Professionally Evil Blog
A blog by experts of penetration testing and other security assessments.
Training,
professionally evil,
Secure Ideas,
Windows 10,
Windows 11,
sysadmin,
system administration,
cmd,
powershell,
firewall rules
How to iterate through advfirewall rules
There are several ways to pull firewall information from a Windows system. Today we will leverage Powershell to quickly find and review the different Remote Desktop rules that are in place. This use case revolves around Remote Desktop being our key search term, but this filter can be adjusted ...
Learn more
Never miss a Professionally Evil update!

Training |
professionally evil |
Secure Ideas |
technology tips and tricks |
sysadmin |
data |
data manipulation |
excel |
spreadsheet |
filtering
Working With Data: IP and Port Filtering
During our day-to-day work, there’s a lot of data that we interact with. In order to make good ...
Learn more
Training |
professionally evil |
Secure Ideas |
hacking |
Windows |
Windows 10 |
Windows 11 |
sysadmin |
system administration |
cmd |
wireless |
wifi |
wifi password |
powershell |
wireless profile
View Wireless Profile Password Information Using PowerShell or CMD
There are a couple different ways for you to access your Windows wireless password information. ...
Learn more

Testing |
Vulnerability |
Guidance |
data breach |
information security |
penetration testing |
application security |
professionally evil |
Secure Ideas |
hacking |
best practices |
cybersecurity |
Privilege Escalation
Application Security 202: Vulnerabilities Accepted
vul·ner·a·bil·i·ty The quality or state of being exposed to the possibility of being attacked or ...
Learn more

Deliverables |
consulting |
application security |
Secure Ideas |
cybersecurity |
methodology |
Project |
Writing |
Quick Bites
(Not So) Quick Bites - Episode 3 - Writing About Writer's Block
So, sometimes I have a real problem with writing, specifically reports and blog posts. Somehow, ...
Learn more
application security |
professionally evil |
Secure Ideas |
Linux |
programming |
File Descriptors |
SetUID |
Privilege Escalation
Privilege Escalation via File Descriptors in Privileged Binaries
Today I wanted to cover an application security topic that applies to SetUID binaries. As we ...
Learn more
network |
professionally evil |
Secure Ideas |
NMAP |
Linux |
IEEE |
OUI |
nmap-mac-prefixes
How to Update the Nmap OUI Database
Overview In a previous blog post, I covered what an OUI is, how to extract them from a MAC ...
Learn more
network |
professionally evil |
Secure Ideas |
MAC Address |
IEEE |
OUI |
PENT
Of MAC Addresses and OUI: A Subtle, but Useful, Recon Resource
When it comes to reconnaissance, every little bit of information can be helpful. Today, we ...
Learn more
Vulnerability |
network |
Secure Ideas |
hacking |
network security |
Windows |
scanning |
methodology |
how-to |
Free
Quick Bites - Finding Open Windows File Shares
Hi there, ladies and gentlemen! My name is Aaron Moss, and welcome to the first edition of Quick ...
Learn more
application security |
professionally evil |
Secure Ideas |
LD_PRELOAD |
accept |
dup2 |
make |
Linux |
programming |
Shared Objects |
dlsym |
shell |
backdoor |
rootkit |
userland |
ELF |
inject |
injection
LD_PRELOAD: Making a Backdoor by Hijacking accept()
Today I want to continue the series on using LD_PRELOAD. In previous posts, we covered how to ...
Learn more
encryption |
security |
professionally evil |
Secure Ideas |
getting started |
BitLocker |
VHD |
rtfm |
manage-bde |
mount-vhd |
manage bitlocker |
technology |
technology tips and tricks |
Windows 10 |
VHDX |
encrypted drive |
technology tips |
how-to |
btfm |
Windows 11
PowerShell Tips: How do I Mount a VHD or Lock a BitLocker Drive?
PowerShell Tips How do I Mount a VHD or Lock a BitLocker Encrypted Drive?
Learn more