Professionally Evil Blog

A blog by experts of penetration testing and other security assessments.
    A Hacker’s Tour of the X86 CPU Architecture
    A Hacker’s Tour of the X86 CPU Architecture
    Overview The Intel x86 CPU architecture is one of the most prolific CPU architectures for desktops, ...
    Learn more
    LD_PRELOAD: How to Run Code at Load Time
    LD_PRELOAD: How to Run Code at Load Time
    Today I want to continue the series on using LD_PRELOAD. In previous posts, we covered how to ...
    Learn more
    Converting NMAP XML Files to HTML with xsltproc
    Converting NMAP XML Files to HTML with xsltproc
    NMAP is a wonderful network scanner and its ability to log scan data to files, specifically XML, ...
    Learn more
    Solving the November 13th Detective Nevil Mystery Challenge
    Solving the November 13th Detective Nevil Mystery Challenge
    Overview Each week on Friday, we post a social media challenge known as “Detective Nevil Mystery ...
    Learn more
    Not-So-Random: Using LD_PRELOAD to Hijack the rand() Function
    Not-So-Random: Using LD_PRELOAD to Hijack the rand() Function
    Today I wanted to continue the series on using LD_PRELOAD.  In today’s post we are going to use ...
    Learn more
    LD_PRELOAD - Introduction
    LD_PRELOAD - Introduction
    Today I wanted to start what I plan to be a small series of blog posts about LD_PRELOAD. LD_PRELOAD ...
    Learn more

    Never miss a professionally evil update!