Professionally Evil Insights
Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.
Welcome aboard!
Professionally Evil Toolkit - Sqlmap
In this series of the Professionally Evil Toolkit we will be talking about sqlmap. Sqlmap is an ...
Continue Reading
Getting Started with BeEF: The Browser Exploitation Framework
BeEF, the Browser Exploitation Framework, is a testing tool designed to enable penetration testers ...
Continue Reading
Red Dawn: Protecting small organizations from attacks
Secure Ideas spends a lot of time working with organizations both large and small. And during this ...
Continue Reading
Creating SSL Certificate Requests Using Certreq.exe and Enable LDAPS
This post picks up on my last about creating and authorizing an internal certificate authority. We ...
Continue Reading
Who We Are: Jeff Bleich
In this series of posts we are introducing staff members at Secure Ideas to give you a quick ...
Continue Reading
Your Passwords Were Stolen: What's Your Plan?
If you have been glancing at many news stories this year, you have certainly seen the large number ...
Continue Reading
SSL Certificates: Setting Up and Authorizing the Internal Certificate Authority
In this post, I wanted to give something directly to the Blue Teams out there. I also thought I ...
Continue Reading
SANS Mobile Summit 2013 Recap
So I just got back from the SANS Mobile Security Summit where I was the chair. The event was a ...
Continue Reading
Using a Throwing Star to Capture Packets
Mobile applications are a hot commodity these days. It seems like everyone and their brother/sister ...
Continue Reading
Preparing for a Consultant
As security consultants, we regularly travel to clients’ sites and experience a wide range of ...
Continue Reading
Autocomplete and actual risk: Why do we look at it?
Autocomplete is always a fun topic to discuss…. ok maybe my idea of fun is not the normal idea. 🙂 ...
Continue Reading
Has contents: true
Total pages: 39
Current page: 34