Offensive Security & Identity Defense

Think Like
an Adversary.
Defend with Precision.

Senior offensive security consultant specializing in Active Directory exploitation, red team operations, cloud identity, and adversary simulation.

7+
Years in offensive security
9+
Certifications
AD/Cloud
Deep specialization
w-logic — red team ops
$ GetUserSPNs.py -request domain/user
ServicePrincipalName: MSSQLSvc/sql01:1433
Hash: $krb5tgs$23$*sql-svc*...
$ hashcat -m 13100 hash.txt rockyou.txt
Status: Cracked — Sql@2023!
$ psexec.py domain/sql-svc@DC01
[+] Domain Admin shell obtained
$
What We Do

Adversarial Testing.
Real-World Threats.

Engagements are scoped to your environment and risk profile. No templates. No generic checklists.

🌐
External Penetration Testing
Simulate internet-based adversaries targeting your exposed infrastructure, web applications, VPN gateways, and cloud perimeter.
OWASP Top 10 VPN / Remote Access Cloud Exposure
🏢
Internal Penetration Testing
Assume Breach scenario. Model a compromised workstation or malicious insider. Identify paths to domain compromise, lateral movement, and sensitive data exposure.
Active Directory Lateral Movement Kerberos Abuse
🔑
AD Security Assessment
Deep identity-focused analysis of your Active Directory environment. Privilege escalation paths, delegation misconfigs, GPO weaknesses, and ACL abuse chains.
BloodHound Delegation ACL Abuse
📜
ADCS / PKI Security Audit
Certificate Services attack surface review covering ESC1 through ESC8 misconfigurations, enrollment agent abuse, and NTLM relay vectors.
ESC1-ESC16 Certipy PKI Hierarchy
☁️
Azure / Entra Security Review
Cloud identity attack paths including service principal abuse, Conditional Access gaps, Azure RBAC misconfigurations, and hybrid identity escalation.
Entra ID Service Principals Token Abuse
🟣
Purple Team Exercises
Structured attack simulations with real-time detection validation. Measure your SOC's mean time to detect, tune your SIEM rules, and close gaps before attackers find them.
Detection Engineering SIEM Validation MTTD Measurement

Senior Offensive
Security Professional

I'm Mark Wharton, founder of W-Logic Security and creator of the Ethical Hacker's Workshop Series. With over 7 years in offensive security, I specialize in Active Directory exploitation, red team operations, and cloud identity attacks.

I've conducted engagements across enterprise environments, built C2 infrastructure, and designed purple team exercises that measurably improve detection capabilities. Every engagement is approached with an attacker's mindset and delivered with defender-focused outcomes.

Available for remote and on-site engagements and assessments.

OSCP CRTO CRTE CRTP CARTE ADCS OSWP PNPT CCNP Security
Specializations
Active Directory • Kerberos • ADCS / PKI
Azure / Entra ID • C2 Infrastructure
Red Team Operations • Purple Team Exercises
Tooling
Cobalt Strike • Havoc • Mythic • Sliver
BloodHound • Impacket • Certipy • Rubeus
Burp Suite Pro • Metasploit
Detection & Monitoring
Splunk • Elastic / ELK • Wazuh
Microsoft Sentinel • SIGMA Rules
Detection engineering & SIEM tuning
W-Logic LLC
Remote & On-Site Engagements
Research & Content

Ethical Hacker's
Workshop Series

Purple team education for practitioners, defenders, and security leaders. Each episode covers the attack, the detection, and the business impact.

Red Team Blue Team Business
EHWS E01: Kerberoasting — Enterprise Readiness Validation
Step-by-step domain compromise via Kerberoasting, paired with event-level detection engineering and an executive brief. Would your SIEM catch this?
Tools
Open Source Security Tools
Offensive security tooling, AD assessment scripts, and purple team resources on GitHub.
LinkedIn
Connect on LinkedIn
Security content, engagement updates, and industry insights. Follow for regular posts on AD security and red team operations.

Let's Talk
Security.

Interested in an engagement, have a security question, or want to discuss a project? Send a message and I'll be in touch.

Email
🏢
Entity
W-Logic Security
🌍
Engagements
Remote & On-Site Engagements
Send a Message

All inquiries are handled confidentially.