Skip to content

Linux Security Blog

How Hackers Work

Search
  • Home
  • Shep Tutorials
    • Set Up Security Shepherd On VMWare
    • Failure To Restrict Access – Solution
    • Insecure DOR – Solution
    • Poor Data Validation – Solution
    • Security Misconfiguration – Solution
    • Insecure Direct Object Reference 2 Solution
    • Cross Site Scripting One Solution
    • SQL Injection Solution
    • OWASP Security Shepherd – Failure To Restrict Access Solution
    • Session Management Challenge One – Solution
  • GNS3 Series
    • Install GNS3 2.2 on Windows10 | Download Link Included
    • Import VirtualBox Images to GNS3
  • Python Series
    • Part I
    • Part II
  • About

Category: Privacy

#career…

Configuring Your IAM Securely on AWS

20 Dec 201924 Jul 2020
To help secure your AWS resources, follow these recommendations for the AWS Identity and Access Management (IAM) service. Lock Away Your AWS Account Root User Access Keys You use an…
Cyber Security…

How To Fully Anonymize Your IP

20 Nov 201924 Jul 2020
As a security professional, sometimes you will want to anonymize your web traffic so as not to set alarms off. Today we will be looking at TOR and a tool…
AppSec…

Securing Your Crypto Wallet

22 Aug 201924 Jul 2020
by Areeb Soo Yasir · Published · 2019-08-22 Why the world misses out on basic user-based security and isolation. When it came time to create my CryptocurrencyOS, based on Linux…
AppSec…

ProxyChains For Anonymity

29 May 201924 Jul 2020
Introduction Proxychains is an incredibly useful tool that is incredibly poorly documented. In this tutorial, we will cover using proxychains and SSH to connect to a multihomed device (like a…
Cryptography…

The Darknet 2019

7 Apr 201924 Jul 2020
Do you want to access the update about deep web links or, the hidden wiki, Deep web sites, Dark web Search, The Dark Web Links, tor onion links, tor hidden wiki links, deep web sites…
Android Security…

It’s Time To take back Our Internet

20 Jan 201920 Jan 2019
Tim Berners Lee was recently awarded the Turing Award (The ACM A.M. Turing Award is an annual prize given by the Association for Computing Machinery (ACM) to "an individual selected…
Crypto Currency…

Banks Must Embrace Crypto or “Bite the Dust”

16 Nov 2018
With all the constant news about the price of Bitcoin, it’s possible to forget what it was invented for. Cryptocurrency trading plays only a small role in what Bitcoin and…
#career…

Now Is The Time, Linux is the Direction

11 Nov 201824 Jan 2019
Your future matters to us @ LSB, so get into Linux and see the new world it will open for you. Created by QuBits 2018-11-11
Cryptography…

The Hidden Wiki

11 Nov 20185 Mar 2019
If you did not know yet the Hidden Wiki is a list of well known Dark Net Sites that will get you started browsing on the other internet. To access…
Android…

Best Ad Blocker Apps For Android

11 Nov 201811 Nov 2018
By Khaled Shariar  - LAST UPDATED: August 10, 2018 Want to get rid of annoying ads? Check out the following ad blocker for android to stop seeing ads on Android.…
Android Security…

How To Find And Delete Where Google Knows You’ve Been

14 Aug 201814 Aug 2018
Even if “Location History” is off on your phone, Google often still stores your precise location Here are some things you can do to delete those markers and keep your location…
AppSec…

Spamming Facebook Messages

3 Jan 201811 Apr 2018
We have reported this bug to Facebook and they replied asking "How is this different than hitting the message button?" If you want to spam everyone in the World that…
Cryptography…

GPG on Linux

9 Dec 2017
1 Introduction Encryption is the process of encoding messages or information in such a way that only authorized parties can read them. With almost no privacy in this digital generation…
AppSec…

A Guide to Not Getting Hacked

20 Nov 20175 Mar 2019
Hackers steal hundreds of millions of passwords in one swoop and occasionally cause large-scale blackouts. The future is probably not going to get better, with real-life disasters caused by internet-connected knick-knacks, smart home robots that could kill…
Dorking…

Google Dorking

16 Nov 201720 Nov 2017
As you all know Google is the most popular search engine in the world. Google serves almost 80% of the search queries on the internet. It itself a big achievement. By doing power…
Dark Net…

How Elliot & Fsociety Made Their Hack of Evil Corp Untraceable

17 Aug 201717 Aug 2017
Welcome back, my tenderfoot hackers! Well, the first season of Mr. Robot just ended and Elliot and fsociety successfully took down Evil Corp! They have effectively destroyed over 70% of the world's…
Legal…

Aaron Swartz and MIT: The inside story

29 Jul 201729 Jul 2017
The mysterious visitor called himself Gary Host at first, then Grace Host, which he shortened for his made-up e-mail address to “ghost,” a joke apparently, perhaps signaling mischievousness — or…
Attacks…

How Shipping Giant Maersk Dealt With a Malware Meltdown, And Other Security News This Week

3 Jul 20173 Jul 2017
WHEN A PIECE of unprecedented malicious software rampages through thousands of critical networks around the world, it tends to get our full attention. And this week's digital plague, known as…
Cyber Security…

SSH Tunneling

9 May 201710 Mar 2020
Recently I wanted to set up a remote desktop sharing session from home pc to my laptop. While going through the set up guide I came across ssh tunneling. Even…
Cloud Security…

Forget VPN’s for private browsing, get involved with TOR

3 Apr 20174 Apr 2017
Recently President Trump reversed a privacy law that was introduced in the last administration, that prevented Internet Service Providers (ISP's) from selling your data to advertisers. When I say your…
Privacy…

Facebook manifesto redacted to omit plans for AI to monitor private messages

19 Feb 201719 Feb 2017
An earlier version of Mark Zuckerberg's 6,000-word manifesto for Facebook revealed his belief that artificial intelligence could one day be used to monitor private messages for terrorists scheming an attack.…
Privacy

Upgrade your SSH keys!

24 Sep 201624 Sep 2016
Whether you're a software developer or a sysadmin, I bet you're using SSH keys. Pushing your commits to Github or managing your Unix systems, it's best practice to do this…
Privacy…

A new Tor that can resist next-generation state surveillance

1 Sep 20161 Sep 2016
Tor is an imperfect privacy platform. Ars meets the researchers trying to replace it. J.M. Porup - 31/8/2016, 07:25 Since Edward Snowden stepped into the limelight from a hotel room in Hong…
Cyber Security…

Schneier has joined the Tor project

15 Jul 201616 Jul 2016
It's with great satisfaction that I bring you the news that security expert Bruce Schneier has joined the Tor project as a director. Schneier has just confirmed it on his…
Privacy

App Tracks Where Governments Hack Activists and Reporters

28 May 201628 May 2016
  IN AN AGE when spies carefully hide their tracks through layers of obfuscation and proxy servers, locating the perpetrators of online surveillance is often nearly impossible. But the victims…
Privacy

Keep Identity Anonymous Using Tor and VPN

19 Apr 201619 Apr 2016
ANONABOX DEVICES BLEND TOR AND VPN TOGETHER TO PROVIDE USERS WITH UTMOST ANONYMITY ON THE INTERNET Anonabox, a hardware company focused on providing internet security and privacy for users has announced…
Privacy

An NSA-Proof Twitter, Built With Code From Bitcoin and BitTorrent

13 Apr 201613 Apr 2016
When mass political protests erupted throughout Brazil in June, Miguel Freitas did what countless others did: He followed the news on Twitter. Tweets revealed information he couldn’t get anywhere else,…
Privacy

Who’s tracking your location? Just about everybody

8 Apr 20168 Apr 2016
That pricey device in your pocket knows exactly where you are. And it’s sharing your location with more people than you realize. Your smartphone is equipped with antennas that send…
Cyber Security…

Tor Project says it can catch spying code

29 Mar 201629 Mar 2016
The Tor Project is fortifying its software so that it can quickly detect if its network is tampered with for surveillance purposes, a top developer for the volunteer project wrote…
Cryptography…

Setup a VPN On Kali Linux For Anonymity

16 Mar 201628 Nov 2019
Virtual Private Networks (vpn) create an encrypted ‘tunnel’ between your computer and the host server, with the internet traffic going in and out of the host server. Your ISP or…
Cyber Security…

Contribute to privacy: Configure a TOR relay

9 Mar 20169 Mar 2016
The Tor network relies on volunteers to donate bandwidth. The more people who run relays, the faster the Tor network will be. If you have at least 2 megabits/s for…
Privacy

How Mobile Ads Leak Personal Data

23 Feb 201623 Feb 2016
The personal information of millions of smartphone users is at risk due to in-app advertising that can leak potentially sensitive user information between ad networks and mobile app developers, according…
Privacy

Google Has Gathered Info On You. Here’s How To Delete It!

9 Feb 20169 Feb 2016
In the past there was the Roman Empire, the Ottoman Empire and the Persian Empire. Over here in 2015 we have the Google empire. No seriously, think about it! Google…
Privacy

Comodo’s so-called ‘Secure Internet Browser’ Comes with Disabled Security Features

3 Feb 20163 Feb 2016
Beware Comodo Users! First of all, make sure whether your default browser had been changed to "Chromodo" -- a free browser offered by Comodo Antivirus. If your head node is…
Privacy

Privacy rejoice: Facebook’s Android app now supports Tor

20 Jan 201622 Feb 2017
Facebook has added the option to route traffic from its Android mobile app over the Tor anonymity network. This will come as good news for privacy-conscious users or those living…
Cryptography…

Moves to rein in ‘dark’ networks

7 Dec 201522 Feb 2017
A key House lawmaker is pushing a new initiative to deal with the proliferation of encrypted technologies that critics say allow terrorists to communicate without detection. The effort from House…
Dark Net…

Tor Project appeals for help to continue

25 Nov 201522 Feb 2017
The Tor anonymous browsing project has asked for donations to improve the network and invest in educational projects. The Tor Project is a non-profit scheme which runs Tor. Otherwise known…
Privacy

Beware of ads that use inaudible sound to link your phone, TV, tablet, and PC 

19 Nov 201522 Feb 2017
Privacy advocates are warning federal authorities of a new threat that uses inaudible, high-frequency sounds to surreptitiously track a person's online behavior across a range of devices, including phones, TVs,…
Privacy…

Tor launches anti-censorship Messenger service

2 Nov 20152 Nov 2015
A new chat tool has been launched in an effort to improve the security of online messaging. Tor Messenger allows users to chat over the Tor (The Onion Router) network…
Privacy

CISA data-sharing bill passes, a sad day for privacy on the internet.

29 Oct 2015
A controversial draft law, which one senator called a "surveillance bill by another name," has passed the Senate. CISA, the Cybersecurity Information Sharing Act (S. 754), will allow private companies…
Encryption…

How the NSA can break trillions of encrypted Web and VPN connections

17 Oct 201517 Oct 2015
For years, privacy advocates have pushed developers of websites, virtual private network apps, and other cryptographic software to adopt the Diffie-Hellman cryptographic key exchange as a defense against surveillance from…
Privacy

Landmark EU ruling says US privacy protections are inadequate

6 Oct 2015
Europe's highest court today ruled that Facebook cannot send personal information on European users to data centers in the US, invalidating a 15-year trans-Atlantic data transfer agreement. In a decision that…

Posts navigation

Older posts

RSS ls -a /Zer0Days

  • [remote] SmartRG Router SR510n 2.6.13 - Remote Code Execution 11 Nov 2022
  • [webapps] CVAT 2.0 - Server Side Request Forgery 11 Nov 2022
  • [local] IOTransfer V4 - Unquoted Service Path 11 Nov 2022
  • [remote] AVEVA InTouch Access Anywhere Secure Gateway 2020 R2 - Path Traversal 11 Nov 2022
  • [remote] MSNSwitch Firmware MNT.2408 - Remote Code Execution 11 Nov 2022

Follow Us

  • Twitter
  • Facebook
  • Tumblr
  • Reddit

RSS Crypto News

  • An error has occurred; the feed is probably down. Try again later.

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,438 other subscribers

ls /categories

AppSec Attacks Bugs Cryptography Cyber Security Education Encryption Entertainment Exploits Hacking Linux Open Source Operating Systems OWASP Penetration Testing Privacy Security Technology Tips Tutorials

ls /comments

Foster Eli on Best Darkweb Links
crypstalk21 on Securing Your Crypto Wallet
kioptrix vm on PenTesting: Gaining Root Privi…
Johnny Dickman (@Dar… on The Darknet 2019
XXS Attack – P… on Payload in PDF
Fred (@Fred37063593) on The Hidden Wiki

ls -a -v /community

ls /MostVisited

  • Best Darkweb Links
    Best Darkweb Links
  • Payload in PDF
    Payload in PDF
  • Write a Ping Sweeper in 4 Lines of Bash
    Write a Ping Sweeper in 4 Lines of Bash
  • Crack WPA Handshake using Aircrack with Kali Linux
    Crack WPA Handshake using Aircrack with Kali Linux
  • Find Vulnerable Devices On The Internet With Shodan
    Find Vulnerable Devices On The Internet With Shodan
  • Windows Takeover with a PDF File
    Windows Takeover with a PDF File
  • How to create an I2P Darknet site
    How to create an I2P Darknet site
  • Heartbleed Discovery and Exploit
    Heartbleed Discovery and Exploit
  • How To Use Netcat to Establish and Test TCP and UDP Connections
    How To Use Netcat to Establish and Test TCP and UDP Connections
  • BlueKeep - Exploit Windows (RDP Vulnerability) Remotely
    BlueKeep - Exploit Windows (RDP Vulnerability) Remotely

ls /Archives

Follow Linux Security Blog on WordPress.com

We Use Social Media

  • Twitter
  • Reddit
  • Facebook
  • Tumblr
  • Pinterest
  • YouTube
Create a website or blog at WordPress.com
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
  • Follow Following
    • Linux Security Blog
    • Join 269 other followers
    • Already have a WordPress.com account? Log in now.
    • Linux Security Blog
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...
 

You must be logged in to post a comment.