Professionally Evil Blog
A blog by experts of penetration testing and other security assessments.
Quick Bites Ep 5 - The Call Is Coming From INSIDE THE HOUSE
Man, I’ll be honest - I’m super excited to be doing a Halloween-themed blog post this year. So, long before I was big into hacking, I was into horror, specifically horror movies. I’ve devoted a large part of my life to horror. I have a rather nice collection of horror movie posters, memorabilia, ...
Learn more
Never miss a Professionally Evil update!

hacking |
NMAP |
port scanning |
masscan |
host discovery
Nmap vs. Masscan
If you are in IT, chances are you have at least heard of Nmap and Masscan. Both are free and ...
Learn more
Training |
professionally evil |
Secure Ideas |
hacking |
Windows |
Windows 10 |
Windows 11 |
sysadmin |
system administration |
cmd |
wireless |
wifi |
wifi password |
powershell |
wireless profile
View Wireless Profile Password Information Using PowerShell or CMD
There are a couple different ways for you to access your Windows wireless password information. ...
Learn more

Testing |
Vulnerability |
Guidance |
data breach |
information security |
penetration testing |
application security |
professionally evil |
Secure Ideas |
hacking |
best practices |
cybersecurity |
Privilege Escalation
Application Security 202: Vulnerabilities Accepted
vul·ner·a·bil·i·ty The quality or state of being exposed to the possibility of being attacked or ...
Learn more
Vulnerability |
network |
Secure Ideas |
hacking |
network security |
Windows |
scanning |
methodology |
how-to |
Free
Quick Bites - Finding Open Windows File Shares
Hi there, ladies and gentlemen! My name is Aaron Moss, and welcome to the first edition of Quick ...
Learn more

Training |
security |
samuraiWTF |
web penetration testing |
information security |
security awareness |
application security |
professionally evil |
Secure Ideas |
hacking |
cybersecurity |
pentesting |
web application security |
technology |
security conference
Wild West Hackin Fest 2022: The Return
Man, San Diego is beautiful. I don't know exactly why John Strand and Black Hills Information ...
Learn more

network |
hacking |
cybersecurity |
pentesting |
scanning |
NMAP |
version |
service |
probe |
ports |
match |
chrome |
debugging |
nmap-service-probes |
softmatch |
rarity |
directive |
remote
How to Create Custom Probes For NMAP Service/Version Detection
Overview NMAP is a fantastic tool for performing initial reconnaissance and enumeration. A simple ...
Learn more
Vulnerability |
developers |
security |
open source |
information security |
application security |
hacking
Digging Between the Couch Cushions - CouchDB CVE-2021-38295 Breakdown
Introduction In this blog post we’re going to take a look at the recent CouchDB vulnerability, ...
Learn more

hacking |
container hacking |
container security |
containerization |
pentesting |
living off the land
A Container Hacker’s Guide to Living Off of the Land
Sometimes as a pentester you find yourself in tricky situations. Depending on the type of ...
Learn more