Oren Isacson
Developer and security researcher at Eclypsium, Inc.- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
-
Spanish -
-
English -
Topline Score
Bio
Alfredo Adrian Ortega
Oren is one of the most acomplished reverse engineer and exploit writer that I have known. He can be writting an android application, and next day he's reverse-engineering complex embedded firmware. His math and logic thinking skills set him apart from other people on the field, and his focus allow him to easily finish most projects ahead of schedule. For those big and scary projects, he's was the right choice every time.
Alfredo Adrian Ortega
Oren is one of the most acomplished reverse engineer and exploit writer that I have known. He can be writting an android application, and next day he's reverse-engineering complex embedded firmware. His math and logic thinking skills set him apart from other people on the field, and his focus allow him to easily finish most projects ahead of schedule. For those big and scary projects, he's was the right choice every time.
Alfredo Adrian Ortega
Oren is one of the most acomplished reverse engineer and exploit writer that I have known. He can be writting an android application, and next day he's reverse-engineering complex embedded firmware. His math and logic thinking skills set him apart from other people on the field, and his focus allow him to easily finish most projects ahead of schedule. For those big and scary projects, he's was the right choice every time.
Alfredo Adrian Ortega
Oren is one of the most acomplished reverse engineer and exploit writer that I have known. He can be writting an android application, and next day he's reverse-engineering complex embedded firmware. His math and logic thinking skills set him apart from other people on the field, and his focus allow him to easily finish most projects ahead of schedule. For those big and scary projects, he's was the right choice every time.
Experience
-
Eclypsium, Inc.
-
United States
-
Computer and Network Security
-
1 - 100 Employee
-
Developer and security researcher
-
Jun 2022 - Present
Programmatic firmware analysis. Programmatic firmware analysis.
-
-
-
Immunity Inc.
-
United States
-
Computer and Network Security
-
1 - 100 Employee
-
Developer and Security Researcher
-
Aug 2014 - May 2022
Lead developer in charge of developing and maintaining the Immunity SILICA wireless vulnerability assessment and exploitation tool. Lead developer in charge of developing and maintaining the Immunity SILICA wireless vulnerability assessment and exploitation tool.
-
-
-
-
Security Researcher
-
Apr 2013 - May 2014
* Network embedded devices reverse engineering. * Security-oriented embedded devices software development. * Penetration testing for large internet companies. * I was part of a team that successfully completed the development of the firmware for a novel security-related communication device. * Network embedded devices reverse engineering. * Security-oriented embedded devices software development. * Penetration testing for large internet companies. * I was part of a team that successfully completed the development of the firmware for a novel security-related communication device.
-
-
-
Core Security
-
United States
-
Computer and Network Security
-
1 - 100 Employee
-
Sr. Exploit Writer
-
Feb 2007 - Mar 2013
Exploit development, patch reversing, bug hunting. Unix platform manager. I've written over 70 exploits, including: * Remote windows kernel exploit (CVE-2007-0069) * SSL chosen plaintext exploit (CVE-2011-3389) * Unix exploits (Linux, Solaris, Freebsd, AIX, etc) * Windows exploits * Android exploits I've also developed new features for the Core Impact product. Exploit development, patch reversing, bug hunting. Unix platform manager. I've written over 70 exploits, including: * Remote windows kernel exploit (CVE-2007-0069) * SSL chosen plaintext exploit (CVE-2011-3389) * Unix exploits (Linux, Solaris, Freebsd, AIX, etc) * Windows exploits * Android exploits I've also developed new features for the Core Impact product.
-
-
-
-
Speaker
-
Jun 2010 - Sep 2010
I was selected as a speaker at the following security conferences: * Defcon 18, Ekoparty 2010, "Exploiting Digital Cameras" I was selected as a speaker at the following security conferences: * Defcon 18, Ekoparty 2010, "Exploiting Digital Cameras"
-
-
-
Flowgate Consulting
-
Computer and Network Security
-
1 - 100 Employee
-
Ethical Hacker
-
Nov 2005 - Feb 2007
-
-
Education
-
Universidad Nacional de Rosario
Computer Science