Senior Security Consultant
Sarah Norris is a Security Consultant for TrustedSec. Sarah is starting her career in Information Security after conducting PCI audits for Trustwave. Before Trustwave, Sarah worked on Linux systems writing and debugging custom Python modules for Zenoss, the open source network monitoring software.
Education & Certifications
- Bachelor of Science, Cybersecurity, Utica College
- Certified Information Systems Security Professional (CISSP)
Sarah Norris is a member of AHA (Austin Hackers Anonymous), Austin 2600, and lolctf.
Passion for Security
Sarah became interested in information security shortly after starting college. She realized that there was nothing more thrilling than picking a lock, cracking a password, or winning a CTF challenge.
Recent Blog Posts
This blog post highlights some good techniques to use when restricted to testing an up-to-date Windows system with low-level user privileges (no local admin) through a Remote Desktop Protocol (RDP) connection. The Situation: At the start of this engagement, I faced the common task of needing to escalate privileges after acquiring low-level access to a...
Because Phishing attacks are becoming more advanced in their exploitation of social engineering techniques, it may be overwhelming to attempt a defense against them. Technical defenses can work hard to shield your employees from being targeted by large phishing expeditions, but user awareness is key in protecting an organization against phishing attacks. Below I will...