Skip to Main Content

Kevin Haubris

Senior Research Analyst

EXPERIENCE
Kevin Haubris has 10+ years of experience in Information Security positions for the public and private sectors, focusing on both offensive and defensive security. During this time, he has concentrated mostly on software development, pen testing, adversarial emulation, and reverse engineering.

EDUCATION & CERTIFICATIONS

  • Bachelor of Science, Computer and Network Security, Dakota State University

PASSION FOR SECURITY
Kevin has had a passion for security since college, when he started learning exploit development outside of class in his spare time. That started him off on a path to learning about additional complicated topics. Now he enjoys solving difficult problems, spending time in a disassembler, and loves learning how different binaries work.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog May 04 2022

ELFLoader: Another In Memory Loader Post

Intro Now that BOFs are commonplace for Windows agents, some people have talked about wanting a non-Windows only version. In this blog post, we’ve got…

Read about this article
Blog February 22 2021

COFFLoader: Building your own in memory loader or how to run BOFs

Intro Have you heard of the new Beacon Object File (BOF) hotness? Have you ever thought that you should be able to run those outside of Cobalt Strike? Well, if…

Read about this article
Blog January 07 2020

SELinux and Auditd

In this blog post, I will discuss SELinux and Auditd, how to use them, how to determine what the default policies are doing, and how to add new ones. For those…

Read about this article
Blog September 18 2018

Linux: How's My Memory

Windows in-memory injection is commonplace in current toolsets, there are quite a few methods to do it, and most of them are documented pretty well. Linux…

Read about this article
Blog April 26 2018

Malware: Linux, Mac, Windows, Oh My!

While going through APT write-ups, I’ve been noticing a lot of focus on detecting Windows malware, so we will skip over that. One thing that I haven’t seen…

Read about this article
Webinars May 08 2024

Preparing for NIST CSF 2.0: Practical Tips for Implementation

TrustedSec’s Senior Security Consultant Jared McWherter and Advisory Solutions Director Alex Hamerstone will provide actionable advice for aligning your…

Read about this article
Events TrustedSec HQ | April 30 2024

ISC2 Cleveland Chapter Member Meeting April 2024

ISC2 Cleveland Chapter April MeetupCome join us for our April Meetup! Our Cleveland Chapter is hosting an exciting in-person event for all cybersecurity…

Read about this article
Events Charlotte, NC | April 29 2024

ILTA EVOLVE

TrustedSec is proud to sponsor ILTA EVOLVE!

Read about this article
Podcasts April 26 2024

Security Noise - Episode 6.19

InfoSec: Cybersecurity Education at Bedford High

Read about this article
Blog April 25 2024

Loading DLLs Reflections

We're back with another post about common malware techniques. This time we're not talking about process hollowing. We are going to branch off and talk about…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.