Skip to content

Linux Security Blog

How Hackers Work

Search
  • Home
  • Shep Tutorials
    • Set Up Security Shepherd On VMWare
    • Failure To Restrict Access – Solution
    • Insecure DOR – Solution
    • Poor Data Validation – Solution
    • Security Misconfiguration – Solution
    • Insecure Direct Object Reference 2 Solution
    • Cross Site Scripting One Solution
    • SQL Injection Solution
    • OWASP Security Shepherd – Failure To Restrict Access Solution
    • Session Management Challenge One – Solution
  • GNS3 Series
    • Install GNS3 2.2 on Windows10 | Download Link Included
    • Import VirtualBox Images to GNS3
  • Python Series
    • Part I
    • Part II
  • About

Category: Hactivism

Android Security…

It’s Time To take back Our Internet

20 Jan 201920 Jan 2019
Tim Berners Lee was recently awarded the Turing Award (The ACM A.M. Turing Award is an annual prize given by the Association for Computing Machinery (ACM) to "an individual selected…
Cloud Security…

Forget VPN’s for private browsing, get involved with TOR

3 Apr 20174 Apr 2017
Recently President Trump reversed a privacy law that was introduced in the last administration, that prevented Internet Service Providers (ISP's) from selling your data to advertisers. When I say your…
Hactivism

Azerbaijani Hackers Deface NATO-Armenia, Embassy Websites in 40 Countries

23 Jan 2016
The cyber war between Anti-Armenia Team from Azerbaijan and The Monte Melkonian Cyber Army (MMCA) from Armenia is getting more sophisticated with every passing day. Last month the MMCA leaked sensitive data from Azerbaijan Ministry…
Hactivism

BBC, Trump attacks “just the start,” says hacktivist group

4 Jan 20164 Jan 2016
NEW YORK -- The group that claimed responsibility for taking down the BBC's global website last week has said the attack was "just the start." On Saturday, a group calling…
Hactivism…

Privacy group calls for a boycott of tech companies supporting CISA

26 Sep 2015
Privacy advocates are stepping up their lobbying efforts against the controversial cyber threat information sharing bill currently in Congress after several tech giants indicated their support. Activist group Fight for…
Hactivism

The Rise of Hacktivism

22 Sep 201522 Sep 2015
The rise of the Internet and related technologies brought with it new methods and practices in all areas of human activity, including activism. Activism in particular was affected in two…
#Metasploit…

Exploring the Hacker Tools of Mr. Robot

15 Sep 201525 Aug 2019
Over the years the most famous hacking tool that has made it into the movies is Nmap. When producers of a movie actually try to put a dose of reality…

RSS ls -a /Zer0Days

  • [webapps] TLR-2005KSH - Arbitrary File Delete 12 May 2022
  • [webapps] Royal Event Management System 1.0 - 'todate' SQL Injection (Authenticated) 12 May 2022
  • [webapps] College Management System 1.0 - 'course_code' SQL Injection (Authenticated) 12 May 2022
  • [remote] F5 BIG-IP 16.0.x - Remote Code Execution (RCE) 12 May 2022
  • [webapps] TLR-2005KSH - Arbitrary File Upload 11 May 2022

Follow Us

  • Twitter
  • Facebook
  • Tumblr
  • Reddit

RSS Crypto News

  • An error has occurred; the feed is probably down. Try again later.

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,438 other followers

ls /categories

AppSec Attacks Bugs Cryptography Cyber Security Education Encryption Entertainment Exploits Hacking Linux Open Source Operating Systems OWASP Penetration Testing Privacy Security Technology Tips Tutorials

ls /comments

Settinguplimitedcomp… on How to Easily Find Anyone on t…
Foster Eli on Best Darkweb Links
crypstalk21 on Securing Your Crypto Wallet
kioptrix vm on PenTesting: Gaining Root Privi…
Johnny Dickman (@Dar… on The Darknet 2019
XXS Attack – P… on Payload in PDF

ls -a -v /community

ls /MostVisited

  • Best Darkweb Links
    Best Darkweb Links
  • Payload in PDF
    Payload in PDF
  • Crack WPA Handshake using Aircrack with Kali Linux
    Crack WPA Handshake using Aircrack with Kali Linux
  • Write a Ping Sweeper in 4 Lines of Bash
    Write a Ping Sweeper in 4 Lines of Bash
  • Explore The Dark Web Anonymously
    Explore The Dark Web Anonymously
  • BlueKeep - Exploit Windows (RDP Vulnerability) Remotely
    BlueKeep - Exploit Windows (RDP Vulnerability) Remotely
  • Windows Takeover with a PDF File
    Windows Takeover with a PDF File
  • OWASP Security Shepherd- Session Management Challenge One - Solution - LSB
    OWASP Security Shepherd- Session Management Challenge One - Solution - LSB
  • How to Crack a "Master Lock" Combination Lock
    How to Crack a "Master Lock" Combination Lock
  • Import VirtualBox Images to GNS3
    Import VirtualBox Images to GNS3

ls /Archives

Follow Linux Security Blog on WordPress.com

We Use Social Media

  • Twitter
  • Reddit
  • Facebook
  • Tumblr
  • Pinterest
  • YouTube
Create a website or blog at WordPress.com
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
  • Follow Following
    • Linux Security Blog
    • Join 2,438 other followers
    • Already have a WordPress.com account? Log in now.
    • Linux Security Blog
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar