Professionally Evil

Solving the November 13th Detective Nevil Mystery Challenge

Overview Each week on Friday, we post a social media challenge known as “Detective Nevil Mystery Challenge”.  On November 13th…

3 days ago

Not-So-Random: Using LD_PRELOAD to Hijack the rand() Function

Today I wanted to continue the series on using LD_PRELOAD.  In today’s post we are going to use LD_PRELOAD to…

1 month ago

Boolean Math (XOR Logic) – CISSP Domain 3

Hello everyone.  We’ve got another Boolean math session to look over today.  Our focus this time will be on the…

2 months ago

LD_PRELOAD – Introduction

Today I wanted to start what I plan to be a small series of blog posts about LD_PRELOAD. LD_PRELOAD is…

2 months ago

How to configure Android (Virtual) for Mobile PenTest

This post is about setting up an Android Virtual Machine (AVD) for a mobile application penetration test.

2 months ago

Encryption – CISSP Domain 3

We’re circling back to some more CISSP-related materials.  Today’s topic will be encryption, which can be found in CISSP Domain…

4 months ago

Encoding – CISSP Domain 3

Today we’re going to take a quick look at encoding, as covered in Domain 3 of the CISSP common body…

4 months ago

Einstein Told Us: Why User Awareness is NOT the right focus

“The definition of insanity is doing the same thing over and over again and expecting different results.” – Einstein (Well,…

5 months ago

Building Blocks: Professionally Evil Fundamentals Series

We at Secure Ideas love security education. What we enjoy even more is affordable security education. So we decided to…

9 months ago

Professionally Evil CISSP Certification: Breaking the Bootcamp Model

ISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage…

2 years ago