Scott Sutherland
78
Seguidores
Personal Information
Organización/Lugar de trabajo
Greater Minneapolis-St. Paul Area United States
Ocupación
Principal Security Consultant - CISSP, QSA
Sector
Technology / Software / Internet
Acerca de
Industry Experience
Scott has been working with medium and large companies in the information security space for over 10 years. He is currently responsible for the development, and execution of penetration testing at NetSPI. His role includes researching and developing tools, techniques, and methodologies used during network and application penetration tests. As part of that experience Scott has had the opportunity to provide technical and compliance security services for financial, healthcare, retail, nuclear, manufacturing, pharmaceutical, and educational organizations.
Community Activities
As an active participant in the information security community Scott performs security resear...
Etiquetas
sql server
red team
penetration testing
hacking
powershell
pentest
powerupsql
netspi
excessive privileges
active directory
network shares
database
breach and attack simulation
detection engineering
ransomware detection
ransomware
troopers
msbuild
global temporary table
arsenal
blackhat
post exploitation
secure360
adversarial simulation
thotcon
application security
owasp
database hacking
detective controls
purple team
sql server database hacking metasploit powershell
hacking pentesting application network server expl
hacking pentest penetration testing layers applica
passwords hacking penetration testing pentest sql
pentest penetration testing hacking cracking audit
hacking pentest decompile reverse hook crack deskt
hacking penetration testing pentest secure360 arp
malware apt trends lifecycle hacking bot virus bac
brute force
windows hacking
password guessing
windows dictionary attacks
application
network
security
information security
sql server database hacking injection links appsec
Ver más
- Presentaciones
- Documentos
- Infografías
Splunk workshop-Threat Hunting
Splunk
•
Hace 6 años
SACON - Threat Hunting Workshop (Shomiron Das Gupta)
Priyanka Aash
•
Hace 6 años
Here Be Dragons: The Unexplored Land of Active Directory ACLs
Andy Robbins
•
Hace 6 años
A Case Study in Attacking KeePass
Will Schroeder
•
Hace 7 años
Pwning the Enterprise With PowerShell
Beau Bullock
•
Hace 7 años
Invoke-Obfuscation DerbyCon 2016
Daniel Bohannon
•
Hace 7 años
Outlook and Exchange for the bad guys
Nick Landers
•
Hace 7 años
Six Degrees of Domain Admin - BloodHound at DEF CON 24
Andy Robbins
•
Hace 7 años
Mind the gap - Troopers 2016
Casey Smith
•
Hace 8 años
I Have the Power(View)
Will Schroeder
•
Hace 8 años
Red team upgrades using sccm for malware deployment
enigma0x3
•
Hace 8 años
DNS exfiltration using sqlmap
Miroslav Stampar
•
Hace 11 años
44CON London 2015 - Old Dog, New Tricks: Forensics With PowerShell
44CON
•
Hace 8 años
Application Instrumentation with WMI
Nicholas Schweitzer
•
Hace 13 años
Building an Empire with PowerShell
Will Schroeder
•
Hace 8 años
Go Hack Yourself - 10 Pen Test Tactics for Blue Teamers
jasonjfrank
•
Hace 8 años
I Hunt Sys Admins
Will Schroeder
•
Hace 9 años
Unicode - Hacking The International Character System
Websecurify
•
Hace 9 años
Malware Analysis Using Free Software
Xavier Mertens
•
Hace 9 años
Windows Attacks AT is the new black
Rob Fuller
•
Hace 10 años