Skip to content

Linux Security Blog

How Hackers Work

Search
  • Home
  • Shep Tutorials
    • Set Up Security Shepherd On VMWare
    • Failure To Restrict Access – Solution
    • Insecure DOR – Solution
    • Poor Data Validation – Solution
    • Security Misconfiguration – Solution
    • Insecure Direct Object Reference 2 Solution
    • Cross Site Scripting One Solution
    • SQL Injection Solution
    • OWASP Security Shepherd – Failure To Restrict Access Solution
    • Session Management Challenge One – Solution
  • GNS3 Series
    • Install GNS3 2.2 on Windows10 | Download Link Included
    • Import VirtualBox Images to GNS3
  • Python Series
    • Part I
    • Part II
  • About

Category: Legal

Crypto Currency…

Banks Must Embrace Crypto or “Bite the Dust”

16 Nov 2018
With all the constant news about the price of Bitcoin, it’s possible to forget what it was invented for. Cryptocurrency trading plays only a small role in what Bitcoin and…
#career…

Now Is The Time, Linux is the Direction

11 Nov 201824 Jan 2019
Your future matters to us @ LSB, so get into Linux and see the new world it will open for you. Created by QuBits 2018-11-11
Legal…

Join Us in the Fight for Net Neutrality

12 Sep 201812 Sep 2018
via Join Us in the Fight for Net Neutrality
Cyber Security…

Create an effective business continuity plan

25 Nov 2017
A business continuity plan outlines procedures and instructions an organization must follow in the face of disaster, whether fire, flood or cyberattack. Here's how to create one that gives your…
Dark Net…

Best Darkweb Links

20 Nov 201724 Jul 2020
Disclaimer: We are not responsible for anything you may access or view on the darkweb. This post is for educational purposes. Please be cautious and enter at your own risk,…
Legal…

Aaron Swartz and MIT: The inside story

29 Jul 201729 Jul 2017
The mysterious visitor called himself Gary Host at first, then Grace Host, which he shortened for his made-up e-mail address to “ghost,” a joke apparently, perhaps signaling mischievousness — or…
Legal

California Now Has the Nation’s Best Digital Privacy Law

13 Oct 201513 Oct 2015
CALIFORNIA CONTINUED ITS long-standing tradition for forward-thinking privacy laws today when Governor Jerry Brown signed a sweeping law protecting digital privacy rights. The landmark Electronic Communications Privacy Act barsany state law…
Cybercrime…

Russian hacker Vladimir Drinkman pleads guilty in New Jersey court

17 Sep 201522 Sep 2015
Russian national Vladimir Drinkman, who was arrested in Amsterdam in 2012 and brought to the United States to be charged for his involvement in the biggest data breach, pleaded guilty…
Legal

Hacker mag 2600 laughs off Getty Images inkspots copyright claim

10 Sep 201515 Sep 2015
Venerable hacker publication 2600 is fighting off what looks like an early candidate for the most egregious copyright infringement accusation of 2015. On a 2012 cover, 2600 used an ink-splatter…
Legal…

California assembly passes digital privacy bill

10 Sep 201515 Sep 2015
The California state assembly has passed a digital privacy bill that aims to prevent government access without warrant to private electronic communications. The bill would provide some exceptions for law…
Attacks…

Coder pleads guilty to writing Gozi banking trojan

8 Sep 20158 Sep 2015
A man credited with helping to create the infamous Gozi banking malware has pleaded guilty in a US court. Deniss Calovskis, 30, of Latvia was arrested in November 2012 and…
Legal…

Justice Department Cracks Down On The Use Of Cellphone Tracking Technology

4 Sep 20154 Sep 2015
Federal law enforcement officers will now be required to obtain a search warrant before using technology that tracks cellphone locations, according to a policy update issued by the Justice Department on Thursday.Under…
Legal…

Hardened Linux stalwarts Grsecurity pull the pin after legal fight

28 Aug 20154 Sep 2015
The gurus behind the popular and respected Linux kernel hardening effort Grsecurity will stop providing free support for their stable offering. In future, only paying sponsors will get stable patches…

RSS ls -a /Zer0Days

  • [remote] SmartRG Router SR510n 2.6.13 - Remote Code Execution 11 Nov 2022
  • [webapps] CVAT 2.0 - Server Side Request Forgery 11 Nov 2022
  • [local] IOTransfer V4 - Unquoted Service Path 11 Nov 2022
  • [remote] AVEVA InTouch Access Anywhere Secure Gateway 2020 R2 - Path Traversal 11 Nov 2022
  • [remote] MSNSwitch Firmware MNT.2408 - Remote Code Execution 11 Nov 2022

Follow Us

  • Twitter
  • Facebook
  • Tumblr
  • Reddit

RSS Crypto News

  • An error has occurred; the feed is probably down. Try again later.

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,438 other subscribers

ls /categories

AppSec Attacks Bugs Cryptography Cyber Security Education Encryption Entertainment Exploits Hacking Linux Open Source Operating Systems OWASP Penetration Testing Privacy Security Technology Tips Tutorials

ls /comments

Foster Eli on Best Darkweb Links
crypstalk21 on Securing Your Crypto Wallet
kioptrix vm on PenTesting: Gaining Root Privi…
Johnny Dickman (@Dar… on The Darknet 2019
XXS Attack – P… on Payload in PDF
Fred (@Fred37063593) on The Hidden Wiki

ls -a -v /community

ls /MostVisited

  • Best Darkweb Links
    Best Darkweb Links
  • Payload in PDF
    Payload in PDF
  • Write a Ping Sweeper in 4 Lines of Bash
    Write a Ping Sweeper in 4 Lines of Bash
  • Crack WPA Handshake using Aircrack with Kali Linux
    Crack WPA Handshake using Aircrack with Kali Linux
  • Find Vulnerable Devices On The Internet With Shodan
    Find Vulnerable Devices On The Internet With Shodan
  • Windows Takeover with a PDF File
    Windows Takeover with a PDF File
  • How to create an I2P Darknet site
    How to create an I2P Darknet site
  • Heartbleed Discovery and Exploit
    Heartbleed Discovery and Exploit
  • How To Use Netcat to Establish and Test TCP and UDP Connections
    How To Use Netcat to Establish and Test TCP and UDP Connections
  • BlueKeep - Exploit Windows (RDP Vulnerability) Remotely
    BlueKeep - Exploit Windows (RDP Vulnerability) Remotely

ls /Archives

Follow Linux Security Blog on WordPress.com

We Use Social Media

  • Twitter
  • Reddit
  • Facebook
  • Tumblr
  • Pinterest
  • YouTube
Create a website or blog at WordPress.com
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
  • Follow Following
    • Linux Security Blog
    • Join 269 other followers
    • Already have a WordPress.com account? Log in now.
    • Linux Security Blog
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar