Skip to Main Content

Justin Elze

CTO, Director of Research

EXPERIENCE
Justin Elze is currently serving as Chief Technology Officer at TrustedSec. Over his 8 years with the company as an InfoSec expert, Justin has used his vast expertise in enterprise penetration testing, network security, social engineering, and red teaming to identify clients’ vulnerabilities and ultimately, protect their technology infrastructure. Prior to becoming CTO, Justin held the roles of Director of Innovation, Research, and Advanced Testing and Principal Security Consultant for TrustedSec.

With more than a decade of experience in the IT industry, Justin’s expertise is increasingly sought out by others in the field. He has taught at Black Hat and spoken at DerbyCon, where he also served on the CFP Review Board, and is also featured as an industry leader in the published books Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World and Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity.

Prior to joining TrustedSec, Justin was a Senior Penetration Tester for Accuvant LABS, Optiv, Dell SecureWorks, and Redspin, where he led numerous red team engagements and penetration tests. He has worked across a variety of industries, including roles for ISPs, hosting companies, Department of Defense contracting companies, and consulting companies. Today, he leans on what he learned throughout his roles in various capacities to inform his choices as CTO and further his thought leadership in the industry.

Outside of his work experience and “ethical hacker” persona, Justin is passionate about building, tuning, and racing cars (and, yes, occasionally hacking them) and spending time with his 3 dogs. You can find his latest musings—security-related and otherwise—on his Twitter account, @HackingLZ.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog May 18 2023

Walking the Tightrope: Maximizing Information Gathering while Avoiding Detection for Red Teams

Analyze the balance between gaining useful information and avoiding detection, detailing recon techniques that can be employed without compromising stealth.…

Read about this article
Blog March 17 2023

Critical Outlook Vulnerability: In-Depth Technical Analysis and Recommendations (CVE-2023-23397)

Threat Overview Earlier this week, Microsoft released a patch for Outlook vulnerability CVE-2023-23397, which has been actively exploited for almost an entire…

Read about this article
Webinars March 15 2023

Ask Me Anything: Penetration Testing Innovations and Insights

Join David Kennedy, Founder & Chief Hacking Officer, and Justin Elze, CTO & Director of Research, for a live webinar in which they’ll answer your questions…

Read about this article
Webinars December 14 2021

Log4j: Live Update Webcast

During the webcast, we will be joined by David Kennedy, TrustedSec CEO & Binary Defense CTO, Randy Pargman, Binary Defense Vice President of Threat Hunting &…

Read about this article
Blog October 29 2024

Android Hacking for Beginners

1.1    Prerequisites Set Up an Android Lab: https://www.trustedsec.com/blog/set-up-an-android-hacking-lab/ Burp Suite: https://portswigger.net/burp DVBA…

Read about this article
Blog October 22 2024

Offensively Groovy

On a recent red team engagement, I was able to compromise the Jenkins admin user via retrieving the necessary components and decrypting credentials.xml. From…

Read about this article
Blog October 17 2024

Spec-tac-ula Deserialization: Deploying Specula with .NET

Earlier this year, I gave a talk at Steelcon on .NET deserialization and how it can be used for Red Team ops. That talk focused on the theory of .NET…

Read about this article
Blog October 15 2024

Let’s Clone a Cloner - Part 2: You Have No Power Here

Previously on Let's Clone a Cloner, I needed a long-range RFID badge cloner. There are many walkthroughs out there on how to build a cloner that are fantastic,…

Read about this article
Blog October 08 2024

EKUwu: Not just another AD CS ESC

TL;DR - Using built-in default version 1 certificate templates, an attacker can craft a CSR to include application policies that are preferred over the…

Read about this article
Blog October 03 2024

Kicking it Old-School with Time-Based Enumeration in Azure

IntroductionYet another user-enumeration method has been identified in Azure. While Microsoft may have disabled Basic Authentication some time ago, we can…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.