Professionally Evil Blog
A blog by experts of penetration testing and other security assessments.

Coming Soon - Twelve Days of ZAPmas
In December of 2018, I published a twelve-day series of cross-site scripting tips, tricks, and ...
Learn more

hacking |
NMAP |
port scanning |
masscan |
host discovery
Nmap vs. Masscan
If you are in IT, chances are you have at least heard of Nmap and Masscan. Both are free and ...
Learn more

Quick Bites Ep 4 - Let's Talk About SSRF, Baby!
Let’s talk about you and (application) secur-i-ty! Let’s talk about all the good things and the bad ...
Learn more
Training |
professionally evil |
Secure Ideas |
hacking |
Windows |
Windows 10 |
Windows 11 |
sysadmin |
system administration |
cmd |
wireless |
wifi |
wifi password |
powershell |
wireless profile
View Wireless Profile Password Information Using PowerShell or CMD
There are a couple different ways for you to access your Windows wireless password information. ...
Learn more

information security |
penetration testing |
CISSP |
education |
compliance |
risk assessment |
security controls |
information security program |
GLBA |
Safeguards Rule |
Dec 9, 2022 |
automotive |
banking |
vulnerability assessment
What are the key requirements of the GLBA Safeguards Rule?
The Gramm-Leach-Bliley Act (GLBA) contains the Safeguards Rule. This requires financial ...
Learn more
Training |
application security |
OWASP |
AWS |
IaC |
JuiceShop |
Containers |
AWS_ECS |
workshops |
Vagrant |
AWS-CDK
JuiceShop Workshop in less than 5 minutes
Have you ever deployed 10-30 containers in AWS with the single stroke of a key? (well if you don’t ...
Learn more
How to Obfuscate Strings in Rust the Easy Way Using the litcrypt Crate
Overview Static strings in a binary can make the life easier for reverse engineers, be those ...
Learn more

Testing |
Vulnerability |
Guidance |
data breach |
information security |
penetration testing |
application security |
professionally evil |
Secure Ideas |
hacking |
best practices |
cybersecurity |
Privilege Escalation
Application Security 202: Vulnerabilities Accepted
vul·ner·a·bil·i·ty The quality or state of being exposed to the possibility of being attacked or ...
Learn more

Deliverables |
consulting |
application security |
Secure Ideas |
cybersecurity |
methodology |
Project |
Writing |
Quick Bites
(Not So) Quick Bites - Episode 3 - Writing About Writer's Block
So, sometimes I have a real problem with writing, specifically reports and blog posts. Somehow, ...
Learn more
Training |
penetration testing |
pentesting |
Windows |
technology tips and tricks |
rdp |
sysadmin |
system administration
How to allow multiple RDP sessions
The goal of this article is to walk through how to set up a Windows host to allow multiple remote ...
Learn more

Hunting Secrets
Applications are hemorrhaging sensitive data. In many cases, the culprit is marketing and analytics ...
Learn more
Ensuring Web Security via Ansible (Apache)
NOTE: even though this will require Ansible, you can run this on any operating system contrary to ...
Learn more