Home
I am a principal security consultant at a cyber security firm and have been working at in the firm’s penetration testing team for over 8 years. Over the course of the 8 years, I honed my skills across many different penetration testing disciplines, and became the firm’s lead Subject Matter Expert (SME) for 2 service offerings:
- Wireless penetration testing, covering Wi-Fi, Bluetooth, RFID, NFC and other forms of wireless communication
- Environment breakout testing, covering breaking out of restricted systems, such as Citrix and RDS ecosystems
Ultimately as SME lead, my role is to help shape and continuly improve the service offerings under my charge, to ensure our customers can understand their threat landscape and address security risks.
Featured Posts
An adversarial perspective of the Windows supplicant settings
Understanding the various Windows supplicant settings and their security implications Continue reading An adversarial perspective of the Windows supplicant settings
Cracking WPA2-EAP WLAN perimeters with Evil Twin attacks
Coercing domain credentials from a device using evil twin attacks Continue reading Cracking WPA2-EAP WLAN perimeters with Evil Twin attacks
Latest Posts
Building a WPA2 Enterprise WLAN with a Ubiquiti UniFi Controller and a Microsoft Network Policy Server
An end-to-end guide to building a Ubiquiti WPA2 Enterprise with Microsoft RADIUS WLANs Continue reading Building a WPA2 Enterprise WLAN with a Ubiquiti UniFi Controller and a Microsoft Network Policy Server
An adversarial perspective of the Windows supplicant settings
Understanding the various Windows supplicant settings and their security implications Continue reading An adversarial perspective of the Windows supplicant settings
Cracking WPA2-EAP WLAN perimeters with Evil Twin attacks
Coercing domain credentials from a device using evil twin attacks Continue reading Cracking WPA2-EAP WLAN perimeters with Evil Twin attacks
Cracking PSK WLAN perimeters with Evil Twin attacks
Coercing the PSK from a device without deauthentication attacks Continue reading Cracking PSK WLAN perimeters with Evil Twin attacks
Cracking WEP & WPA2-PSK Wireless Encryption Redux
A 2023 guide on cracking WEP & WPA2-PSK wireless encryption Continue reading Cracking WEP & WPA2-PSK Wireless Encryption Redux
Manually Extracting WPA2-EAP WLAN RADIUS Certificates
Inspecting RADIUS certificates for target information Continue reading Manually Extracting WPA2-EAP WLAN RADIUS Certificates
See Posts for more