Professionally Evil Blog
A blog by experts of penetration testing and other security assessments.

Application Security 202: Vulnerabilities Accepted
vul·ner·a·bil·i·ty The quality or state of being exposed to the possibility of being attacked or ...
Learn more

(Not So) Quick Bites - Episode 3 - Writing About Writer's Block
So, sometimes I have a real problem with writing, specifically reports and blog posts. Somehow, ...
Learn more
Hunting Secrets
Applications are hemorrhaging sensitive data. In many cases, the culprit is marketing and analytics ...
Learn more
Privilege Escalation via File Descriptors in Privileged Binaries
Today I wanted to cover an application security topic that applies to SetUID binaries. As we ...
Learn more
application security |
professionally evil |
Secure Ideas |
LD_PRELOAD |
accept |
dup2 |
make |
Linux |
programming |
Shared Objects |
dlsym |
shell |
backdoor |
rootkit |
userland |
ELF |
inject |
injection
LD_PRELOAD: Making a Backdoor by Hijacking accept()
Today I want to continue the series on using LD_PRELOAD. In previous posts, we covered how to ...
Learn more

Wild West Hackin Fest 2022: The Return
Man, San Diego is beautiful. I don't know exactly why John Strand and Black Hills Information ...
Learn more