Skip to content

Linux Security Blog

How Hackers Work

Search
  • Home
  • Shep Tutorials
    • Set Up Security Shepherd On VMWare
    • Failure To Restrict Access – Solution
    • Insecure DOR – Solution
    • Poor Data Validation – Solution
    • Security Misconfiguration – Solution
    • Insecure Direct Object Reference 2 Solution
    • Cross Site Scripting One Solution
    • SQL Injection Solution
    • OWASP Security Shepherd – Failure To Restrict Access Solution
    • Session Management Challenge One – Solution
  • GNS3 Series
    • Install GNS3 2.2 on Windows10 | Download Link Included
    • Import VirtualBox Images to GNS3
  • Python Series
    • Part I
    • Part II
  • About

Category: Social Media

Education…

How to Easily Find Anyone on the Internet

26 Jul 202026 Jul 2020
I just put a short video together to demonstrate the installation of Serlock and what it can do. Qubits 2020-07-26
Android Security…

It’s Time To take back Our Internet

20 Jan 201920 Jan 2019
Tim Berners Lee was recently awarded the Turing Award (The ACM A.M. Turing Award is an annual prize given by the Association for Computing Machinery (ACM) to "an individual selected…
AppSec…

Spamming Facebook Messages

3 Jan 201811 Apr 2018
We have reported this bug to Facebook and they replied asking "How is this different than hitting the message button?" If you want to spam everyone in the World that…
AppSec…

A Guide to Not Getting Hacked

20 Nov 20175 Mar 2019
Hackers steal hundreds of millions of passwords in one swoop and occasionally cause large-scale blackouts. The future is probably not going to get better, with real-life disasters caused by internet-connected knick-knacks, smart home robots that could kill…
Cloud Security…

Forget VPN’s for private browsing, get involved with TOR

3 Apr 20174 Apr 2017
Recently President Trump reversed a privacy law that was introduced in the last administration, that prevented Internet Service Providers (ISP's) from selling your data to advertisers. When I say your…
Privacy…

Facebook manifesto redacted to omit plans for AI to monitor private messages

19 Feb 201719 Feb 2017
An earlier version of Mark Zuckerberg's 6,000-word manifesto for Facebook revealed his belief that artificial intelligence could one day be used to monitor private messages for terrorists scheming an attack.…

RSS ls -a /Zer0Days

  • [remote] PAN-OS 10.0 - Remote Code Execution (RCE) (Authenticated) 9 Aug 2022
  • [webapps] ThingsBoard 3.3.1 'description' - Stored Cross-Site Scripting (XSS) 9 Aug 2022
  • [webapps] ThingsBoard 3.3.1 'name' - Stored Cross-Site Scripting (XSS) 9 Aug 2022
  • [webapps] Feehi CMS 2.1.1 - Stored Cross-Site Scripting (XSS) 9 Aug 2022
  • [webapps] Prestashop blockwishlist module 2.1.0 - SQLi 9 Aug 2022

Follow Us

  • Twitter
  • Facebook
  • Tumblr
  • Reddit

RSS Crypto News

  • An error has occurred; the feed is probably down. Try again later.

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,437 other followers

ls /categories

AppSec Attacks Bugs Cryptography Cyber Security Education Encryption Entertainment Exploits Hacking Linux Open Source Operating Systems OWASP Penetration Testing Privacy Security Technology Tips Tutorials

ls /comments

Foster Eli on Best Darkweb Links
crypstalk21 on Securing Your Crypto Wallet
kioptrix vm on PenTesting: Gaining Root Privi…
Johnny Dickman (@Dar… on The Darknet 2019
XXS Attack – P… on Payload in PDF
Fred (@Fred37063593) on The Hidden Wiki

ls -a -v /community

ls /MostVisited

  • Payload in PDF
    Payload in PDF
  • Crack WPA Handshake using Aircrack with Kali Linux
    Crack WPA Handshake using Aircrack with Kali Linux
  • Best Darkweb Links
    Best Darkweb Links
  • BlueKeep - Exploit Windows (RDP Vulnerability) Remotely
    BlueKeep - Exploit Windows (RDP Vulnerability) Remotely
  • Write a Ping Sweeper in 4 Lines of Bash
    Write a Ping Sweeper in 4 Lines of Bash
  • Find Vulnerable Devices On The Internet With Shodan
    Find Vulnerable Devices On The Internet With Shodan
  • OWASP Security Shepherd- Session Management Challenge One - Solution - LSB
    OWASP Security Shepherd- Session Management Challenge One - Solution - LSB
  • Create a Persistent BackDoor in Android Using Kali Linux
    Create a Persistent BackDoor in Android Using Kali Linux
  • Create a Backdoor Shell Script in Python
    Create a Backdoor Shell Script in Python
  • How To Use Netcat to Establish and Test TCP and UDP Connections
    How To Use Netcat to Establish and Test TCP and UDP Connections

ls /Archives

Follow Linux Security Blog on WordPress.com

We Use Social Media

  • Twitter
  • Reddit
  • Facebook
  • Tumblr
  • Pinterest
  • YouTube
Create a website or blog at WordPress.com
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
  • Follow Following
    • Linux Security Blog
    • Join 2,437 other followers
    • Already have a WordPress.com account? Log in now.
    • Linux Security Blog
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar