Personal Information
Entreprise/Lieu de travail
Washington D.C. Metro Area United States
Secteur d’activité
Technology / Software / Internet
À propos
Chris has extensive experience in network and web application penetration testing as well as other Information Operations experience working as an operator for a DoD Red Team and other Full Scope penetration testing teams (regular pentesting teams too). Chris holds a BS in Computer Science and Geospatial Information Science from the United States Military Academy at West Point and holds his...[see certs below]. In the past, he has spoken at the United States Military Academy, BlackHat, DefCon, Derbycon, Toorcon, Brucon, Troopers, SOURCE Boston, OWASP AppSec DC, ChicagoCon, NotaCon, and CSI. He is a Co-Founder of NoV...
Mots-clés
pentesting
chris gates
carnal0wnage
metasploit
hacking
devops
red teaming
ken johnson
lares
purple teaming
aws
redis
devooops
memcache
aws security
adversarial simulation
chris nickerson
defense
appsec
blue teaming
cktricky
jenkins
elasticsearch
security
post exploitation
rob fuller
mubix
oracle
health
hackingyourhappiness
spirituality
energy healing
coaching
metaphysics
reiki
gcp
carnal0wange
raspberry pi
retropie
novahackers
tankstick
rsac2017
hadoop
simulation
canary
honeypot
haydn johnson
lessons learned
pruple teaming
incident response
devopsdays
serchcode
.git
vagrant
github
subversion
webappsec
risk assessment
joe mccray
gpp
coldfusion
auxiliary modules
osint
wxf
clientside
Tout plus
Présentations
(32)J’aime
(8)Ready player 2 Multiplayer Red Teaming Against macOS
Cody Thomas
•
il y a 5 ans
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
Scott Sutherland
•
il y a 7 ans
Technical Approach to Red Team Operations
Eduardo Arriols Nuñez
•
il y a 6 ans
Go Hack Yourself - 10 Pen Test Tactics for Blue Teamers
jasonjfrank
•
il y a 8 ans
Infiltrate 2015 - Data Driven Offense
Ram Shankar Siva Kumar
•
il y a 9 ans
Practical mitm for_pentesters
Jonathan Cran
•
il y a 10 ans
OWASP AppSecCali 2015 - Marshalling Pickles
Christopher Frohoff
•
il y a 9 ans
NSC #2 - D1 02 - Georgi Geshev - Your Q is my Q
NoSuchCon
•
il y a 9 ans
Personal Information
Entreprise/Lieu de travail
Washington D.C. Metro Area United States
Secteur d’activité
Technology / Software / Internet
À propos
Chris has extensive experience in network and web application penetration testing as well as other Information Operations experience working as an operator for a DoD Red Team and other Full Scope penetration testing teams (regular pentesting teams too). Chris holds a BS in Computer Science and Geospatial Information Science from the United States Military Academy at West Point and holds his...[see certs below]. In the past, he has spoken at the United States Military Academy, BlackHat, DefCon, Derbycon, Toorcon, Brucon, Troopers, SOURCE Boston, OWASP AppSec DC, ChicagoCon, NotaCon, and CSI. He is a Co-Founder of NoV...
Mots-clés
pentesting
chris gates
carnal0wnage
metasploit
hacking
devops
red teaming
ken johnson
lares
purple teaming
aws
redis
devooops
memcache
aws security
adversarial simulation
chris nickerson
defense
appsec
blue teaming
cktricky
jenkins
elasticsearch
security
post exploitation
rob fuller
mubix
oracle
health
hackingyourhappiness
spirituality
energy healing
coaching
metaphysics
reiki
gcp
carnal0wange
raspberry pi
retropie
novahackers
tankstick
rsac2017
hadoop
simulation
canary
honeypot
haydn johnson
lessons learned
pruple teaming
incident response
devopsdays
serchcode
.git
vagrant
github
subversion
webappsec
risk assessment
joe mccray
gpp
coldfusion
auxiliary modules
osint
wxf
clientside
Tout plus