Skip to content

Linux Security Blog

How Hackers Work

Search
  • Home
  • Shep Tutorials
    • Set Up Security Shepherd On VMWare
    • Failure To Restrict Access – Solution
    • Insecure DOR – Solution
    • Poor Data Validation – Solution
    • Security Misconfiguration – Solution
    • Insecure Direct Object Reference 2 Solution
    • Cross Site Scripting One Solution
    • SQL Injection Solution
    • OWASP Security Shepherd – Failure To Restrict Access Solution
    • Session Management Challenge One – Solution
  • GNS3 Series
    • Install GNS3 2.2 on Windows10 | Download Link Included
    • Import VirtualBox Images to GNS3
  • Python Series
    • Part I
    • Part II
  • About

Category: Android Security

#career…

Hacking Android With Metasploit

4 Sep 201924 Jul 2020
Good morning/evening/night my fellow hackers, today's lesson is on Metasploit and how we can hack Android with a Metasploit payload. So let's get started!! As always, this post is for…
Android Security…

It’s Time To take back Our Internet

20 Jan 201920 Jan 2019
Tim Berners Lee was recently awarded the Turing Award (The ACM A.M. Turing Award is an annual prize given by the Association for Computing Machinery (ACM) to "an individual selected…
#career…

Now Is The Time, Linux is the Direction

11 Nov 201824 Jan 2019
Your future matters to us @ LSB, so get into Linux and see the new world it will open for you. Created by QuBits 2018-11-11
Android…

Best Ad Blocker Apps For Android

11 Nov 201811 Nov 2018
By Khaled Shariar  - LAST UPDATED: August 10, 2018 Want to get rid of annoying ads? Check out the following ad blocker for android to stop seeing ads on Android.…
Android Security…

How To Find And Delete Where Google Knows You’ve Been

14 Aug 201814 Aug 2018
Even if “Location History” is off on your phone, Google often still stores your precise location Here are some things you can do to delete those markers and keep your location…
Android Security…

How the CopyCat malware infected Android devices around the world

7 Jul 20177 Jul 2017
Check Point researchers identified a mobile malware that infected 14 million Android devices, rooting approximately 8 million of them, and earning the hackers behind the campaign approximately $1.5 million in…
Android Security

Most Android devices lack latest security patches

29 Mar 201729 Mar 2017
Nearly three-quarters of Android devices on the five biggest U.S. carriers are running on security patches that are at least two months old, putting them at greater risk of being…
Android…

apktool

30 Nov 201630 Nov 2016
It is a tool for reverse engineering 3rd party, closed, binary Android apps. It can decode resources to nearly original form and rebuild them after making some modifications; it makes…
Android…

Resources for Rooting your Android Device

11 May 201625 Jun 2020
As Android matures, the wide-open style of root access we may have grown used to with legacy versions has gone away. Because Android is designed for mobile devices, the focus…
Android Security…

Keeping Your Android Device Secure

5 Feb 201625 Aug 2019
Most people these days carry a mobile phone or tablet on their person. Some people even have two, maybe an extra device for work. Globally there are an estimated 6…

RSS ls -a /Zer0Days

  • [webapps] Mailhog 1.0.1 - Stored Cross-Site Scripting (XSS) 27 Jun 2022
  • [webapps] WSO2 Management Console (Multiple Products) - Unauthenticated Reflected Cross-Site Scripting (XSS) 27 Jun 2022
  • [webapps] WordPress Plugin Weblizar 8.9 - Backdoor 27 Jun 2022
  • [webapps] SolarView Compact 6.00 - 'pow' Cross-Site Scripting (XSS) 14 Jun 2022
  • [webapps] SolarView Compact 6.00 - 'time_begin' Cross-Site Scripting (XSS) 14 Jun 2022

Follow Us

  • Twitter
  • Facebook
  • Tumblr
  • Reddit

RSS Crypto News

  • An error has occurred; the feed is probably down. Try again later.

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,439 other followers

ls /categories

AppSec Attacks Bugs Cryptography Cyber Security Education Encryption Entertainment Exploits Hacking Linux Open Source Operating Systems OWASP Penetration Testing Privacy Security Technology Tips Tutorials

ls /comments

Settinguplimitedcomp… on How to Easily Find Anyone on t…
Foster Eli on Best Darkweb Links
crypstalk21 on Securing Your Crypto Wallet
kioptrix vm on PenTesting: Gaining Root Privi…
Johnny Dickman (@Dar… on The Darknet 2019
XXS Attack – P… on Payload in PDF

ls -a -v /community

ls /MostVisited

  • Best Darkweb Links
    Best Darkweb Links
  • Payload in PDF
    Payload in PDF
  • Crack WPA Handshake using Aircrack with Kali Linux
    Crack WPA Handshake using Aircrack with Kali Linux
  • Write a Ping Sweeper in 4 Lines of Bash
    Write a Ping Sweeper in 4 Lines of Bash
  • Find Vulnerable Devices On The Internet With Shodan
    Find Vulnerable Devices On The Internet With Shodan
  • Setup a VPN On Kali Linux For Anonymity
    Setup a VPN On Kali Linux For Anonymity
  • The Darknet 2019
    The Darknet 2019
  • Enabling Monitor Mode & Packet Injection on the Raspberry Pi
    Enabling Monitor Mode & Packet Injection on the Raspberry Pi
  • Explore The Dark Web Anonymously
    Explore The Dark Web Anonymously
  • How to Easily Find Anyone on the Internet
    How to Easily Find Anyone on the Internet

ls /Archives

Follow Linux Security Blog on WordPress.com

We Use Social Media

  • Twitter
  • Reddit
  • Facebook
  • Tumblr
  • Pinterest
  • YouTube
Create a website or blog at WordPress.com
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
  • Follow Following
    • Linux Security Blog
    • Join 2,439 other followers
    • Already have a WordPress.com account? Log in now.
    • Linux Security Blog
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar