Skip to content

Linux Security Blog

How Hackers Work

Search
  • Home
  • Shep Tutorials
    • Set Up Security Shepherd On VMWare
    • Failure To Restrict Access – Solution
    • Insecure DOR – Solution
    • Poor Data Validation – Solution
    • Security Misconfiguration – Solution
    • Insecure Direct Object Reference 2 Solution
    • Cross Site Scripting One Solution
    • SQL Injection Solution
    • OWASP Security Shepherd – Failure To Restrict Access Solution
    • Session Management Challenge One – Solution
  • GNS3 Series
    • Install GNS3 2.2 on Windows10 | Download Link Included
    • Import VirtualBox Images to GNS3
  • Python Series
    • Part I
    • Part II
  • About

Category: Spying

Education…

Getting Anonymously Harassed Online? Try This!

17 Aug 202017 Aug 2020
Lots of people are bullied or harassed online from anonymous users on different Social Media platforms that use different accounts and personas. So let's look at how we can try…
Attacks…

Discover & Attack Raspberry Pi’s on a Network

16 Jun 202024 Jul 2020
Many people never bother to change their default password on their devices. For a Raspberry Pi, this can leave it extremely vulnerable. Today, we will be looking at a little…
AppSec…

Movies Featuring the Nmap Security Scanner

6 Oct 201930 Oct 2019
The Nmap Security Scanner has appeared in many major motion pictures (as well as more obscure films). This gallery provides screen shots and details for each movie. Source: Movies Featuring…
Cyber Security…

Send Secret Files in an Image Using Steganography

2 Oct 201924 Jul 2020
Steganography is data hidden within data. It enables us to embed files, messages or links into an image that can't be detected by email filters. So we can send secret…
Cryptography…

The Darknet 2019

7 Apr 201924 Jul 2020
Do you want to access the update about deep web links or, the hidden wiki, Deep web sites, Dark web Search, The Dark Web Links, tor onion links, tor hidden wiki links, deep web sites…
AppSec…

OWASP Security Shepherd – Cross Site Scripting One Solution – LSB

12 Sep 201812 Sep 2018
Welcome back to LSB my budding hackers. Today's lesson is about Cross Site Scripting (Or XSS).  Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected…
Android Security…

How To Find And Delete Where Google Knows You’ve Been

14 Aug 201814 Aug 2018
Even if “Location History” is off on your phone, Google often still stores your precise location Here are some things you can do to delete those markers and keep your location…
Cloud Security…

Forget VPN’s for private browsing, get involved with TOR

3 Apr 20174 Apr 2017
Recently President Trump reversed a privacy law that was introduced in the last administration, that prevented Internet Service Providers (ISP's) from selling your data to advertisers. When I say your…
Privacy…

A new Tor that can resist next-generation state surveillance

1 Sep 20161 Sep 2016
Tor is an imperfect privacy platform. Ars meets the researchers trying to replace it. J.M. Porup - 31/8/2016, 07:25 Since Edward Snowden stepped into the limelight from a hotel room in Hong…
Spying

Police Used Stingrays in Planes to Spy on Phones

2 Feb 20162 Feb 2016
THE GOVERNMENT’S USE of a controversial invasive technology for tracking phones just got a little more controversial. The Anaheim Police Department has acknowledged in new documents that it uses surveillance…
Spying

Internet firms to be banned from offering unbreakable encryption

3 Nov 20153 Nov 2015
Internet and social media companies will be banned from putting customer communications beyond their own reach under new laws to be unveiled on Wednesday. Companies such as Apple, Google and…
#Metasploit…

Exploring the Hacker Tools of Mr. Robot

15 Sep 201525 Aug 2019
Over the years the most famous hacking tool that has made it into the movies is Nmap. When producers of a movie actually try to put a dose of reality…
Hacking…

Hacking Team, Computer Vulnerabilities, and the NSA

15 Sep 201522 Sep 2015
When the National Security Administration (NSA) -- or any government agency -- discovers a vulnerability in a popular computer system, should it disclose it or not? The debate exists because…
Legal…

Justice Department Cracks Down On The Use Of Cellphone Tracking Technology

4 Sep 20154 Sep 2015
Federal law enforcement officers will now be required to obtain a search warrant before using technology that tracks cellphone locations, according to a policy update issued by the Justice Department on Thursday.Under…

RSS ls -a /Zer0Days

  • [webapps] MotoCMS Version 3.4.3 - Server-Side Template Injection (SSTI)
  • [webapps] Pydio Cells 4.1.2 - Server-Side Request Forgery
  • [webapps] Pydio Cells 4.1.2 - Cross-Site Scripting (XSS) via File Download
  • [webapps] Pydio Cells 4.1.2 - Unauthorised Role Assignments
  • [webapps] Faculty Evaluation System 1.0 - Unauthenticated File Upload
  • [webapps] Online Security Guards Hiring System 1.0 - Reflected XSS
  • [remote] Flexense HTTP Server 10.6.24 - Buffer Overflow (DoS) (Metasploit)
  • [webapps] unilogies/bumsys v1.0.3 beta - Unrestricted File Upload
  • [webapps] SCRMS 2023-05-27 1.0 - Multiple SQL Injection
  • [webapps] Rukovoditel 3.3.1 - CSV injection

Follow Us

  • Twitter
  • Facebook
  • Tumblr
  • Reddit

RSS Crypto News

  • An error has occurred; the feed is probably down. Try again later.

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,441 other subscribers

ls /categories

AppSec Attacks Bugs Cryptography Cyber Security Education Encryption Entertainment Exploits Hacking Linux Open Source Operating Systems OWASP Penetration Testing Privacy Security Technology Tips Tutorials

ls /comments

dark92i (@dark92i) on The Hidden Wiki
Foster Eli on Best Darkweb Links
crypstalk21 on Securing Your Crypto Wallet
kioptrix vm on PenTesting: Gaining Root Privi…
Johnny Dickman (@Dar… on The Darknet 2019
XXS Attack – P… on Payload in PDF

ls -a -v /community

ls /MostVisited

  • Payload in PDF
    Payload in PDF
  • Best Darkweb Links
    Best Darkweb Links
  • Crack WPA Handshake using Aircrack with Kali Linux
    Crack WPA Handshake using Aircrack with Kali Linux
  • Find Vulnerable Devices On The Internet With Shodan
    Find Vulnerable Devices On The Internet With Shodan
  • Write a Ping Sweeper in 4 Lines of Bash
    Write a Ping Sweeper in 4 Lines of Bash
  • Set Up A Penetration Testing Lab  Easily With Vagrant
    Set Up A Penetration Testing Lab Easily With Vagrant
  • BlueKeep - Exploit Windows (RDP Vulnerability) Remotely
    BlueKeep - Exploit Windows (RDP Vulnerability) Remotely
  • How to install WebGoat on Ubuntu
    How to install WebGoat on Ubuntu
  • Windows Takeover with a PDF File
    Windows Takeover with a PDF File
  • Heartbleed Discovery and Exploit
    Heartbleed Discovery and Exploit

ls /Archives

Follow Linux Security Blog on WordPress.com

We Use Social Media

  • Twitter
  • Reddit
  • Facebook
  • Tumblr
  • Pinterest
  • YouTube
Create a website or blog at WordPress.com
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
  • Follow Following
    • Linux Security Blog
    • Join 272 other followers
    • Already have a WordPress.com account? Log in now.
    • Linux Security Blog
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar