Cim StordalinCognitePwn2Own or Not2Pwn, Part 3: The lazy man’s escalationWelcome back to our Pwn2Own or Not2Pwn series about our Schneider Electric EcoStruxure Operator Terminal Expert exploit attempt. To catch…Mar 1, 2021Mar 1, 2021
Cim StordalinCognitePwn2Own or Not2Pwn, Part 2.5: A brief tale of free 0daysIn our first Pwn2Own blog post, we briefly talked about how we discovered a directory traversal vulnerability in less than 20 minutes…Jun 2, 2020Jun 2, 2020
Cim StordalinCogniteIs fuzzing Python code worth it? Yes!Unit testing and code review are the most common ways of testing code, but they’re not perfect. The fundamental weakness of these methods…Apr 8, 2020Apr 8, 2020
Cim StordalinCognitePwn2Own or Not2Pwn, Part 2By Fredrik Østrem, Emil Sandstø and Cim StordalMar 13, 20201Mar 13, 20201
Cim StordalinCognitePwn2Own or Not2Pwn, Part 1By Fredrik Østrem, Emil Sandstø and Cim StordalFeb 17, 20202Feb 17, 20202