Education… How to Easily Find Anyone on the Internet 26 Jul 202026 Jul 2020 I just put a short video together to demonstrate the installation of Serlock and what it can do. Qubits 2020-07-26
#career… Top Linux Interview Questions 10 Jul 202024 Jul 2020 So you want to ace that interview for a Linux position in a company and want to know what would be the interview questions you really need to know? Let's…
Attacks… Exploiting F5 Big IP Vulnerability | CVE-2020-5902 8 Jul 202024 Jul 2020 CVE-2020-5902 is a critical remote code execution vulnerability in the configuration interface (aka Traffic Management User Interface – TMUI) of BIG-IP devices used by some of the world’s biggest companies.…
Development… Install Lightweight Ubuntu and Apache Web Server on Windows10 29 Jun 202024 Jul 2020 So some of you may have heard that WSL2 (Windows Subsystem for Linux) was released last year, so in this post we will install it and run an Apache server…
#Metasploit… Windows Takeover with a PDF File 18 Jun 202024 Jul 2020 There are multiple ways to exploit and take over a Windows machine, today we will look at doing this with a PDF file containing a virus. For this you will…
#career… Python Scripting for the Ethical Hacker Part II 9 Jun 202018 Jun 2020 Welcome back to LSB my fellow ethical hackers, this is the second part to our Python scripting tutorial. Today we will be installing PyCharm and creating our first Python script.…
#Metasploit… Heartbleed Discovery and Exploit 1 Feb 202018 Jun 2020 Heartbleed is a security bug in the OpenSSL cryptography library, which is a widely used implementation of the Transport Layer Security protocol. It was introduced into the software in 2012…
#career… Configuring Your IAM Securely on AWS 20 Dec 201924 Jul 2020 To help secure your AWS resources, follow these recommendations for the AWS Identity and Access Management (IAM) service. Lock Away Your AWS Account Root User Access Keys You use an…
#Metasploit… Gaining Access to Windows10 Through VLC Exploit 14 Nov 201924 Jul 2020 VLC is a free and open source cross-platform multimedia player and framework that plays most multimedia files as well as DVDs, Audio CDs, VCDs, and various streaming protocols. Today we…
AppSec… Import VirtualBox Images to GNS3 1 Nov 201924 Jul 2020 This is the second post of our GNS3 tutorials, today we will look at how to import a VirtualBox image into GNS3. If you haven't installed GNS3 yet or downloaded…
#career… Install GNS3 2.2 on Windows10 | Download Link Included 31 Oct 201924 Jul 2020 GNS3 is a Graphical Network Simulator that allows emulation of complex networks. GNS3 allows the same type of emulation using Cisco Internetwork Operating Systems. It allows you to run a…
Attacks… Crack WPA Handshake using Aircrack with Kali Linux 29 Oct 201924 Jul 2020 Today's tutorial will be looking into how you can crack the password of the 4 way handshake of someone that is re-authenticating themselves to a wireless router. The goal is…
AppSec… XML External Entity (XXE) Vulnerability 14 Oct 20199 Mar 2020 According to OWASP, an XML External Entity attack is a type of attack against an application that parses XML input. This attack occurs when XML input containing a reference to…
#Metasploit… BlueKeep – Exploit Windows (RDP Vulnerability) Remotely 10 Oct 201924 Jul 2020 Remote desktop protocol (RDP) is a secure network communications protocol designed for remote management, as well as for remote access to virtual desktops, applications and an RDP terminal server. RDP…
Attacks… Reverse Engineering Router Firmware 3 Oct 201924 Jul 2020 Reverse engineering, also called back engineering, is the process by which a man-made object is deconstructed to reveal its designs, architecture, or to extract knowledge from the object; similar to…
#career… Hacking Android With Metasploit 4 Sep 201924 Jul 2020 Good morning/evening/night my fellow hackers, today's lesson is on Metasploit and how we can hack Android with a Metasploit payload. So let's get started!! As always, this post is for…
Cyber Security… Managing the Linux /tmp Directory Expertly 30 Jul 201924 Jul 2020 Posted July 30, 2019 | by Ken Hess (Red Hat) The /tmp directory is a temporary landing place for files. Users also have write access to this directory, which can…
AppSec… Set Up A Penetration Testing Lab Easily With Vagrant 30 May 201924 Jul 2020 Today we will be looking at a neat little command line tool called Vagrant. This tool allows us to deploy virtual machines seamlessly and we are going to show you…
Cyber Security… Handy Bash one-liners 22 May 201924 Jul 2020 Terminal Tricks Using Ctrl keys Ctrl + n : same as Down arrow. Ctrl + p : same as Up arrow. Ctrl + r : begins a backward search through…
AppSec… Enabling Monitor Mode & Packet Injection on the Raspberry Pi 20 May 201924 Jul 2020 By Kodyhttps://null-byte.wonderhowto.com/how-to/enable-monitor-mode-packet-injection-raspberry-pi-0189378/The Raspberry Pi Zero W and Pi 3 Model B+ include integrated Wi-Fi, Bluetooth Low Energy, and more than enough power to run Kali Linux. They sound like perfect…
#career… OWASP A2: Broken Authentication and Session Management Cause and Prevention 12 May 201924 Jul 2020 Threat Agents Attack Vectors Security Weakness Technical Impacts Business Impacts Application Specific Exploitability AVERAGE Prevalence WIDESPREAD Detectability AVERAGE Impact SEVERE Application / Business Specific Consider anonymous external attackers, as well…
AppSec… New Exploits for Insecure SAP Systems 6 May 201924 Jul 2020 Summary The Cybersecurity and Infrastructure Security Agency (CISA) is issuing this activity alert in response to recently disclosed exploits that target insecure configurations of SAP components. Technical Details A presentation…
#career… Best Linux Distros for Ethical Hacking and Penetration Testing 1 May 201924 Jul 2020 Here is a list of some top Linux distro for ethical hacking and penetration testing that will surely help you to pick one that best fits your need. Kali Linux:…
#career… Create An SQL Backdoor 7 Apr 20197 Apr 2019 SQL Malware affects a variety of database-driven applications, including but not limited to web applications, services, and desktop applications. This breed of malware is made possible by the SQL functionality for triggers and stored sub-procedures. Notice: SQL malware persists beyond deletion of rows…
#Metasploit… NetBIOS Auxiliary Modules 26 Mar 201924 Jul 2020 Full article: https://www.offensive-security.com/metasploit-unleashed/scanner-netbios-auxiliary-modules/ nbname The nbname auxiliary module scans a range of hosts and determines their hostnames via NetBIOS. msf > use auxiliary/scanner/netbios/nbname msf auxiliary(nbname) > show options Module options (auxiliary/scanner/netbios/nbname): Name…
AppSec… SMB Exploited 14 Mar 201924 Jul 2020 Server Message Block (SMB) is the transport protocol used by Windows machines for a wide variety of purposes such as file sharing, printer sharing, and access to remote Windows services.…
AppSec… Exploiting XXE Vulnerabilities 5 Mar 201924 Jul 2020 By Chris Davis XXE (XML External Entity) attacks happen when an XML parser improperly processes input from a user that contains an external entity declaration in the doctype of an…
AppSec… CSRF Code Examples and Defense 3 Mar 201924 Jul 2020 CSRF is an attack that tricks the victim into submitting a malicious request. It inherits the identity and privileges of the victim to perform an undesired function on the victim's…
#career… Web Application Security 21 Feb 201924 Jul 2020 WHAT IS WEB APPLICATION SECURITY Web application security is the process of protecting websites and online services against different security threats that exploit vulnerabilities in an application’s code. Common targets…
#career… Intro to Git and GitHub for Linux 7 Jan 20197 Jan 2019 The Git distributed revision control system is a sweet step up from Subversion, CVS, Mercurial, and all those others we've tried and made do with. It's great for distributed development,…
#career… We Have Linux Foundation Deals for you 23 Dec 201814 May 2020 As usual we have amazing new deals on Linux Foundation certificates and courses. Sign on and use your own pace to finish the course. Prometheus is the latast deal!! Updated…
AppSec… Create a Backdoor with Cryptcat 23 Dec 2018 In this tutorial, I'll introduce you to netcat's popular cousin, cryptcat (she's actually much cuter and more exotic than the plain netcat). Cryptcat enables us to communicate between two systems and encrypts…
Cyber Security… Router Hardening Checklist 9 Dec 20189 Dec 2018 Network infrastructure devices (routers, switches, load balancers, firewalls etc) are among the assets of an enterprise that play an important role in security and thus need to be protected and…
#career… Cyber Monday Sale Starts NOW!(FOR A WEEK!!) 26 Nov 201830 Nov 2018 Yikes, yes, we are rolling out Cyber Monday deals for a week. This will hopefully make up for the lack of Black Friday deals, but maybe Black Friday has died.…
AppSec… SQL Injection Attacks 20 Nov 2018 A customer asked that we check out his intranet site, which was used by the company's employees and customers. This was part of a larger security review, and though we'd…
AppSec… IPtables – the Linux Firewall 13 Nov 201813 Nov 2018 KORBIN BROWN FEBRUARY 6, 2014, 12:34PM EDT Iptables is an extremely flexible firewall utility built for Linux operating systems. Whether you’re a novice Linux geek or a system administrator, there’s…
#Metasploit… Payload in PDF 12 Nov 2018 Infected PDFs have always been a privileged way to infect users because this document format is very common and used by almost everyone. Moreover, it exists many ways to exploit Acrobat Reader…
#career… Now Is The Time, Linux is the Direction 11 Nov 201824 Jan 2019 Your future matters to us @ LSB, so get into Linux and see the new world it will open for you. Created by QuBits 2018-11-11
Android… Best Ad Blocker Apps For Android 11 Nov 201811 Nov 2018 By Khaled Shariar - LAST UPDATED: August 10, 2018 Want to get rid of annoying ads? Check out the following ad blocker for android to stop seeing ads on Android.…
#career… Linux Foundation Deals For LSB Followers 25 Oct 2018 We are delighted to be able to team up with The Linux Foundation to bring you some great deals on amazing Linux courses and materials. All courses, on completion is…
AppSec… OWASP Security Shepherd- Session Management Challenge One – Solution – LSB 12 Oct 201812 Oct 2018 We have another solution in the OWASP Security Shepherd challenges and we enjoyed completing this one. You can find out about Session Management from OWASP here. So let's get on…
You must be logged in to post a comment.