Professionally Evil Insights

Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.

Welcome aboard!

    Never miss a Professionally Evil update!

    Introducing SamuraiWTF 5.3: A Powerhouse for Web App Pen Testing
    Testing  |  Training  |  samuraiWTF  |  web penetration testing  |  application security  |  professionally evil  |  Secure Ideas  |  hacking  |  OWASP  |  Project
    We are thrilled to announce the release of SamuraiWTF (Web Training Framework) version 5.3! This ...
    Continue Reading
    How to iterate through advfirewall rules
    Training  |  professionally evil  |  Secure Ideas  |  Windows 10  |  Windows 11  |  sysadmin  |  system administration  |  cmd  |  powershell  |  firewall rules
    There are several ways to pull firewall information from a Windows system. Today we will leverage ...
    Continue Reading
    Working With Data: IP and Port Filtering
    Training  |  professionally evil  |  Secure Ideas  |  technology tips and tricks  |  sysadmin  |  data  |  data manipulation  |  excel  |  spreadsheet  |  filtering
    During our day-to-day work, there’s a lot of data that we interact with. In order to make good use ...
    Continue Reading
    View Wireless Profile Password Information Using PowerShell or CMD
    Training  |  professionally evil  |  Secure Ideas  |  hacking  |  Windows  |  Windows 10  |  Windows 11  |  sysadmin  |  system administration  |  cmd  |  wireless  |  wifi  |  wifi password  |  powershell  |  wireless profile
    There are a couple different ways for you to access your Windows wireless password information. If ...
    Continue Reading
    Application Security 202: Vulnerabilities Accepted
    vul·ner·a·bil·i·ty The quality or state of being exposed to the possibility of being attacked or ...
    Continue Reading
    (Not So) Quick Bites - Episode 3 - Writing About Writer's Block
    Deliverables  |  consulting  |  application security  |  Secure Ideas  |  cybersecurity  |  methodology  |  Project  |  Writing  |  Quick Bites
    So, sometimes I have a real problem with writing, specifically reports and blog posts. Somehow, ...
    Continue Reading
    Privilege Escalation via File Descriptors in Privileged Binaries
    Today I wanted to cover an application security topic that applies to SetUID binaries. As we all ...
    Continue Reading
    How to Update the Nmap OUI Database
    network  |  professionally evil  |  Secure Ideas  |  NMAP  |  Linux  |  IEEE  |  OUI  |  nmap-mac-prefixes
    Overview In a previous blog post, I covered what an OUI is, how to extract them from a MAC address, ...
    Continue Reading
    Of MAC Addresses and OUI: A Subtle, but Useful, Recon Resource
    network  |  professionally evil  |  Secure Ideas  |  MAC Address  |  IEEE  |  OUI  |  PENT
    When it comes to reconnaissance, every little bit of information can be helpful. Today, we will ...
    Continue Reading
    Quick Bites - Finding Open Windows File Shares
    Vulnerability  |  network  |  Secure Ideas  |  hacking  |  network security  |  Windows  |  scanning  |  methodology  |  how-to  |  Free
    Hi there, ladies and gentlemen! My name is Aaron Moss, and welcome to the first edition of Quick ...
    Continue Reading
    Has contents: true Total pages: 2 Current page: 1