Skip to content

ls /blog

Linux Security Blog

Search
  • Home
  • Shep Tutorials
    • Set Up Security Shepherd On VMWare
    • Failure To Restrict Access – Solution
    • Insecure DOR – Solution
    • Poor Data Validation – Solution
    • Security Misconfiguration – Solution
    • Insecure Direct Object Reference 2 Solution
    • Cross Site Scripting One Solution
    • SQL Injection Solution
    • OWASP Security Shepherd – Failure To Restrict Access Solution
    • Session Management Challenge One – Solution
  • GNS3 Series
    • Install GNS3 2.2 on Windows10 | Download Link Included
    • Import VirtualBox Images to GNS3
  • Python Series
    • Part I
    • Part II
  • About

Category: Social Engineering

Education…

Getting Anonymously Harassed Online? Try This!

17 Aug 202017 Aug 2020
Lots of people are bullied or harassed online from anonymous users on different Social Media platforms that use different accounts and personas. So let's look at how we can try…
AppSec…

Movies Featuring the Nmap Security Scanner

6 Oct 201930 Oct 2019
The Nmap Security Scanner has appeared in many major motion pictures (as well as more obscure films). This gallery provides screen shots and details for each movie. Source: Movies Featuring…
Attacks…

Find Vulnerable Devices On The Internet With Shodan

9 Sep 201924 Jul 2020
Welcome back to LSB and thanks for reading. Today we will be looking at how to search for vulnerable devices around the world using Shodan. Shodan is an index of…
#career…

Best Linux Distros for Ethical Hacking and Penetration Testing

1 May 201924 Jul 2020
Here is a list of some top Linux distro for ethical hacking and penetration testing that will surely help you to pick one that best fits your need. Kali Linux:…
AppSec…

CSRF Code Examples and Defense

3 Mar 201924 Jul 2020
CSRF is an attack that tricks the victim into submitting a malicious request. It inherits the identity and privileges of the victim to perform an undesired function on the victim's…
AppSec…

Password cracking with John the Ripper

24 May 201810 Feb 2019
Introduction For those of you who haven't yet heard about John the Ripper (hereby called John for brevity), it is a free password cracking tool written mostly in C. Before…
Cyber Security…

How Does Ransomware Work?

31 Mar 2018
May 12, 2017 / RYAN MURPHY Ransomware is similar to other malware in that it installs itself on a computer and runs in the background without the user’s knowledge. But unlike malware that hides and…
AppSec…

Exploiting CSRF under NoScript Conditions

22 Nov 201716 Mar 2019
CSRFs -- or Cross-Site Request Forgery vulnerabilities -- occur when a server accepts requests that can be “spoofed” from a site running on a different domain. The attack goes something like this:…
Entertainment…

KRACKing WPA2

19 Oct 201719 Oct 2017
Our main attack is against the 4-way handshake of the WPA2 protocol. This handshake is executed when a client wants to join a protected Wi-Fi network, and is used to…
Attacks…

How Shipping Giant Maersk Dealt With a Malware Meltdown, And Other Security News This Week

3 Jul 20173 Jul 2017
WHEN A PIECE of unprecedented malicious software rampages through thousands of critical networks around the world, it tends to get our full attention. And this week's digital plague, known as…
Phishing…

Reconnaissance. Information Gathering for the Ethical Hacker

25 Apr 2016
Gathering information on a target is one of the most important skills of an ethical hacker. The more information you have on a target the easier they will be to…
Social Engineering…

Maltego For Recon

22 Mar 201622 Mar 2016
According to their web site, “Paterva invents and sells unique data manipulation software. Paterva is headed by Roelof Temmingh who is leading a light and lethal team of talented software…
#career…

SQLMap – Testing With SQL Injection

12 Mar 20165 May 2019
Sqlmap is included in pen testing linux distros like kali linux, backtrack, backbox etc. On other distros it can be simply downloaded from the following url: http://sqlmap.org/. Since its written…
#Metasploit…

Exploring the Hacker Tools of Mr. Robot

15 Sep 201525 Aug 2019
Over the years the most famous hacking tool that has made it into the movies is Nmap. When producers of a movie actually try to put a dose of reality…

RSS ls -a /Zer0Days

  • [webapps] GetSimple CMS My SMTP Contact Plugin 1.1.1 - CSRF to RCE 16 Apr 2021
  • [dos] glFTPd 2.11a - Remote Denial of Service 15 Apr 2021
  • [webapps] htmly 2.8.0 - 'description' Stored Cross-Site Scripting (XSS) 15 Apr 2021
  • [webapps] Tileserver-gl 3.0.0 - 'key' Reflected Cross-Site Scripting (XSS) 15 Apr 2021
  • [webapps] Horde Groupware Webmail 5.2.22 - Stored XSS 15 Apr 2021

Follow Us

  • Twitter
  • Facebook
  • Tumblr
  • Reddit

RSS Crypto News

  • An error has occurred; the feed is probably down. Try again later.

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,461 other followers

ls /categories

AppSec Attacks Bugs Cryptography Cyber Security Education Encryption Entertainment Exploits Hacking Linux Open Source Operating Systems OWASP Penetration Testing Privacy Security Technology Tips Tutorials

ls /comments

kioptrix vm on PenTesting: Gaining Root Privi…
Johnny Dickman (@Dar… on The Darknet 2019
XXS Attack – P… on Payload in PDF
Fred (@Fred37063593) on The Hidden Wiki
The Privacy Pros and… on A Beginners Guide to I2P
ls /blog 🐧🛡️🌐 (@lsbd… on Discover & Attack Raspberr…

Support Us

Support ls /blog

€5.00

ls -a -v /community

ls /MostVisited

  • Best Darkweb Links
    Best Darkweb Links
  • Payload in PDF
    Payload in PDF
  • BlueKeep - Exploit Windows (RDP Vulnerability) Remotely
    BlueKeep - Exploit Windows (RDP Vulnerability) Remotely
  • Crack WPA Handshake using Aircrack with Kali Linux
    Crack WPA Handshake using Aircrack with Kali Linux
  • Explore The Dark Web Anonymously
    Explore The Dark Web Anonymously
  • Best Onion Links
    Best Onion Links
  • Find Vulnerable Devices On The Internet With Shodan
    Find Vulnerable Devices On The Internet With Shodan
  • Hacking Android With Metasploit
    Hacking Android With Metasploit
  • Exploiting Routers With Routersploit
    Exploiting Routers With Routersploit
  • Create a Persistent Back Door with Kali, Netcat and Weevely
    Create a Persistent Back Door with Kali, Netcat and Weevely

ls /Archives

Follow ls /blog on WordPress.com

We Use Social Media

  • Twitter
  • Reddit
  • Facebook
  • Tumblr
  • Pinterest
  • YouTube
Create a website or blog at WordPress.com
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy