Professionally Evil Blog
A blog by experts of penetration testing and other security assessments.
Is the CISSP Mentorship for me?
“Knowledge is power.” That quote has been said more times than you can count because it’s true. The common body of knowledge (CBK) covered in the CISSP provides an industry-standard way of discussing security. So, the way we gather knowledge tends to vary immensely. Rush learning with Boot Camps ...
Learn more
Never miss a Professionally Evil update!
Training |
professionally evil |
Secure Ideas |
Windows 10 |
Windows 11 |
sysadmin |
system administration |
cmd |
powershell |
firewall rules
How to iterate through advfirewall rules
There are several ways to pull firewall information from a Windows system. Today we will ...
Learn more

Training |
professionally evil |
Secure Ideas |
technology tips and tricks |
sysadmin |
data |
data manipulation |
excel |
spreadsheet |
filtering
Working With Data: IP and Port Filtering
During our day-to-day work, there’s a lot of data that we interact with. In order to make good ...
Learn more

Coming Soon - Twelve Days of ZAPmas
In December of 2018, I published a twelve-day series of cross-site scripting tips, tricks, and ...
Learn more
Training |
professionally evil |
Secure Ideas |
hacking |
Windows |
Windows 10 |
Windows 11 |
sysadmin |
system administration |
cmd |
wireless |
wifi |
wifi password |
powershell |
wireless profile
View Wireless Profile Password Information Using PowerShell or CMD
There are a couple different ways for you to access your Windows wireless password information. ...
Learn more
Training |
application security |
OWASP |
AWS |
IaC |
JuiceShop |
Containers |
AWS_ECS |
workshops |
Vagrant |
AWS-CDK
JuiceShop Workshop in less than 5 minutes
Have you ever deployed 10-30 containers in AWS with the single stroke of a key? (well if you don’t ...
Learn more
Training |
penetration testing |
pentesting |
Windows |
technology tips and tricks |
rdp |
sysadmin |
system administration
How to allow multiple RDP sessions
The goal of this article is to walk through how to set up a Windows host to allow multiple remote ...
Learn more

Training |
security |
samuraiWTF |
web penetration testing |
information security |
security awareness |
application security |
professionally evil |
Secure Ideas |
hacking |
cybersecurity |
pentesting |
web application security |
technology |
security conference
Wild West Hackin Fest 2022: The Return
Man, San Diego is beautiful. I don't know exactly why John Strand and Black Hills Information ...
Learn more

How I Became a Security Consultant: AbsoluteAppsec Interview
Every so often, podcasts and such will invite me to speak on a variety of topics. And this week, I ...
Learn more