Skip to content

ls /blog

Linux Security Blog

Search
  • Home
  • Shep Tutorials
    • Set Up Security Shepherd On VMWare
    • Failure To Restrict Access – Solution
    • Insecure DOR – Solution
    • Poor Data Validation – Solution
    • Security Misconfiguration – Solution
    • Insecure Direct Object Reference 2 Solution
    • Cross Site Scripting One Solution
    • SQL Injection Solution
    • OWASP Security Shepherd – Failure To Restrict Access Solution
    • Session Management Challenge One – Solution
  • GNS3 Series
    • Install GNS3 2.2 on Windows10 | Download Link Included
    • Import VirtualBox Images to GNS3
  • Python Series
    • Part I
    • Part II
  • About

Category: Technology

AppSec…

Stealing Signal Conversations from a MacBook

27 May 2018
Developed by Open Whisper Systems, Signal is a free, open-source encrypted communications app for both mobile and desktop devices that allows users to make voice calls, send instant messages, and even make…
AppSec…

Setting Up A Snort IDS on Debian Linux

24 May 2018
Malicious network traffic (such as worms, hacking attempts, etc.) has certain patterns to it. You could monitor your network traffic with a sniffer and look for this malicious traffic manually…
AppSec…

Password cracking with John the Ripper

24 May 201810 Feb 2019
Introduction For those of you who haven't yet heard about John the Ripper (hereby called John for brevity), it is a free password cracking tool written mostly in C. Before…
Crypto Currency…

VOISE – Once in a generation the whole game changes

2 May 2018
VOISE is a blockchain powered anonymous decentralized platform with personalized token based on Ethereum's smart contract ecosystem for transactions. VOISE is an innovative cryptocurrency powered solution for the music industry…
Cyber Security…

Build a Beginner Hacking Kit with the Raspberry Pi 3 Model B+

23 Apr 20186 Feb 2020
The Raspberry Pi is a perfect way to start. In 2018, the Raspberry Pi 3 Model B+ was released featuring a better CPU, Wi-Fi, Bluetooth, and Ethernet built in. Our recommended Kali Pi kit…
Cyber Security…

Best SMB Firewalls

6 Apr 2018
Andrew Harmon Best Small Business Firewall, a coveted title that manufacturers are gunning to claim and users are clamoring to find the answer to. Understandably, we all want to make sure…
Cyber Security…

How Does Ransomware Work?

31 Mar 2018
May 12, 2017 / RYAN MURPHY Ransomware is similar to other malware in that it installs itself on a computer and runs in the background without the user’s knowledge. But unlike malware that hides and…
#Metasploit…

Metasploit | (Msfvenom)

24 Mar 20189 Nov 2019
Eluding and evading antivirus software and intrusion detection systems is one of the most critical tasks of the hacker.As soon as a new exploit is developed and discovered, the AV and IDS…
Cryptography…

Metal (MTL) | Shaping Digital Money

6 Mar 20186 Mar 2018
Transfer money instantly around the globe with nothing more than a phone number. Earn rewards every time you spend or make a purchase. METAL ROCKS The Digital Wallet Earn rewards…
Crypto Currency…

Top Ten Cryptocurrencies

20 Feb 201820 Feb 2018
10. Dash (DASH) $718.42 USD A revolutionary digital money system. Use Dash to make instant, private payments online or in-store using our secure open-source platform hosted by thousands of users around the…
Cloud Security…

15% Off Enterprise IT & Linux System Admin

12 Feb 2018
Starting February 12, we’re offering 15% off any Enterprise IT & Linux System Administration Training courses. Check out the full details below: Promotion Details15% off any Enterprise IT & Linux…
#career…

Enterprise IT & Linux System Administration Training

2 Feb 20186 Feb 2018
Introduction to Linux Linux powers 94% of the world’s supercomputers, most of the servers powering the Internet, the majority of financial trades worldwide and a billion Android devices. In short,…
Cyber Security…

Removing Network Malware

1 Feb 20182 Feb 2018
To disinfect a local network of a malware outbreak, follow the step-by-step instructions below. 1. Quarantine the Network Disconnect the local network from the Internet immediately as a precautionary measure against further…
Crypto Currency…

Etherium | Crypto Royalty

30 Jan 20182 Feb 2018
Build unstoppable applications Ethereum is a decentralized platform that runs smart contracts: applications that run exactly as programmed without any possibility of downtime, censorship, fraud or third-party interference. These apps run…
Attacks…

Removing Chrome Adware

30 Jan 201830 Jan 2018
Here are couple of suggestions. When I mention commands, those are to be issued in command-line aka terminal , which you can access by pressing CtrlAltT Remove google-chrome related folders,…
Crypto Currency…

DasCoin | Taking Cryptocurrency Mainstream

30 Jan 201830 Jan 2018
The Hybrid Solution And Why It’s Better The latest coin in the crypto currency world coming from Ireland. It's doing quite well and looks to be getting stronger. DasCoin combines…
Crypto Currency…

Could Cryptocurrencies Take Over the US Dollar as World Reserve Currency?

22 Jan 2018
COULD BITCOIN REPLACE THE DOLLAR? Cryptocurrencies were the clear winner of 2017. Major cryptocurrencies like Bitcoin, Ethereum and Litecoin have massively increased in value over the year, effectively outperforming investments…
#career…

Eryllium (ERY)

22 Jan 201822 Jan 2018
Welcome back fellow crypto traders, we have an exciting coin to introduce to you today. If you'd like to get into crypto trading go visit our earlier post about getting…
Crypto Currency…

QubitCoin (Q2C)

13 Jan 201814 Jan 2018
Welcome back fellow crypto traders. Todays flavour of the day is Q2C, for around 1.2 cent a pop. Qubitcoin was started on Jan 12 2014 as an CPU and GPU…
Crypto Currency…

Will 2018 be the rise of the AltCoin?

11 Jan 201813 Jan 2018
There's lots of chatter on crypto chat forums about this year being the year of the AltCoin (short for alternative coins). These are basically the small fries in the crypto…
Data Mining…

How To Get Started In Trading Crypto Currency

4 Jan 20184 Jan 2018
As my readers probably know crypto currency is taking over the World. Even banks are getting in on it now. I'd like to share some decent advice to my followers…
AppSec…

Spamming Facebook Messages

3 Jan 201811 Apr 2018
We have reported this bug to Facebook and they replied asking "How is this different than hitting the message button?" If you want to spam everyone in the World that…
Crypto Currency…

Litecoin (LTC) making a killing

13 Dec 201713 Dec 2017
If you invested in Litecoin a few weeks ago, you would now have a profit of 1600%.  So your initial investment of €20 would now be around $320 for each coin…
Cryptography…

GPG on Linux

9 Dec 2017
1 Introduction Encryption is the process of encoding messages or information in such a way that only authorized parties can read them. With almost no privacy in this digital generation…
#Metasploit…

Metasploit for the Aspiring Ethical Hacker, Part 3 (Payloads) – LSB

5 Dec 20176 Dec 2017
As you know, Metasploit is an exploitation framework that every hacker should be knowledgeable of and skilled at. It is one of my favorite hacking tools available. Let's take a closer look…
Attacks…

Nmap Scripts for Recon

5 Dec 201727 Dec 2018
These Nmap NSE Scripts are all included in standard installations of Nmap. Use them to gather additional information on the targets you are scanning. The information can both add context…
Distros…

Light Ubuntu | LSB

4 Dec 201724 Dec 2017
  lubuntu 17.10 Artful Aardvark released. What is Lubuntu? Lubuntu is an Ubuntu flavor using LXDE. The project’s goal is to provide a lightweight yet functional distribution. Lubuntu specifically targets older machines with lower…
Attacks…

Metasploit for the Aspiring Ethical Hacker, Part 2

1 Dec 201729 Jan 2019
Part 1 is here: https://linuxsecurityblog.com/2016/03/01/metasploit-for-the-aspiring-ethical-hacker-part-1/ In this second tutorial, we will look at some of the basic commands we can use in Metasploit. Although the Metasploit framework can appear daunting to…
Cyber Security…

Linux Log Files | LSB

1 Dec 20174 Dec 2017
I am a new Linux user. I would like to know where are the log files located under Debian/Ubuntu or CentOS/RHEL/Fedora Linux server? How do I open or view log…
Attacks…

Hackers can bypass new protections in MacOS High Sierra

29 Nov 201729 Nov 2017
MacOS High Sierra protections can be bypassed, but will make security researchers and companies work more difficult Hackers can bypass a new security feature in MacOS High Sierra to load…
Cyber Security…

Create an effective business continuity plan

25 Nov 2017
A business continuity plan outlines procedures and instructions an organization must follow in the face of disaster, whether fire, flood or cyberattack. Here's how to create one that gives your…
Cloud Security…

Create Your Own VPN with AWS

24 Nov 201723 May 2019
Internet users are spoiled for choice when it comes to VPN services, but they either require a monthly subscription, aren’t secure, or are just plain slow. Thankfully, alternatives do exist.…
Cyber Security…

OWASP A1 – Injection, Cause and Prevention

23 Nov 20175 May 2019
Am I Vulnerable To 'Injection'? The best way to find out if an application is vulnerable to injection is to verify that all use of interpreters clearly separates untrusted data…
AppSec…

Exploiting CSRF under NoScript Conditions

22 Nov 201716 Mar 2019
CSRFs -- or Cross-Site Request Forgery vulnerabilities -- occur when a server accepts requests that can be “spoofed” from a site running on a different domain. The attack goes something like this:…
#career…

Black Friday Deals – LSB

22 Nov 201729 Nov 2017
Because we are such good people here at LSB, we like to treat our followers to some fantastic deals that we are offered. So we present them to you. The Linux…
Dark Net…

Best Darkweb Links

20 Nov 201724 Jul 2020
Disclaimer: We are not responsible for anything you may access or view on the darkweb. This post is for educational purposes. Please be cautious and enter at your own risk,…
Dorking…

Google Dorking

16 Nov 201720 Nov 2017
As you all know Google is the most popular search engine in the world. Google serves almost 80% of the search queries on the internet. It itself a big achievement. By doing power…
Bugs…

Amazon Key Lets Delivery People into Your House and It Just Got Hacked

16 Nov 201716 Nov 2017
A hardware safeguard in Amazon’s recently launched while-you’re-out delivery service turns out to have a big hole. And, well—let’s just say you probably should have seen this coming. Amazon Key uses a smart…
AppSec…

On Web Extensions shortcomings and their impact on add-on security

12 Nov 201712 Nov 2017
Recently, I reported a security issue in the new Firefox Screenshots feature (fixed in Firefox 56). This issue is remarkable for a number of reasons. First of all, the vulnerable code was…
Attacks…

WAFNinja – Web Application Firewall Attack Tool

7 Nov 201729 Jan 2019
WAFNinja is a Python-based Web Application Firewall Attack Tool designed to help penetration testers execute WAF bypass by automating the steps necessary to bypass input validation. The tool was created…
Entertainment…

KRACKing WPA2

19 Oct 201719 Oct 2017
Our main attack is against the 4-way handshake of the WPA2 protocol. This handshake is executed when a client wants to join a protected Wi-Fi network, and is used to…
Hacking…

Linux commands everyone should know

29 Aug 201729 Aug 2017
sysadmin commands for Linux development environments, containers, virtual machines (VMs), and bare metal. In a world bursting with new tools and diverse development environments, it's practically a necessity for any…

Posts navigation

Older posts
Newer posts

RSS ls -a /Zer0Days

  • [webapps] GetSimple CMS My SMTP Contact Plugin 1.1.1 - CSRF to RCE 16 Apr 2021
  • [dos] glFTPd 2.11a - Remote Denial of Service 15 Apr 2021
  • [webapps] htmly 2.8.0 - 'description' Stored Cross-Site Scripting (XSS) 15 Apr 2021
  • [webapps] Tileserver-gl 3.0.0 - 'key' Reflected Cross-Site Scripting (XSS) 15 Apr 2021
  • [webapps] Horde Groupware Webmail 5.2.22 - Stored XSS 15 Apr 2021

Follow Us

  • Twitter
  • Facebook
  • Tumblr
  • Reddit

RSS Crypto News

  • An error has occurred; the feed is probably down. Try again later.

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,461 other followers

ls /categories

AppSec Attacks Bugs Cryptography Cyber Security Education Encryption Entertainment Exploits Hacking Linux Open Source Operating Systems OWASP Penetration Testing Privacy Security Technology Tips Tutorials

ls /comments

kioptrix vm on PenTesting: Gaining Root Privi…
Johnny Dickman (@Dar… on The Darknet 2019
XXS Attack – P… on Payload in PDF
Fred (@Fred37063593) on The Hidden Wiki
The Privacy Pros and… on A Beginners Guide to I2P
ls /blog 🐧🛡️🌐 (@lsbd… on Discover & Attack Raspberr…

Support Us

Support ls /blog

€5.00

ls -a -v /community

ls /MostVisited

  • Best Darkweb Links
    Best Darkweb Links
  • Payload in PDF
    Payload in PDF
  • Crack WPA Handshake using Aircrack with Kali Linux
    Crack WPA Handshake using Aircrack with Kali Linux
  • BlueKeep - Exploit Windows (RDP Vulnerability) Remotely
    BlueKeep - Exploit Windows (RDP Vulnerability) Remotely
  • Best Onion Links
    Best Onion Links
  • Hacking Android With Metasploit
    Hacking Android With Metasploit
  • Explore The Dark Web Anonymously
    Explore The Dark Web Anonymously
  • Windows Takeover with a PDF File
    Windows Takeover with a PDF File
  • Write a Ping Sweeper in 4 Lines of Bash
    Write a Ping Sweeper in 4 Lines of Bash
  • Find Vulnerable Devices On The Internet With Shodan
    Find Vulnerable Devices On The Internet With Shodan

ls /Archives

Follow ls /blog on WordPress.com

We Use Social Media

  • Twitter
  • Reddit
  • Facebook
  • Tumblr
  • Pinterest
  • YouTube
Create a website or blog at WordPress.com
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
Cancel

You must be logged in to post a comment.

Loading Comments...
Comment
    ×