Professionally Evil Insights

Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.

Welcome aboard!

    Of MAC Addresses and OUI: A Subtle, but Useful, Recon Resource
    network  |  professionally evil  |  Secure Ideas  |  MAC Address  |  IEEE  |  OUI  |  PENT
    When it comes to reconnaissance, every little bit of information can be helpful. Today, we will ...
    Continue Reading
    LD_PRELOAD: Making a Backdoor by Hijacking accept()
    application security  |  professionally evil  |  Secure Ideas  |  LD_PRELOAD  |  accept  |  dup2  |  make  |  Linux  |  programming  |  Shared Objects  |  dlsym  |  shell  |  backdoor  |  rootkit  |  userland  |  ELF  |  inject  |  injection
    Today I want to continue the series on using LD_PRELOAD. In previous posts, we covered how to ...
    Continue Reading
    How to Create Custom Probes For NMAP Service/Version Detection
    network  |  hacking  |  cybersecurity  |  pentesting  |  scanning  |  NMAP  |  version  |  service  |  probe  |  ports  |  match  |  chrome  |  debugging  |  nmap-service-probes  |  softmatch  |  rarity  |  directive  |  remote
    Overview NMAP is a fantastic tool for performing initial reconnaissance and enumeration. A simple ...
    Continue Reading
    Linux X86 Assembly - How To Test Custom Shellcode Using a C Payload Tester
    Overview In the last blog post in this series, we created a tool to make it easy to build our ...
    Continue Reading
    Linux X86 Assembly - How To Make Payload Extraction Easier
    Overview In the last blog post of the X86 Linux assembly series, we focused on how to make our ...
    Continue Reading
    Linux X86 Assembly - How to Make Our Hello World Usable as an Exploit Payload
    Overview In the last two tutorials, we built a Hello World program in NASM and GAS for x86 ...
    Continue Reading
    Linux X86 Assembly - How to Build a Hello World Program in GAS
    Overview In the last tutorial, we covered how to build a 32-bit x86 Hello World program in NASM. ...
    Continue Reading
    Linux X86 Assembly - How to Build a Hello World Program in NASM
    Overview A processor understands bytecode instructions specific to that architecture. We as humans ...
    Continue Reading
    A Hacker’s Tour of the X86 CPU Architecture
    Overview The Intel x86 CPU architecture is one of the most prolific CPU architectures for desktops, ...
    Continue Reading
    LD_PRELOAD: How to Run Code at Load Time
    Today I want to continue the series on using LD_PRELOAD. In previous posts, we covered how to ...
    Continue Reading
    Converting NMAP XML Files to HTML with xsltproc
    NMAP is a wonderful network scanner and its ability to log scan data to files, specifically XML, ...
    Continue Reading

    Never miss a professionally evil update!