Personal Information
Organization / Workplace
Greater Minneapolis-St. Paul Area United States
Occupation
Principal Security Consultant - CISSP, QSA
Industry
Technology / Software / Internet
About
Industry Experience
Scott has been working with medium and large companies in the information security space for over 10 years. He is currently responsible for the development, and execution of penetration testing at NetSPI. His role includes researching and developing tools, techniques, and methodologies used during network and application penetration tests. As part of that experience Scott has had the opportunity to provide technical and compliance security services for financial, healthcare, retail, nuclear, manufacturing, pharmaceutical, and educational organizations.
Community Activities
As an active participant in the information security community Scott performs security resear...
Tags
sql server
red team
penetration testing
hacking
powershell
pentest
powerupsql
netspi
excessive privileges
active directory
network shares
database
breach and attack simulation
detection engineering
ransomware detection
ransomware
troopers
msbuild
global temporary table
arsenal
blackhat
post exploitation
secure360
adversarial simulation
thotcon
application security
owasp
database hacking
detective controls
purple team
sql server database hacking metasploit powershell
hacking pentesting application network server expl
hacking pentest penetration testing layers applica
passwords hacking penetration testing pentest sql
pentest penetration testing hacking cracking audit
hacking pentest decompile reverse hook crack deskt
hacking penetration testing pentest secure360 arp
malware apt trends lifecycle hacking bot virus bac
brute force
windows hacking
password guessing
windows dictionary attacks
application
network
security
information security
sql server database hacking injection links appsec
See more
- Presentations
- Documents
- Infographics
Splunk workshop-Threat Hunting
Splunk
•
6 years ago
SACON - Threat Hunting Workshop (Shomiron Das Gupta)
Priyanka Aash
•
6 years ago
Here Be Dragons: The Unexplored Land of Active Directory ACLs
Andy Robbins
•
6 years ago
A Case Study in Attacking KeePass
Will Schroeder
•
7 years ago
Pwning the Enterprise With PowerShell
Beau Bullock
•
7 years ago
Invoke-Obfuscation DerbyCon 2016
Daniel Bohannon
•
7 years ago
Outlook and Exchange for the bad guys
Nick Landers
•
7 years ago
Six Degrees of Domain Admin - BloodHound at DEF CON 24
Andy Robbins
•
7 years ago
Mind the gap - Troopers 2016
Casey Smith
•
8 years ago
I Have the Power(View)
Will Schroeder
•
8 years ago
Red team upgrades using sccm for malware deployment
enigma0x3
•
8 years ago
DNS exfiltration using sqlmap
Miroslav Stampar
•
11 years ago
44CON London 2015 - Old Dog, New Tricks: Forensics With PowerShell
44CON
•
8 years ago
Application Instrumentation with WMI
Nicholas Schweitzer
•
13 years ago
Building an Empire with PowerShell
Will Schroeder
•
8 years ago
Go Hack Yourself - 10 Pen Test Tactics for Blue Teamers
jasonjfrank
•
8 years ago
I Hunt Sys Admins
Will Schroeder
•
9 years ago
Unicode - Hacking The International Character System
Websecurify
•
9 years ago
Malware Analysis Using Free Software
Xavier Mertens
•
9 years ago
Windows Attacks AT is the new black
Rob Fuller
•
10 years ago