Education… Getting Anonymously Harassed Online? Try This! 17 Aug 202017 Aug 2020 Lots of people are bullied or harassed online from anonymous users on different Social Media platforms that use different accounts and personas. So let's look at how we can try…
Education… How to Easily Find Anyone on the Internet 26 Jul 202026 Jul 2020 I just put a short video together to demonstrate the installation of Serlock and what it can do. Qubits 2020-07-26
Attacks… Discover & Attack Raspberry Pi’s on a Network 16 Jun 202024 Jul 2020 Many people never bother to change their default password on their devices. For a Raspberry Pi, this can leave it extremely vulnerable. Today, we will be looking at a little…
AppSec… Import VirtualBox Images to GNS3 1 Nov 201924 Jul 2020 This is the second post of our GNS3 tutorials, today we will look at how to import a VirtualBox image into GNS3. If you haven't installed GNS3 yet or downloaded…
#career… Install GNS3 2.2 on Windows10 | Download Link Included 31 Oct 201924 Jul 2020 GNS3 is a Graphical Network Simulator that allows emulation of complex networks. GNS3 allows the same type of emulation using Cisco Internetwork Operating Systems. It allows you to run a…
AppSec… Movies Featuring the Nmap Security Scanner 6 Oct 201930 Oct 2019 The Nmap Security Scanner has appeared in many major motion pictures (as well as more obscure films). This gallery provides screen shots and details for each movie. Source: Movies Featuring…
Cyber Security… Send Secret Files in an Image Using Steganography 2 Oct 201924 Jul 2020 Steganography is data hidden within data. It enables us to embed files, messages or links into an image that can't be detected by email filters. So we can send secret…
Attacks… Find Vulnerable Devices On The Internet With Shodan 9 Sep 201924 Jul 2020 Welcome back to LSB and thanks for reading. Today we will be looking at how to search for vulnerable devices around the world using Shodan. Shodan is an index of…
#career… Hacking Android With Metasploit 4 Sep 201924 Jul 2020 Good morning/evening/night my fellow hackers, today's lesson is on Metasploit and how we can hack Android with a Metasploit payload. So let's get started!! As always, this post is for…
Cyber Security… Handy Bash one-liners 22 May 201924 Jul 2020 Terminal Tricks Using Ctrl keys Ctrl + n : same as Down arrow. Ctrl + p : same as Up arrow. Ctrl + r : begins a backward search through…
AppSec… Enabling Monitor Mode & Packet Injection on the Raspberry Pi 20 May 201924 Jul 2020 By Kodyhttps://null-byte.wonderhowto.com/how-to/enable-monitor-mode-packet-injection-raspberry-pi-0189378/The Raspberry Pi Zero W and Pi 3 Model B+ include integrated Wi-Fi, Bluetooth Low Energy, and more than enough power to run Kali Linux. They sound like perfect…
Cryptography… The Darknet 2019 7 Apr 201924 Jul 2020 Do you want to access the update about deep web links or, the hidden wiki, Deep web sites, Dark web Search, The Dark Web Links, tor onion links, tor hidden wiki links, deep web sites…
#career… We Have Linux Foundation Deals for you 23 Dec 201814 May 2020 As usual we have amazing new deals on Linux Foundation certificates and courses. Sign on and use your own pace to finish the course. Prometheus is the latast deal!! Updated…
AppSec… Create a Backdoor with Cryptcat 23 Dec 2018 In this tutorial, I'll introduce you to netcat's popular cousin, cryptcat (she's actually much cuter and more exotic than the plain netcat). Cryptcat enables us to communicate between two systems and encrypts…
#career… Cyber Monday Sale Starts NOW!(FOR A WEEK!!) 26 Nov 201830 Nov 2018 Yikes, yes, we are rolling out Cyber Monday deals for a week. This will hopefully make up for the lack of Black Friday deals, but maybe Black Friday has died.…
#career… Now Is The Time, Linux is the Direction 11 Nov 201824 Jan 2019 Your future matters to us @ LSB, so get into Linux and see the new world it will open for you. Created by QuBits 2018-11-11
Cryptography… The Hidden Wiki 11 Nov 20185 Mar 2019 If you did not know yet the Hidden Wiki is a list of well known Dark Net Sites that will get you started browsing on the other internet. To access…
#career… Linux Foundation Deals For LSB Followers 25 Oct 2018 We are delighted to be able to team up with The Linux Foundation to bring you some great deals on amazing Linux courses and materials. All courses, on completion is…
AppSec… OWASP Security Shepherd- Session Management Challenge One – Solution – LSB 12 Oct 201812 Oct 2018 We have another solution in the OWASP Security Shepherd challenges and we enjoyed completing this one. You can find out about Session Management from OWASP here. So let's get on…
AppSec… OWASP Security Shepherd – Failure To Restrict Access Solution – LSB 27 Sep 201827 May 2019 Am I Vulnerable To 'Failure to Restrict URL Access'? The best way to find out if an application has failed to properly restrict URL access is to verify every page. Consider for…
AppSec… OWASP Security Shepherd – Insecure Cryptographic Storage Challenge 1 Solution – LSB 21 Sep 2018 Thanks for visiting and today we have another OWASP Security Shepherd Solution for you. This time it's the Insecure Cryptographic Storage Challenge. Cryptography is usually the safest way to communicate…
AppSec… OWASP Security Shepherd – SQL Injection Solution – LSB 15 Sep 201819 Sep 2019 A SQL injection attack consists of insertion or "injection" of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data…
AppSec… OWASP Security Shepherd – Cross Site Scripting One Solution – LSB 12 Sep 201812 Sep 2018 Welcome back to LSB my budding hackers. Today's lesson is about Cross Site Scripting (Or XSS). Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected…
AppSec… OWASP Security Shepherd – Insecure Direct Object Reference Solution – LSB 10 Sep 2018 Welcome back to the Security Shepherd solutions from LSB. This was quite an interesting puzzle and it took a few tries to get the key. Insecure Direct Object Reference (called IDOR from here) occurs when…
AppSec… OWASP Security Shepherd – Failure To Restrict Access Solution – LSB 7 Sep 20187 Sep 2018 What is Failure to Restrict URL Access Vulnerability/Threat? Failure to restrict URL access occurs in applications hide functionality from non-privileged users. In an application that fails to restrict URL access, administration…
AppSec… AV evading with Veil 29 Aug 201822 Nov 2019 One of the most important issues any hacker must address is how to get past security devices and remain undetected. These can include antivirus software, intrusion detection systems, firewalls, web…
Crypto Currency… Ratecoin (XRA) 21 Jun 201821 Jun 2018 The genesis and general development history of Ratecoin is marked by some low points. Her entire program landscape was tackled several times from scratch, but each time she fell into oblivion. In…
AppSec… Password cracking with John the Ripper 24 May 201810 Feb 2019 Introduction For those of you who haven't yet heard about John the Ripper (hereby called John for brevity), it is a free password cracking tool written mostly in C. Before…
Cyber Security… Build a Beginner Hacking Kit with the Raspberry Pi 3 Model B+ 23 Apr 20186 Feb 2020 The Raspberry Pi is a perfect way to start. In 2018, the Raspberry Pi 3 Model B+ was released featuring a better CPU, Wi-Fi, Bluetooth, and Ethernet built in. Our recommended Kali Pi kit…
#career… Enterprise IT & Linux System Administration Training 2 Feb 20186 Feb 2018 Introduction to Linux Linux powers 94% of the world’s supercomputers, most of the servers powering the Internet, the majority of financial trades worldwide and a billion Android devices. In short,…
Crypto Currency… DasCoin | Taking Cryptocurrency Mainstream 30 Jan 201830 Jan 2018 The Hybrid Solution And Why It’s Better The latest coin in the crypto currency world coming from Ireland. It's doing quite well and looks to be getting stronger. DasCoin combines…
Crypto Currency… Could Cryptocurrencies Take Over the US Dollar as World Reserve Currency? 22 Jan 2018 COULD BITCOIN REPLACE THE DOLLAR? Cryptocurrencies were the clear winner of 2017. Major cryptocurrencies like Bitcoin, Ethereum and Litecoin have massively increased in value over the year, effectively outperforming investments…
#career… Eryllium (ERY) 22 Jan 201822 Jan 2018 Welcome back fellow crypto traders, we have an exciting coin to introduce to you today. If you'd like to get into crypto trading go visit our earlier post about getting…
Crypto Currency… QubitCoin (Q2C) 13 Jan 201814 Jan 2018 Welcome back fellow crypto traders. Todays flavour of the day is Q2C, for around 1.2 cent a pop. Qubitcoin was started on Jan 12 2014 as an CPU and GPU…
Attacks… How to Crack a “Master Lock” Combination Lock 12 Jan 2018 It's funny how they call a "safe" a safe. If you don't know the combination to a Master Lock combination lock, you have a few options. If your lock is…
Education… A Collection of Secret Linux Humor 12 Jan 201812 Jan 2018 Who says Linux nerds can't be funny? Enjoy this collection of amusing man pages and prank programs. Oneko the Cute Cursor-Chasing Kitty oneko launches a tiny kitty cat that chases your…
Crypto Currency… Will 2018 be the rise of the AltCoin? 11 Jan 201813 Jan 2018 There's lots of chatter on crypto chat forums about this year being the year of the AltCoin (short for alternative coins). These are basically the small fries in the crypto…
Data Mining… How To Get Started In Trading Crypto Currency 4 Jan 20184 Jan 2018 As my readers probably know crypto currency is taking over the World. Even banks are getting in on it now. I'd like to share some decent advice to my followers…
#Metasploit… Metasploit for the Aspiring Ethical Hacker, Part 3 (Payloads) – LSB 5 Dec 20176 Dec 2017 As you know, Metasploit is an exploitation framework that every hacker should be knowledgeable of and skilled at. It is one of my favorite hacking tools available. Let's take a closer look…
Attacks… Metasploit for the Aspiring Ethical Hacker, Part 2 1 Dec 201729 Jan 2019 Part 1 is here: https://linuxsecurityblog.com/2016/03/01/metasploit-for-the-aspiring-ethical-hacker-part-1/ In this second tutorial, we will look at some of the basic commands we can use in Metasploit. Although the Metasploit framework can appear daunting to…
Cloud Security… Create Your Own VPN with AWS 24 Nov 201723 May 2019 Internet users are spoiled for choice when it comes to VPN services, but they either require a monthly subscription, aren’t secure, or are just plain slow. Thankfully, alternatives do exist.…
AppSec… Exploiting CSRF under NoScript Conditions 22 Nov 201716 Mar 2019 CSRFs -- or Cross-Site Request Forgery vulnerabilities -- occur when a server accepts requests that can be “spoofed” from a site running on a different domain. The attack goes something like this:…
You must be logged in to post a comment.