Skip to content

Linux Security Blog

How Hackers Work

Search
  • Home
  • Shep Tutorials
    • Set Up Security Shepherd On VMWare
    • Failure To Restrict Access – Solution
    • Insecure DOR – Solution
    • Poor Data Validation – Solution
    • Security Misconfiguration – Solution
    • Insecure Direct Object Reference 2 Solution
    • Cross Site Scripting One Solution
    • SQL Injection Solution
    • OWASP Security Shepherd – Failure To Restrict Access Solution
    • Session Management Challenge One – Solution
  • GNS3 Series
    • Install GNS3 2.2 on Windows10 | Download Link Included
    • Import VirtualBox Images to GNS3
  • Python Series
    • Part I
    • Part II
  • About

Category: Cryptography

Blockchain…

Breaking News: More Than $600 Million Stolen In Ethereum And Other Cryptocurrencies—Marking One Of Crypto’s Biggest Hacks Ever

10 Aug 202110 Aug 2021
https://www.forbes.com/sites/jonathanponciano/2021/08/10/more-than-600-million-stolen-in-ethereum-and-other-cryptocurrencies-marking-one-of-cryptos-biggest-hacks-ever/?sh=413075dd7f62
#Metasploit…

Heartbleed Discovery and Exploit

1 Feb 202018 Jun 2020
Heartbleed is a security bug in the OpenSSL cryptography library, which is a widely used implementation of the Transport Layer Security protocol. It was introduced into the software in 2012…
Cryptography…

The Darknet 2019

7 Apr 201924 Jul 2020
Do you want to access the update about deep web links or, the hidden wiki, Deep web sites, Dark web Search, The Dark Web Links, tor onion links, tor hidden wiki links, deep web sites…
Android Security…

It’s Time To take back Our Internet

20 Jan 201920 Jan 2019
Tim Berners Lee was recently awarded the Turing Award (The ACM A.M. Turing Award is an annual prize given by the Association for Computing Machinery (ACM) to "an individual selected…
AppSec…

Create a Backdoor with Cryptcat

23 Dec 2018
In this tutorial, I'll introduce you to netcat's popular cousin, cryptcat (she's actually much cuter and more exotic than the plain netcat). Cryptcat enables us to communicate between two systems and encrypts…
Crypto Currency…

Banks Must Embrace Crypto or “Bite the Dust”

16 Nov 2018
With all the constant news about the price of Bitcoin, it’s possible to forget what it was invented for. Cryptocurrency trading plays only a small role in what Bitcoin and…
#career…

Now Is The Time, Linux is the Direction

11 Nov 201824 Jan 2019
Your future matters to us @ LSB, so get into Linux and see the new world it will open for you. Created by QuBits 2018-11-11
Cryptography…

The Hidden Wiki

11 Nov 20185 Mar 2019
If you did not know yet the Hidden Wiki is a list of well known Dark Net Sites that will get you started browsing on the other internet. To access…
#career…

Linux Foundation Deals For LSB Followers

25 Oct 2018
We are delighted to be able to team up with The Linux Foundation to bring you some great deals on amazing Linux courses and materials. All courses, on completion is…
Attacks…

The Evil Twin Attack

8 Oct 201829 Oct 2019
I searched through many guides, and none of them really gave good description of how to do this. There’s a lot of software out there (such as SEToolkit, which can…
AppSec…

OWASP Security Shepherd – Insecure Cryptographic Storage Challenge 1 Solution – LSB

21 Sep 2018
Thanks for visiting and today we have another OWASP Security Shepherd Solution for you. This time it's the Insecure Cryptographic Storage Challenge. Cryptography is usually the safest way to communicate…
Crypto Currency…

Ratecoin (XRA)

21 Jun 201821 Jun 2018
The genesis and general development history of Ratecoin is marked by some low points. Her entire program landscape was tackled several times from scratch, but each time she fell into oblivion. In…
Crypto Currency…

VOISE – Once in a generation the whole game changes

2 May 2018
VOISE is a blockchain powered anonymous decentralized platform with personalized token based on Ethereum's smart contract ecosystem for transactions. VOISE is an innovative cryptocurrency powered solution for the music industry…
Cryptography…

Metal (MTL) | Shaping Digital Money

6 Mar 20186 Mar 2018
Transfer money instantly around the globe with nothing more than a phone number. Earn rewards every time you spend or make a purchase. METAL ROCKS The Digital Wallet Earn rewards…
Crypto Currency…

Top Ten Cryptocurrencies

20 Feb 201820 Feb 2018
10. Dash (DASH) $718.42 USD A revolutionary digital money system. Use Dash to make instant, private payments online or in-store using our secure open-source platform hosted by thousands of users around the…
#career…

Enterprise IT & Linux System Administration Training

2 Feb 20186 Feb 2018
Introduction to Linux Linux powers 94% of the world’s supercomputers, most of the servers powering the Internet, the majority of financial trades worldwide and a billion Android devices. In short,…
Crypto Currency…

Etherium | Crypto Royalty

30 Jan 20182 Feb 2018
Build unstoppable applications Ethereum is a decentralized platform that runs smart contracts: applications that run exactly as programmed without any possibility of downtime, censorship, fraud or third-party interference. These apps run…
Crypto Currency…

DasCoin | Taking Cryptocurrency Mainstream

30 Jan 201830 Jan 2018
The Hybrid Solution And Why It’s Better The latest coin in the crypto currency world coming from Ireland. It's doing quite well and looks to be getting stronger. DasCoin combines…
Crypto Currency…

Could Cryptocurrencies Take Over the US Dollar as World Reserve Currency?

22 Jan 2018
COULD BITCOIN REPLACE THE DOLLAR? Cryptocurrencies were the clear winner of 2017. Major cryptocurrencies like Bitcoin, Ethereum and Litecoin have massively increased in value over the year, effectively outperforming investments…
#career…

Eryllium (ERY)

22 Jan 201822 Jan 2018
Welcome back fellow crypto traders, we have an exciting coin to introduce to you today. If you'd like to get into crypto trading go visit our earlier post about getting…
Crypto Currency…

QubitCoin (Q2C)

13 Jan 201814 Jan 2018
Welcome back fellow crypto traders. Todays flavour of the day is Q2C, for around 1.2 cent a pop. Qubitcoin was started on Jan 12 2014 as an CPU and GPU…
Crypto Currency…

Will 2018 be the rise of the AltCoin?

11 Jan 201813 Jan 2018
There's lots of chatter on crypto chat forums about this year being the year of the AltCoin (short for alternative coins). These are basically the small fries in the crypto…
Crypto Currency…

Litecoin (LTC) making a killing

13 Dec 201713 Dec 2017
If you invested in Litecoin a few weeks ago, you would now have a profit of 1600%.  So your initial investment of €20 would now be around $320 for each coin…
Cryptography…

GPG on Linux

9 Dec 2017
1 Introduction Encryption is the process of encoding messages or information in such a way that only authorized parties can read them. With almost no privacy in this digital generation…
Crypto Currency…

Let’s Untangle Blockchain

12 Nov 201726 Apr 2019
In a not too distant future, everything from our banking, supply chains, law, accountancy, communications services – and even governments – will have been redefined. Dramatically more egalitarian means of…
Cryptography

Cracking the Adventure Time Cipher

2 Aug 20162 Aug 2016
I recently read “Adventure Time: Volume 1″, a comic book based on the smart animated series of the same name. In the comic, I found some odd looking messages at…
Cryptography

Ransomware master decryption key released

24 May 201624 May 2016
TeslaCrypt's master key has been released to the public, shutting down the ransomware for good in an unexpected twist in the malware's story. TeslaCrypt, which often targets gamers, lands on…
Cryptography…

Setup a VPN On Kali Linux For Anonymity

16 Mar 201628 Nov 2019
Virtual Private Networks (vpn) create an encrypted ‘tunnel’ between your computer and the host server, with the internet traffic going in and out of the host server. Your ISP or…
Cryptography

Global Crypto Wars

4 Mar 20164 Mar 2016
American politicians, media, and the public may be focused on the ongoing battle between Apple and the FBI over encryption in the iPhone, but the so-called Crypto Wars are far…
Cryptography

MD5 function torpedoes crypto protections in HTTPS and IPSEC

9 Jan 201622 Feb 2017
If you thought MD5 was banished from HTTPS encryption, you'd be wrong. It turns out the fatally weak cryptographic hash function, along with its only slightly stronger SHA1 cousin, are…
Cryptography

Dutch Government Embraces Encryption, Denounces Backdoors

6 Jan 201622 Feb 2017
While the “Going Dark” debate over encryption standards rages on here in the ­­United States, government officials in the Netherlands this week released a statement that actually calls for stronger…
Cryptography…

Moves to rein in ‘dark’ networks

7 Dec 201522 Feb 2017
A key House lawmaker is pushing a new initiative to deal with the proliferation of encrypted technologies that critics say allow terrorists to communicate without detection. The effort from House…
Cryptography…

The attack that broke the Dark Web

2 Dec 201522 Feb 2017
Law enforcement has been complaining for years about the Web “going dark,” saying that encryption and privacy tools are frustrating their ability to track criminals online. But massive FBI operations…
Cryptography

Researchers poke hole in custom crypto built for AWS

1 Dec 201522 Feb 2017
Underscoring just how hard it is to design secure cryptographic software, academic researchers recently uncovered a potentially serious weakness in an early version of the code library protecting Amazon Web…
Cryptography…

Online security braces for quantum revolution

9 Sep 201522 Feb 2017
  It is an inevitability that cryptographers dread: the arrival of powerful quantum computers that can break the security of the Internet. Although these devices are thought to be a…

RSS ls -a /Zer0Days

  • [webapps] Bitbucket v7.0.0 - RCE 23 Mar 2023
  • [webapps] wkhtmltopdf 0.12.6 - Server Side Request Forgery 23 Mar 2023
  • [webapps] WorkOrder CMS 0.1.0 - SQL Injection 23 Mar 2023
  • [webapps] MAN-EAM-0003 V3.2.4 - XXE 23 Mar 2023
  • [webapps] Owlfiles File Manager 12.0.1 - Multiple Vulnerabilities 23 Mar 2023

Follow Us

  • Twitter
  • Facebook
  • Tumblr
  • Reddit

RSS Crypto News

  • An error has occurred; the feed is probably down. Try again later.

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,439 other subscribers

ls /categories

AppSec Attacks Bugs Cryptography Cyber Security Education Encryption Entertainment Exploits Hacking Linux Open Source Operating Systems OWASP Penetration Testing Privacy Security Technology Tips Tutorials

ls /comments

dark92i (@dark92i) on The Hidden Wiki
Foster Eli on Best Darkweb Links
crypstalk21 on Securing Your Crypto Wallet
kioptrix vm on PenTesting: Gaining Root Privi…
Johnny Dickman (@Dar… on The Darknet 2019
XXS Attack – P… on Payload in PDF

ls -a -v /community

ls /MostVisited

  • Best Darkweb Links
    Best Darkweb Links
  • Payload in PDF
    Payload in PDF
  • Crack WPA Handshake using Aircrack with Kali Linux
    Crack WPA Handshake using Aircrack with Kali Linux
  • Write a Ping Sweeper in 4 Lines of Bash
    Write a Ping Sweeper in 4 Lines of Bash
  • BlueKeep - Exploit Windows (RDP Vulnerability) Remotely
    BlueKeep - Exploit Windows (RDP Vulnerability) Remotely
  • Find Vulnerable Devices On The Internet With Shodan
    Find Vulnerable Devices On The Internet With Shodan
  • Hacking Linux with Armitage
    Hacking Linux with Armitage
  • Reverse Engineering Router Firmware
    Reverse Engineering Router Firmware
  • Sniffing Access Points and Mac Addresses Using Python
    Sniffing Access Points and Mac Addresses Using Python
  • Installing Security Shepherd on VMWare Workstation 12 Player
    Installing Security Shepherd on VMWare Workstation 12 Player

ls /Archives

Follow Linux Security Blog on WordPress.com

We Use Social Media

  • Twitter
  • Reddit
  • Facebook
  • Tumblr
  • Pinterest
  • YouTube
Create a website or blog at WordPress.com
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
  • Follow Following
    • Linux Security Blog
    • Join 270 other followers
    • Already have a WordPress.com account? Log in now.
    • Linux Security Blog
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar