blog.securityevaluators.com
Open in
urlscan Pro
52.4.38.70
Public Scan
Submitted URL: http://blog.securityevaluators.com/
Effective URL: https://blog.securityevaluators.com/?gi=c6fe928a917e
Submission: On May 21 via api from US — Scanned from DE
Effective URL: https://blog.securityevaluators.com/?gi=c6fe928a917e
Submission: On May 21 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
To make Medium work, we log user data. By using Medium, you agree to our Privacy Policy, including cookie policy. Homepage Open in app Sign inGet started INDEPENDENT SECURITY EVALUATORS SECURITY SPECIALISTS THAT PROVIDE CUSTOM SERVICES INCLUDING SECURITY ASSESSMENTS AND SOFTWARE DEVELOPMENT. ISE ALSO RUNS IOT VILLAGE, WHICH HOSTS TALKS BY EXPERT SECURITY RESEARCHERS AND HACKING CONTESTS. AboutISE Hacking ResearchBlog ArchiveASK AN EXPERT FollowFollowing Reading Hackable Without a Background in Security READING HACKABLE WITHOUT A BACKGROUND IN SECURITY Reading Hackable Without a Background in Security Jenn Alberts Mar 7, 2022 Social Psychology: Discovering the Weakest Link SOCIAL PSYCHOLOGY: DISCOVERING THE WEAKEST LINK In cybersecurity, humans are often considered to be the weakest link in the chain. When IT topics come to mind, the importance of… Rachael Tubbs Feb 17, 2021 Creating AV Resistant Malware — Part 1 CREATING AV RESISTANT MALWARE — PART 1 Recently, I have been preparing for my eCTPXv2 certification from eLearnSecurity. The certification course covers a lot of advanced topics… Brendan Ortiz Dec 1, 2020 Creating AV Resistant Malware — Part 2 CREATING AV RESISTANT MALWARE — PART 2 In part two of this series we’re going to be creating the AV destroyer part of our malware! It will be based off of Rasta-mouse’s… Brendan Ortiz Dec 1, 2020 Who is ISE? Independent Security Evaluators INDEPENDENT SECURITY EVALUATORS We are ethical hackers, computer scientists, reverse engineers, cryptographers, software developers, penetration testers, and consultants. ISE Nov 19, 2020 Independent Security Evaluators Security specialists that provide custom services including security assessments and software development. ISE also runs IoT Village, which hosts talks by expert security researchers and hacking contests. More information Followers 1K Elsewhere Creating AV Resistant Malware — Part 3 CREATING AV RESISTANT MALWARE — PART 3 In part 3 of this series we will be covering creating another malicious DLL that we will load into memory using PowerShell’s reflection… Brendan Ortiz Dec 1, 2020 Creating AV Resistant Malware — Part 4 CREATING AV RESISTANT MALWARE — PART 4 The final part of this blog series will be a short tutorial of how to use your new tools and how to tie it all together to get a reverse… Brendan Ortiz Dec 1, 2020 Reverse Engineering Bumble’s API REVERSE ENGINEERING BUMBLE’S API When you have too much time on your hands & want to dump out Bumble’s entire user base and bypass paying for premium Bumble Boost features. Sanjana Sarda Nov 14, 2020 User Information Disclosure in Dating Apps USER INFORMATION DISCLOSURE IN DATING APPS Extracting user data from mobile apps to craft exploits. Brendan Ortiz Nov 14, 2020 We Went Virtual, What Did You Do This Summer? WE WENT VIRTUAL, WHAT DID YOU DO THIS SUMMER? COVID-19 has changed the world in more ways than one. Prior to 2020, we had never considered the possibility of making our content virtual… Rachael Tubbs Nov 9, 2020 Hackable: How to Do Application Security Right HACKABLE: HOW TO DO APPLICATION SECURITY RIGHT Hackable is a book that rethinks penetration testing in order to help you build better, more secure products, and then prove it Ted Harrington Oct 14, 2020 IoT Village: The Face of IoT Security Worldwide IOT VILLAGE: THE FACE OF IOT SECURITY WORLDWIDE What is IoT Village? What does IoT Village do? Rachael Tubbs Oct 6, 2020 ¿Cómo fortalecer el OpenVPN durante 2020? ¿CÓMO FORTALECER EL OPENVPN DURANTE 2020? Esta guía te guiará a configurar y asegurar tu OpenVPN utilizando las mejores prácticas. Ximena Robertson Sep 14, 2020 Guía de Seguridad Adecuada para una Pandemia GUÍA DE SEGURIDAD ADECUADA PARA UNA PANDEMIA Las mejores prácticas para asegurar a tu equipo de trabajo remoto Ximena Robertson Aug 27, 2020 Getting Started with Mobile Application Hacking: Part 1 — The Barrier to Entry GETTING STARTED WITH MOBILE APPLICATION HACKING: PART 1 — THE BARRIER TO ENTRY Let’s Get Started with Hacking Mobile Apps! Christopher Campbell Aug 24, 2020 Critical Vulnerability in F5’s BIG-IP (CVE-2020–5902) CRITICAL VULNERABILITY IN F5’S BIG-IP (CVE-2020–5902) How to Detect and Mitigate CVE-2020–5902 Christopher Campbell Jul 10, 2020 Tenda AC15 AC1900 Vulnerabilities Discovered and Exploited TENDA AC15 AC1900 VULNERABILITIES DISCOVERED AND EXPLOITED Demonstrating how remote attackers can gain control of the Tenda AC15 AC1900. Sanjana Sarda Jul 10, 2020 eLearnSecurity Pen Test Professional (PTP) Review ELEARNSECURITY PEN TEST PROFESSIONAL (PTP) REVIEW An excellent certification with realistic labs, but not yet as widely recognized by employers. Shea Polansky Jun 30, 2020 HOW TO HARDEN OPENVPN IN 2020 — PART 2 “Extra credit” hardening options to maximize the security of your OpenVPN installation Shea Polansky Jun 26, 2020 A Hack the Box Walkthrough — Resolute A HACK THE BOX WALKTHROUGH — RESOLUTE I will cover the methodology I used solving Hack The Box challenge on the “Resolute” box. Enumeration to improper access controls for… Brendan Ortiz Jun 18, 2020 How to Harden OpenVPN in 2020 HOW TO HARDEN OPENVPN IN 2020 This guide will help you configure and secure OpenVPN using the latest best practices. Shea Polansky May 5, 2020 Security Guidance Fit for a Pandemic SECURITY GUIDANCE FIT FOR A PANDEMIC As many of us transition to mandatory teleworking scenarios, thought pieces are popping up in every corner of the internet on how to best… Alyssa Rittenburg Mar 16, 2020 A BETTER WINDOWS 10+WSL SSH EXPERIENCE Windows 10 ships with two awesome features for users and developers who still work in Linux land. The first is the Windows Subsystem for… Shea Polansky Jan 15, 2020 CREATING TPM-BACKED CERTIFICATES ON WINDOWS I’ve started experimenting with exposing some of my home lab services to the world without needing a VPN. Instead, I use Caddy (which is… Shea Polansky Jan 13, 2020 Remotely Exploiting IoT Pet Feeders REMOTELY EXPLOITING IOT PET FEEDERS Multiple vulnerabilities in Skymee Petalk AI and Petwant PF-103 Shaun Mirani Dec 9, 2019 dApps: Beyond Germs Transmitted by Handshakes DAPPS: BEYOND GERMS TRANSMITTED BY HANDSHAKES Developing Threat Models for dApps Drew Branch Apr 30, 2019 Ethereum’s Blockchain Bandit ETHEREUM’S BLOCKCHAIN BANDIT Research on how to find private keys that were generated in suboptimal ways. ISE Apr 23, 2019 A Hacker’s Perspective on Faulty Threat Models for Blockchain Assets A HACKER’S PERSPECTIVE ON FAULTY THREAT MODELS FOR BLOCKCHAIN ASSETS The code might be mistake free, but that doesn’t mean an attacker can’t find security weaknesses in the system’s design. Rick Ramgattie Apr 22, 2019 3 Things You Need to Know about Securing a Blockchain 3 THINGS YOU NEED TO KNOW ABOUT SECURING A BLOCKCHAIN Attackers commonly attack the technology around a blockchain, rather than the blockchain itself. Ted Harrington Apr 15, 2019 Blockchain: Common Cryptographic Primitives BLOCKCHAIN: COMMON CRYPTOGRAPHIC PRIMITIVES A brief overview of cryptographic concepts commonly employed by blockchain solutions Adrian Bednarek Apr 8, 2019 About Independent Security EvaluatorsLatest StoriesArchiveAbout MediumTermsPrivacyTeams