Professionally Evil Blog

A blog by experts of penetration testing and other security assessments.
    How to iterate through advfirewall rules
        There are several ways to pull firewall information from a Windows system.  Today we will leverage Powershell to quickly find and review the different Remote Desktop rules that are in place. This use case revolves around Remote Desktop being our key search term, but this filter can be adjusted ...
    Learn more

    Never miss a Professionally Evil update!

    Working With Data: IP and Port Filtering
    Working With Data: IP and Port Filtering
      During our day-to-day work, there’s a lot of data that we interact with.  In order to make good ...
    Learn more
    How to allow multiple RDP sessions
      The goal of this article is to walk through how to set up a Windows host to allow multiple remote ...
    Learn more
    Boolean Math (NOT Logic) – CISSP Domain 3
    Boolean Math (NOT Logic) – CISSP Domain 3
    Hello everyone.  We’ve got another Boolean math session lined up for you today.  This time we’re ...
    Learn more
    Boolean Math (XOR Logic) – CISSP Domain 3
    Boolean Math (XOR Logic) – CISSP Domain 3
    Hello everyone.  We’ve got another Boolean math session to look over today.  Our focus this time ...
    Learn more
    Boolean Math (OR Logic) – CISSP Domain 3
    Boolean Math (OR Logic) – CISSP Domain 3
    Today we are going to take another look at some Boolean mathematics.  In particular, we’re going to ...
    Learn more
    Boolean Math (AND Logic) - CISSP Domain 3
    Boolean Math (AND Logic) - CISSP Domain 3
    Today we’re going to take a quick look at the AND Boolean logic, which is covered in Domain 3 of ...
    Learn more
    Encryption – CISSP Domain 3
    Encryption – CISSP Domain 3
    We’re circling back to some more CISSP-related materials.  Today’s topic will be encryption, which ...
    Learn more