
#9 Red Teaming & Malware Development ft. Nathan Rice
08/21/24 • 35 min
In this conversation, Kyser Clark interviews Nathan Rice, a senior penetration tester, about his background and experience in cybersecurity. They discuss the differences between penetration testing and red team operations, the importance of starting with penetration testing before moving to red teaming, and the challenges and rewards of obtaining certifications. They also touch on the skills required for malware development and the importance of staying up to date with evolving techniques. Nathan shares advice for aspiring red team operators and emphasizes the need to be proactive and not be afraid to ask questions.
Connect with Nathan Rice: https://www.linkedin.com/in/nathan-rice-b52209123/
Takeaways
- Penetration testing and red team operations have distinct differences, with red teaming requiring more patience, stealth, and intent to emulate real-world threat adversaries.
- Starting with penetration testing before transitioning to red team operations is recommended, as the skills learned in penetration testing translate well to red teaming.
- Obtaining certifications in cybersecurity, such as OSCP and OSEP, can be challenging and may require multiple attempts, but they provide valuable knowledge and recognition in the field.
- Malware development skills are important for red team operators, as having the ability to create custom tools and bypass EDRs is crucial for success.
- Aspiring red team operators should not be afraid to ask questions, be proactive, and not get caught up in analysis paralysis. Getting caught is part of the learning process and should be used as an opportunity to improve.
- Moving with intent and being able to think creatively are essential skills for red team operators, as they need to constantly adapt and find new ways to bypass defenses.
Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY
Music by Karl Casey @ White Bat Audio
Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.
Opinions are my own and may not represent the positions of my employer.
In this conversation, Kyser Clark interviews Nathan Rice, a senior penetration tester, about his background and experience in cybersecurity. They discuss the differences between penetration testing and red team operations, the importance of starting with penetration testing before moving to red teaming, and the challenges and rewards of obtaining certifications. They also touch on the skills required for malware development and the importance of staying up to date with evolving techniques. Nathan shares advice for aspiring red team operators and emphasizes the need to be proactive and not be afraid to ask questions.
Connect with Nathan Rice: https://www.linkedin.com/in/nathan-rice-b52209123/
Takeaways
- Penetration testing and red team operations have distinct differences, with red teaming requiring more patience, stealth, and intent to emulate real-world threat adversaries.
- Starting with penetration testing before transitioning to red team operations is recommended, as the skills learned in penetration testing translate well to red teaming.
- Obtaining certifications in cybersecurity, such as OSCP and OSEP, can be challenging and may require multiple attempts, but they provide valuable knowledge and recognition in the field.
- Malware development skills are important for red team operators, as having the ability to create custom tools and bypass EDRs is crucial for success.
- Aspiring red team operators should not be afraid to ask questions, be proactive, and not get caught up in analysis paralysis. Getting caught is part of the learning process and should be used as an opportunity to improve.
- Moving with intent and being able to think creatively are essential skills for red team operators, as they need to constantly adapt and find new ways to bypass defenses.
Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY
Music by Karl Casey @ White Bat Audio
Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.
Opinions are my own and may not represent the positions of my employer.
Previous Episode

#8 Cybersecurity Is a Beautiful Field: There's People That Don't Like Me ft. Aaron Tran
Kyser Clark interviews Aaron Tran, a military veteran who successfully transitioned into a career in cybersecurity. They discuss Aaron's journey from the military to becoming a penetration tester, the challenges he faced, and the steps he took to bridge the gap between non-cyber and cyber roles. They also touch on the importance of having a plan and utilizing resources like the SkillBridge internship program. Aaron shares his insights on paying ransomware demands, the value of the TCM Practical Career Ready Professional program, and the need for kindness and collaboration in the cybersecurity field.
Connect with Aaron Tran on LinkedIn: https://www.linkedin.com/in/aarontran-anasec/
Takeaways
- Having a plan is crucial when transitioning from the military to a career in cybersecurity
- Utilize resources like the SkillBridge internship program to gain real-world experience
- Paying ransomware demands is not recommended, but there may be situations where it's the only option
- The TCM Practical Career Ready Professional program can provide valuable training and networking opportunities
- Soft skills are essential in cybersecurity, as they help with client interactions and job interviews
- Don't let the noise and conflicting advice in the cybersecurity field discourage you
- Reach out to fellow veterans for support and camaraderie
- Kindness and collaboration are important in the cybersecurity field
Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY
Music by Karl Casey @ White Bat Audio
Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.
Opinions are my own and may not represent the positions of my employer.
Next Episode

#10 Breaking into Cybersecurity: Tips from a Pro ft. Jake Mayhew
In this conversation, Kyser Clark interviews Jake Mayhew, a senior penetration tester, about his background and experiences in cybersecurity. They discuss the importance of internships, the value of creating a home lab, and the benefits of networking at local conferences and meetups. Jake also shares advice for job seekers, including the significance of standing out through proactive actions like writing reports and asking questions. Jake Mayhew and Kyser Clark discuss their favorite hacker movies and shows, as well as their experiences with different hacking certifications. They also explore the challenges of pursuing higher-level certifications and offer advice for those entering the cybersecurity field. The conversation concludes with a discussion on the importance of perseverance and community involvement in the job search process.
Connect with Jake Mayhew: https://www.linkedin.com/in/jake-mayhew-osce-oscp/
Takeaways
- Internships can be a valuable way to gain experience and get your foot in the door in the cybersecurity field.
- Creating a home lab and actively using it to learn and practice cybersecurity skills can demonstrate your passion and dedication to potential employers.
- Attending local conferences and meetups can provide opportunities for networking and building relationships with professionals in the industry.
- Proactively standing out in the job search process, such as by writing reports or asking questions, can make a candidate more memorable and increase their chances of getting hired.
- Continuous learning and pursuing certifications can help job seekers demonstrate their commitment to improving their skills and staying up-to-date in the field.
- The OSCP certification is highly regarded and a good starting point for those interested in network penetration testing.
- Higher-level certifications like OSEP, OSWE, and OSED require a deeper understanding of specific topics and may be more challenging.
- Real-world experience and practical application of skills are crucial for success in advanced certifications.
- Perseverance is key in the job search process, as rejection is common in the cybersecurity field.
- Getting involved in the cybersecurity community can provide valuable networking opportunities and support.
Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY
Music by Karl Casey @ White Bat Audio
Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.
Opinions are my own and may not represent the positions of my employer.
The Hacker's Cache - #9 Red Teaming & Malware Development ft. Nathan Rice
Transcript
[Kyser Clark] (0:00 - 0:06) When you're doing a red team engagement compared to a penetration test, do you feel more like a threat actor at that point?
[Nathan Rice] (0:06 - 0:21) Oh absolutely, that is the real, the best cure to imposter syndrome I think I've ever had was if this were a real phish and this were real everything, like if I was actually a bad guy, I'd be like a millionaire right now. The company was thrilled with us too, they loved it, and I was like, okay, I did some good
If you like this episode you’ll love
Episode Comments
Generate a badge
Get a badge for your website that links back to this episode
<a href="https://goodpods.com/podcasts/the-hackers-cache-609455/9-red-teaming-and-malware-development-ft-nathan-rice-79407806"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to #9 red teaming & malware development ft. nathan rice on goodpods" style="width: 225px" /> </a>
Copy