Professionally Evil Insights
Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.
Welcome aboard!
Of MAC Addresses and OUI: A Subtle, but Useful, Recon Resource
network |
professionally evil |
Secure Ideas |
MAC Address |
IEEE |
OUI |
PENT
When it comes to reconnaissance, every little bit of information can be helpful. Today, we will ...
Continue Reading
The Other Replicating Directory Changes
Quick Summary The Replicating Directory Changes right in Active Directory allows you to request ...
Continue Reading
Quick Bites - Finding Open Windows File Shares
Vulnerability |
network |
Secure Ideas |
hacking |
network security |
Windows |
scanning |
methodology |
how-to |
Free
Hi there, ladies and gentlemen! My name is Aaron Moss, and welcome to the first edition of Quick ...
Continue Reading
LD_PRELOAD: Making a Backdoor by Hijacking accept()
application security |
professionally evil |
Secure Ideas |
LD_PRELOAD |
accept |
dup2 |
make |
Linux |
programming |
Shared Objects |
dlsym |
shell |
backdoor |
rootkit |
userland |
ELF |
inject |
injection
Today I want to continue the series on using LD_PRELOAD. In previous posts, we covered how to ...
Continue Reading
PowerShell Tips: How do I Mount a VHD or Lock a BitLocker Drive?
encryption |
security |
professionally evil |
Secure Ideas |
getting started |
BitLocker |
VHD |
rtfm |
manage-bde |
mount-vhd |
manage bitlocker |
technology |
technology tips and tricks |
Windows 10 |
VHDX |
encrypted drive |
technology tips |
how-to |
btfm |
Windows 11
PowerShell Tips How do I Mount a VHD or Lock a BitLocker Encrypted Drive?
Continue Reading
Wild West Hackin Fest 2022: The Return
Training |
security |
samuraiWTF |
web penetration testing |
information security |
security awareness |
application security |
professionally evil |
Secure Ideas |
hacking |
cybersecurity |
pentesting |
web application security |
technology |
security conference
Man, San Diego is beautiful. I don't know exactly why John Strand and Black Hills Information ...
Continue Reading
How to Create Custom Probes For NMAP Service/Version Detection
network |
hacking |
cybersecurity |
pentesting |
scanning |
NMAP |
version |
service |
probe |
ports |
match |
chrome |
debugging |
nmap-service-probes |
softmatch |
rarity |
directive |
remote
Overview NMAP is a fantastic tool for performing initial reconnaissance and enumeration. A simple ...
Continue Reading
How to verify PGP signatures
how to verify pgp signature |
how to use pgp signature |
pgp signature check |
how to verify gpg signatures |
pgp digital signatures |
gpg signatures |
verify gpg signatures
PGP (Pretty Good Privacy) is an encryption software that is mostly known for its use in email. It ...
Continue Reading
Digging Between the Couch Cushions - CouchDB CVE-2021-38295 Breakdown
Vulnerability |
developers |
security |
open source |
information security |
application security |
hacking
Introduction In this blog post we’re going to take a look at the recent CouchDB vulnerability, ...
Continue Reading
Has contents: true
Total pages: 38
Current page: 11