A Senior Security Consultant currently working at TrustedSec, specialising in Adversarial Simulation engagements.


Read more
I'm available for
Adam's Collections

Articles and blogs

1 Highlight

Code I’ve Shared

1 Highlight
2022
May 15, 2022
May 15, 2022
With the leaking of code signing certificates and exploits for vulnerable drivers becoming common occurrences, adversaries are adopting the kernel as their new playground. And with Microsoft making technologies like Virtualization Based Security (VBS) and Hypervisor Code Integrity (HVCI) available, I wanted to take some time to understand just how vulnerable endpoints are when faced with an attacker set on escaping to Ring-0.

https://blog.xpnsec.com/gcioptions-in-a-virtualized-world/
Read more
Apr 14, 2022
Apr 14, 2022
Emulating Daxin Backdoor with NDIS Hooking and Kernel Code Injection https://www.youtube.com/watch?v=veQ2bO2kEl8
Read more
Apr 12, 2022
Apr 12, 2022
Promoted to Principal Security Consultant at TrustedSec.

https://www.trustedsec.com
Read more
Apr 09, 2022
Apr 09, 2022
A demo showing how an attacker can bypass VBS only protection of the Windows Kernel, and the value of Microsoft Hypervisor Code Integrity (HVCI) to prevent these kinds of attacks.

https://www.youtube.com/watch?v=uSNivgtM5BM
Read more
Apr 06, 2022
Apr 06, 2022
Reposted by Adam Chester
Excited to onboard a new community member today, welcome Adam! Thanks for checking out Polywork 🙏. Please let me know if you have any feedback on how we can make Polywork better, we're just getting started!
Apr 05, 2022
Apr 05, 2022
Published a POC to Github demonstrating how attackers can use SMB over QUIC.

https://github.com/xpn/ntlmquic
Read more
Loading...