Professionally Evil Fundementals Encoding

Encoding – CISSP Domain 3

Today we’re going to take a quick look at encoding, as covered in Domain 3 of the CISSP common body of knowledge (CBK). There is often some confusion between encoding and encryption, so one of the purposes of this article is to look at how the CBK defines encoding. Encoding ... Read More
Hashing functions

Hashing Functions – CISSP Domain 3

Today we’re going to take a quick look at hashing functions, as covered in Domain 3 of the CISSP common body of knowledge (CBK). There is often some confusion between hashing, encryption, and encoding, so one of the purposes of this article is to help differentiate between them. To start ... Read More

My Experience in the CISSP Mentorship Program

A little while back, I was talking with a friend of mine about the different services that Secure Ideas offered, and one of the topics that came up was training and certifications. Since I just finished taking the CISSP Mentorship class, and it was the first thing that came to ... Read More
File Encryption Using VHD and BitLocker

File Encryption Using VHD and BitLocker

When I was thinking of topics to write about, the idea of protecting the data we work with came to mind. There’s always some sort of data that we want to keep safe such as, personal information, customer data, super-secret-squirrel project files…and the list goes on. For example, when working ... Read More
Cracking WPA Pre Shared Keys

Cracking WPA Pre Shared Keys

Cracking WPA Pre Shared Keys This is intended to be part 2 of a previous blog (Intro to Wireless Security), which was designed to introduce people to the realm of wireless security testing. One of the best ways I’ve found to learn about something new is to walk through various ... Read More
Introduction to Wireless Security with Aircrack-ng

Introduction to Wireless Security with Aircrack-ng

Introduction to Wireless Security with Aircrack-ng Today we’re going to walk through a few WiFi testing examples using Aircrack-ng, which is a suite of wireless network security tools. It allows us to monitor and export packet data, attack access points and clients, and crack WEP and WPA keys. I’ve included ... Read More