Skip to content

ls /blog

Linux Security Blog

Search
  • Home
  • Shep Tutorials
    • Set Up Security Shepherd On VMWare
    • Failure To Restrict Access – Solution
    • Insecure DOR – Solution
    • Poor Data Validation – Solution
    • Security Misconfiguration – Solution
    • Insecure Direct Object Reference 2 Solution
    • Cross Site Scripting One Solution
    • SQL Injection Solution
    • OWASP Security Shepherd – Failure To Restrict Access Solution
    • Session Management Challenge One – Solution
  • Linux Courses
    • Hyperledger Fundamentals
    • LFD201 – INTRODUCTION TO OPEN SOURCE DEVELOPMENT, GIT, AND LINUX!
    • KUBERNETES FOR DEVELOPERS (LFD259) COURSE AND CKAD CERTIFICATION
    • OUR SELF PACED COURSE – LFS264 – OPNFV FUNDAMENTALS!
    • THE SELF PACED COURSE – LFS263 – ONAP FUNDAMENTALS
    • Get a FREE Dell Chromebook 11 with qualifying Linux Foundation instructor-led course purchase!
  • GNS3 Series
    • Install GNS3 2.2 on Windows10 | Download Link Included
    • Import VirtualBox Images to GNS3
  • About

Category: Malware

#Metasploit…

Exploiting Routers With Routersploit

26 Sep 20195 Oct 2019
If you have Wi-Fi at home, then you have a router, this is how you get your internet access. Today we will be looking a piece of software that allows…
#career…

Malware Analysis With Valkyrie

22 Apr 201914 Oct 2019
Valkyrie is a malware analysis tool that's free for you for a year to try out. You can visit https://valkyrie.comodo.com to sign up. Once you sign up you will presented…
AppSec…

Emotet The Banking Trojan

11 Apr 2019
Emotet is a kind of malware originally designed as a banking Trojan aimed at stealing financial data, but it’s evolved to become a major threat to users everywhere. Let’s talk…
AppSec…

SMB Exploited

14 Mar 201916 Nov 2019
Server Message Block (SMB) is the transport protocol used by Windows machines for a wide variety of purposes such as file sharing, printer sharing, and access to remote Windows services.…
Bugs…

Cuckoo – Sandboxed Malware Analysis

27 Dec 201822 Nov 2019
What is Cuckoo? Cuckoo Sandbox is the leading open source automated malware analysis system. You can throw any suspicious file at it and in a matter of minutes Cuckoo will provide…
#career…

Now Is The Time, Linux is the Direction

11 Nov 201824 Jan 2019
Your future matters to us @ LSB, so get into Linux and see the new world it will open for you. Created by QuBits 2018-11-11
AppSec…

Honeyd Tutorial Part 1, Getting Started

25 Jun 201821 Mar 2019
This series of articles will focus on honeypots using an application called honeyd. There are a number of honeypot solutions out there but I personally feel like honeyd is a great…
Cyber Security…

How Does Ransomware Work?

31 Mar 2018
May 12, 2017 / RYAN MURPHY Ransomware is similar to other malware in that it installs itself on a computer and runs in the background without the user’s knowledge. But unlike malware that hides and…
Cyber Security…

Removing Network Malware

1 Feb 20182 Feb 2018
To disinfect a local network of a malware outbreak, follow the step-by-step instructions below. 1. Quarantine the Network Disconnect the local network from the Internet immediately as a precautionary measure against further…
Attacks…

Removing Chrome Adware

30 Jan 201830 Jan 2018
Here are couple of suggestions. When I mention commands, those are to be issued in command-line aka terminal , which you can access by pressing CtrlAltT Remove google-chrome related folders,…
Attacks…

Malware Types Explained

15 Aug 201715 Aug 2017
In this article we will be looking at the different kinds of malware and what they do. When performing static or dynamic malware analysis it is crucial to have a…
Android Security…

How the CopyCat malware infected Android devices around the world

7 Jul 20177 Jul 2017
Check Point researchers identified a mobile malware that infected 14 million Android devices, rooting approximately 8 million of them, and earning the hackers behind the campaign approximately $1.5 million in…
Attacks…

How Shipping Giant Maersk Dealt With a Malware Meltdown, And Other Security News This Week

3 Jul 20173 Jul 2017
WHEN A PIECE of unprecedented malicious software rampages through thousands of critical networks around the world, it tends to get our full attention. And this week's digital plague, known as…
Malware

Malware asks for a selfie as it steals your information

20 Nov 201620 Nov 2016
Not content with stealing your financial details, personal information, and login credentials, there’s now an Android banking Trojan that also asks victims to take a selfie with their ID cards.…
Malware

Malware Analysis Toolkit Using Free Tools

7 Jun 20167 Jun 2016
Examining the capabilities of malicious software allows your IT team to better assess the nature of a security incident, and may help prevent further infections. Here’s how to set up…
Malware

Car Hack Technique Uses Dealerships to Spread Malware

2 Oct 20152 Oct 2015
OVER THE LAST summer, the security research community has proven like never before that cars are vulnerable to hackers—via cellular Internet connections, intercepted smartphone signals, and even insurance dongles plugged…

RSS ls -a /Zer0Days

  • [webapps] Inim Electronics Smartliving SmartLAN 6.x - Remote Command Execution 10 Dec 2019
  • [webapps] Inim Electronics Smartliving SmartLAN 6.x - Unauthenticated Server-Side Request Forgery 10 Dec 2019
  • [local] Inim Electronics Smartliving SmartLAN 6.x - Hard-coded Credentials 10 Dec 2019
  • [webapps] Oracle Siebel Sales 8.1 - Persistent Cross-Site Scripting 9 Dec 2019
  • [webapps] Alcatel-Lucent Omnivista 8770 - Remote Code Execution 9 Dec 2019

Follow Us

  • Twitter
  • Facebook
  • Tumblr
  • Reddit

RSS Crypto News

  • SEC Seeks British Assistance in Getting Testimony of Ex-Telegram CIO 10 Dec 2019 Caileam Raleigh
  • Bakkt’s Plans for Its Options, Cash-Settled Futures Products 10 Dec 2019 Ankit Singhania
  • Huobi US to Cease Operations After Underwhelming Year 9 Dec 2019 Caileam Raleigh
  • Ripple is All Set to Boost Financial Inclusion Globally 9 Dec 2019 Ankit Singhania
  • Ripple Makes Last-Ditch Attempt to Dismiss Securities Lawsuit 6 Dec 2019 Caileam Raleigh

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 2,212 other followers

ls /categories

AppSec Attacks Bugs Cryptography Cyber Security Education Encryption Entertainment Exploits Hacking Linux Open Source Operating Systems OWASP Penetration Testing Privacy Security Technology Tips Tutorials

ls /comments

Security Stack Sheet… on OWASP Security Shepherd- Sessi…
How To Fully Anonymi… on How To Fully Anonymize Your Sy…
Linux Security Blog… on How To Fully Anonymize Your Sy…
psychocod3r on How To Fully Anonymize Your Sy…
QuBits on How To Fully Anonymize Your Sy…
Linux Security Blog… on How To Fully Anonymize Your Sy…

Linux E-Learning Courses

Hyperledger Fabric Fundamentals (LFD271)

$299 REGISTERS YOU FOR OUR NEWEST SELF PACED COURSE! LFD201 - INTRODUCTION TO OPEN SOURCE DEVELOPMENT, GIT, AND LINUX!

REGISTER TODAY FOR YOUR KUBERNETES FOR DEVELOPERS (LFD259) COURSE AND CKAD CERTIFICATION TODAY! $499!

$199 ENROLLS YOU INTO OUR SELF PACED COURSE - LFS264 - OPNFV FUNDAMENTALS!

ENROLL TODAY IN THE SELF PACED COURSE - LFS263 - ONAP FUNDAMENTALS FOR $199!

$299 WILL ENROLL YOU IN OUR SELF PACED COURSE - LFS205 - ADMINISTERING LINUX ON AZURE!

BUNDLE CLOUD FOUNDRY FOR DEVELOPERS COURSE(LFD232) AND THE CFCD CERTIFICATION FOR $499!

SPEND $199 AND ENROLL IN OUR SELF PACED CONTAINERS FUNDAMENTALS COURSE (LFS253)!

$199 ENROLLS YOU INTO THE CONTAINERS FOR DEVELOPERS AND QUALITY ASSURANCE COURSE (LFS254)!

ENROLL TODAY IN THE DevOps Fundamentals: Implementing Continuous Delivery SELF PACED COURSE! $199

ls -a -v /community

Most Visited

  • Best Darkweb Links
    Best Darkweb Links
  • Payload in PDF
    Payload in PDF
  • Hacking Android With Metasploit
    Hacking Android With Metasploit
  • The Darknet 2019
    The Darknet 2019
  • PenTesting: Gaining Root Privileges on Kioptrix
    PenTesting: Gaining Root Privileges on Kioptrix
  • BlueKeep - Exploit Windows (RDP Vulnerability) Remotely
    BlueKeep - Exploit Windows (RDP Vulnerability) Remotely
  • D@rk Web L1nk$
    D@rk Web L1nk$
  • Cyber Monday Training And Certification Sale!
    Cyber Monday Training And Certification Sale!
  • Exploiting a Buffer Overflow Vulnerability
    Exploiting a Buffer Overflow Vulnerability
  • Create a Backdoor Shell Script in Python
    Create a Backdoor Shell Script in Python

Archives

Follow ls /blog on WordPress.com

We Use Social Media

  • Twitter
  • Reddit
  • Facebook
  • Tumblr
  • Pinterest
  • YouTube
Create a website or blog at WordPress.com
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy