Professionally Evil Blog

A blog by experts of penetration testing and other security assessments.
    How to Update the Nmap OUI Database
    Overview     In a previous blog post, I covered what an OUI is, how to extract them from a MAC address, how the IEEE maintains this information publicly, and that tools like Nmap and Wireshark can perform an OUI lookup.  Today, I want to cover how Nmap does this function, and how we can update this ...
    Continue Reading

    Never miss a Professionally Evil update!

    Of MAC Addresses and OUI: A Subtle, but Useful, Recon Resource
    network  |  professionally evil  |  Secure Ideas  |  MAC Address  |  IEEE  |  OUI  |  PENT
        When it comes to reconnaissance, every little bit of information can be helpful.  Today, we ...
    Continue Reading
    Quick Bites - Finding Open Windows File Shares
    Vulnerability  |  network  |  Secure Ideas  |  hacking  |  network security  |  Windows  |  scanning  |  methodology  |  how-to  |  Free
    Hi there, ladies and gentlemen! My name is Aaron Moss, and welcome to the first edition of Quick ...
    Continue Reading
    How to Create Custom Probes For NMAP Service/Version Detection
    network  |  hacking  |  cybersecurity  |  pentesting  |  scanning  |  NMAP  |  version  |  service  |  probe  |  ports  |  match  |  chrome  |  debugging  |  nmap-service-probes  |  softmatch  |  rarity  |  directive  |  remote
    Overview NMAP is a fantastic tool for performing initial reconnaissance and enumeration.  A simple ...
    Continue Reading