Professionally Evil Insights

Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.

Welcome aboard!

    Introduction to Metasploit Video
    The Metasploit Framework is a key resource for security assessors. Whether you’re goal is to become ...
    Continue Reading
    Granular Privacy Controls
    Have you seen glympse.com? It’s a location-sharing site designed to let users share their GPS data ...
    Continue Reading
    What Do YOU Think About Privacy?
    “What do you think about privacy?” That’s the question I asked my wife last week. We had just ...
    Continue Reading
    Intercepting DNS
    Recently during a penetration test, I discovered a Linksys WRT54G wireless router that had been ...
    Continue Reading
    Why Target's Breach Included PIN Data
    encryption  |  PCI  |  data breach  |  target
    Last Friday Target issued an update acknowledging that encrypted PIN data were included in the data ...
    Continue Reading
    Professionally Evil Toolkit - Recon-ng
    The first stage of almost every successful penetration test is the reconnaissance phase. During ...
    Continue Reading
    Facebook Removes Privacy Settings (or Why it's hard to hide information on the Internet)
    A few weeks ago Facebook announced the removal of a “Search” setting. That’s their marketing term ...
    Continue Reading
    Security Tubthumping
    I have a friend who is an alcoholic. A few weeks ago after 5 years of sobriety, she stumbled and ...
    Continue Reading
    Comparing Authorization Levels with Burp's Compare Site Map feature
    Burp Suite from Portswigger.net is a fantastic web app testing tool that we use regularly at Secure ...
    Continue Reading
    Defending Against Pass-the-Hash (PtH) Attacks
    Pass-the-Hash (PtH) attacks have become probably the most common form of credential attacks used in ...
    Continue Reading
    Kismet Log Viewer v2 Tool Released
    Secure Ideas actively supports open source and giving back to the community. In that light, we’re ...
    Continue Reading

    Never miss a professionally evil update!