Skills For A Red-Teamer

Presented at NolaCon 2018, May 18, 2018, 2 p.m. (Unknown duration)

Want to incorporate hybrid security assessments into your testing methodology? What does going above and beyond look like for these types of assessments? How do you provide the best value with the resources and scope provided? What do some of these toolkits encompass?

If you're interested in what skills are needed for a Red-Teamer, or taking your red teaming assessments to the next level, here's the basic info to get you started. I'll discuss items of importance, methodology, gear, stories and even some tactics used to help give you an edge.


Presenters:

  • Brent White / B1TK1LL3R as Brent White
    Brent is an Sr. Security Consultant at NTT Security. He is the founder of the Nashville DEF CON group (DC615) and is the Global Coordinator for the DEF CON conference Groups program. He has held the role of Web/Project Manager and IT Security Director at the headquarters of a global franchise company as well as Web Manager and information security positions for television personalities on The Travel Channel. He has also been interviewed on the popular web series, Hak5‚ with Darren Kitchen, BBC News, and Microsoft‚ Roadtrip Nation show. Brent has also spoken at numerous security conferences including DEF CON, DerbyCon and ISSA International. Twitter: @brentwdesign
  • Tim Roberts / byt3boy as Tim Roberts
    Tim is a Sr. Security Consultant within NTT Security’s Threat Services group. He has spoken at national, international and collegiate security conferences, including ISSA International, DEF CON, DerbyCon, various B-Sides, CircleCityCon, Techno Security Con, SaintCon, Appalachian Institute of Digital Evidence at Marshall University and more. He has been interviewed on the subject of “White hat hacking” for Microsoft’s “Roadtrip Nation” television series, was featured on IDG Enterprise’s CSO Online publication by Ryan Francis on social engineering and is a regular contributor to NTT Security’s #WarStoryWednesday blog series. Tim has held management, IT and physical security roles across multiple industries, including healthcare and government. His professional experiences cover traditional/non-traditional hacking techniques that include network, wireless, social engineering, application, physical and scenario-based compromises. These techniques have led to highly successful Red Team assessments against corporate environments. By continuing to share these experiences, he hopes to further contribute to the InfoSec community.

Links:

Similar Presentations: