is a Co-Founder of NoV...
Etiquetas
pentesting
chris gates
carnal0wnage
metasploit
hacking
red teaming
devops
lares
ken johnson
purple teaming
memcache
aws
redis
devooops
cktricky
blue teaming
security
appsec
defense
elasticsearch
jenkins
chris nickerson
adversarial simulation
aws security
oracle
post exploitation
mubix
rob fuller
clientside
wxf
github
subversion
osint
auxiliary modules
coldfusion
webappsec
gpp
joe mccray
risk assessment
health
hackingyourhappiness
spirituality
energy healing
coaching
metaphysics
reiki
gcp
carnal0wange
raspberry pi
retropie
novahackers
tankstick
rsac2017
hadoop
simulation
canary
honeypot
haydn johnson
lessons learned
pruple teaming
incident response
devopsdays
serchcode
.git
vagrant
Ver más
Presentaciones
(32)Recomendaciones
(8)Ready player 2 Multiplayer Red Teaming Against macOS
Cody Thomas
•
Hace 6 años
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
Scott Sutherland
•
Hace 8 años
Technical Approach to Red Team Operations
Eduardo Arriols Nuñez
•
Hace 7 años
Go Hack Yourself - 10 Pen Test Tactics for Blue Teamers
jasonjfrank
•
Hace 10 años
Infiltrate 2015 - Data Driven Offense
Ram Shankar Siva Kumar
•
Hace 10 años
Practical mitm for_pentesters
Jonathan Cran
•
Hace 12 años
OWASP AppSecCali 2015 - Marshalling Pickles
Christopher Frohoff
•
Hace 10 años
NSC #2 - D1 02 - Georgi Geshev - Your Q is my Q
NoSuchCon
•
Hace 10 años
Personal Information
Organización/Lugar de trabajo
Washington D.C. Metro Area United States
Sector
Technology / Software / Internet
Acerca de
Chris has extensive experience in network and web application penetration testing as well as other Information Operations experience working as an operator for a DoD Red Team and other Full Scope penetration testing teams (regular pentesting teams too). Chris holds a BS in Computer Science and Geospatial Information Science from the United States Military Academy at West Point and holds his...[see certs below]. In the past, he has spoken at the United States Military Academy, BlackHat, DefCon, Derbycon, Toorcon, Brucon, Troopers, SOURCE Boston, OWASP AppSec DC, ChicagoCon, NotaCon, and CSI. He is a Co-Founder of NoV...
Etiquetas
pentesting
chris gates
carnal0wnage
metasploit
hacking
red teaming
devops
lares
ken johnson
purple teaming
memcache
aws
redis
devooops
cktricky
blue teaming
security
appsec
defense
elasticsearch
jenkins
chris nickerson
adversarial simulation
aws security
oracle
post exploitation
mubix
rob fuller
clientside
wxf
github
subversion
osint
auxiliary modules
coldfusion
webappsec
gpp
joe mccray
risk assessment
health
hackingyourhappiness
spirituality
energy healing
coaching
metaphysics
reiki
gcp
carnal0wange
raspberry pi
retropie
novahackers
tankstick
rsac2017
hadoop
simulation
canary
honeypot
haydn johnson
lessons learned
pruple teaming
incident response
devopsdays
serchcode
.git
vagrant
Ver más