Skip to Main Content

Kevin Haubris

Senior Research Analyst

EXPERIENCE
Kevin Haubris has 10+ years of experience in Information Security positions for the public and private sectors, focusing on both offensive and defensive security. During this time, he has concentrated mostly on software development, pen testing, adversarial emulation, and reverse engineering.

EDUCATION & CERTIFICATIONS

  • Bachelor of Science, Computer and Network Security, Dakota State University

PASSION FOR SECURITY
Kevin has had a passion for security since college, when he started learning exploit development outside of class in his spare time. That started him off on a path to learning about additional complicated topics. Now he enjoys solving difficult problems, spending time in a disassembler, and loves learning how different binaries work.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog May 04 2022

ELFLoader: Another In Memory Loader Post

Intro Now that BOFs are commonplace for Windows agents, some people have talked about wanting a non-Windows only version. In this blog post, we’ve got…

Read about this article
Blog February 22 2021

COFFLoader: Building your own in memory loader or how to run BOFs

Intro Have you heard of the new Beacon Object File (BOF) hotness? Have you ever thought that you should be able to run those outside of Cobalt Strike? Well, if…

Read about this article
Blog January 07 2020

SELinux and Auditd

In this blog post, I will discuss SELinux and Auditd, how to use them, how to determine what the default policies are doing, and how to add new ones. For those…

Read about this article
Blog September 18 2018

Linux: How's My Memory

Windows in-memory injection is commonplace in current toolsets, there are quite a few methods to do it, and most of them are documented pretty well. Linux…

Read about this article
Blog April 26 2018

Malware: Linux, Mac, Windows, Oh My!

While going through APT write-ups, I’ve been noticing a lot of focus on detecting Windows malware, so we will skip over that. One thing that I haven’t seen…

Read about this article
Events Mesa, AZ | February 14 2025

CactusCon 2025

TrustedSec is proud to sponsor and have a booth at CactusCon this year! Three of our consultants will be giving talks as well.

Read about this article
Webinars February 11 2025

2024 Conference Roundup

Join our panelists David Kennedy, Justin Elze, Jason Lang, and Oddvar Moe for their firsthand accounts and perspectives on what people were talking about at…

Read about this article
Blog February 06 2025

The Hidden Trap in the PCI DSS SAQ A Changes

The Payment Card Industry Security Standards Council (PCI SSC) just announced a change to Self Assessment Questionnaire A (SAQ A). The change eliminates two…

Read about this article
Podcasts February 04 2025

Security Noise - Episode 7.10

Authentication in 2025

Read about this article
Blog January 23 2025

Operating Inside the Interpreted: Offensive Python

IntroductionEvery once in a while, I get the urge to go back and revisit older techniques that used to be popular but have fallen out of favor with the…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.