Skip to content

ls /blog

Linux Security Blog

Search
  • Home
  • Shep Tutorials
    • Set Up Security Shepherd On VMWare
    • Failure To Restrict Access – Solution
    • Insecure DOR – Solution
    • Poor Data Validation – Solution
    • Security Misconfiguration – Solution
    • Insecure Direct Object Reference 2 Solution
    • Cross Site Scripting One Solution
    • SQL Injection Solution
    • OWASP Security Shepherd – Failure To Restrict Access Solution
    • Session Management Challenge One – Solution
  • GNS3 Series
    • Install GNS3 2.2 on Windows10 | Download Link Included
    • Import VirtualBox Images to GNS3
  • Python Series
    • Part I
    • Part II
  • About

Category: Android Security

#career…

Hacking Android With Metasploit

4 Sep 201924 Jul 2020
Good morning/evening/night my fellow hackers, today's lesson is on Metasploit and how we can hack Android with a Metasploit payload. So let's get started!! As always, this post is for…
Android Security…

It’s Time To take back Our Internet

20 Jan 201920 Jan 2019
Tim Berners Lee was recently awarded the Turing Award (The ACM A.M. Turing Award is an annual prize given by the Association for Computing Machinery (ACM) to "an individual selected…
#career…

Now Is The Time, Linux is the Direction

11 Nov 201824 Jan 2019
Your future matters to us @ LSB, so get into Linux and see the new world it will open for you. Created by QuBits 2018-11-11
Android…

Best Ad Blocker Apps For Android

11 Nov 201811 Nov 2018
By Khaled Shariar  - LAST UPDATED: August 10, 2018 Want to get rid of annoying ads? Check out the following ad blocker for android to stop seeing ads on Android.…
Android Security…

How To Find And Delete Where Google Knows You’ve Been

14 Aug 201814 Aug 2018
Even if “Location History” is off on your phone, Google often still stores your precise location Here are some things you can do to delete those markers and keep your location…
Android Security…

How the CopyCat malware infected Android devices around the world

7 Jul 20177 Jul 2017
Check Point researchers identified a mobile malware that infected 14 million Android devices, rooting approximately 8 million of them, and earning the hackers behind the campaign approximately $1.5 million in…
Android Security

Most Android devices lack latest security patches

29 Mar 201729 Mar 2017
Nearly three-quarters of Android devices on the five biggest U.S. carriers are running on security patches that are at least two months old, putting them at greater risk of being…
Android…

apktool

30 Nov 201630 Nov 2016
It is a tool for reverse engineering 3rd party, closed, binary Android apps. It can decode resources to nearly original form and rebuild them after making some modifications; it makes…
Android…

Resources for Rooting your Android Device

11 May 201625 Jun 2020
As Android matures, the wide-open style of root access we may have grown used to with legacy versions has gone away. Because Android is designed for mobile devices, the focus…
Android Security…

Keeping Your Android Device Secure

5 Feb 201625 Aug 2019
Most people these days carry a mobile phone or tablet on their person. Some people even have two, maybe an extra device for work. Globally there are an estimated 6…

RSS ls -a /Zer0Days

  • [remote] Remote Desktop Web Access - Authentication Timing Attack (Metasploit Module) 26 Feb 2021
  • [webapps] LightCMS 1.3.4 - 'exclusive' Stored XSS 26 Feb 2021
  • [webapps] Triconsole 3.75 - Reflected XSS 26 Feb 2021
  • [webapps] Simple Employee Records System 1.0 - File Upload RCE (Unauthenticated) 26 Feb 2021
  • [webapps] Vehicle Parking Management System 1.0 - 'catename' Persistent Cross-Site Scripting (XSS) 25 Feb 2021

Follow Us

  • Twitter
  • Facebook
  • Tumblr
  • Reddit

RSS Crypto News

  • An error has occurred; the feed is probably down. Try again later.

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 2,371 other followers

ls /categories

AppSec Attacks Bugs Cryptography Cyber Security Education Encryption Entertainment Exploits Hacking Linux Open Source Operating Systems OWASP Penetration Testing Privacy Security Technology Tips Tutorials

ls /comments

kioptrix vm on PenTesting: Gaining Root Privi…
Johnny Dickman (@Dar… on The Darknet 2019
XXS Attack – P… on Payload in PDF
Fred (@Fred37063593) on The Hidden Wiki
The Privacy Pros and… on A Beginners Guide to I2P
ls /blog 🐧🛡️🌐 (@lsbd… on Discover & Attack Raspberr…

Support Us

Support ls /blog

€5.00

ls -a -v /community

ls /MostVisited

  • Best Darkweb Links
    Best Darkweb Links
  • Payload in PDF
    Payload in PDF
  • Crack WPA Handshake using Aircrack with Kali Linux
    Crack WPA Handshake using Aircrack with Kali Linux
  • BlueKeep - Exploit Windows (RDP Vulnerability) Remotely
    BlueKeep - Exploit Windows (RDP Vulnerability) Remotely
  • Explore The Dark Web Anonymously
    Explore The Dark Web Anonymously
  • Best Onion Links
    Best Onion Links
  • Windows Takeover with a PDF File
    Windows Takeover with a PDF File
  • The Darknet 2019
    The Darknet 2019
  • Find Vulnerable Devices On The Internet With Shodan
    Find Vulnerable Devices On The Internet With Shodan
  • OWASP Security Shepherd- Session Management Challenge One - Solution - LSB
    OWASP Security Shepherd- Session Management Challenge One - Solution - LSB

ls /Archives

Follow ls /blog on WordPress.com

We Use Social Media

  • Twitter
  • Reddit
  • Facebook
  • Tumblr
  • Pinterest
  • YouTube
Create a website or blog at WordPress.com
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy