Ruben Boonen

Ruben Boonen holds a number of industry recognised security certifications such as the OSCE, OSEE and CREST CCT INF. While he has lead a wide variety of engagements he has developed a speciality for red teaming and Windows post-exploitation. His areas of research include client-side attacks, privilege escalation, Windows internals, Windows kernel exploitation, restricted environment breakouts, persistence and PowerShell.

More About Ruben

Profile

Ruben Boonen holds a number of industry recognised security certifications such as the OSCE, OSEE and CREST CCT INF. While he has lead a wide variety of engagements he has developed a speciality for red teaming and Windows post-exploitation. His areas of research include client-side attacks, privilege escalation, Windows internals, Windows kernel exploitation, restricted environment breakouts, persistence and PowerShell. In his free time Ruben loves to give back to the InfoSec community. He has been an assistant trainer at Black Hat USA, delivered training at Hack In Paris and has delivered workshops at DefCon, 44Con and various BSides events. He maintains an InfoSec blog (http://www.fuzzysecurity.com/) and GitHub account (https://github.com/FuzzySecurity) where he publishes research on a variety of topics.