Deral Heiland's picture

Posts by Deral Heiland

Hands-On IoT Hacking: Rapid7 at DefCon IoT Village, Part 2

Detection and Response

Hands-On IoT Hacking: Rapid7 at DefCon IoT Village, Part 2

Deral Heiland's avatar

Deral Heiland

Hands-On IoT Hacking: Rapid7 at DefCon IoT Village, Part 1

Detection and Response

Hands-On IoT Hacking: Rapid7 at DefCon IoT Village, Part 1

Deral Heiland's avatar

Deral Heiland

UPnP With a Holiday Cheer

Exposure Management

UPnP With a Holiday Cheer

Deral Heiland's avatar

Deral Heiland

Building a Printed Circuit Board Probe Testing Jig

Detection and Response

Building a Printed Circuit Board Probe Testing Jig

Deral Heiland's avatar

Deral Heiland

IoT Security and Risk: What Is It, Where Is It Heading, and How Do We Embrace It?

Detection and Response

IoT Security and Risk: What Is It, Where Is It Heading, and How Do We Embrace It?

Deral Heiland's avatar

Deral Heiland

Extracting Firmware from Microcontrollers’ 
Onboard Flash Memory, Part 4

Detection and Response

Extracting Firmware from Microcontrollers’ Onboard Flash Memory, Part 4

Deral Heiland's avatar

Deral Heiland

Extracting Firmware from Microcontrollers' 
Onboard Flash Memory, Part 3: Microchip PIC Microcontrollers

Threat Research

Extracting Firmware from Microcontrollers' Onboard Flash Memory, Part 3: Microchip PIC Microcontrollers

Deral Heiland's avatar

Deral Heiland

Extracting Firmware from Microcontrollers' 
Onboard Flash Memory, Part 2: Nordic RF Microcontrollers

Threat Research

Extracting Firmware from Microcontrollers' Onboard Flash Memory, Part 2: Nordic RF Microcontrollers

Deral Heiland's avatar

Deral Heiland

Extracting Firmware from Microcontrollers' Onboard Flash Memory, Part 1: Atmel Microcontrollers

Detection and Response

Extracting Firmware from Microcontrollers' Onboard Flash Memory, Part 1: Atmel Microcontrollers

Deral Heiland's avatar

Deral Heiland

[IoT Security] Introduction to Embedded Hardware Hacking

Threat Research

[IoT Security] Introduction to Embedded Hardware Hacking

Deral Heiland's avatar

Deral Heiland

Once a Haxer, Always a Haxor

Threat Research

Once a Haxer, Always a Haxor

Deral Heiland's avatar

Deral Heiland

Lessons and Takeaways from CTIA’s Recently Released IoT Security Certification Program

Detection and Response

Lessons and Takeaways from CTIA’s Recently Released IoT Security Certification Program

Deral Heiland's avatar

Deral Heiland

Security Impact of Easily Accessible 
UART on IoT Technology

Threat Research

Security Impact of Easily Accessible UART on IoT Technology

Deral Heiland's avatar

Deral Heiland

ROCA: Vulnerable RSA Key Generation

Exposure Management

ROCA: Vulnerable RSA Key Generation

Deral Heiland's avatar

Deral Heiland

IoT Security Testing Methodology

Detection and Response

IoT Security Testing Methodology

Deral Heiland's avatar

Deral Heiland

12 Days of HaXmas: 2016 IoT Research Recap

Exposure Management

12 Days of HaXmas: 2016 IoT Research Recap

Deral Heiland's avatar

Deral Heiland

IoT Security vs Usability

Detection and Response

IoT Security vs Usability

Deral Heiland's avatar

Deral Heiland

Research Lead (IoT)

Threat Research

Research Lead (IoT)

Deral Heiland's avatar

Deral Heiland

Getting a Handle on the [Internet of] Things in the Enterprise

Detection and Response

Getting a Handle on the [Internet of] Things in the Enterprise

Deral Heiland's avatar

Deral Heiland

SNMP Data Harvesting During Penetration Testing

Exposure Management

SNMP Data Harvesting During Penetration Testing

Deral Heiland's avatar

Deral Heiland

Brute Force Attacks Using US Census Bureau Data

Industry Trends

Brute Force Attacks Using US Census Bureau Data

Deral Heiland's avatar

Deral Heiland