Professionally Evil Insights
Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.
Welcome aboard!
Twelve Days of ZAPmas - Day 2 - The Edge of Tomorrow
Day 2 - The Edge of Tomorrow - Replaying and Tampering with Requests Fuzzing and tampering are like the primitives upon which we design tests to evaluate functionality and flaws. Here’s how I’m using these terms: Tampering is taking a request and modifying it manually, and then issuing the modified ...
Continue Reading
Never miss a Professionally Evil update!
How to allow multiple RDP sessions
Training |
penetration testing |
pentesting |
Windows |
technology tips and tricks |
rdp |
sysadmin |
system administration
The goal of this article is to walk through how to set up a Windows host to allow multiple remote ...
Continue Reading
Wild West Hackin Fest 2022: The Return
Training |
security |
samuraiWTF |
web penetration testing |
information security |
security awareness |
application security |
professionally evil |
Secure Ideas |
hacking |
cybersecurity |
pentesting |
web application security |
technology |
security conference
Man, San Diego is beautiful. I don't know exactly why John Strand and Black Hills Information ...
Continue Reading
How to Create Custom Probes For NMAP Service/Version Detection
network |
hacking |
cybersecurity |
pentesting |
scanning |
NMAP |
version |
service |
probe |
ports |
match |
chrome |
debugging |
nmap-service-probes |
softmatch |
rarity |
directive |
remote
Overview NMAP is a fantastic tool for performing initial reconnaissance and enumeration. A simple ...
Continue Reading
Computers are People Too
There are those rare times during pen tests, when you are on a client’s network and you don’t have ...
Continue Reading
Automating Red Team Homelabs: Part 2 – Build, Pentest, Destroy, and Repeat
pentesting |
automation |
API |
dev ops |
home lab
As of 2019-05-14 the Funny Stories section has been updated. Now that we understand what the goal ...
Continue Reading
A Container Hacker’s Guide to Living Off of the Land
hacking |
container hacking |
container security |
containerization |
pentesting |
living off the land
Sometimes as a pentester you find yourself in tricky situations. Depending on the type of ...
Continue Reading