Hacking

Escaping the Whale: Things You Probably Shouldn’t Do With Docker (part 2)

This post is part 2 of a series of blog posts on container hacking. If you haven’t read the part1, you should check it out. Today I’m going to tell you about a new collection of scripts, and a lab VM for hacking containers. Both of these resources are currently works in progress, and are …

Escaping the Whale: Things You Probably Shouldn’t Do With Docker (part 2)Read More »

Professionally Evil Web App Pen Testing 101 Course

UPDATE: Updated the done steps. below.  Also changed the links from S3 to Git. Since our founding in 2010 Secure Ideas has always tried to focus on education and increasing the amount of available knowledge in our field.   As such we have contributed to courses, presented at conferences around the world and contributed to open …

Professionally Evil Web App Pen Testing 101 CourseRead More »

Professionally Evil Courses: Advanced Mobile PenTesting with MobiSec

Secure Ideas is excited to announce that Kevin Johnson and James Jardine will be teaching Advance Mobile PenTesting with MobiSec at Blackhat 2014.  This course will be offered twice, in two day sessions. In this hands-on, lab driven course students will be taught a methodology and series of techniques used to perform penetration testing of …

Professionally Evil Courses: Advanced Mobile PenTesting with MobiSecRead More »

Professionally Evil Courses: Mobile PenTesting with MobiSec

Secure Ideas is excited to announce that Jason Gillam will be teaching Mobile PenTesting with MobiSec at Charlotte ISSA 10th Annual Infosec Summit.  Kevin Johnson, one of the course authors, may be available on the second day. In this hands-on, lab driven course students will be taught a methodology and series of techniques used to perform penetration …

Professionally Evil Courses: Mobile PenTesting with MobiSecRead More »

Intercepting DNS

Recently during a penetration test, I discovered a Linksys WRT54G wireless router that had been installed on a customer’s network. Surprisingly, this device was accessible from the Internet with default credentials. Watching the client list, I noticed several clients connecting on & off throughout the day. We all know that this is bad, but how …

Intercepting DNSRead More »

Professionally Evil Training: Tactical Burp Suite Webinar

Tactical Burp Suite Webinar Secure Ideas is excited to announce its latest upcoming online training.  We will be offering a two-hour session exploring Burp Suite and its use in a web application penetration test.  Kevin Johnson and James Jardine will explore the various features of Burp Suite, focused on how we use the system during …

Professionally Evil Training: Tactical Burp Suite WebinarRead More »

Scroll to Top