# Contact Info Brian Durham Email: [Redacted] Phone: [Redacted] Address: [Redacted] Website: https://bdurham.dev LinkedIn: https://www.linkedin.com/in/brian-durham/ Hack The Box: https://app.hackthebox.com/profile/29427 Try Hack Me: https://tryhackme.com/p/moxfolder Github: https://github.com/thebriandurham Offworld Systems: https://offworldsystems.com Twitter: https://twitter.com/mox_folder_ # About Me Hi, there! My name is Brian, and I eat, drink, sleep, and breathe infosec and technology. I love to figure out how things work (digital, mechanical, or otherwise). I also love anything that goes FAST: cars, motorcycles, planes, and rockets (especially rockets!). I've been hooked on cybersecurity since I first watched Hackers, *way* back in the day. Ever since, I've had my eyes set on penetration testing and red teaming. That's my path, and I'm going to walk it. Note: Redacted Information & Plaintext Resume What's with all the redacted information?: Well, the internet is a dangerous place. There are millions of malicious web-scraping bots and threat actors out there that are constantly dragging the internet for sensitive data. As a result: PII that isn't critical to this document has been redacted. Un-redacted versions of data will be provided only by request and after identity verification. Thank you for your understanding. Why is this resume a txt file?: Per my previous point, the web is dangerous. If I were to offer this resume as a .docx, .pdf, or some other file-type, you may not feel safe opening it. For your consideration and cybersecurity, this resume is presented in plaintext. # Certifications & Licenses OSCP November 2019 Offensive Security Cert Link: https://www.credly.com/badges/feb95537-81b9-4cf0-bbe4-b7a8d804d03d/linked_in_profile PNPT August 2022 TCM Security Cert Link: https://www.credential.net/1474599d-ad39-461b-ab08-cddcf6fdded2#gs.8fsws0 eJPT August 2018 eLearn Security HAM Technician's License Callsign: [Redacted] July 2020 FCC # Courses/Continuing Ed. BHIS/Antisyphon: Cyber Threat Hunting Level 1 BHIS/Antisyphon: How to Fail a Pentest | John Strand HTB Academy: Introduction to Active Directory (In-Progress) HTB Academy: Introduction to Networking HTB Academy: Introduction to Web Applications HTB Academy: Linux Fundamentals HTB Academy: Web Requests HTB Academy: Windows Fundamentals TCM-Sec: External Pentest Playbook TCM-Sec: Linux Privilege Escalation TCM-Sec: Open-Source Intelligence (OSINT) Fundamentals TCM-Sec: Practical Ethical Hacking TCM-Sec: Windows Privilege Escalation # Badges & Accolades Hack the Box Rank: Pro Hacker Global Rank: 495/~600,000+ Try Hack Me Rank: 93,553/1,274,071 (top 7%) Try Hack Me Badges: Linux PrivEsc # Projects ## On-going grabsploit - Created a rust-based wrapper for common searchsploit commands so they can be ran in shorthand format, making exploit research for a given system more efficient. - Up Next: add console functionality that allows users to navigate search results, peak into exploit code, and re-run searches, all without taking their hands off the keyboard. lazypeon - lazypeon is a python-based cheat and reference sheat generator for penetration testing use. - Designed the program to run as a console or as a terminal command. - Agreggated pentesting cheat sheets, such as reverse shells and common recon commands, into files which the program uses to generate pentesting commands with crucial variables (such as remote or local host IP addresses) pre-populated based on user input. Nominal - Nominal is an indie, puzzle, asymmetric-co-op game created by yours truly. - https://store.steampowered.com/app/1454190/Nominal/ ## Queued 3D Printed Rocket Flight Computer - Designed, printed, and tested a model-scale rocket to house the flight computer. - Designed and outsourced a PCB that houses an Arduino Nano, altimeter module, and a radio module. (Started with basics before making things more complicated). - Developed and tested Arduino firmware to control one instance of the PCB assembly as a base station to receive data from the rocket. - Developed and tested Arduino firmware to control a second instance of the PCB assembly to act as the flight computer, in the actual rocket. - Pending first test flight and confirmation of functionality and viability of components before advancing the flight computer's capabilities. - As is: the flight computer establishes radio communication with the base station, initializes its altimeter, and will live-stream altitude data to the base station throughout flight. ## Open Source Contributions TCM-Sec: Windows-WiFi-Extractor - Assisted TCM Security with development of their Windows WiFi Extractor tool. - The program is designed to dump WiFi SSIDs and plaintext keys from Windows hosts utilizing the built-in netsh utility. - Forked the original repo and converted the code to run in-memory only, as the original code created files (and therefore traces) on the victim computer. - As a result: removed reliance on hard-coded integer accessors to parsed XML data and moved to a human-readable JSON format. ## Past Active Directory Exploitation & Pivoting Lab - Utilized VMWare Workstation Pro to setup an Active Directory environment to learn and practice AD enumeration, exploitation, and pivoting techniques. - Setup a domain controller with group policy objects to emulate a real life, insecure Windows environment. - Setup two vulnerable host machines and joined them to the AD domain. - Used a Kali attack box to enumerate the AD environment, intercept and spoof NTLM traffic, and practice Kerberoasting and other common AD attack methods to compromise each host in the domain, as well as the domain controller. Intel NUC Proxmox & Linode Homelab - Setup an INTEL NUC machine running Proxmox on baremetal. - Hardened Proxmox installation and configured private subnets for virtualized hosts. - Setup Linode OpenVPN instance, hardened the host, configured Linode Firewall rules, and setup private subnets for individual VPN profiles. - Used OpenVPN host to secure communications between each virtualized host running on the Proxmox server. - Configured a Kali virtual machine on the Proxmox server with an installation of Nessus and a secured/hardened remote desktop configuration to allow running vulnerability scans while away from home. nanoparser - Created an Azure MySQL database backend with an accompanying Azure Functions API to manage mining and payout information on the Nanominer ecosystem to better learn Azure services and automate pool mining administrative issues. - Created a python script, nanoparser, to parse log files from Nanominer to ensure accurate share ratings when calculating payout ratios within a share nanopool pool. - The data from nanoparser was uploaded to the Azure MySQL database through hardened Azure Functions. DinoDisplay - Created an Arduino-based PC hardware data display to learn serial communication between an arduino and a PC, as well as how to pull system information, such as CPU core temperatures. - Utilizes WMI and Open Hardware monitor to fetch and provide said data to the arduino for display on a chosen screen solution (LCD/LED/etc.) Paratrooper - Network enumeration script that is meant to be ran from a Raspberry Pi dropbox on a client's internal network. - Stores the output of standard enumeration commands (such as ifconfig, netstat, etc.) and then uses scp to copy the enumerated data back to a listening host. - Designed to be set up on a Kali instance and ran via Crontab to allow the script to execute on a set interval to ensure the data gets returned once a network connection is established. sqlchecker - Python script that reads in a list of reserved SQL keywords and scans a provided input to determine whether or not a SQL keyword is present. - Useful for PCAP analysis to determine the validity of SQLi security events. opt_enum - Python script, created to quickly enumerate what HTTP verbs are allowed for a given URL or file or URLs. Rust Basics - Followed guided learning experience to get a better grasp of the Rust programming language so that I can make more performant offsec tools that can easily be compiled for various operating systems. - Learned the foundations of Rust, including: using Cargo, data-types, error-handling, functions, control flows, etc. - Created a single threaded web server to learn the basics of networking, sockets, and requests in the rust language. # CTFs & Writeups ## HTB Business CTF 2022 Breakout - Challenge: A C2 implant's interface was left exposed on a victim's webserver. Break into the interface and enumerate its functionality. - Compromised the C2 interface and extracted a non-native binary, 'bkd.' - Performed analysis on the binary and extracted the flag from multiple strings present in the compiled code. Chromeminer - Challenge: A browser extension is believed to host cryptomining malware. Investigate. - Downloaded and unzipped the .crx (browser extension) file. - Reverse engineered heavily obfuscated malicious javascript code to retrieve the flag. Lina's Invitation - Challenge: A CEO's password vault has been compromised after receiving an email with an attachment. Review the provided PCAP file and attachment to determine how he was compromised. - Unzipped the attachment (a .docx file), used OLE Tools suite to analyze its contents, and discovered malicious VBA macros calling out to a fake Windows Update site and containing a part of the flag. - Analyzed the provided PCAP file and found two indicators of compromised: a malicious HTML payload and some obfuscated PowerShell commands. - De-obfuscated the malicious HTML payload to discover part of the flag. - De-obfuscated and reverse-engineered the PowerShell payload to reveal the final part of the flag. # Experience Offworld Systems LLC - Owner & Lead Developer - September 2020 - Present - Planned, designed, and developed an independent game: Nominal. - Released said game on the Steam platform to players worldwide and supported it with continuous updates, developer updates, and meticulous changelogs. - Managed an accompanying community Discord server, Twitter, and Steam hub, and provided customer support through all aforementioned channels. - Created multiple proof-of-concept game technology demos, utilizing the Unity Game Engine, C#, Azure Web Services, Microsoft SQL Database, and other creative technologies. - Provided independently contracted web design, development, and admin services to third parties. - Provided cybersecurity incident response and remediation services to private clients. - Provided cybersecurity education and training to private clients. [Redacted MSSP] - Full Stack Developer - August 2019 - October 2021 - Leveraged Python, Flask, JS, and MariaDB technologies as a full-stack developer to engineer web applications that enhanced the team's workflow and daily life. - Created multiple internal web applications to fetch and contextualize proprietary data at a reduced time and higher success rate than current web applications. - Reverse engineered, rewrote, and optimized internal tools and scripts that were no longer supported. - Sr. Cyber Security Analyst - February 2018 - August 2019 - Worked in a 24x7x365 Security Operations Center environment to provide Managed Security Services to more than 4,200 clients using proprietary IDS, IPS, and ML systems. - Performed event and log analysis to provide well-written, succinct reports on the validity of security incidents for clients. - Created internal software to gather, aggregate, and analyze Open Source Intelligence (OSINT) threat data at a reduced time compared to existing resources (existing: 1m30s+ execution time, new program: 3-5s). [Redacted University] - Information Technology Support Specialist - February 2017 - January 2018 - Provided hardware and software support for 31 departments and over 700 machines. - Maintained user access rights and Group Policy through Active Directory. - Developed, implemented, and enacted hardware lifecycle plans, imaged and configured new machines, securely wiped and out-processed machines for recycling. - Maintained local and campus-wide hardware inventory for divisional equipment. - Acted as a liaison between ITS and the Division of Student Affairs vice presidents, directors, and department heads. - Supported and maintained computer infrastructure for critical FM Radio broadcasting equipment. - Configured, hardened, and maintained infrastructure used to run student government elections and voting machines. - Information Technology Support Technician - May 2016 - January 2017 - Fulfilled hardware/software support requests through UNF ITS’ ticketing system. - Administered user access rights and Group Policy through Active Directory. - Created and updated knowledge base articles for technical procedures and departmental access structures. - Help Desk Technician - January 2014 - April 2016 - Provided end-user support for students, faculty, and staff campus-wide in both remote and onsite situations. - Mentored newly hired technicians - Designed support documentation and guides for the ITS division. - Volunteered for technical projects and opportunities to assist in other support departments and divisions. [Redacted Bar] - Server / Expo / Barback / Host - April 2012 - December 2013 - Interacted with and provided service to customers in a high-pressure bar environment. - Trained and mentored new staff. - Communicated dining needs between servers and line cooks. - Resolved inter-staff conflicts delicately and fairly. # Education [Redacted University] - Bachelor of Science -BS, Information Technology - Computer Security & Cryptography - 2012-2016