Skip to Main Content

Larry Spohn

EXPERIENCE

Larry Spohn is a highly experienced security consultant with over 20 years of experience in the industry and a proven track record of success in assessing and improving the security posture of organizations of all sizes. Larry is not only a skilled technical analyst with a deep understanding of security threats and vulnerabilities, but he is also an excellent communicator and trainer who is adept at conveying complex security concepts to both technical and non-technical audiences.

EDUCATION & CERTIFICATIONS

  • Offensive Security Certified Professional (OSCP)
  • Certified Information Systems Security Professional (CISSP)
  • Microsoft Certified Systems Engineer (MCSE)

PROFESSIONAL AFFILIATIONS

  • Northeast Ohio Information Security Forum (NEOISF), InfraGard Northern Ohio Chapter

INDUSTRY CONTRIBUTIONS

Speaking:

  • Northeast Ohio Information Security Forum 2014
  • Cleveland B-Sides 2015

Training Provided:

  • BlackHat USA 2014, 2015, 2016, 2017, 2018, 2019, 2021, 2022
  • Cleveland B-Sides 2017
  • InfoSec World 2017, 2018, 2019, 2020, 2021
  • DerbyCon 2014, 2015, 2016, 2017, 2018, 2019
  • Ohio Information Security Summit 2013, 2014
  • Wild West Hacking Fest 2020

Tools:

PASSION FOR SECURITY

Larry is experienced in executing various security assessments for numerous organizations and industries, including health care, education, manufacturing, banking, insurance, and governments, both foreign and domestic. His previous experience in network security includes patch management, anti-virus administration, vulnerability management, intrusion prevention, Internet gateway administration, Group Policy management, and Active Directory administration.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog November 07 2023

The Triforce of Initial Access

LootWhile Red Teamers love to discuss and almost poetically describe their C2 feature sets, EDR evasion capabilities, and fast weaponizing of N-day exploits,…

Read about this article
Blog November 02 2023

JS-Tap: Weaponizing JavaScript for Red Teams

How do you use malicious JavaScript to attack an application you know nothing about?Application penetration testers often create custom weaponized JavaScript…

Read about this article
Blog October 17 2023

A Hitch-hacker's Guide to DACL-Based Detections (Part 3)

This blog series was co-authored by Security Consultant Megan Nilsen and TAC Practice Lead Andrew Schwartz.1    IntroductionIn this third and final…

Read about this article
Blog October 12 2023

A Hitch-hacker's Guide to DACL-Based Detections (Part 2)

This blog series was co-authored by Security Consultant Megan Nilsen and TAC Practice Lead Andrew Schwartz.1    IntroductionThis is a continuation of A…

Read about this article
Blog October 11 2023

A Hitch-hacker's Guide to DACL-Based Detections (Part 1B)

This blog series was co-authored by Security Consultant Megan Nilsen and TAC Practice Lead Andrew Schwartz.1    IntroductionIn this continuation to our first…

Read about this article
Blog October 10 2023

A Hitch-hacker's Guide to DACL-Based Detections (Part 1A)

This blog series was co-authored by Security Consultant Megan Nilsen and TAC Practice Lead Andrew Schwartz.1    IntroductionIf you were to collectively ask any…

Read about this article
Blog September 21 2023

Basic Authentication Versus CSRF

I was recently involved in an engagement where access was controlled by Basic Authentication. One (1) of the findings I discovered was a Cross-Site Request…

Read about this article
Blog September 18 2023

Okta for Red Teamers

For a long time, Red Teamers have been preaching the mantra “Don’t make Domain Admin the goal of the assessment” and it appears that customers are listening.…

Read about this article
Blog September 05 2023

Creative Process Enumeration

Very often in engagements, you'll want to list out processes running on a host. One thing that is beneficial is to know is if the processes is a 64-bit or…

Read about this article
Blog August 31 2023

Crafting Emails with HTML Injection

Have you ever wanted to send an email from a domain you don’t have SMTP credentials for? With some HTML injection, we may be able to do just that. From time to…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.