Skip to content

ls /blog

Linux Security Blog

Search
  • Home
  • Shep Tutorials
    • Set Up Security Shepherd On VMWare
    • Failure To Restrict Access – Solution
    • Insecure DOR – Solution
    • Poor Data Validation – Solution
    • Security Misconfiguration – Solution
    • Insecure Direct Object Reference 2 Solution
    • Cross Site Scripting One Solution
    • SQL Injection Solution
    • OWASP Security Shepherd – Failure To Restrict Access Solution
    • Session Management Challenge One – Solution
  • Linux Courses
    • Hyperledger Fundamentals
    • LFD201 – INTRODUCTION TO OPEN SOURCE DEVELOPMENT, GIT, AND LINUX!
    • KUBERNETES FOR DEVELOPERS (LFD259) COURSE AND CKAD CERTIFICATION
    • OUR SELF PACED COURSE – LFS264 – OPNFV FUNDAMENTALS!
    • THE SELF PACED COURSE – LFS263 – ONAP FUNDAMENTALS
    • Get a FREE Dell Chromebook 11 with qualifying Linux Foundation instructor-led course purchase!
  • GNS3 Series
    • Install GNS3 2.2 on Windows10 | Download Link Included
    • Import VirtualBox Images to GNS3
  • About

Category: Security

AppSec…

Exploiting a Buffer Overflow Vulnerability

9 Dec 201915 Dec 2019
Buffer overflow flaws can be present in both the web server and application server products that serve the static and dynamic portions of a site, or in the web application…
#career…

PenTesting: Gaining Root Privileges on Kioptrix

6 Dec 20196 Dec 2019
Kioptrix is a Capture The Flag style VulnHub VM and the aim of the game is to gain root privileges. We will be using Kali Linux in this post so…
#Metasploit…

Write an IMAP Fuzzing Tool

3 Dec 20193 Dec 2019
Picture this scenario. During a host reconnaissance session we discovered an IMAP Mail server which is known to be vulnerable to a buffer overflow attack (Surgemail 3.8k4-4). We found an…
Cyber Security…

How To Fully Anonymize Your System

20 Nov 201920 Nov 2019
As a security professional, sometimes you will want to anonymize your web traffic so as not to set alarms off. Today we will be looking at TOR and a tool…
#Metasploit…

Gaining Access to Windows10 Through VLC Exploit

14 Nov 201920 Nov 2019
VLC is a free and open source cross-platform multimedia player and framework that plays most multimedia files as well as DVDs, Audio CDs, VCDs, and various streaming protocols. Today we…
#career…

Install GNS3 2.2 on Windows10 | Download Link Included

31 Oct 20199 Dec 2019
GNS3 is a Graphical Network Simulator that allows emulation of complex networks. GNS3 allows the same type of emulation using Cisco Internetwork Operating Systems. It allows you to run a…
Attacks…

Crack WPA Handshake using Aircrack with Kali Linux

29 Oct 201930 Oct 2019
Today's tutorial will be looking into how you can crack the password of the 4 way handshake of someone that is re-authenticating themselves to a wireless router. The goal is…
AppSec…

XML External Entity (XXE) Vulnerability

14 Oct 201927 Oct 2019
According to OWASP, an XML External Entity attack is a type of attack against an application that parses XML input. This attack occurs when XML input containing a reference to…
#Metasploit…

BlueKeep – Exploit Windows (RDP Vulnerability) Remotely

10 Oct 201910 Oct 2019
Remote desktop protocol (RDP) is a secure network communications protocol designed for remote management, as well as for remote access to virtual desktops, applications and an RDP terminal server. RDP…
Attacks…

Reverse Engineering Router Firmware

3 Oct 201911 Oct 2019
Reverse engineering, also called back engineering, is the process by which a man-made object is deconstructed to reveal its designs, architecture, or to extract knowledge from the object; similar to…
Attacks…

Create a Backdoor Shell Script in Python

28 Sep 201926 Nov 2019
So we've delved into Python before, but this post should be a bit more interesting. What we will do today is write a backdoor in Python and if you manage…
#Metasploit…

Exploiting Routers With Routersploit

26 Sep 20195 Oct 2019
If you have Wi-Fi at home, then you have a router, this is how you get your internet access. Today we will be looking a piece of software that allows…
Attacks…

Find Vulnerable Devices On The Internet With Shodan

9 Sep 201923 Sep 2019
Welcome back to LSB and thanks for reading. Today we will be looking at how to search for vulnerable devices around the world using Shodan. Shodan is an index of…
#career…

Set up some Honeypots and a Threat Map

2 Sep 201917 Sep 2019
Welcome back my fellow ethical hackers. Remember, the contents in this post is for educational purposes and should only be used for ethical reasons, so with that caveat, let's get…
AppSec…

Securing Your Crypto Wallet

22 Aug 201917 Nov 2019
by Areeb Soo Yasir · Published · 2019-08-22 Why the world misses out on basic user-based security and isolation. When it came time to create my CryptocurrencyOS, based on Linux…
#career…

SysAdmin Day Sales – The Linux Foundation

16 Jul 201916 Jul 2019
To celebrate Sysadmin Day, starting July 16th we’re offering all our IT certification and prep course bundles for only $325 each! We’ll also throw in a bonus course, regularly priced…
#career…

June Deals: 70% Off Linux Foundation Bundles

16 Jun 201916 Jun 2019
For a limited time, get in-depth training in the open source technologies that matter most with one of our career training bundles - only $349 each - for a 70%…
AppSec…

Set Up A Penetration Testing Lab Easily With Vagrant

30 May 201915 Nov 2019
Today we will be looking at a neat little command line tool called Vagrant. This tool allows us to deploy virtual machines seamlessly and we are going to show you…
AppSec…

ProxyChains For Anonymity

29 May 201926 Nov 2019
Introduction Proxychains is an incredibly useful tool that is incredibly poorly documented. In this tutorial, we will cover using proxychains and SSH to connect to a multihomed device (like a…
AppSec…

Enabling Monitor Mode & Packet Injection on the Raspberry Pi

20 May 201920 May 2019
By Kodyhttps://null-byte.wonderhowto.com/how-to/enable-monitor-mode-packet-injection-raspberry-pi-0189378/The Raspberry Pi Zero W and Pi 3 Model B+ include integrated Wi-Fi, Bluetooth Low Energy, and more than enough power to run Kali Linux. They sound like perfect…
#career…

OWASP A2: Broken Authentication and Session Management Cause and Prevention

12 May 201912 May 2019
Threat Agents Attack Vectors Security Weakness Technical Impacts Business Impacts Application Specific Exploitability AVERAGE Prevalence WIDESPREAD Detectability AVERAGE Impact SEVERE Application / Business Specific Consider anonymous external attackers, as well…
AppSec…

New Exploits for Insecure SAP Systems

6 May 201918 May 2019
Summary The Cybersecurity and Infrastructure Security Agency (CISA) is issuing this activity alert in response to recently disclosed exploits that target insecure configurations of SAP components. REGISTER TODAY FOR YOUR…
#career…

Best Linux Distros for Ethical Hacking and Penetration Testing

1 May 20191 May 2019
Here is a list of some top Linux distro for ethical hacking and penetration testing that will surely help you to pick one that best fits your need. Kali Linux:…
#career…

Malware Analysis With Valkyrie

22 Apr 201914 Oct 2019
Valkyrie is a malware analysis tool that's free for you for a year to try out. You can visit https://valkyrie.comodo.com to sign up. Once you sign up you will presented…
AppSec…

Adblock Plus filter lists may execute arbitrary code

15 Apr 201915 Apr 2019
A new version of Adblock Plus was released on July 17, 2018. Version 3.2 introduced a new filter option for rewriting requests. A day later AdBlock followed suit and released…
AppSec…

Emotet The Banking Trojan

11 Apr 2019
Emotet is a kind of malware originally designed as a banking Trojan aimed at stealing financial data, but it’s evolved to become a major threat to users everywhere. Let’s talk…
#Metasploit…

NetBIOS Auxiliary Modules

26 Mar 201927 Mar 2019
Full article: https://www.offensive-security.com/metasploit-unleashed/scanner-netbios-auxiliary-modules/ nbname The nbname auxiliary module scans a range of hosts and determines their hostnames via NetBIOS. msf > use auxiliary/scanner/netbios/nbname msf auxiliary(nbname) > show options Module options (auxiliary/scanner/netbios/nbname): Name…
AppSec…

Ghidra – First impressions of the NSA Reverse Engineering Tool

13 Mar 201910 Oct 2019
Ghidra is a reverse engineering tool, written in Java, that was recently open-sourced by the National Security Agency (NSA). You can find the Github page here and the download link…
AppSec…

Exploiting XXE Vulnerabilities

5 Mar 201927 Nov 2019
By Chris Davis XXE (XML External Entity) attacks happen when an XML parser improperly processes input from a user that contains an external entity declaration in the doctype of an…
AppSec…

CSRF Code Examples and Defense

3 Mar 20193 Mar 2019
CSRF is an attack that tricks the victim into submitting a malicious request. It inherits the identity and privileges of the victim to perform an undesired function on the victim's…
#career…

Web Application Security

21 Feb 201925 Feb 2019
WHAT IS WEB APPLICATION SECURITY Web application security is the process of protecting websites and online services against different security threats that exploit vulnerabilities in an application’s code. Common targets…
AppSec…

VFEmail Suffers ‘Catastrophic’ Hack

13 Feb 2019
Email company VFEmail suffered what they call a "catastrophic" hack that destroyed their primary and backup data for the U.S. The firm’s founder says he now fears some 18 years’…
#career…

Hyperledger Training Sale

28 Jan 201930 Jan 2019
We just released a new certification for Hyperledger Fabric, and to celebrate, we’re offering 30% off all our Hyperledger courses and certifications! No matter where you’re at in your blockchain journey,…
Android Security…

It’s Time To take back Our Internet

20 Jan 201920 Jan 2019
Tim Berners Lee was recently awarded the Turing Award (The ACM A.M. Turing Award is an annual prize given by the Association for Computing Machinery (ACM) to "an individual selected…
#career…

New Year Linux Foundation Deals

23 Dec 20188 Oct 2019
As usual we have amazing new deals on Linux Foundation certificates and courses. Sign on and use your own pace to finish the course. Perfect for a boring January and…
AppSec…

Create a Backdoor with Cryptcat

23 Dec 2018
In this tutorial, I'll introduce you to netcat's popular cousin, cryptcat (she's actually much cuter and more exotic than the plain netcat). Cryptcat enables us to communicate between two systems and encrypts…
Cyber Security…

Veil – AV Evasion – Set Up and Tutorial

17 Dec 2018
Veil-Evasion is a tool designed to generate metasploit payloads that bypass common anti-virus solutions. NOTE: ./setup/setup.sh should be re-run on every major version update. If you receive any major errors on running…
Cyber Security…

Router Hardening Checklist

9 Dec 20189 Dec 2018
Network infrastructure devices (routers, switches, load balancers, firewalls etc) are among the assets of an enterprise that play an important role in security and thus need to be protected and…
#career…

Cyber Monday Sale Starts NOW!(FOR A WEEK!!)

26 Nov 201830 Nov 2018
Yikes, yes, we are rolling out Cyber Monday deals for a week. This will hopefully make up for the lack of Black Friday deals, but maybe Black Friday has died.…
AppSec…

SQL Injection Attacks

20 Nov 2018
A customer asked that we check out his intranet site, which was used by the company's employees and customers. This was part of a larger security review, and though we'd…
Cyber Security…

Snort Open Source IDS

14 Nov 201828 Nov 2019
Snort is an open source Intrusion Detection System that you can use on your Linux systems.  This tutorial will go over basic configuration of Snort IDS and teach you how…
AppSec…

IPtables – the Linux Firewall

13 Nov 201813 Nov 2018
KORBIN BROWN FEBRUARY 6, 2014, 12:34PM EDT Iptables is an extremely flexible firewall utility built for Linux operating systems. Whether you’re a novice Linux geek or a system administrator, there’s…

Posts navigation

Older posts

RSS ls -a /Zer0Days

  • [local] FTP Commander Pro 8.03 - Local Stack Overflow 13 Dec 2019
  • [webapps] NVMS 1000 - Directory Traversal 13 Dec 2019
  • [webapps] Bullwark Momentum Series JAWS 1.0 - Directory Traversal 12 Dec 2019
  • [webapps] OpenNetAdmin 18.1.1 - Command Injection Exploit (Metasploit) 12 Dec 2019
  • [dos] Lenovo Power Management Driver 1.67.17.48 - 'pmdrvs.sys' Denial of Service (PoC) 12 Dec 2019

Follow Us

  • Twitter
  • Facebook
  • Tumblr
  • Reddit

RSS Crypto News

  • Tezos (XTZ) Hits New High for 2019, Market Cap Tops $1.4 Billion 13 Dec 2019 Ankit Singhania
  • Binance Adds Fiat Payment Options With Paxful Partnership 12 Dec 2019 Caileam Raleigh
  • Ripple Upgrades Xpring Platform to Boost XRP Development 11 Dec 2019 Caileam Raleigh
  • Matic Network (MATIC) Slumps After Rallying Earlier This Year 11 Dec 2019 Ankit Singhania
  • SEC Seeks British Assistance in Getting Testimony of Ex-Telegram CIO 10 Dec 2019 Caileam Raleigh

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 2,212 other followers

ls /categories

AppSec Attacks Bugs Cryptography Cyber Security Education Encryption Entertainment Exploits Hacking Linux Open Source Operating Systems OWASP Penetration Testing Privacy Security Technology Tips Tutorials

ls /comments

Security Stack Sheet… on OWASP Security Shepherd- Sessi…
How To Fully Anonymi… on How To Fully Anonymize Your Sy…
Linux Security Blog… on How To Fully Anonymize Your Sy…
psychocod3r on How To Fully Anonymize Your Sy…
QuBits on How To Fully Anonymize Your Sy…
Linux Security Blog… on How To Fully Anonymize Your Sy…

Linux E-Learning Courses

Hyperledger Fabric Fundamentals (LFD271)

$299 REGISTERS YOU FOR OUR NEWEST SELF PACED COURSE! LFD201 - INTRODUCTION TO OPEN SOURCE DEVELOPMENT, GIT, AND LINUX!

REGISTER TODAY FOR YOUR KUBERNETES FOR DEVELOPERS (LFD259) COURSE AND CKAD CERTIFICATION TODAY! $499!

$199 ENROLLS YOU INTO OUR SELF PACED COURSE - LFS264 - OPNFV FUNDAMENTALS!

ENROLL TODAY IN THE SELF PACED COURSE - LFS263 - ONAP FUNDAMENTALS FOR $199!

$299 WILL ENROLL YOU IN OUR SELF PACED COURSE - LFS205 - ADMINISTERING LINUX ON AZURE!

BUNDLE CLOUD FOUNDRY FOR DEVELOPERS COURSE(LFD232) AND THE CFCD CERTIFICATION FOR $499!

SPEND $199 AND ENROLL IN OUR SELF PACED CONTAINERS FUNDAMENTALS COURSE (LFS253)!

$199 ENROLLS YOU INTO THE CONTAINERS FOR DEVELOPERS AND QUALITY ASSURANCE COURSE (LFS254)!

ENROLL TODAY IN THE DevOps Fundamentals: Implementing Continuous Delivery SELF PACED COURSE! $199

ls -a -v /community

Most Visited

  • Best Darkweb Links
    Best Darkweb Links
  • Hacking Android With Metasploit
    Hacking Android With Metasploit
  • Python Scripting  For The Ethical Hacker
    Python Scripting For The Ethical Hacker
  • The Darknet 2019
    The Darknet 2019
  • Payload in PDF
    Payload in PDF
  • D@rk Web L1nk$
    D@rk Web L1nk$
  • The Hidden Wiki
    The Hidden Wiki
  • BlueKeep - Exploit Windows (RDP Vulnerability) Remotely
    BlueKeep - Exploit Windows (RDP Vulnerability) Remotely
  • How To Fully Anonymize Your System
    How To Fully Anonymize Your System
  • Exploring the Hacker Tools of Mr. Robot
    Exploring the Hacker Tools of Mr. Robot

Archives

Follow ls /blog on WordPress.com

We Use Social Media

  • Twitter
  • Reddit
  • Facebook
  • Tumblr
  • Pinterest
  • YouTube
Create a website or blog at WordPress.com
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
Cancel