Oren Isacson

Developer and security researcher at Eclypsium, Inc.
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Argentina, AR
Languages
  • Spanish -
  • English -

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

5.0

/5.0
/ Based on 1 ratings
  • (1)
  • (0)
  • (0)
  • (0)
  • (0)

Filter reviews by:

Alfredo Adrian Ortega

Oren is one of the most acomplished reverse engineer and exploit writer that I have known. He can be writting an android application, and next day he's reverse-engineering complex embedded firmware. His math and logic thinking skills set him apart from other people on the field, and his focus allow him to easily finish most projects ahead of schedule. For those big and scary projects, he's was the right choice every time.

You need to have a working account to view this content.
You need to have a working account to view this content.

Experience

    • United States
    • Computer and Network Security
    • 1 - 100 Employee
    • Developer and security researcher
      • Jun 2022 - Present

      Programmatic firmware analysis. Programmatic firmware analysis.

    • United States
    • Computer and Network Security
    • 1 - 100 Employee
    • Developer and Security Researcher
      • Aug 2014 - May 2022

      Lead developer in charge of developing and maintaining the Immunity SILICA wireless vulnerability assessment and exploitation tool. Lead developer in charge of developing and maintaining the Immunity SILICA wireless vulnerability assessment and exploitation tool.

    • Security Researcher
      • Apr 2013 - May 2014

      * Network embedded devices reverse engineering. * Security-oriented embedded devices software development. * Penetration testing for large internet companies. * I was part of a team that successfully completed the development of the firmware for a novel security-related communication device. * Network embedded devices reverse engineering. * Security-oriented embedded devices software development. * Penetration testing for large internet companies. * I was part of a team that successfully completed the development of the firmware for a novel security-related communication device.

    • United States
    • Computer and Network Security
    • 1 - 100 Employee
    • Sr. Exploit Writer
      • Feb 2007 - Mar 2013

      Exploit development, patch reversing, bug hunting. Unix platform manager. I've written over 70 exploits, including: * Remote windows kernel exploit (CVE-2007-0069) * SSL chosen plaintext exploit (CVE-2011-3389) * Unix exploits (Linux, Solaris, Freebsd, AIX, etc) * Windows exploits * Android exploits I've also developed new features for the Core Impact product. Exploit development, patch reversing, bug hunting. Unix platform manager. I've written over 70 exploits, including: * Remote windows kernel exploit (CVE-2007-0069) * SSL chosen plaintext exploit (CVE-2011-3389) * Unix exploits (Linux, Solaris, Freebsd, AIX, etc) * Windows exploits * Android exploits I've also developed new features for the Core Impact product.

    • Speaker
      • Jun 2010 - Sep 2010

      I was selected as a speaker at the following security conferences: * Defcon 18, Ekoparty 2010, "Exploiting Digital Cameras" I was selected as a speaker at the following security conferences: * Defcon 18, Ekoparty 2010, "Exploiting Digital Cameras"

    • Computer and Network Security
    • 1 - 100 Employee
    • Ethical Hacker
      • Nov 2005 - Feb 2007

Education

  • Universidad Nacional de Rosario
    Computer Science
    1998 - 2004

Community

You need to have a working account to view this content. Click here to join now