Professionally Evil Blog

A blog by experts of penetration testing and other security assessments.
    Twelve Days of ZAPmas - Day 2 - The Edge of Tomorrow
    Day 2 - The Edge of Tomorrow - Replaying and Tampering with Requests Fuzzing and tampering are like the primitives upon which we design tests to evaluate functionality and flaws. Here’s how I’m using these terms: Tampering is taking a request and modifying it manually, and then issuing the modified ...
    Learn more

    Never miss a Professionally Evil update!

    How to allow multiple RDP sessions
    How to allow multiple RDP sessions
      The goal of this article is to walk through how to set up a Windows host to allow multiple remote ...
    Learn more
    How to Create Custom Probes For NMAP Service/Version Detection
    How to Create Custom Probes For NMAP Service/Version Detection
    Overview NMAP is a fantastic tool for performing initial reconnaissance and enumeration.  A simple ...
    Learn more
    Computers are People Too
    Computers are People Too
    There are those rare times during pen tests, when you are on a client’s network and you don’t have ...
    Learn more
    Automating Red Team Homelabs: Part 2 – Build, Pentest, Destroy, and Repeat
    Automating Red Team Homelabs: Part 2 – Build, Pentest, Destroy, and Repeat
      As of 2019-05-14 the Funny Stories section has been updated. Now that we understand what the goal ...
    Learn more
    A Container Hacker’s Guide to Living Off of the Land
    A Container Hacker’s Guide to Living Off of the Land
      Sometimes as a pentester you find yourself in tricky situations. Depending on the type of ...
    Learn more