PinnedISEinIndependent Security EvaluatorsIndependent Security EvaluatorsWe are ethical hackers, computer scientists, reverse engineers, cryptographers, software developers, penetration testers, and consultants.Nov 20, 2020Nov 20, 2020
ISEinIndependent Security EvaluatorsEthereum’s Blockchain BanditResearch on how to find private keys that were generated in suboptimal ways.Apr 23, 20191Apr 23, 20191
ISEinIndependent Security EvaluatorsIoT Village at RSAC, Features Live Hacking, Hands-on Labs, and Expert Speakers on Internet of…From Smart Home Harassment to Food Supply Hacking, IoT Village Highlights Growing Attack Vectors in Connected DevicesFeb 28, 2019Feb 28, 2019
ISEinIndependent Security EvaluatorsFAQ — Common Misunderstandings Around the Hack of a Password ManagerQuestion not answered? Ask us, we’ll try to answer it.Feb 23, 20191Feb 23, 20191
ISEinIndependent Security EvaluatorsLivestream: Lenovo ix4–300d, Or: from alert(1) to uid=0(root)Chaining cross-site scripting and command injection to get root on Lenovo NASJan 17, 2019Jan 17, 2019
ISEinIndependent Security EvaluatorsLIVESTREAM: How We Discovered New Vulnerabilities in the ASUS RT-AC3200 Route.See how we combine a stack buffer overflow with a memory disclosure vulnerability to reliably execute arbitrary system commands!Nov 26, 2018Nov 26, 2018
ISEinIndependent Security EvaluatorsLIVESTREAM: How We Discovered New Vulnerabilities in the Buffalo TeraStation TS5600D1206 NAS.These vulnerabilities in this IoT device lead to authentication bypass, command injection, arbitrary file upload, and more!Nov 6, 2018Nov 6, 2018
ISEinIndependent Security EvaluatorsLIVESTREAM: Walkthrough on Running Arbitrary Commands on the ZyXEL NSA325v2Check out this livestream to get some step by step info on assessing security in IoT devices!Nov 5, 20181Nov 5, 20181
ISEinIndependent Security EvaluatorsLIVESTREAM: RCE as Root Over the Internet on the Drobo 5N2Reverse engineering a proprietary protocol on an IoT device for RCESep 13, 2018Sep 13, 2018
ISEinIndependent Security EvaluatorsLIVESTREAM: DEF CON Badgelife Hardware HackingIntroduction In-Circuit Serial Programming (ICSP) to pull and flash firmwareSep 6, 2018Sep 6, 2018