
Posts by Deral Heiland

Detection and Response
Hands-On IoT Hacking: Rapid7 at DefCon IoT Village, Part 2
Deral Heiland

Detection and Response
Hands-On IoT Hacking: Rapid7 at DefCon IoT Village, Part 1
Deral Heiland

Exposure Management
UPnP With a Holiday Cheer
Deral Heiland

Detection and Response
Building a Printed Circuit Board Probe Testing Jig
Deral Heiland

Detection and Response
IoT Security and Risk: What Is It, Where Is It Heading, and How Do We Embrace It?
Deral Heiland

Detection and Response
Extracting Firmware from Microcontrollers’ Onboard Flash Memory, Part 4
Deral Heiland

Threat Research
Extracting Firmware from Microcontrollers' Onboard Flash Memory, Part 3: Microchip PIC Microcontrollers
Deral Heiland

Threat Research
Extracting Firmware from Microcontrollers' Onboard Flash Memory, Part 2: Nordic RF Microcontrollers
Deral Heiland

Detection and Response
Extracting Firmware from Microcontrollers' Onboard Flash Memory, Part 1: Atmel Microcontrollers
Deral Heiland
![[IoT Security] Introduction to Embedded Hardware Hacking](/_next/image/?url=%2Fblog-post-image-placeholder.webp%3Fauto%3Davif&w=1920&q=75)
Threat Research
[IoT Security] Introduction to Embedded Hardware Hacking
Deral Heiland

Threat Research
Once a Haxer, Always a Haxor
Deral Heiland

Detection and Response
Lessons and Takeaways from CTIA’s Recently Released IoT Security Certification Program
Deral Heiland

Threat Research
Security Impact of Easily Accessible UART on IoT Technology
Deral Heiland

Exposure Management
ROCA: Vulnerable RSA Key Generation
Deral Heiland

Detection and Response
IoT Security Testing Methodology
Deral Heiland

Exposure Management
12 Days of HaXmas: 2016 IoT Research Recap
Deral Heiland

Detection and Response
IoT Security vs Usability
Deral Heiland

Threat Research
Research Lead (IoT)
Deral Heiland
![Getting a Handle on the [Internet of] Things in the Enterprise](/_next/image/?url=%2Fblog-post-image-placeholder.webp%3Fauto%3Davif&w=1920&q=75)
Detection and Response
Getting a Handle on the [Internet of] Things in the Enterprise
Deral Heiland

Exposure Management
SNMP Data Harvesting During Penetration Testing
Deral Heiland

Industry Trends
Brute Force Attacks Using US Census Bureau Data
Deral Heiland