Tyler Booth | OSCP, CRTO, CRTL

Principal Offensive Security Consultant and Researcher

LinkedIn | X

[email protected], Roanoke, United States

About

Principal Offensive Security Consultant. Hacker. Red Team Lead. Researcher.

Work Experience

Principal, Adversary Services

Coalfire | FTE

Sep 2025 - Present

Roanoke, Virginia, United States

Principal Offensive Security Consultant/ Adversary Simulation Team Lead

CDW

Sep 2021 - Sep 2025

Lead the Adversary Simulation team, developing initial access payloads, C2 infrastructure automation, and advanced EDR evasion techniques. Drive the creation of custom internal tooling to enhance offensive security engagements and overall team effectiveness. Manage internal knowledge-sharing and training programs, elevating team competency and operational readiness. Support pre-sales initiatives by demonstrating team expertise, articulating service offerings, and advising on engagement scope. Promote team achievements through whitepapers, advisories, marketing materials, and industry event representation, strengthening the organization’s professional network and industry presence.

Senior Offensive Security Consultant

CDW

Aug 2019 - Sep 2021

Developed custom tools for internal team use while enhancing systems and processes to improve operational efficiency. Created and executed personalized education plans to align skill development with client needs, supporting team growth initiatives. Participated in pre-sales activities by demonstrating team expertise, clarifying service offerings, and advising on engagement scope. Conducted research on emerging security topics, producing tools and documentation to support security assessments. Promoted team visibility through internal collaboration, whitepapers, advisories, marketing contributions, and conference presentations.

Offensive Security Consultant

CDW

Sep 2015 - Aug 2019

Led and supported network security assessments for organizations ranging from small businesses to large enterprises. Developed custom tools and scripts to streamline engagements and served as the designated Serpico Project lead, modifying code to meet reporting standards. Created a red team service offering, including toolbox development, automated infrastructure builds, and comprehensive documentation. Maintained social engineering infrastructure, designed new campaigns, and actively shared insights with the team to enhance collective expertise.

Customer Care Representative

nTelos Wireless

Jul 2014 - Sep 2015

Provided customer support by resolving billing concerns, answering inquiries, and troubleshooting handset and cellular network issues. Developed and maintained Excel spreadsheets for rate plan calculations and implemented systems to track company devices, preventing loss or theft. Educated associates on Microsoft Dynamics CRM functionality and wrote scripts to analyze service reports, identifying potential outage locations.

Information Security Researcher

GMU Center for Secure Information Systems

Jun 2013 - Nov 2013

Conducted in-depth Android malware analysis and evaluated proof-of-concept code to develop metrics for assessing zero-day attack probabilities. Assembled and maintained server racks while supporting faculty research through white paper reviews and minor contributions to new publications. Collaborated closely with professors to enhance algorithms, source code, and project outcomes.

Certificates

Certified Red Team Lead (CRTL)

Zero-Point Security Ltd

Feb 2025

BOF Development and Tradecraft

Zero-Point Security Ltd

Oct 2024

Certified Red Team Opereator (CRTO)

Zero-Point Security Ltd

May 2021

Offensive Security Certified Professional (OSCP)

Offensive Security

Mar 2014

Projects

NetScaler Password Hash Research

Apr 2024 - Apr 2024

An analysis of the user password hashing algorithm used by Citrix NetScaler.

MiniDumpFS

Mar 2024 - Mar 2024

Programmatically parse minidump files from system memory dumps using a patched version of Ulf Frisk's vmm library.

GetLAPSPassword

May 2023 - May 2023

An impacket example script that retrieves Microsoft LAPS (LAPSv1) passwords from LDAP attributes.

Publications

CVE-2024-29513

MITRE

May 2024

An issue in briscKernelDriver.sys in BlueRiSC WindowsSCOPE Cyber Forensics before 3.3 allows a local attacker to execute arbitrary code within the driver and create a local denial-of-service condition due to an improper DACL being applied to the device the driver creates.

Kerberos 101

Jan 2024

An overview of Kerberos and various attacks primitives.

Exploiting Vulnerable Drivers

Nov 2023

Defense Against the Dark Arts 2023 presentation on exploiting vulnerable drivers.

CVE-2023-41444

MITRE

Aug 2023

An issue in Binalyze IREC.sys v.3.11.0 and before allows a local attacker to execute arbitrary code and escalate privileges via the IREC.sys driver.

CVE-2022-38611

MITRE

Sep 2022

Incorrect access control in Watchdog Anti-Virus v1.4.158 allows attackers to perform a DLL hijacking attack and execute arbitrary code via a crafted binary.

Police Station Pentest: From Zero Access to the Evidence Room

Nov 2020

A talk that went over an interesting pentest engagement. Domains are compromised, access control systems taken over, server rooms are broken into, and some explanation as to why this happened is shared.