Professionally Evil Blog
A blog by experts of penetration testing and other security assessments.
Twelve Days of ZAPmas - Day 4 - Fuzzing for Injection
I briefly introduced fuzzing earlier in the series, citing it as the second primitive upon which application testing techniques are built. OWASP has a more in-depth definition available here. We also have a video on fuzzing with Burp Suite here. Fuzzing in ZAP Much like tampering, you can start by ...Continue Reading
Twelve Days of ZAPmas - Day 3 - CYA (Cover Your Auth)
Access control is one of the crucial elements to application security. The vast majority of ...Continue Reading
Twelve Days of ZAPmas - Day 2 - The Edge of Tomorrow
Day 2 - The Edge of Tomorrow - Replaying and Tampering with Requests Fuzzing and tampering are like ...Continue Reading
Twelve Days of ZAPmas - Day 1 - Setting Up ZAP
This holiday season, I’m going to run down some of the ins and outs of working with OWASP Zed ...Continue Reading
Quick Bites - Finding Open Windows File Shares
Vulnerability | network | Secure Ideas | hacking | network security | Windows | scanning | methodology | how-to | Free
Hi there, ladies and gentlemen! My name is Aaron Moss, and welcome to the first edition of Quick ...Continue Reading
PowerShell Tips: How do I Mount a VHD or Lock a BitLocker Drive?
encryption | security | professionally evil | Secure Ideas | getting started | BitLocker | VHD | rtfm | manage-bde | mount-vhd | manage bitlocker | technology | technology tips and tricks | Windows 10 | VHDX | encrypted drive | technology tips | how-to | btfm | Windows 11
PowerShell Tips How do I Mount a VHD or Lock a BitLocker Encrypted Drive?Continue Reading