Professionally Evil Blog
A blog by experts of penetration testing and other security assessments.
Testing,
Vulnerability,
Guidance,
data breach,
information security,
penetration testing,
application security,
professionally evil,
Secure Ideas,
hacking,
best practices,
cybersecurity,
Privilege Escalation
Application Security 202: Vulnerabilities Accepted
vul·ner·a·bil·i·ty The quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally. This is the Oxford English Dictionary definition of vulnerability. But I’m going to modify it a little bit to reflect our topic of application security. ...
Learn more
Never miss a Professionally Evil update!

Deliverables |
consulting |
application security |
Secure Ideas |
cybersecurity |
methodology |
Project |
Writing |
Quick Bites
(Not So) Quick Bites - Episode 3 - Writing About Writer's Block
So, sometimes I have a real problem with writing, specifically reports and blog posts. Somehow, ...
Learn more

Training |
security |
samuraiWTF |
web penetration testing |
information security |
security awareness |
application security |
professionally evil |
Secure Ideas |
hacking |
cybersecurity |
pentesting |
web application security |
technology |
security conference
Wild West Hackin Fest 2022: The Return
Man, San Diego is beautiful. I don't know exactly why John Strand and Black Hills Information ...
Learn more

network |
hacking |
cybersecurity |
pentesting |
scanning |
NMAP |
version |
service |
probe |
ports |
match |
chrome |
debugging |
nmap-service-probes |
softmatch |
rarity |
directive |
remote
How to Create Custom Probes For NMAP Service/Version Detection
Overview NMAP is a fantastic tool for performing initial reconnaissance and enumeration. A simple ...
Learn more

Social Engineering - Why hack it, when people are just giving away their information!
In today’s technologically driven society, more and more criminals have turned to cyber crime as ...
Learn more