Illusion of Control: Capability Maturity Models and Red Teaming
$3000 Bug Bounty Award from Mozilla for a successful targeted Credential Hunt
Post-Exploitation: Abusing Chrome's debugging feature to observe and control browsing sessions remotely
Hunting for credentials and building a credential type reference catalog
Attack Graphs - How to create and present them