AppSec… Python Scripting For The Ethical Hacker 21 Jun 20188 Sep 2019 Welcome back, my greenhorn hackers!I began this series on scripting awhile back to teach all aspiring hackers how to write some basic scripts for hacking and reconnaissance. Without developing some basic scripting skills,…
Crypto Currency… Ratecoin (XRA) 21 Jun 201821 Jun 2018 The genesis and general development history of Ratecoin is marked by some low points. Her entire program landscape was tackled several times from scratch, but each time she fell into oblivion. In…
Cyber Security… Kubernetes for Developers (LFD259) 17 Jun 201827 Jun 2018 Get advanced knowledge of application development using Kubernetes with training from The Linux Foundation! Kubernetes is a high-velocity open source orchestration tool to deploy, scale, and update containerized applications. This course…
Cloud Security… 10% Off Linux Programming & Development Training 27 May 2018 Promotion Details 10% Off any Linux Programming & Development Training courses Promo code: MEMORIAL10 Starts: May 28th at 12:00 AM Ends: May 28th at 11:59 PM Linux Memorial Day Sale…
AppSec… Stealing Signal Conversations from a MacBook 27 May 2018 Developed by Open Whisper Systems, Signal is a free, open-source encrypted communications app for both mobile and desktop devices that allows users to make voice calls, send instant messages, and even make…
AppSec… Setting Up A Snort IDS on Debian Linux 24 May 2018 Malicious network traffic (such as worms, hacking attempts, etc.) has certain patterns to it. You could monitor your network traffic with a sniffer and look for this malicious traffic manually…
AppSec… Password cracking with John the Ripper 24 May 201810 Feb 2019 Introduction For those of you who haven't yet heard about John the Ripper (hereby called John for brevity), it is a free password cracking tool written mostly in C. Before…
Cyber Security… Build a Beginner Hacking Kit with the Raspberry Pi 3 Model B+ 23 Apr 20186 Feb 2020 The Raspberry Pi is a perfect way to start. In 2018, the Raspberry Pi 3 Model B+ was released featuring a better CPU, Wi-Fi, Bluetooth, and Ethernet built in. Our recommended Kali Pi kit…
Cyber Security… Best SMB Firewalls 6 Apr 2018 Andrew Harmon Best Small Business Firewall, a coveted title that manufacturers are gunning to claim and users are clamoring to find the answer to. Understandably, we all want to make sure…
Cyber Security… How Does Ransomware Work? 31 Mar 2018 May 12, 2017 / RYAN MURPHY Ransomware is similar to other malware in that it installs itself on a computer and runs in the background without the user’s knowledge. But unlike malware that hides and…
#Metasploit… Metasploit | (Msfvenom) 24 Mar 20189 Nov 2019 Eluding and evading antivirus software and intrusion detection systems is one of the most critical tasks of the hacker.As soon as a new exploit is developed and discovered, the AV and IDS…
Crypto Currency… Top Ten Cryptocurrencies 20 Feb 201820 Feb 2018 10. Dash (DASH) $718.42 USD A revolutionary digital money system. Use Dash to make instant, private payments online or in-store using our secure open-source platform hosted by thousands of users around the…
Cloud Security… 15% Off Enterprise IT & Linux System Admin 12 Feb 2018 Starting February 12, we’re offering 15% off any Enterprise IT & Linux System Administration Training courses. Check out the full details below: Promotion Details15% off any Enterprise IT & Linux…
#career… Enterprise IT & Linux System Administration Training 2 Feb 20186 Feb 2018 Introduction to Linux Linux powers 94% of the world’s supercomputers, most of the servers powering the Internet, the majority of financial trades worldwide and a billion Android devices. In short,…
Cyber Security… Removing Network Malware 1 Feb 20182 Feb 2018 To disinfect a local network of a malware outbreak, follow the step-by-step instructions below. 1. Quarantine the Network Disconnect the local network from the Internet immediately as a precautionary measure against further…
Crypto Currency… Etherium | Crypto Royalty 30 Jan 20182 Feb 2018 Build unstoppable applications Ethereum is a decentralized platform that runs smart contracts: applications that run exactly as programmed without any possibility of downtime, censorship, fraud or third-party interference. These apps run…
Attacks… Removing Chrome Adware 30 Jan 201830 Jan 2018 Here are couple of suggestions. When I mention commands, those are to be issued in command-line aka terminal , which you can access by pressing CtrlAltT Remove google-chrome related folders,…
Crypto Currency… DasCoin | Taking Cryptocurrency Mainstream 30 Jan 201830 Jan 2018 The Hybrid Solution And Why It’s Better The latest coin in the crypto currency world coming from Ireland. It's doing quite well and looks to be getting stronger. DasCoin combines…
Crypto Currency… Could Cryptocurrencies Take Over the US Dollar as World Reserve Currency? 22 Jan 2018 COULD BITCOIN REPLACE THE DOLLAR? Cryptocurrencies were the clear winner of 2017. Major cryptocurrencies like Bitcoin, Ethereum and Litecoin have massively increased in value over the year, effectively outperforming investments…
#career… Eryllium (ERY) 22 Jan 201822 Jan 2018 Welcome back fellow crypto traders, we have an exciting coin to introduce to you today. If you'd like to get into crypto trading go visit our earlier post about getting…
Crypto Currency… QubitCoin (Q2C) 13 Jan 201814 Jan 2018 Welcome back fellow crypto traders. Todays flavour of the day is Q2C, for around 1.2 cent a pop. Qubitcoin was started on Jan 12 2014 as an CPU and GPU…
Attacks… How to Crack a “Master Lock” Combination Lock 12 Jan 2018 It's funny how they call a "safe" a safe. If you don't know the combination to a Master Lock combination lock, you have a few options. If your lock is…
Education… A Collection of Secret Linux Humor 12 Jan 201812 Jan 2018 Who says Linux nerds can't be funny? Enjoy this collection of amusing man pages and prank programs. Oneko the Cute Cursor-Chasing Kitty oneko launches a tiny kitty cat that chases your…
Crypto Currency… Will 2018 be the rise of the AltCoin? 11 Jan 201813 Jan 2018 There's lots of chatter on crypto chat forums about this year being the year of the AltCoin (short for alternative coins). These are basically the small fries in the crypto…
Data Mining… How To Get Started In Trading Crypto Currency 4 Jan 20184 Jan 2018 As my readers probably know crypto currency is taking over the World. Even banks are getting in on it now. I'd like to share some decent advice to my followers…
AppSec… Spamming Facebook Messages 3 Jan 201811 Apr 2018 We have reported this bug to Facebook and they replied asking "How is this different than hitting the message button?" If you want to spam everyone in the World that…
Cryptography… GPG on Linux 9 Dec 2017 1 Introduction Encryption is the process of encoding messages or information in such a way that only authorized parties can read them. With almost no privacy in this digital generation…
Attacks… Nmap Scripts for Recon 5 Dec 201727 Dec 2018 These Nmap NSE Scripts are all included in standard installations of Nmap. Use them to gather additional information on the targets you are scanning. The information can both add context…
Distros… Light Ubuntu | LSB 4 Dec 201724 Dec 2017 lubuntu 17.10 Artful Aardvark released. What is Lubuntu? Lubuntu is an Ubuntu flavor using LXDE. The project’s goal is to provide a lightweight yet functional distribution. Lubuntu specifically targets older machines with lower…
Attacks… Metasploit for the Aspiring Ethical Hacker, Part 2 1 Dec 201729 Jan 2019 Part 1 is here: https://linuxsecurityblog.com/2016/03/01/metasploit-for-the-aspiring-ethical-hacker-part-1/ In this second tutorial, we will look at some of the basic commands we can use in Metasploit. Although the Metasploit framework can appear daunting to…
Cyber Security… Linux Log Files | LSB 1 Dec 20174 Dec 2017 I am a new Linux user. I would like to know where are the log files located under Debian/Ubuntu or CentOS/RHEL/Fedora Linux server? How do I open or view log…
Attacks… Hackers can bypass new protections in MacOS High Sierra 29 Nov 201729 Nov 2017 MacOS High Sierra protections can be bypassed, but will make security researchers and companies work more difficult Hackers can bypass a new security feature in MacOS High Sierra to load…
Cyber Security… Create an effective business continuity plan 25 Nov 2017 A business continuity plan outlines procedures and instructions an organization must follow in the face of disaster, whether fire, flood or cyberattack. Here's how to create one that gives your…
Cloud Security… Create Your Own VPN with AWS 24 Nov 201723 May 2019 Internet users are spoiled for choice when it comes to VPN services, but they either require a monthly subscription, aren’t secure, or are just plain slow. Thankfully, alternatives do exist.…
AppSec… OWASP – A2 – Broken Authentication and Session Management – LSB 24 Nov 201729 Jun 2018 Threat Agents Consider anonymous external attackers, as well as users with their own accounts, who may attempt to steal accounts from others. Also consider insiders wanting to disguise their actions.…
Cyber Security… OWASP A1 – Injection, Cause and Prevention 23 Nov 20175 May 2019 Am I Vulnerable To 'Injection'? The best way to find out if an application is vulnerable to injection is to verify that all use of interpreters clearly separates untrusted data…
Cyber Security… LSB Afilliate Programs 22 Nov 201728 Nov 2017 I thank each and every one of you for visiting my blog, you are the reason we are still able to keep LSB alive. As you may or may not…
AppSec… Exploiting CSRF under NoScript Conditions 22 Nov 201716 Mar 2019 CSRFs -- or Cross-Site Request Forgery vulnerabilities -- occur when a server accepts requests that can be “spoofed” from a site running on a different domain. The attack goes something like this:…
#career… Black Friday Deals – LSB 22 Nov 201729 Nov 2017 Because we are such good people here at LSB, we like to treat our followers to some fantastic deals that we are offered. So we present them to you. The Linux…
Attacks… Cracking WPA/WPA2 Encryption 15 Jan 201725 Aug 2019 A little Disclaimer – The contents of this post are solely for ethical and educational purposes. You may not use it for unethical purposes. The Author or the Website is…
Education… How To Use Netcat to Establish and Test TCP and UDP Connections 25 May 20162 Dec 2019 Introduction Linux is known for having a great number of mature, useful command line utilities available out of the box in most distributions. Skilled system administrators can do much of…
Android… Resources for Rooting your Android Device 11 May 201625 Jun 2020 As Android matures, the wide-open style of root access we may have grown used to with legacy versions has gone away. Because Android is designed for mobile devices, the focus…
You must be logged in to post a comment.