Professionally Evil Insights
Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.
Welcome aboard!
Decoding F5 Cookie
As a Penetration Tester, there are many different things you come across while performing a test. ...
Continue Reading
Grab a CORS Light
Many of you already know that any cross-site HTTP requests invoked from scripts running within a ...
Continue Reading
Laudanum by Example: Shell
Previously, I wrote a post providing a brief introduction to Laudanum. If you haven’t read it, or ...
Continue Reading
Introduction to Laudanum
As a security consultant, there are so many scenarios that I run into every day that there is no ...
Continue Reading
Spear Phishing: "You guys are Shady!"
This post is part of our Professionally Evil series of posts that discuss some of the experiences ...
Continue Reading
Installing RatProxy on Windows - Video Uploaded
A few months ago I did the original Installing RatProxy on Windows blog post that describes both ...
Continue Reading
Grey Box Penetration Testing
A common question I get from potential clients is “what is grey box testing and why do we need it?” ...
Continue Reading
SH5ARK: Taking a Byte out of HTML5
The new features in HTML5 have opened a whole new world of opportunities for developers and for ...
Continue Reading
How To: Encrypting Mac Mail
As a security consultant, frequently traveling, it is critical to implement security controls to ...
Continue Reading
Ninja Developer Talk at Louisville Metro Infosec Conference
I recently attended, and spoke, at the Louisville Metro Infosec Conference ...
Continue Reading
ViewState XSS: What's the Deal?
Testing |
developers |
QA |
security |
testers |
web penetration testing
As penetration testers, there are many different technologies that we have to be familiar with. The ...
Continue Reading
Has contents: true
Total pages: 5
Current page: 4