Professionally Evil Blog
A blog by experts of penetration testing and other security assessments.
Training,
professionally evil,
Secure Ideas,
Windows 10,
Windows 11,
sysadmin,
system administration,
cmd,
powershell,
firewall rules
How to iterate through advfirewall rules
There are several ways to pull firewall information from a Windows system. Today we will leverage Powershell to quickly find and review the different Remote Desktop rules that are in place. This use case revolves around Remote Desktop being our key search term, but this filter can be adjusted ...
Learn more
Never miss a Professionally Evil update!

Training |
professionally evil |
Secure Ideas |
technology tips and tricks |
sysadmin |
data |
data manipulation |
excel |
spreadsheet |
filtering
Working With Data: IP and Port Filtering
During our day-to-day work, there’s a lot of data that we interact with. In order to make good ...
Learn more
Training |
professionally evil |
Secure Ideas |
hacking |
Windows |
Windows 10 |
Windows 11 |
sysadmin |
system administration |
cmd |
wireless |
wifi |
wifi password |
powershell |
wireless profile
View Wireless Profile Password Information Using PowerShell or CMD
There are a couple different ways for you to access your Windows wireless password information. ...
Learn more

Testing |
Vulnerability |
Guidance |
data breach |
information security |
penetration testing |
application security |
professionally evil |
Secure Ideas |
hacking |
best practices |
cybersecurity |
Privilege Escalation
Application Security 202: Vulnerabilities Accepted
vul·ner·a·bil·i·ty The quality or state of being exposed to the possibility of being attacked or ...
Learn more
application security |
professionally evil |
Secure Ideas |
Linux |
programming |
File Descriptors |
SetUID |
Privilege Escalation
Privilege Escalation via File Descriptors in Privileged Binaries
Today I wanted to cover an application security topic that applies to SetUID binaries. As we ...
Learn more
network |
professionally evil |
Secure Ideas |
NMAP |
Linux |
IEEE |
OUI |
nmap-mac-prefixes
How to Update the Nmap OUI Database
Overview In a previous blog post, I covered what an OUI is, how to extract them from a MAC ...
Learn more
network |
professionally evil |
Secure Ideas |
MAC Address |
IEEE |
OUI |
PENT
Of MAC Addresses and OUI: A Subtle, but Useful, Recon Resource
When it comes to reconnaissance, every little bit of information can be helpful. Today, we ...
Learn more
application security |
professionally evil |
Secure Ideas |
LD_PRELOAD |
accept |
dup2 |
make |
Linux |
programming |
Shared Objects |
dlsym |
shell |
backdoor |
rootkit |
userland |
ELF |
inject |
injection
LD_PRELOAD: Making a Backdoor by Hijacking accept()
Today I want to continue the series on using LD_PRELOAD. In previous posts, we covered how to ...
Learn more
encryption |
security |
professionally evil |
Secure Ideas |
getting started |
BitLocker |
VHD |
rtfm |
manage-bde |
mount-vhd |
manage bitlocker |
technology |
technology tips and tricks |
Windows 10 |
VHDX |
encrypted drive |
technology tips |
how-to |
btfm |
Windows 11
PowerShell Tips: How do I Mount a VHD or Lock a BitLocker Drive?
PowerShell Tips How do I Mount a VHD or Lock a BitLocker Encrypted Drive?
Learn more

Training |
security |
samuraiWTF |
web penetration testing |
information security |
security awareness |
application security |
professionally evil |
Secure Ideas |
hacking |
cybersecurity |
pentesting |
web application security |
technology |
security conference
Wild West Hackin Fest 2022: The Return
Man, San Diego is beautiful. I don't know exactly why John Strand and Black Hills Information ...
Learn more