$ whoami
I’m Larry Pesce, known online as @haxorthematrix. Security researcher, educator, podcaster, and author with over 25 years in information security.
Currently serving as Vice President of Services at Finite State, specializing in IoT security and software supply chain risk.
Beyond the keyboard, I’m a maker at heart—knifemaking, recycled jewelry, and retro-modding old tech. Licensed ham radio operator (KB1TNF) and Star Wars bounder in my spare time.
$ cat credentials.txt
Paul’s Security Weekly
Co-Host
Internationally acclaimed security podcast
Finite State
Vice President of Services
IoT Pentesting, Supply Chain Security & Thought Leadership
Cybersecurity Canon
Reviewer
Evaluating must-read books in cybersecurity
$ ls -la ~/expertise/
- drwxr-xr-x IoT & Embedded Security — Firmware analysis, hardware hacking, device teardowns
- drwxr-xr-x Wireless Penetration Testing — WiFi, Bluetooth, RF, SDR, IoT protocols
- drwxr-xr-x Software Supply Chain Security — SBOM analysis, dependency risk, firmware composition
- drwxr-xr-x Ethical Hacking — Penetration testing methodologies, red team operations
- drwxr-xr-x Security Education — SANS instruction, workshops, conference presentations
$ cat teaching.md
As a SANS Principal Instructor, I co-authored SEC556: IoT Penetration Testing and teach both SEC556 and SEC617: Wireless Penetration Testing and Ethical Hacking—two of SANS’ most hands-on courses covering IoT and wireless security assessment techniques.
I previously participated in the Mid-Atlantic Collegiate Cyber Defense Challenge (CCDC), creating hardware challenges and mentoring students entering the security field.
$ cat podcast.md
I co-host Paul’s Security Weekly, one of the longest-running and most respected security podcasts in the industry. We cover the latest security news, interview industry leaders, and dive deep into technical topics.
$ grep -r “speaking” ~/history/
I’ve presented at major security conferences and have been featured in media outlets including:
- DEF CON
- Black Hat
- SANS conferences worldwide
- The New York Times (2010 feature on security)
$ ls ~/books/
Linksys WRT54G Ultimate Hacking
The definitive guide to hacking and customizing the legendary WRT54G router.
Using Wireshark and Ethereal
Comprehensive network protocol analysis and packet capture techniques.
How to Cheat at Configuring Open Source Security Tools
Practical guide to deploying and configuring open source security solutions.
Technical Editor
Wireless Reconnaissance in Penetration Testing
Blue Team Handbook – Incident Response Edition, Version 1
$ cat ~/.social
- Twitter/X: @haxorthematrix
- LinkedIn: larry-pesce
- GitHub: haxorthematrix
- Mastodon: @haxorthematrix@infosec.exchange
- SANS: SANS Profile
$ echo “Thanks for reading. Now go break something (responsibly).”
Thanks for reading. Now go break something (responsibly).