Skip to Main Content

Christopher Paschen

Research Practice Lead

EXPERIENCE
Christopher Paschen has worked in Information Security in both the private and public sectors for more than 10 years. He has experience managing Active Directory and network services for a small team and has developed products that are used across organizational boundaries to accomplish a variety of red team tasks. Currently, he manages research direction and contributes to our internal implant and payload generation systems.

EDUCATION & CERTIFICATIONS

  • Master of Science, Applied Computer Science, Dakota State University
  • Bachelor of Arts, Computer and Network Security, Dakota State University
  • Microsoft Certified: Azure Security Engineer Associate

PASSION FOR SECURITY
Christopher has always been interested in how computers work. He started assembling his first system with birthday money when he was 13 years old and experimented with programming in high school. While pursuing his Information Security career in college, he led teams for CCDC and CTF events in order to share his love for computer security with those around him. Currently, he enjoys creating tooling and platforms that enable the TrustedSec red team to accomplish their goals.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Webinars November 04 2020

Using Research to Gain Attack Intelligence

Come hear Carlos Perez, Practice Lead of the TrustedSec Research Unit and Chris Paschen, Senior Research Analyst, discuss how the industry has evolved, how to…

Read about this article
Blog March 28 2023

Using RPC in BOFs

In previous blog posts, I detailed how a windows programmer can develop against RPC and solidified why I feel Beacon Object Files (BOFs) have become cemented…

Read about this article
Blog March 24 2023

Disabling AV With Process Suspension

Every now and again, I see a crazy tweet that feels like it just can’t be true. Many of them are not true or are folks making overblown statements about…

Read about this article
Blog March 09 2023

Changes in the Beacon Object File Landscape

Time flies when you’re having fun! Can you believe it has been over two (2) years since the release of beacon object files (BOFs)? BOFs were released June 25,…

Read about this article
Blog March 02 2023

RPC Programming for the Aspiring Windows Developer

As EDR/AV solutions have evolved, attackers, be they malicious or hired testers, need to improve their techniques by exploring new avenues of accomplishing…

Read about this article
Webinars December 18 2024

The Lost Underground

Join TrustedSec Principal Security Consultant Mike Felch for an eye-opening journey into the lost underground, where ingenuity, disobedience, and complexity…

Read about this article
Webinars December 04 2024

BEC Basics: Your First Step to Thwarting Email Scams

Join Senior Security Consultant Steven Erwin and Security Consultant Caroline Fenstermacher as they cover the basics of BEC analysis, providing participants…

Read about this article
Blog December 03 2024

Discovering a Deserialization Vulnerability in LINQPad

Like most red teamers, I spend quite a lot of time looking for novel vulnerabilities that could be used for initial access or lateral movement. Recently, my…

Read about this article
Blog November 21 2024

A 5-Minute Guide to HTTP Response Codes

If you've done any network scanning or application testing, you've run into your fair share of HTTP response codes. If not, these codes will show up in most…

Read about this article
Events TrustedSec HQ | November 20 2024

WiCyS Ransomware Panel & Networking Event

Join us for an insightful discussion with the Women in Cyber Security (WiCyS) Northeast Ohio Affiliate members!

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.