Skip to Main Content
All Trimarc services are now delivered through TrustedSec! Learn more

Esteban Rodriguez

Senior Security Consultant

EXPERIENCE

  • 10+ years IT
  • 8+ years cybersecurity
  • 5+ years penetration testing/consulting

EDUCATION & CERTIFICATIONS

  • Associate in Science, Information Systems Technology, Community College of the Air Force
  • Bachelor of Science, Computer Networks & Security, University of Maryland University College
  • Offensive Security Certified Professional (OSCP)
  • Offensive Security Wireless Professional (OSWP)
  • GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)
  • GIAC Web Application Penetration Tester (GWAPT)
  • GIAC Penetration Tester (GPEN)
  • GIAC Security Essentials (GSEC)
  • GIAC Certified Incident Handler (GCIH)
  • GIAC Certified Intrusion Analyst (GCIA)
  • Certified Ethical Hacker (CEH)
  • CompTIA Network+
  • CompTIA Security+

INDUSTRY CONTRIBUTIONS

PASSION FOR SECURITY
I just love popping shells.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog December 05 2023

The SOCKS We Have at Home

Use OpenSSH to pivot through networks without complex tools, leveraging Windows 10 and Server 2019's default installation, and easily set up a bind shell for…

Read about this article
Blog September 15 2022

Practical Attacks against NTLMv1

Exploit NTLMv1 vulnerabilities to gain administrative access, leveraging authentication downgrade, LDAP relay, and Shadow Credentials attacks, with techniques…

Read about this article
Blog March 03 2022

Manipulating User Passwords Without Mimikatz

Manipulating User Passwords Without Mimikatz: Exploring Alternative Techniques for Lateral Movement and Privilege Escalation.

Read about this article
News December 12 2025

Security Advisory: React2Shell (CVE-2025-55182) - Critical RCE Vulnerability

A critical vulnerability affecting React Server Components (RSC) is being actively exploited. Here's what to look for and what to do next.

Read about this article
Blog December 09 2025

Holy Shuck! Weaponizing NTLM Hashes as a Wordlist

Password reuse is common in Active Directory (AD). From an attacker’s perspective, it is a reliable path to lateral movement or privilege escalation. Most IT…

Read about this article
Podcasts December 05 2025

Security Noise - Hacker Family Feud

Our security experts compete to see which team can guess the most popular answers to cybersecurity industry questions on this episode of the TrustedSec…

Read about this article
Events December 04 2025

Research on Windows Accessibility: Narrator.exe

Join us for our next Discord Livestream "Research on Windows Accessibility: Narrator.exe" on December 4 at 11:00AM ET! During this exclusive session, Principal…

Read about this article
Blog December 04 2025

What is a TrustedSec Program Maturity Assessment (PMA)?

The TrustedSec PMA is a tactical approach to evaluating the components, efficiency, and overall maturity of an organization’s Information Security…

Read about this article
Webinars December 03 2025

NIST CSF 2.0 - From Compliance to Confidence

During our next webinar, our experts will cover the latest evolution of the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF),…

Read about this article
News December 01 2025

KTVU Fox 2 San Francisco - Too good to be true? Cyber Monday Warning

Protect your purchases this Cyber Monday! Director of Advisory Services Chris Camejo speaks with KTVU Fox 2 to share essential tips on how to safeguard your…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.