#career… Now Is The Time, Linux is the Direction 11 Nov 201824 Jan 2019 Your future matters to us @ LSB, so get into Linux and see the new world it will open for you. Created by QuBits 2018-11-11
Cryptography… The Hidden Wiki 11 Nov 20185 Mar 2019 If you did not know yet the Hidden Wiki is a list of well known Dark Net Sites that will get you started browsing on the other internet. To access…
Android… Best Ad Blocker Apps For Android 11 Nov 201811 Nov 2018 By Khaled Shariar - LAST UPDATED: August 10, 2018 Want to get rid of annoying ads? Check out the following ad blocker for android to stop seeing ads on Android.…
#career… Linux Foundation Deals For LSB Followers 25 Oct 2018 We are delighted to be able to team up with The Linux Foundation to bring you some great deals on amazing Linux courses and materials. All courses, on completion is…
AppSec… OWASP Security Shepherd- Session Management Challenge One – Solution – LSB 12 Oct 201812 Oct 2018 We have another solution in the OWASP Security Shepherd challenges and we enjoyed completing this one. You can find out about Session Management from OWASP here. So let's get on…
AppSec… OWASP Security Shepherd – Failure To Restrict Access Solution – LSB 27 Sep 201827 May 2019 Am I Vulnerable To 'Failure to Restrict URL Access'? The best way to find out if an application has failed to properly restrict URL access is to verify every page. Consider for…
AppSec… OWASP Security Shepherd – Insecure Cryptographic Storage Challenge 1 Solution – LSB 21 Sep 2018 Thanks for visiting and today we have another OWASP Security Shepherd Solution for you. This time it's the Insecure Cryptographic Storage Challenge. Cryptography is usually the safest way to communicate…
AppSec… OWASP Security Shepherd – SQL Injection Solution – LSB 15 Sep 201819 Sep 2019 A SQL injection attack consists of insertion or "injection" of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data…
AppSec… OWASP Security Shepherd – Insecure Direct Object Reference Solution – LSB 10 Sep 2018 Welcome back to the Security Shepherd solutions from LSB. This was quite an interesting puzzle and it took a few tries to get the key. Insecure Direct Object Reference (called IDOR from here) occurs when…
AppSec… OWASP Security Shepherd – Failure To Restrict Access Solution – LSB 7 Sep 20187 Sep 2018 What is Failure to Restrict URL Access Vulnerability/Threat? Failure to restrict URL access occurs in applications hide functionality from non-privileged users. In an application that fails to restrict URL access, administration…
AppSec… W3af walkthrough and tutorial 9 Aug 20189 Aug 2018 w3af (Web Application audit and attack framework) is a framework for auditing and exploitation of web applications. In this series of articles we will be looking at almost all the…
AppSec… The Best Hacking Books 2018 25 Jul 201825 Jul 2018 BY HACKING TUTORIALS ON FEBRUARY 2, 2018 One of the most popular and most asked questions since I’ve started this blog is if I can recommend some good hacking books to read…
#career… Linux Foundation Courses/Certificates on Offer For Under 500 Bucks | LSB 21 Jun 2018 Introduction to Open Source Development, Git and Linux Learn how to develop open source software. This course focuses on open source software, an introduction to Linux systems and the use…
Cloud Security… 10% Off Linux Programming & Development Training 27 May 2018 Promotion Details 10% Off any Linux Programming & Development Training courses Promo code: MEMORIAL10 Starts: May 28th at 12:00 AM Ends: May 28th at 11:59 PM Linux Memorial Day Sale…
Cyber Security… Build a Beginner Hacking Kit with the Raspberry Pi 3 Model B+ 23 Apr 20186 Feb 2020 The Raspberry Pi is a perfect way to start. In 2018, the Raspberry Pi 3 Model B+ was released featuring a better CPU, Wi-Fi, Bluetooth, and Ethernet built in. Our recommended Kali Pi kit…
#Metasploit… Metasploit | (Msfvenom) 24 Mar 20189 Nov 2019 Eluding and evading antivirus software and intrusion detection systems is one of the most critical tasks of the hacker.As soon as a new exploit is developed and discovered, the AV and IDS…
Cryptography… Metal (MTL) | Shaping Digital Money 6 Mar 20186 Mar 2018 Transfer money instantly around the globe with nothing more than a phone number. Earn rewards every time you spend or make a purchase. METAL ROCKS The Digital Wallet Earn rewards…
#career… Enterprise IT & Linux System Administration Training 2 Feb 20186 Feb 2018 Introduction to Linux Linux powers 94% of the world’s supercomputers, most of the servers powering the Internet, the majority of financial trades worldwide and a billion Android devices. In short,…
Crypto Currency… Etherium | Crypto Royalty 30 Jan 20182 Feb 2018 Build unstoppable applications Ethereum is a decentralized platform that runs smart contracts: applications that run exactly as programmed without any possibility of downtime, censorship, fraud or third-party interference. These apps run…
Crypto Currency… DasCoin | Taking Cryptocurrency Mainstream 30 Jan 201830 Jan 2018 The Hybrid Solution And Why It’s Better The latest coin in the crypto currency world coming from Ireland. It's doing quite well and looks to be getting stronger. DasCoin combines…
#career… Eryllium (ERY) 22 Jan 201822 Jan 2018 Welcome back fellow crypto traders, we have an exciting coin to introduce to you today. If you'd like to get into crypto trading go visit our earlier post about getting…
Crypto Currency… QubitCoin (Q2C) 13 Jan 201814 Jan 2018 Welcome back fellow crypto traders. Todays flavour of the day is Q2C, for around 1.2 cent a pop. Qubitcoin was started on Jan 12 2014 as an CPU and GPU…
Crypto Currency… Will 2018 be the rise of the AltCoin? 11 Jan 201813 Jan 2018 There's lots of chatter on crypto chat forums about this year being the year of the AltCoin (short for alternative coins). These are basically the small fries in the crypto…
Data Mining… How To Get Started In Trading Crypto Currency 4 Jan 20184 Jan 2018 As my readers probably know crypto currency is taking over the World. Even banks are getting in on it now. I'd like to share some decent advice to my followers…
Crypto Currency… Litecoin (LTC) making a killing 13 Dec 201713 Dec 2017 If you invested in Litecoin a few weeks ago, you would now have a profit of 1600%. So your initial investment of €20 would now be around $320 for each coin…
Cryptography… GPG on Linux 9 Dec 2017 1 Introduction Encryption is the process of encoding messages or information in such a way that only authorized parties can read them. With almost no privacy in this digital generation…
Distros… Light Ubuntu | LSB 4 Dec 201724 Dec 2017 lubuntu 17.10 Artful Aardvark released. What is Lubuntu? Lubuntu is an Ubuntu flavor using LXDE. The project’s goal is to provide a lightweight yet functional distribution. Lubuntu specifically targets older machines with lower…
Cloud Security… Create Your Own VPN with AWS 24 Nov 201723 May 2019 Internet users are spoiled for choice when it comes to VPN services, but they either require a monthly subscription, aren’t secure, or are just plain slow. Thankfully, alternatives do exist.…
AppSec… OWASP – A2 – Broken Authentication and Session Management – LSB 24 Nov 201729 Jun 2018 Threat Agents Consider anonymous external attackers, as well as users with their own accounts, who may attempt to steal accounts from others. Also consider insiders wanting to disguise their actions.…
Cyber Security… OWASP A1 – Injection, Cause and Prevention 23 Nov 20175 May 2019 Am I Vulnerable To 'Injection'? The best way to find out if an application is vulnerable to injection is to verify that all use of interpreters clearly separates untrusted data…
#career… Black Friday Deals – LSB 22 Nov 201729 Nov 2017 Because we are such good people here at LSB, we like to treat our followers to some fantastic deals that we are offered. So we present them to you. The Linux…
Crypto Currency… Let’s Untangle Blockchain 12 Nov 201726 Apr 2019 In a not too distant future, everything from our banking, supply chains, law, accountancy, communications services – and even governments – will have been redefined. Dramatically more egalitarian means of…
AppSec… Security Shepherd Solutions 20 Aug 201715 Oct 2018 The OWASP Security Shepherd project is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic.…
Cloud Security… Forget VPN’s for private browsing, get involved with TOR 3 Apr 20174 Apr 2017 Recently President Trump reversed a privacy law that was introduced in the last administration, that prevented Internet Service Providers (ISP's) from selling your data to advertisers. When I say your…
Open Source… The Best Free Alternatives to Paid Software 5 Mar 20175 Mar 2017 Say goodbye to Photoshop and Microsoft Office. From productivity to entertainment and beyond – we’ve rounded up the best free software. Pixlr – Fully functional alternative to Adobe Photoshop. (Web, Windows,…
Android… Resources for Rooting your Android Device 11 May 201625 Jun 2020 As Android matures, the wide-open style of root access we may have grown used to with legacy versions has gone away. Because Android is designed for mobile devices, the focus…
Cryptography… Setup a VPN On Kali Linux For Anonymity 16 Mar 201628 Nov 2019 Virtual Private Networks (vpn) create an encrypted ‘tunnel’ between your computer and the host server, with the internet traffic going in and out of the host server. Your ISP or…
AppSec… Pen Testing Web Browsers With BeEF 14 Mar 201628 Nov 2019 BeEF was developed by a group of developers led by Wade Alcorn. Built on the familiar Ruby on Rails platform, BeEF was developed to explore the vulnerabilities in browsers and…
#career… SQLMap – Testing With SQL Injection 12 Mar 20168 Oct 2021 Sqlmap is included in pen testing linux distros like kali linux, backtrack, backbox etc. On other distros it can be simply downloaded from the following url: http://sqlmap.org/. Since its written…
#Metasploit… Metasploit for the Aspiring Ethical Hacker, Part 1 1 Mar 201614 May 2019 Metasploit was developed by HD Moore as an open source project in 2003. Originally written in Perl, Metasploit was completely rewritten in Ruby in 2007. In 2009, it was purchased…
Cyber Security… Turning Firefox Into a Pen Testing Tool 15 Feb 201618 Mar 2019 In this brief post, we are listing a few popular and interesting Firefox add-ons that are useful for penetration testers. These add-ons vary from information gathering tools to attacking tools.…
Android Security… Keeping Your Android Device Secure 5 Feb 201625 Aug 2019 Most people these days carry a mobile phone or tablet on their person. Some people even have two, maybe an extra device for work. Globally there are an estimated 6…
You must be logged in to post a comment.