Nick “Kizz MyAnthia” Donarski
Kizz is an InfoSec specialist whose qualifications include an in-depth understanding of security principles and practices; C|EH, MCSE +Security CPS designations; and detailed knowledge of security tools, technologies and development. Seven years of security experience in the creation and Testers, deployment of solutions protecting networks, systems and assets for diverse companies and organizations.
|Security: Technologies:||Data Forensics, Law Enforcement, chain of custody experience, Network Security Scanners (NeXpose, LanGuard, Qualys, OpenVAS); SSL; Digital Certificates; Anti-Virus Tools (Norton, Symantec, Ghost, etc.); Penetration Testing Frameworks (OWASP, Metasploit, BackTrack); Mobile (Smartphones, Windows Mobile, Android); Real-time GPS Tracking; Communications Security(TxRx, IP/TCP/UDP, Tradecraft); High Threat Environment Risk Analysis; Physical Security Technology (RFID, Magstrip, Lock Picking); Adversarial Machine Learning|
|Systems:||Unix-Based Systems (Solaris, Linux, BSD); Windows (all)|
|Networking:||LANs, WANs, VPNs, Routers, Firewalls, TCP/IP|
|Software:||MS Office (Word, Excel, Outlook, Access, PowerPoint); GFI LanGuard; Rapid7 NeXpose; NMap; Aircrack-ng Suite; Metasploit; RFID IO Tools; Ollydbg; Wireshark; Ettercap; Bluetooth Utilities; Databases (MySQL, MSSQL, PostgreSQL, Oracle); HP WebInspect; Acunetix WVS; Burp; ELK Stack; Tensorflow; PacketBeat; Filestash|
An expert in information security and related technologies.
A hacker, a geek, a nerd, a Dad and so much more.
Recent Project Highlights:
Machine Learning & Adversarial Machine Learning: Current trends are pushing organizations to integrate further autonomous systems, deep learning systems, and big data. A focused deep research into both the understanding of how machine learning in its various forms and the potential of the adversarial machine learning model pose both great benefit and potential new security vectors for the enterprises worldwide.
Data Forensics: Computer forensics, or digital forensics, is a fairly new field. Computer forensics investigators, also known as computer forensics specialists, computer forensics examiners, or computer forensics analysts, are charged with uncovering and describing the information contained on, or the state or existence of, a digital artifact. Digital artifacts include computer systems, hard drives, CDs, and other storage devices, as well as electronic documents and files like emails and JPEG images.
PCI Compliance: Currently with Fortune 500 clients to test, develop, secure, remediate, and validate security implementations to provide PCI Compliance. This includes retail operations and systems, eCommerce applications, and the supporting network infrastructure.
Penetration Testing: An active member in the Information Security Community, working with other IS members has developed applications and profiles to streamline and further the testing platforms, applications, and frameworks. Was able to leverage his understanding and ability to “think outside of the box” to leverage attack vectors via uncommon system exploitation methods. One instance was an ability to access a point of sale system to execute commands via a barcode scanner.
Mobile Devices: Specializing in the in-depth understanding of mobile devices and their integration into society he has spent time in development and testing of security posture of these devices. Building on his knowledge has worked to develop similar tools used to perform security audits on computer systems and networks to the smartphone environment.
Social Engineering: Specializing in Social Engineering he has used his technical knowledge and intellect to exploit weaknesses in human behavior. With an understanding of human psychology and behavior he is able to leverage human reactions to display weaknesses in organizations. This information and skill has allowed him to work with organizations to develop security training programs and procedures to ensure that the events do not cause a future incident.
Infrastructure: Led comprehensive security infrastructure upgrades (e.g., firewall/VPN upgrades, intrusion detection, token-based authentication and remote management) for various midsize and large companies.
Risk Management: Protected vulnerable networks following detailed risk assessments. Guided cross-functional teams in the design, validation, acceptance testing and implementation of secure, networked communications across remote sites for several key clients.
Offensive Technologies are the future and drones are cool and fun.
Kizz Kustoms Hacker Labs is currently working on the next generation hacking platform bringing the two together.
Introducing: Project Guarded Panda
More info to come….
Current Tech Focus
Just some of the things that I have recently geeking out on and spending my personal time on.
I have become a huge fan of the FLSun QQ-S Pro and the Tevo Tarantula Pro for at home printing and speed prototyping. We will be covering a number of topics around 3D printing, tools, techniques, things learned from a beginner, and more.
From Red Teaming to Web Apps to Malware Analysis to Exploit Development we will cover stuff for every hacker out there.
I have spent 20 years working in the active offensive security space and will share tricks of the trade with you through videos and posts.
I have been flying RC aircraft for many many years. Expanding into the new and open drone space and developing custom air-frames, components, and systems has been on my workbench for the past few months. I will be sharing a combination of tips, tricks, and videos around the building of Project: Guarded Panda.
AR / VR Development
Development of augmented and virtual reality games has always been a fun personal development endeavour. Spending the last few years developing AR/VR apps and games we will cover some of the fun things that you can do with Unity, ARCore, Vuforia and others.
Mentorship, Consulting, Career
Kizz’s community focus, mentorships, talks, trainings and everything he has attained is with complete thanks to the Hacking Community. Without the community he would have never learned as much and never been able to succeed. With his love for helping the next generation of hackers, geeks, nerds, techies, and everyone that has an interest in technology, security, or any other topic of conversation he always makes time to chat.
Kizz is available for many opportunities to schedule him for your conference talks and trainings, IS / Security career development sessions, and private hacker / tech events.