blog.securityevaluators.com Open in urlscan Pro
52.4.38.70  Public Scan

Submitted URL: http://blog.securityevaluators.com/
Effective URL: https://blog.securityevaluators.com/?gi=c6fe928a917e
Submission: On May 21 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

To make Medium work, we log user data. By using Medium, you agree to our Privacy
Policy, including cookie policy.

Homepage
Open in app
Sign inGet started



INDEPENDENT SECURITY EVALUATORS


SECURITY SPECIALISTS THAT PROVIDE CUSTOM SERVICES INCLUDING SECURITY ASSESSMENTS
AND SOFTWARE DEVELOPMENT. ISE ALSO RUNS IOT VILLAGE, WHICH HOSTS TALKS BY EXPERT
SECURITY RESEARCHERS AND HACKING CONTESTS.


AboutISE Hacking ResearchBlog ArchiveASK AN EXPERT
FollowFollowing
Reading Hackable Without a Background in Security
READING HACKABLE WITHOUT A BACKGROUND IN SECURITY

Reading Hackable Without a Background in Security
Jenn Alberts
Mar 7, 2022
Social Psychology: Discovering the Weakest Link
SOCIAL PSYCHOLOGY: DISCOVERING THE WEAKEST LINK

In cybersecurity, humans are often considered to be the weakest link in the
chain. When IT topics come to mind, the importance of…
Rachael Tubbs
Feb 17, 2021
Creating AV Resistant Malware — Part 1
CREATING AV RESISTANT MALWARE — PART 1

Recently, I have been preparing for my eCTPXv2 certification from
eLearnSecurity. The certification course covers a lot of advanced topics…
Brendan Ortiz
Dec 1, 2020
Creating AV Resistant Malware — Part 2
CREATING AV RESISTANT MALWARE — PART 2

In part two of this series we’re going to be creating the AV destroyer part of
our malware! It will be based off of Rasta-mouse’s…
Brendan Ortiz
Dec 1, 2020
Who is ISE?
Independent Security Evaluators
INDEPENDENT SECURITY EVALUATORS

We are ethical hackers, computer scientists, reverse engineers, cryptographers,
software developers, penetration testers, and consultants.
ISE
Nov 19, 2020
Independent Security Evaluators
Security specialists that provide custom services including security assessments
and software development. ISE also runs IoT Village, which hosts talks by expert
security researchers and hacking contests.
More information
Followers
1K
Elsewhere

Creating AV Resistant Malware — Part 3
CREATING AV RESISTANT MALWARE — PART 3

In part 3 of this series we will be covering creating another malicious DLL that
we will load into memory using PowerShell’s reflection…
Brendan Ortiz
Dec 1, 2020
Creating AV Resistant Malware — Part 4
CREATING AV RESISTANT MALWARE — PART 4

The final part of this blog series will be a short tutorial of how to use your
new tools and how to tie it all together to get a reverse…
Brendan Ortiz
Dec 1, 2020
Reverse Engineering Bumble’s API
REVERSE ENGINEERING BUMBLE’S API

When you have too much time on your hands & want to dump out Bumble’s entire
user base and bypass paying for premium Bumble Boost features.
Sanjana Sarda
Nov 14, 2020
User Information Disclosure in Dating Apps
USER INFORMATION DISCLOSURE IN DATING APPS

Extracting user data from mobile apps to craft exploits.
Brendan Ortiz
Nov 14, 2020
We Went Virtual, What Did You Do This Summer?
WE WENT VIRTUAL, WHAT DID YOU DO THIS SUMMER?

COVID-19 has changed the world in more ways than one. Prior to 2020, we had
never considered the possibility of making our content virtual…
Rachael Tubbs
Nov 9, 2020
Hackable: How to Do Application Security Right
HACKABLE: HOW TO DO APPLICATION SECURITY RIGHT

Hackable is a book that rethinks penetration testing in order to help you build
better, more secure products, and then prove it
Ted Harrington
Oct 14, 2020
IoT Village: The Face of IoT Security Worldwide
IOT VILLAGE: THE FACE OF IOT SECURITY WORLDWIDE

What is IoT Village? What does IoT Village do?
Rachael Tubbs
Oct 6, 2020
¿Cómo fortalecer el OpenVPN durante 2020?
¿CÓMO FORTALECER EL OPENVPN DURANTE 2020?

Esta guía te guiará a configurar y asegurar tu OpenVPN utilizando las mejores
prácticas.
Ximena Robertson
Sep 14, 2020
Guía de Seguridad Adecuada para una Pandemia
GUÍA DE SEGURIDAD ADECUADA PARA UNA PANDEMIA

Las mejores prácticas para asegurar a tu equipo de trabajo remoto
Ximena Robertson
Aug 27, 2020
Getting Started with Mobile Application Hacking: Part 1 — The Barrier to Entry
GETTING STARTED WITH MOBILE APPLICATION HACKING: PART 1 — THE BARRIER TO ENTRY

Let’s Get Started with Hacking Mobile Apps!
Christopher Campbell
Aug 24, 2020
Critical Vulnerability in F5’s BIG-IP (CVE-2020–5902)
CRITICAL VULNERABILITY IN F5’S BIG-IP (CVE-2020–5902)

How to Detect and Mitigate CVE-2020–5902
Christopher Campbell
Jul 10, 2020
Tenda AC15 AC1900 Vulnerabilities Discovered and Exploited
TENDA AC15 AC1900 VULNERABILITIES DISCOVERED AND EXPLOITED

Demonstrating how remote attackers can gain control of the Tenda AC15 AC1900.
Sanjana Sarda
Jul 10, 2020
eLearnSecurity Pen Test Professional (PTP) Review
ELEARNSECURITY PEN TEST PROFESSIONAL (PTP) REVIEW

An excellent certification with realistic labs, but not yet as widely recognized
by employers.
Shea Polansky
Jun 30, 2020
HOW TO HARDEN OPENVPN IN 2020 — PART 2

“Extra credit” hardening options to maximize the security of your OpenVPN
installation
Shea Polansky
Jun 26, 2020
A Hack the Box Walkthrough — Resolute
A HACK THE BOX WALKTHROUGH — RESOLUTE

I will cover the methodology I used solving Hack The Box challenge on the
“Resolute” box. Enumeration to improper access controls for…
Brendan Ortiz
Jun 18, 2020
How to Harden OpenVPN in 2020
HOW TO HARDEN OPENVPN IN 2020

This guide will help you configure and secure OpenVPN using the latest best
practices.
Shea Polansky
May 5, 2020
Security Guidance Fit for a Pandemic
SECURITY GUIDANCE FIT FOR A PANDEMIC

As many of us transition to mandatory teleworking scenarios, thought pieces are
popping up in every corner of the internet on how to best…
Alyssa Rittenburg
Mar 16, 2020
A BETTER WINDOWS 10+WSL SSH EXPERIENCE

Windows 10 ships with two awesome features for users and developers who still
work in Linux land. The first is the Windows Subsystem for…
Shea Polansky
Jan 15, 2020
CREATING TPM-BACKED CERTIFICATES ON WINDOWS

I’ve started experimenting with exposing some of my home lab services to the
world without needing a VPN. Instead, I use Caddy (which is…
Shea Polansky
Jan 13, 2020
Remotely Exploiting IoT Pet Feeders
REMOTELY EXPLOITING IOT PET FEEDERS

Multiple vulnerabilities in Skymee Petalk AI and Petwant PF-103
Shaun Mirani
Dec 9, 2019
dApps: Beyond Germs Transmitted by Handshakes
DAPPS: BEYOND GERMS TRANSMITTED BY HANDSHAKES

Developing Threat Models for dApps
Drew Branch
Apr 30, 2019
Ethereum’s Blockchain Bandit
ETHEREUM’S BLOCKCHAIN BANDIT

Research on how to find private keys that were generated in suboptimal ways.
ISE
Apr 23, 2019
A Hacker’s Perspective on Faulty Threat Models for Blockchain Assets
A HACKER’S PERSPECTIVE ON FAULTY THREAT MODELS FOR BLOCKCHAIN ASSETS

The code might be mistake free, but that doesn’t mean an attacker can’t find
security weaknesses in the system’s design.
Rick Ramgattie
Apr 22, 2019
3 Things You Need to Know about Securing a Blockchain
3 THINGS YOU NEED TO KNOW ABOUT SECURING A BLOCKCHAIN

Attackers commonly attack the technology around a blockchain, rather than the
blockchain itself.
Ted Harrington
Apr 15, 2019
Blockchain: Common Cryptographic Primitives
BLOCKCHAIN: COMMON CRYPTOGRAPHIC PRIMITIVES

A brief overview of cryptographic concepts commonly employed by blockchain
solutions
Adrian Bednarek
Apr 8, 2019
About Independent Security EvaluatorsLatest StoriesArchiveAbout
MediumTermsPrivacyTeams