solstice.sh Pentesting, Offensive Security Research & Development

Conference Talks

Bypassing Port Security in 2018: Defeating MACSEC and 802.1x-2010

Presented at: DEF CON 26, DerbyCon 2018, 44con, BSides DC

Slides: DEF CON Media Server


5GHZ Electronic Warfare

Presented at: Thotcon 2018, HackWest 2018, BSidesKC 2018

Slides:

5 ghz electronic warfare part i from Digital Silence

The Black Art of Wireless Post-Exploitation: Bypassing Port-Based Access Controls Using Indirect Wireless Pivots

Presented at: DEF CON 25, DEF CON 25 (Wall of Sheep), BSides Las Vegas 2017, 44con 2017, GRRCon 2017, BSides DC 2017,

Slides: The Black Art of Wireless Post-Exploitation - PowerPoint Slides


Introducing EAPHammer

Presented at: BlackHat Arsenal 2017, DEF CON 25 (Demo Labs)


Beyond Wardriving: Tracking Human Beings Using RF Technology

Presented at: BSides SLC 2017


Slaying Rogue Access Points With Python and Cheap Hardware

Presented at: DEF CON 24 (Wireless Village), BSides SLC 2016, BSides Hunstville 2016,