Tradecraft Tuesday | Huntress CTF Finale Part II: The Making Of

On-demand

Reserve your spot

Error: Please enter your first name.
Error: Please enter your last name.
This field is required.
This field is required.
This field is required.

About

Good defenders study real-world hacker techniques. The best defenders, though, turn them into capture-the-flag (CTF) challenges. 

Join our next Tradecraft Tuesday episode where we’ll take you behind the scenes to reveal how we turned the tradecraft we’ve seen in the wild into immersive CTF challenges. We’ll break down our process for replicating real TTPs and building them into our CTF competition—and we’ll even show you how to solve some of our toughest challenges.

Webinar
Presenters

John Hammond

Principal Security Researcher

John Hammond is a cybersecurity researcher, educator and content creator. As part of the Threat Operations team at Huntress, John spends his days making hackers earn their access and helping tell the story. Previously, as a Department of Defense Cyber Training Academy instructor, he taught the Cyber Threat Emulation course, educating both civilian and military members on offensive Python, PowerShell, other scripting languages and the adversarial mindset. He has developed training material and information security challenges for events such as PicoCTF and competitions at DEFCON US. John speaks at security conferences such as BsidesNoVA, to students at colleges such as the US Naval Academy, and other online events including the SANS Holiday Hack Challenge/KringleCon. He is an online YouTube personality showcasing programming tutorials, CTF video walkthroughs and other cyber security content. John currently holds the following certifications: Security+, CEH, LFS, eJPT, eCPPT, PNPT, PCAP, OSWP, OSCP, OSCE, OSWE, OSEP, and OSED (OSCE(3)).

Matt Kiely

Principal Product Researcher

Theater kid turned Marine turned Windows system administrator turned network administrator turned cyber defender turned malware analyst turned ethical hacker turned offensive security researcher turned red teamer turned arrow maker at Huntress.

Matt Kiely is a Principal Security Researcher at Huntress developing products that hit hackers where it hurts. He currently leads MDR for Microsoft 365 product research. He is a skilled cyber expert with over 10 years of experience in IT and security working for organizations including: Massachusetts Institute of Technology, financial institutions, SimSpace, and the United States Marine Corps. Matt holds a Bachelor of Science in Information Technology from Northeastern University and a Graduate Certificate in Cybersecurity from the Rochester Institute of Technology. Some of Matt's professional credentials include OSCP, eCPPT, eCPTX, CRTO, and CRTP.

Adam Rice

Senior Security Engineer

Adam is an Infrastructure and Security Engineer with nearly a decade's experience designing, deploying, maintaining, and securing cloud and on-premise data center network and server infrastructure. He is skilled in Vulnerability Management and Remediation, CSPM, SIEM, Logging Infrastructure, Active Directory, EDR, Windows, Linux, PowerShell, Splunk, and Okta. Adam’s affinity for tinkering and solving complex problems is what brought him into the info security space and he finds satisfaction in knowing he’s helping contribute to securing the 99% out there through his work at Huntress.

Login
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt.
Webinar: Tradecraft Tuesday | Huntress CTF Finale Part II: The Making Of by Huntress