Jason Lang, MCTTP

Jason Lang, TrustedSec Red Team, @curi0usJack

Oddvar Moe, Principal Security Consultant @TrustedSec. Microsoft Security MVP, @Oddvarmoe


Jason Lang is the practice lead of the Targeted Operations group at TrustedSec, an industry leader in offensive security services. The Targeted Operations group consists of some of the industry’s finest red team operators and researchers and is responsible for performing red team assessments for some of the world’s largest organizations across industry verticals. When not red teaming, Jason can be found in his woodland hermit castle pushing a jack plane, drinking coffee, or doing country chores.


Oddvar is a Principal Security Consultant working as a Red Teamer in the Targeted Operations Group at TrustedSec. Working with Red Teaming towards Fortune 100 companies Oddvar has gained a lot of experience from some of the most secure customers in the world. He has more than 20 years of working experience in the IT industry and is passionate about Windows Security, so passionate that Microsoft has awarded him the Most Valuable Professional Award 8 years in row. 


As a speaker he has delivered top notch sessions at conferences such as DerbyCon, IT Dev Connections, Paranoia, HackCon, Microsoft Security Week, MVP Dagen and Nordic Infrastructure Conference. He also actively contributes to the security community and he is most known for his contributions around the LOLBins/LOLBAS and the Ultimate AppLocker Bypasslist.


He has also discovered several weaknesses (CVE) in the Windows operating system and found several new persistence techniques that has since then been used by APT groups. Oddvar also actively blogs about techniques and release tools to the community.

Talks & Q&A

Conference | Sep 19

TTP Treasure Hunt: Mining VXUG for Red Team Tactics

Practical takeaways for turning malware research into red team wins.

Description

Malware authors and red teams share a common goal: bypassing defenses to achieve their objectives. Sites like vx-underground offer a treasure trove of malware source code, samples, and papers that reveal the latest TTPs used by real-world bad guys. In this talk, we’ll explore how red teams can mine these resources to enhance their own adversary emulation playbooks. From persistence to evasion, we’ll break down key findings from recent vx-underground papers, demonstrate their applicability in modern red teams, and discuss how these insights can challenge defense teams. Expect practical takeaways, maybe a demo or two, and a roadmap for turning malware research into red team wins—without needing a PhD in reverse engineering.


Why the committee chose this talk

Every security research can be used in a malicious way. Lets find out some new ideas.