Skip to Main Content

Hans Lakhan

Principal Security Consultant

EXPERIENCE
With over a decade of industry experience, Hans Lakhan has worked in both offensive and defensive roles. Before switching to red teaming, he spent 5 years working as a technical Security Analyst for a Fortune 500 telecommunications company, specializing in networking, firewalls, vulnerability management, and VPNs.

EDUCATION & CERTIFICATIONS

  • B.S. Bio-Medical Information Systems, University of Minnesota
  • Offensive Security Certified Professional (OSCP)

PROFESSIONAL AFFILIATIONS
Hans occasionally presents at various conferences (Blackhat, DerbyCon) and contributes to several open source projects.

PASSION FOR SECURITY
While Hans enjoys tackling complex security challenges, his true passion stems from tearing apart systems (physical, digital, process flows, and more), in which the goal is to identify weaknesses and present remediation solutions.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog January 25 2022

Recovering Randomly Generated Passwords

TL;DR - Use the following hashcat mask files when attempting to crack randomly generated passwords. 8 Character Passwordsmasks_8.hcmask9 Character…

Read about this article
Blog February 02 2021

Injecting Rogue DNS Records Using DHCP

During an Internal Penetration Test or Adversarial Attack Simulation (Red Team), TrustedSec will deploy a rogue, Linux-based networking device onto a client's…

Read about this article
Blog September 23 2020

Azure Account Hijacking using mimikatz’s lsadump::setntlm

Not long ago, I was on an engagement where the client made use of a hybrid Office 365 environment. In their setup, authentication credentials were managed by…

Read about this article
Webinars June 17 2020

Password Recovery 101: Cracking More of Your List

Join VP of Consulting Services Martin Bos, as well as Senior Security Consultants Paul Burkeland and Hans Lakhan for this webinar and interactive walkthrough,…

Read about this article
Webinars January 15 2025

DOD Contract Compliance: DFARS 7012 and CMMC

Advisory Compliance Practice Lead Chris Camejo will take a deep dive into the Department of Defense requirements for protecting FCI and CUI.

Read about this article
Blog January 07 2025

Solving NIST Password Complexities: Guidance From a GRC Perspective

Not another password change! Isn’t one (1) extra-long password enough? As a former Incident Response, Identity and Access Control, and Education and Awareness…

Read about this article
Podcasts December 20 2024

Security Noise - Episode 7.8

Farewell 2024

Read about this article
Blog December 19 2024

Malware Series: Process Injection Mapped Sections

We're back with another post about common malware techniques. This time, we are talking about using shared memory sections to inject and execute code in a…

Read about this article
Webinars December 18 2024

The Lost Underground

Join TrustedSec Principal Security Consultant Mike Felch for an eye-opening journey into the lost underground, where ingenuity, disobedience, and complexity…

Read about this article
Blog December 17 2024

Top 10 Blogs of 2024

At TrustedSec, we are all about leveraging our collective intelligence and knowledge to uplift the cybersecurity community. One of our most popular educational…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.