Professionally Evil Insights
Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.
Welcome aboard!
Wild West Hackin Fest 2022: The Return
Training |
security |
samuraiWTF |
web penetration testing |
information security |
security awareness |
application security |
professionally evil |
Secure Ideas |
hacking |
cybersecurity |
pentesting |
web application security |
technology |
security conference
Man, San Diego is beautiful. I don't know exactly why John Strand and Black Hills Information ...
Continue Reading
How to Create Custom Probes For NMAP Service/Version Detection
network |
hacking |
cybersecurity |
pentesting |
scanning |
NMAP |
version |
service |
probe |
ports |
match |
chrome |
debugging |
nmap-service-probes |
softmatch |
rarity |
directive |
remote
Overview NMAP is a fantastic tool for performing initial reconnaissance and enumeration. A simple ...
Continue Reading
How to verify PGP signatures
how to verify pgp signature |
how to use pgp signature |
pgp signature check |
how to verify gpg signatures |
pgp digital signatures |
gpg signatures |
verify gpg signatures
PGP (Pretty Good Privacy) is an encryption software that is mostly known for its use in email. It ...
Continue Reading
Digging Between the Couch Cushions - CouchDB CVE-2021-38295 Breakdown
Vulnerability |
developers |
security |
open source |
information security |
application security |
hacking
Introduction In this blog post we’re going to take a look at the recent CouchDB vulnerability, ...
Continue Reading
Linux X86 Assembly - How To Test Custom Shellcode Using a C Payload Tester
Overview In the last blog post in this series, we created a tool to make it easy to build our ...
Continue Reading
It Was The Best Of Times, It Was The Worst Of Times...
Two of the characters in Charles Dickens’ beloved novel, A Tale of Two Cities have such similar ...
Continue Reading
Low Hanging Fruit Ninja: Slashing the Risks of the Human Element
A long time ago in a galaxy far, far away, I was not a Security Consultant. I was a Chef. And I ...
Continue Reading
How to configure BurpelFish
I recently was doing a pentest and was continuously looking up translations for words, and thought ...
Continue Reading
Linux X86 Assembly - How To Make Payload Extraction Easier
Overview In the last blog post of the X86 Linux assembly series, we focused on how to make our ...
Continue Reading
A New Consultant’s 1st Con - Wild West Hackin Fest - Way West 2021
Last month, I found myself Googling: Is weed legal in Nevada? This was the day after arriving in ...
Continue Reading
Linux X86 Assembly - How to Make Our Hello World Usable as an Exploit Payload
Overview In the last two tutorials, we built a Hello World program in NASM and GAS for x86 ...
Continue Reading
Has contents: true
Total pages: 39
Current page: 12