Professionally Evil
Solving the November 13th Detective Nevil Mystery Challenge
Overview Each week on Friday, we post a social media challenge known as “Detective Nevil Mystery Challenge”. On November 13th of 2020, we released a challenge that contained a payload and it ...
Not-So-Random: Using LD_PRELOAD to Hijack the rand() Function
Today I wanted to continue the series on using LD_PRELOAD. In today’s post we are going to use LD_PRELOAD to hijack the rand() function in a simple random number guessing game to ...
Boolean Math (XOR Logic) – CISSP Domain 3
Hello everyone. We’ve got another Boolean math session to look over today. Our focus this time will be on the XOR logic. The XOR stands for exclusive OR, and we will go ...
LD_PRELOAD – Introduction
Today I wanted to start what I plan to be a small series of blog posts about LD_PRELOAD. LD_PRELOAD is related to Linux based systems and revolves around the loader system and ...
How to configure Android (Virtual) for Mobile PenTest
This post is about setting up an Android Virtual Machine (AVD) for a mobile application penetration test ...
Encryption – CISSP Domain 3
We’re circling back to some more CISSP-related materials. Today’s topic will be encryption, which can be found in CISSP Domain 3. By its very nature, encryption is meant to hide the meaning ...
Encoding – CISSP Domain 3
Today we’re going to take a quick look at encoding, as covered in Domain 3 of the CISSP common body of knowledge (CBK). There is often some confusion between encoding and encryption, ...
Einstein Told Us: Why User Awareness is NOT the right focus
“The definition of insanity is doing the same thing over and over again and expecting different results.” – Einstein (Well, not really!) Every day we hear another reason why user awareness (or ...
Building Blocks: Professionally Evil Fundamentals Series
We at Secure Ideas love security education. What we enjoy even more is affordable security education. So we decided to start a Professionally Evil Fundamentals Video series. These are short definition videos ...
Professionally Evil CISSP Certification: Breaking the Bootcamp Model
ISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used ...

