Skip to content

Linux Security Blog

How Hackers Work

Search
  • Home
  • Shep Tutorials
    • Set Up Security Shepherd On VMWare
    • Failure To Restrict Access – Solution
    • Insecure DOR – Solution
    • Poor Data Validation – Solution
    • Security Misconfiguration – Solution
    • Insecure Direct Object Reference 2 Solution
    • Cross Site Scripting One Solution
    • SQL Injection Solution
    • OWASP Security Shepherd – Failure To Restrict Access Solution
    • Session Management Challenge One – Solution
  • GNS3 Series
    • Install GNS3 2.2 on Windows10 | Download Link Included
    • Import VirtualBox Images to GNS3
  • Python Series
    • Part I
    • Part II
  • About

Category: Security

#Metasploit…

Payload in PDF

12 Nov 2018
Infected PDFs have always been a privileged way to infect users because this document format is very common and used by almost everyone. Moreover, it exists many ways to exploit Acrobat Reader…
#career…

Now Is The Time, Linux is the Direction

11 Nov 201824 Jan 2019
Your future matters to us @ LSB, so get into Linux and see the new world it will open for you. Created by QuBits 2018-11-11
#career…

Linux Foundation Deals For LSB Followers

25 Oct 2018
We are delighted to be able to team up with The Linux Foundation to bring you some great deals on amazing Linux courses and materials. All courses, on completion is…
AppSec…

OWASP Security Shepherd- Session Management Challenge One – Solution – LSB

12 Oct 201812 Oct 2018
We have another solution in the OWASP Security Shepherd challenges and we enjoyed completing this one. You can find out about Session Management from OWASP here. So let's get on…
AppSec…

Penetration Testing – Complete Guide

10 Oct 201810 Dec 2018
What is Penetration Testing? It’s the process to identify security vulnerabilities in an application by evaluating the system or network with various malicious techniques. The weak points of a system…
Attacks…

The Evil Twin Attack

8 Oct 201829 Oct 2019
I searched through many guides, and none of them really gave good description of how to do this. There’s a lot of software out there (such as SEToolkit, which can…
AppSec…

OWASP Security Shepherd – Failure To Restrict Access Solution – LSB

27 Sep 201827 May 2019
Am I Vulnerable To 'Failure to Restrict URL Access'? The best way to find out if an application has failed to properly restrict URL access is to verify every page. Consider for…
AppSec…

OWASP Security Shepherd – Insecure Cryptographic Storage Challenge 1 Solution – LSB

21 Sep 2018
Thanks for visiting and today we have another OWASP Security Shepherd Solution for you. This time it's the Insecure Cryptographic Storage Challenge. Cryptography is usually the safest way to communicate…
AppSec…

Create a Persistent Back Door with Kali, Netcat and Weevely

13 Sep 201815 Aug 2020
This post will dive into how we can take advantage of a vulnerability in a web application to gain access and upload a backdoor that we can connect to in…
AppSec…

OWASP Security Shepherd – Insecure Direct Object Reference Solution – LSB

10 Sep 2018
Welcome back to the Security Shepherd solutions from LSB. This was quite an interesting puzzle and it took a few tries to get the key. Insecure Direct Object Reference (called IDOR from here) occurs when…
AppSec…

OWASP Security Shepherd – Failure To Restrict Access Solution – LSB

7 Sep 20187 Sep 2018
What is Failure to Restrict URL Access Vulnerability/Threat? Failure to restrict URL access occurs in applications hide functionality from non-privileged users. In an application that fails to restrict URL access, administration…
AppSec…

AV evading with Veil

29 Aug 201822 Nov 2019
One of the most important issues any hacker must address is how to get past security devices and remain undetected. These can include antivirus software, intrusion detection systems, firewalls, web…
Android Security…

How To Find And Delete Where Google Knows You’ve Been

14 Aug 201814 Aug 2018
Even if “Location History” is off on your phone, Google often still stores your precise location Here are some things you can do to delete those markers and keep your location…
AppSec…

W3af walkthrough and tutorial

9 Aug 20189 Aug 2018
w3af (Web Application audit and attack framework) is a framework for auditing and exploitation of web applications. In this series of articles we will be looking at almost all the…
AppSec…

The Best Hacking Books 2018

25 Jul 201825 Jul 2018
BY HACKING TUTORIALS ON FEBRUARY 2, 2018 One of the most popular and most asked questions since I’ve started this blog is if I can recommend some good hacking books to read…
AppSec…

XSS in Canopy login page

21 Jun 201821 Jun 2018
[Description] CheckSec Canopy 3.x before 3.0.7 has stored XSS via the Login Page Disclaimer, allowing attacks by low-privileged users against higher-privileged users.This instance of stored cross-site scripting (XSS) vulnerability could…
Cyber Security…

Kubernetes for Developers (LFD259)

17 Jun 201827 Jun 2018
Get advanced knowledge of application development using Kubernetes with training from The Linux Foundation! Kubernetes is a high-velocity open source orchestration tool to deploy, scale, and update containerized applications. This course…
Cloud Security…

10% Off Linux Programming & Development Training

27 May 2018
Promotion Details 10% Off any Linux Programming & Development Training courses Promo code: MEMORIAL10 Starts: May 28th at 12:00 AM Ends: May 28th at 11:59 PM Linux Memorial Day Sale…
AppSec…

Stealing Signal Conversations from a MacBook

27 May 2018
Developed by Open Whisper Systems, Signal is a free, open-source encrypted communications app for both mobile and desktop devices that allows users to make voice calls, send instant messages, and even make…
AppSec…

Password cracking with John the Ripper

24 May 201810 Feb 2019
Introduction For those of you who haven't yet heard about John the Ripper (hereby called John for brevity), it is a free password cracking tool written mostly in C. Before…
Crypto Currency…

VOISE – Once in a generation the whole game changes

2 May 2018
VOISE is a blockchain powered anonymous decentralized platform with personalized token based on Ethereum's smart contract ecosystem for transactions. VOISE is an innovative cryptocurrency powered solution for the music industry…
Cyber Security…

Build a Beginner Hacking Kit with the Raspberry Pi 3 Model B+

23 Apr 20186 Feb 2020
The Raspberry Pi is a perfect way to start. In 2018, the Raspberry Pi 3 Model B+ was released featuring a better CPU, Wi-Fi, Bluetooth, and Ethernet built in. Our recommended Kali Pi kit…
Cyber Security…

How Does Ransomware Work?

31 Mar 2018
May 12, 2017 / RYAN MURPHY Ransomware is similar to other malware in that it installs itself on a computer and runs in the background without the user’s knowledge. But unlike malware that hides and…
#Metasploit…

Metasploit | (Msfvenom)

24 Mar 20189 Nov 2019
Eluding and evading antivirus software and intrusion detection systems is one of the most critical tasks of the hacker.As soon as a new exploit is developed and discovered, the AV and IDS…
Cloud Security…

15% Off Enterprise IT & Linux System Admin

12 Feb 2018
Starting February 12, we’re offering 15% off any Enterprise IT & Linux System Administration Training courses. Check out the full details below: Promotion Details15% off any Enterprise IT & Linux…
#career…

Enterprise IT & Linux System Administration Training

2 Feb 20186 Feb 2018
Introduction to Linux Linux powers 94% of the world’s supercomputers, most of the servers powering the Internet, the majority of financial trades worldwide and a billion Android devices. In short,…
Cyber Security…

Removing Network Malware

1 Feb 20182 Feb 2018
To disinfect a local network of a malware outbreak, follow the step-by-step instructions below. 1. Quarantine the Network Disconnect the local network from the Internet immediately as a precautionary measure against further…
Attacks…

Removing Chrome Adware

30 Jan 201830 Jan 2018
Here are couple of suggestions. When I mention commands, those are to be issued in command-line aka terminal , which you can access by pressing CtrlAltT Remove google-chrome related folders,…
Data Mining…

How To Get Started In Trading Crypto Currency

4 Jan 20184 Jan 2018
As my readers probably know crypto currency is taking over the World. Even banks are getting in on it now. I'd like to share some decent advice to my followers…
AppSec…

Spamming Facebook Messages

3 Jan 201811 Apr 2018
We have reported this bug to Facebook and they replied asking "How is this different than hitting the message button?" If you want to spam everyone in the World that…
Cryptography…

GPG on Linux

9 Dec 2017
1 Introduction Encryption is the process of encoding messages or information in such a way that only authorized parties can read them. With almost no privacy in this digital generation…
#Metasploit…

Metasploit for the Aspiring Ethical Hacker, Part 3 (Payloads) – LSB

5 Dec 20176 Dec 2017
As you know, Metasploit is an exploitation framework that every hacker should be knowledgeable of and skilled at. It is one of my favorite hacking tools available. Let's take a closer look…
Attacks…

Metasploit for the Aspiring Ethical Hacker, Part 2

1 Dec 201729 Jan 2019
Part 1 is here: https://linuxsecurityblog.com/2016/03/01/metasploit-for-the-aspiring-ethical-hacker-part-1/ In this second tutorial, we will look at some of the basic commands we can use in Metasploit. Although the Metasploit framework can appear daunting to…
Cyber Security…

Linux Log Files | LSB

1 Dec 20174 Dec 2017
I am a new Linux user. I would like to know where are the log files located under Debian/Ubuntu or CentOS/RHEL/Fedora Linux server? How do I open or view log…
Attacks…

Hackers can bypass new protections in MacOS High Sierra

29 Nov 201729 Nov 2017
MacOS High Sierra protections can be bypassed, but will make security researchers and companies work more difficult Hackers can bypass a new security feature in MacOS High Sierra to load…
Cyber Security…

Create an effective business continuity plan

25 Nov 2017
A business continuity plan outlines procedures and instructions an organization must follow in the face of disaster, whether fire, flood or cyberattack. Here's how to create one that gives your…
AppSec…

Exploiting CSRF under NoScript Conditions

22 Nov 201716 Mar 2019
CSRFs -- or Cross-Site Request Forgery vulnerabilities -- occur when a server accepts requests that can be “spoofed” from a site running on a different domain. The attack goes something like this:…
#career…

Black Friday Deals – LSB

22 Nov 201729 Nov 2017
Because we are such good people here at LSB, we like to treat our followers to some fantastic deals that we are offered. So we present them to you. The Linux…
Bugs…

Amazon Key Lets Delivery People into Your House and It Just Got Hacked

16 Nov 201716 Nov 2017
A hardware safeguard in Amazon’s recently launched while-you’re-out delivery service turns out to have a big hole. And, well—let’s just say you probably should have seen this coming. Amazon Key uses a smart…
Attacks…

Set up a Honeypot on AWS

8 Nov 20178 Nov 2017
If you’re aspiring to become a professional in the field of computer security, wish to understand further the current threat landscape or simply want to have a play around with…
Attacks…

WAFNinja – Web Application Firewall Attack Tool

7 Nov 201729 Jan 2019
WAFNinja is a Python-based Web Application Firewall Attack Tool designed to help penetration testers execute WAF bypass by automating the steps necessary to bypass input validation. The tool was created…
AppSec…

OWASP Security Shepherd – Security Misconfiguration – Solution – LSB

2 Nov 201712 Dec 2019
Welcome back to another OWASP Security Shepherd solution. This challenge is called Security Misconfiguration. So we are given a Username and Password field and we can get the result key…

Posts navigation

Older posts
Newer posts

RSS ls -a /Zer0Days

  • [webapps] Bitbucket v7.0.0 - RCE 23 Mar 2023
  • [webapps] wkhtmltopdf 0.12.6 - Server Side Request Forgery 23 Mar 2023
  • [webapps] WorkOrder CMS 0.1.0 - SQL Injection 23 Mar 2023
  • [webapps] MAN-EAM-0003 V3.2.4 - XXE 23 Mar 2023
  • [webapps] Owlfiles File Manager 12.0.1 - Multiple Vulnerabilities 23 Mar 2023

Follow Us

  • Twitter
  • Facebook
  • Tumblr
  • Reddit

RSS Crypto News

  • An error has occurred; the feed is probably down. Try again later.

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,439 other subscribers

ls /categories

AppSec Attacks Bugs Cryptography Cyber Security Education Encryption Entertainment Exploits Hacking Linux Open Source Operating Systems OWASP Penetration Testing Privacy Security Technology Tips Tutorials

ls /comments

dark92i (@dark92i) on The Hidden Wiki
Foster Eli on Best Darkweb Links
crypstalk21 on Securing Your Crypto Wallet
kioptrix vm on PenTesting: Gaining Root Privi…
Johnny Dickman (@Dar… on The Darknet 2019
XXS Attack – P… on Payload in PDF

ls -a -v /community

ls /MostVisited

  • Best Darkweb Links
    Best Darkweb Links
  • Payload in PDF
    Payload in PDF
  • Crack WPA Handshake using Aircrack with Kali Linux
    Crack WPA Handshake using Aircrack with Kali Linux
  • Write a Ping Sweeper in 4 Lines of Bash
    Write a Ping Sweeper in 4 Lines of Bash
  • BlueKeep - Exploit Windows (RDP Vulnerability) Remotely
    BlueKeep - Exploit Windows (RDP Vulnerability) Remotely
  • Find Vulnerable Devices On The Internet With Shodan
    Find Vulnerable Devices On The Internet With Shodan
  • Hacking Linux with Armitage
    Hacking Linux with Armitage
  • Reverse Engineering Router Firmware
    Reverse Engineering Router Firmware
  • Sniffing Access Points and Mac Addresses Using Python
    Sniffing Access Points and Mac Addresses Using Python
  • Installing Security Shepherd on VMWare Workstation 12 Player
    Installing Security Shepherd on VMWare Workstation 12 Player

ls /Archives

Follow Linux Security Blog on WordPress.com

We Use Social Media

  • Twitter
  • Reddit
  • Facebook
  • Tumblr
  • Pinterest
  • YouTube
Create a website or blog at WordPress.com
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
  • Follow Following
    • Linux Security Blog
    • Join 270 other followers
    • Already have a WordPress.com account? Log in now.
    • Linux Security Blog
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...
 

You must be logged in to post a comment.