DNS Remote Code Execution: Writing the Exploit 💣 (Part 2)

DNS Remote Code Execution: Writing the Exploit 💣 (Part 2)

Pulling SYSTEM out of Windows GINA 🪟

Pulling SYSTEM out of Windows GINA 🪟

DNS Remote Code Execution: Finding the Vulnerability 👾 (Part 1)

DNS Remote Code Execution: Finding the Vulnerability 👾 (Part 1)

Extracting Firmware from Embedded Devices (SPI NOR Flash) ⚡

Extracting Firmware from Embedded Devices (SPI NOR Flash) ⚡

Rice for Pretzels: Attacking a Cisco VPN Gateway 9000 km Away 🌍

Rice for Pretzels: Attacking a Cisco VPN Gateway 9000 km Away 🌍

Rooting an Arlo Q Plus Camera (SSH 🔙🚪?!)

Rooting an Arlo Q Plus Camera (SSH 🔙🚪?!)

Pwning Cisco ISE: From Cross Site Scripting to Root Shell!

Pwning Cisco ISE: From Cross Site Scripting to Root Shell!

Exploiting (and Patching) a Zero Day RCE Vulnerability in a Western Digital NAS

Exploiting (and Patching) a Zero Day RCE Vulnerability in a Western Digital NAS

Hacker's Guide to UART Root Shells

Hacker's Guide to UART Root Shells

How We Hacked a TP-Link Router and Took Home $55,000 in Pwn2Own

How We Hacked a TP-Link Router and Took Home $55,000 in Pwn2Own