|
| 1 | +<!DOCTYPE html> |
| 2 | +<html lang="en"> |
| 3 | +<head> |
| 4 | + <meta charset="UTF-8"> |
| 5 | + <meta name="viewport" content="width=device-width, initial-scale=1.0"> |
| 6 | + <title>Ryan Sharpnack | ICS Security Researcher</title> |
| 7 | + <link rel="stylesheet" href="style.css"> |
| 8 | +</head> |
| 9 | +<body> |
| 10 | + <div class="container"> |
| 11 | + <header> |
| 12 | + <h1 class="glitch" data-text="RYAN_SHARPNACK">RYAN_SHARPNACK<span class="cursor">_</span></h1> |
| 13 | + <p class="tagline">ICS_SECURITY_RESEARCHER</p> |
| 14 | + <p class="subtitle">35+ CVE Discoveries | Firmware Analysis | Protocol Exploitation</p> |
| 15 | + </header> |
| 16 | + |
| 17 | + <div class="disclosure-notice"> |
| 18 | + <span class="notice-icon">⚠</span> COORDINATED_DISCLOSURE_IN_PROGRESS → Research publishing Q3 2026 |
| 19 | + </div> |
| 20 | + |
| 21 | + <section class="about"> |
| 22 | + <h2 class="section-title">// ABOUT</h2> |
| 23 | + <p>Security researcher specializing in critical infrastructure protection. Discovering vulnerabilities in Industrial Control Systems (ICS) and SCADA networks to make them stronger.</p> |
| 24 | + <p>Current focus: Firmware reverse engineering, protocol exploitation, and penetration testing of operational technology environments.</p> |
| 25 | + </section> |
| 26 | + |
| 27 | + <section class="status"> |
| 28 | + <h2 class="section-title">// RESEARCH_STATUS</h2> |
| 29 | + <div class="status-grid"> |
| 30 | + <div class="status-item"> |
| 31 | + <span class="status-label">→ Disclosure:</span> |
| 32 | + <span class="status-value">Active with CISA ICS-CERT</span> |
| 33 | + </div> |
| 34 | + <div class="status-item"> |
| 35 | + <span class="status-label">→ DEF CON 34:</span> |
| 36 | + <span class="status-value">Accepted (August 2026)</span> |
| 37 | + </div> |
| 38 | + <div class="status-item"> |
| 39 | + <span class="status-label">→ CVEs:</span> |
| 40 | + <span class="status-value">35+ (Publishing Q3-Q4 2026)</span> |
| 41 | + </div> |
| 42 | + <div class="status-item"> |
| 43 | + <span class="status-label">→ Reports:</span> |
| 44 | + <span class="status-value">Coming soon</span> |
| 45 | + </div> |
| 46 | + </div> |
| 47 | + </section> |
| 48 | + |
| 49 | + <section class="research-areas"> |
| 50 | + <h2 class="section-title">// RESEARCH_AREAS</h2> |
| 51 | + <div class="research-grid"> |
| 52 | + <div class="research-item"> |
| 53 | + <h3>Firmware Analysis</h3> |
| 54 | + <p>Reverse engineering ICS/SCADA firmware binaries (ARM, PowerPC, x86)</p> |
| 55 | + </div> |
| 56 | + <div class="research-item"> |
| 57 | + <h3>Protocol Security</h3> |
| 58 | + <p>Vulnerability research in Modbus, DNP3, IEC 61850, IEC 60870-5-104</p> |
| 59 | + </div> |
| 60 | + <div class="research-item"> |
| 61 | + <h3>Exploit Development</h3> |
| 62 | + <p>Proof-of-concept exploits for authentication bypass and privilege escalation</p> |
| 63 | + </div> |
| 64 | + <div class="research-item"> |
| 65 | + <h3>Penetration Testing</h3> |
| 66 | + <p>Security assessments of operational technology environments</p> |
| 67 | + </div> |
| 68 | + </div> |
| 69 | + </section> |
| 70 | + |
| 71 | + <section class="coming-soon"> |
| 72 | + <h2 class="section-title">// COMING_SOON</h2> |
| 73 | + <ul class="coming-list"> |
| 74 | + <li><span class="bullet">▸</span> Vulnerability research papers (Post-disclosure)</li> |
| 75 | + <li><span class="bullet">▸</span> Conference presentations & slides</li> |
| 76 | + <li><span class="bullet">▸</span> Proof-of-concept code (Sanitized)</li> |
| 77 | + <li><span class="bullet">▸</span> Educational content & tutorials</li> |
| 78 | + </ul> |
| 79 | + <p class="subscribe-note">⭐ Star my <a href="https://github.com/ryan-sharpnack/ics-security-research-portfolio" target="_blank">research portfolio</a> for updates when materials publish</p> |
| 80 | + </section> |
| 81 | + |
| 82 | + <section class="connect"> |
| 83 | + <h2 class="section-title">// CONNECT</h2> |
| 84 | + <div class="links"> |
| 85 | + <a href="https://github.com/ryan-sharpnack" target="_blank" class="link-item"> |
| 86 | + <span class="link-arrow">→</span> GitHub |
| 87 | + </a> |
| 88 | + <a href="https://linkedin.com/in/ryan-sharpnack-ics-security" target="_blank" class="link-item"> |
| 89 | + <span class="link-arrow">→</span> LinkedIn |
| 90 | + </a> |
| 91 | + <a href="https://youtube.com/@your-channel" target="_blank" class="link-item"> |
| 92 | + <span class="link-arrow">→</span> YouTube |
| 93 | + </a> |
| 94 | + <a href="https://ryansharpnack.beehiiv.com" target="_blank" class="link-item"> |
| 95 | + <span class="link-arrow">→</span> Blog |
| 96 | + </a> |
| 97 | + </div> |
| 98 | + </section> |
| 99 | + |
| 100 | + <footer> |
| 101 | + <div class="legal"> |
| 102 | + <h3 class="section-title">// LEGAL_NOTICE</h3> |
| 103 | + <p>All research conducted ethically through coordinated disclosure procedures. Unauthorized access to industrial control systems is illegal.</p> |
| 104 | + </div> |
| 105 | + <p class="copyright">© 2026 Ryan Sharpnack | All rights reserved</p> |
| 106 | + </footer> |
| 107 | + </div> |
| 108 | +</body> |
| 109 | +</html> |
0 commit comments