Professionally Evil Insights
Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.
Welcome aboard!
How to Update the Nmap OUI Database
              
              
              network  | 
              
              professionally evil  | 
              
              Secure Ideas  | 
              
              NMAP  | 
              
              Linux  | 
              
              IEEE  | 
              
              OUI  | 
              
              nmap-mac-prefixes 
              
                
            
            
            
              Overview In a previous blog post, I covered what an OUI is, how to extract them from a MAC address, ...
            
            
              
              Continue Reading
              
              
                
              
            
          Of MAC Addresses and OUI: A Subtle, but Useful, Recon Resource
              
              
              network  | 
              
              professionally evil  | 
              
              Secure Ideas  | 
              
              MAC Address  | 
              
              IEEE  | 
              
              OUI  | 
              
              PENT 
              
                
            
            
            
              When it comes to reconnaissance, every little bit of information can be helpful. Today, we will ...
            
            
              
              Continue Reading
              
              
                
              
            
          LD_PRELOAD: Making a Backdoor by Hijacking accept()
              
              
              application security  | 
              
              professionally evil  | 
              
              Secure Ideas  | 
              
              LD_PRELOAD  | 
              
              accept  | 
              
              dup2  | 
              
              make  | 
              
              Linux  | 
              
              programming  | 
              
              Shared Objects  | 
              
              dlsym  | 
              
              shell  | 
              
              backdoor  | 
              
              rootkit  | 
              
              userland  | 
              
              ELF  | 
              
              inject  | 
              
              injection 
              
                
            
            
            
              Today I want to continue the series on using LD_PRELOAD. In previous posts, we covered how to ...
            
            
              
              Continue Reading
              
              
                
              
            
          How to Create Custom Probes For NMAP Service/Version Detection
              
              
              network  | 
              
              hacking  | 
              
              cybersecurity  | 
              
              pentesting  | 
              
              scanning  | 
              
              NMAP  | 
              
              version  | 
              
              service  | 
              
              probe  | 
              
              ports  | 
              
              match  | 
              
              chrome  | 
              
              debugging  | 
              
              nmap-service-probes  | 
              
              softmatch  | 
              
              rarity  | 
              
              directive  | 
              
              remote 
              
                
            
            
            
              Overview NMAP is a fantastic tool for performing initial reconnaissance and enumeration. A simple ...
            
            
              
              Continue Reading
              
              
                
              
            
          Linux X86 Assembly - How To Test Custom Shellcode Using a C Payload Tester
              Overview In the last blog post in this series, we created a tool to make it easy to build our ...
            
            
              
              Continue Reading
              
              
                
              
            
          Linux X86 Assembly - How To Make Payload Extraction Easier
              Overview In the last blog post of the X86 Linux assembly series, we focused on how to make our ...
            
            
              
              Continue Reading
              
              
                
              
            
          Linux X86 Assembly - How to Make Our Hello World Usable as an Exploit Payload
              Overview In the last two tutorials, we built a Hello World program in NASM and GAS for x86 ...
            
            
              
              Continue Reading
              
              
                
              
            
          Linux X86 Assembly - How to Build a Hello World Program in GAS
              Overview In the last tutorial, we covered how to build a 32-bit x86 Hello World program in NASM. ...
            
            
              
              Continue Reading
              
              
                
              
            
          Linux X86 Assembly - How to Build a Hello World Program in NASM
              Overview A processor understands bytecode instructions specific to that architecture. We as humans ...
            
            
              
              Continue Reading
              
              
                
              
            
          A Hacker’s Tour of the X86 CPU Architecture
              Overview The Intel x86 CPU architecture is one of the most prolific CPU architectures for desktops, ...
            
            
              
              Continue Reading
              
              
                
              
            
          LD_PRELOAD: How to Run Code at Load Time
              Today I want to continue the series on using LD_PRELOAD. In previous posts, we covered how to ...
            
            
              
              Continue Reading
              
              
                
              
            
          
  Has contents: true
  
    Total pages: 3
    Current page: 2