Professionally Evil Insights

Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.

Welcome aboard!

    CyberScream - Hacking Like a Ghost(face)
    consulting  |  data breach  |  penetration testing  |  professionally evil  |  hacking  |  analysis  |  cybersecurity  |  pentesting  |  phishing  |  security breach  |  exploits  |  Halloween  |  webcast
    It’s that most hauntingly wonderful time of year again! Halloween is upon us, along with the dread ...
    Continue Reading
    Quick Bites Episode 8 - (Back From the) Dead Space
    hacking  |  Quick Bites  |  exploits  |  MOVEit  |  MOVEit Transfer  |  SQL Injection  |  Patching
    For the last couple weeks, I’ve been replaying the original Dead Space trilogy - for those of you ...
    Continue Reading
    Introducing SamuraiWTF 5.3: A Powerhouse for Web App Pen Testing
    Testing  |  Training  |  samuraiWTF  |  web penetration testing  |  application security  |  professionally evil  |  Secure Ideas  |  hacking  |  OWASP  |  Project
    We are thrilled to announce the release of SamuraiWTF (Web Training Framework) version 5.3! This ...
    Continue Reading
    Hardware Hacking: Interfacing to UART with Your Computer
    hacking  |  hardware  |  UART
    In my previous article, we covered identification and mapping of the UART interface. In that ...
    Continue Reading
    Hardware Hacking: Finding UART Pinouts on PCBs
    hacking  |  hardware  |  UART
    In my previous article, we started to explore the Universal Asynchronous Receiver/Transmitter ...
    Continue Reading
    Hardware Hacking: Introduction to the UART Interface
    hacking  |  IoT  |  hardware  |  UART
    I wanted to provide some information about hardware and firmware hacking in our blogs. To get the ...
    Continue Reading
    Quick Bites Ep 5 - The Call Is Coming From INSIDE THE HOUSE
    hacking  |  Quick Bites  |  Insider Threat  |  Attacks  |  Halloween
    Man, I’ll be honest - I’m super excited to be doing a Halloween-themed blog post this year. So, ...
    Continue Reading
    Nmap vs. Masscan
    hacking  |  NMAP  |  port scanning  |  masscan  |  host discovery
    If you are in IT, chances are you have at least heard of Nmap and Masscan. Both are free and ...
    Continue Reading
    View Wireless Profile Password Information Using PowerShell or CMD
    Training  |  professionally evil  |  Secure Ideas  |  hacking  |  Windows  |  Windows 10  |  Windows 11  |  sysadmin  |  system administration  |  cmd  |  wireless  |  wifi  |  wifi password  |  powershell  |  wireless profile
    There are a couple different ways for you to access your Windows wireless password information. If ...
    Continue Reading
    Application Security 202: Vulnerabilities Accepted
    vul·ner·a·bil·i·ty The quality or state of being exposed to the possibility of being attacked or ...
    Continue Reading
    Quick Bites - Finding Open Windows File Shares
    Vulnerability  |  network  |  Secure Ideas  |  hacking  |  network security  |  Windows  |  scanning  |  methodology  |  how-to  |  Free
    Hi there, ladies and gentlemen! My name is Aaron Moss, and welcome to the first edition of Quick ...
    Continue Reading