Sample of my present & past research publications & presentations
Black Hat Arsenal USA – 2024 – Splunk Attack Range
Hackmiami – Introduction to LangChain – March 2024
STRT – Detecting WS FTP Server exploitation with Attack Range – Oct 2023
Hackmiami – Robots 101 – Interacting Attacking AI Robot – May 2023
STRT – CISA Top 10 Malware – January 2023
A DCO Force-Multiplier; STRT Detections of Destructive Payloads July 2022
STRT – Industroyer2 – June 2022
STRT – CPE Destructive software – April 2022
STRT – Threat Update Caddy Wiper – April 2022
STRT – Threat Update Double Zero Destructor – March 2022
STRT-Detecting HermeticWiper & Ransomware Decoy Mar 2022
STRT-TA02- Threat Advisory. Destructive Software-Jan 2022
Approaching Linux Post Exploitation with Splunk Attack Range. SPLUNK STRT – Jan 2022
DEF CON 29 Cloud Village – Rod Soto – Detection Challenges in Cloud Connected Credential Attacks
Black Hat Europe 2021 – Git Wild Hunt. A Tool for Hunting Leaked Credentials
Black Hat Arsenal USA 2021- Git Wild Hunt
Due to Less Pollution, Secrets Stored on the Cloud are Now Clearly Visible – RSA USA Conference 2021
Detecting Trickbot with Splunk
Hackmiami Meetup 02-06-2021 Whatsapp, Telegram & Signal attack vectors
Kitploit – GitWildHunt A Tool To Hunt For Credentials In Github Wild AKA Git*Hunt
Black Hat Arsenal Europe 2020 – git-wild-hunt: Pwn API and leaked secrets
Purple Team Summit 2020 – Adversarial Attack Range with Splunk
Blog – Detecting Ryuk using Splunk Attack Range
Blog – Using Splunk to Detect Abuse of AWS Permanent and Temporary Credentials
DEF CON Safe Mode Red Team Village – Rod Soto – Have My Keys Been Pwned API Edition
Blog -Approaching Azure Kubernetes Security
Blog – Approaching Kubernetes Security — Detecting Kubernetes Scan with Splunk
Blog – Splunk Attack Range Now With Caldera and Kali Linux
Blog – Use Cloud Infrastructure Data Model to Detect Container Implantation (MITRE T1525)
Rod Soto – Jose Hernandez. DEFCON Red Team Village May-hem online summit 2020. Red Teaming Devops.
Rod Soto – Jose Hernandez. Hackmadrid %27 Online Meetup. Red Teaming Devops (In Spanish – Espanol)
Rod Soto – Attacking & Defending Against Drones. Pacific Hackers Online Meetup 2020.
Bsides SFO 2019 – Profiling “VIP Accounts” Access Patterns in User-Centric Data Streams
Shellbot Crimeware Re-Emerges in Monero Mining Campaign (Dark Reading)
BSides Las Vegas 2018 – I am the cavalry
IATC – Cavalry is ALL OF US – Joshua Corman, Beau Woods, Rod Soto, Travis Moore & Heath Wickline
DEFCON XXVI – Defcon Demo Labs – Chiron
Black Hat Arsenal USA 2018 – Chiron
Identiverse 2018 – SMS Vulnerabilities in Identity Management
SAMBA Protocol Vulnerabilities Threat Advisory – 2018 – JASK
Domain Impersonation / IDN Campaigns TA – 2018 – JASK
DerbyCon 2017 – Chiron Home based ML IDS with Joseph Zadeh
Hackmiami Conference 2017 – Detection of webshells in compromised perimeter assets using ML algorithms
RSA Conference 2017 – Automated Prevention of Ransomware with Machine Learning and GPOs
DEFCON 2016 – Packet Hacking Village Dynamic Population discovery for Lateral Movement Detection
Hackmiami Conference 2015 – Biohacking – Implantable chip attack vector Demo video
Aktaion – Signatureless Threat Detection. Open source ML tool for ransomware detection
The Lambda Defense: Functional Paradigms of Defense for Cybersecurity
BSides Orlando 2014 – Civilianization of War, paramilitarization of cyberspace and its implications for infosec pros
AKAMAI State of The Internet Q4-2014
DDoS attacks against global markets PLXSert – White Paper