Security consultant and researcher
Long experience in designing and implementation of security solutions, mainly oriented on web, mobile and embedded applications. Author of penetration testing tools, recognized by OWASP organization and BackTrack Linux distribution. Researching work includes discovery of vulnerabilities of numeral applications and services, and for these, author received public apreciations by Microsoft Company..
After so many failed attempts to exploit vulnerabilities in extracted Xerox firmware packages, you need to use bigger guns :) Using scrape parts, STM32 and a little C magic you can easily bruteforce PIN code!