PinnedISEinIndependent Security EvaluatorsIndependent Security EvaluatorsWe are ethical hackers, computer scientists, reverse engineers, cryptographers, software developers, penetration testers, and consultants.2 min read·Nov 20, 2020----
ISEinIndependent Security EvaluatorsEthereum’s Blockchain BanditResearch on how to find private keys that were generated in suboptimal ways.4 min read·Apr 23, 2019--1--1
ISEinIndependent Security EvaluatorsIoT Village at RSAC, Features Live Hacking, Hands-on Labs, and Expert Speakers on Internet of…From Smart Home Harassment to Food Supply Hacking, IoT Village Highlights Growing Attack Vectors in Connected Devices7 min read·Feb 28, 2019----
ISEinIndependent Security EvaluatorsFAQ — Common Misunderstandings Around the Hack of a Password ManagerQuestion not answered? Ask us, we’ll try to answer it.7 min read·Feb 23, 2019--1--1
ISEinIndependent Security EvaluatorsLivestream: Lenovo ix4–300d, Or: from alert(1) to uid=0(root)Chaining cross-site scripting and command injection to get root on Lenovo NAS2 min read·Jan 17, 2019----
ISEinIndependent Security EvaluatorsLIVESTREAM: How We Discovered New Vulnerabilities in the ASUS RT-AC3200 Route.See how we combine a stack buffer overflow with a memory disclosure vulnerability to reliably execute arbitrary system commands!2 min read·Nov 26, 2018----
ISEinIndependent Security EvaluatorsLIVESTREAM: How We Discovered New Vulnerabilities in the Buffalo TeraStation TS5600D1206 NAS.These vulnerabilities in this IoT device lead to authentication bypass, command injection, arbitrary file upload, and more!2 min read·Nov 6, 2018----
ISEinIndependent Security EvaluatorsLIVESTREAM: Walkthrough on Running Arbitrary Commands on the ZyXEL NSA325v2Check out this livestream to get some step by step info on assessing security in IoT devices!2 min read·Nov 5, 2018--1--1
ISEinIndependent Security EvaluatorsLIVESTREAM: RCE as Root Over the Internet on the Drobo 5N2Reverse engineering a proprietary protocol on an IoT device for RCE2 min read·Sep 13, 2018----
ISEinIndependent Security EvaluatorsLIVESTREAM: DEF CON Badgelife Hardware HackingIntroduction In-Circuit Serial Programming (ICSP) to pull and flash firmware1 min read·Sep 6, 2018----