Skip to content

Linux Security Blog

How Hackers Work

Search
  • Home
  • Shep Tutorials
    • Set Up Security Shepherd On VMWare
    • Failure To Restrict Access – Solution
    • Insecure DOR – Solution
    • Poor Data Validation – Solution
    • Security Misconfiguration – Solution
    • Insecure Direct Object Reference 2 Solution
    • Cross Site Scripting One Solution
    • SQL Injection Solution
    • OWASP Security Shepherd – Failure To Restrict Access Solution
    • Session Management Challenge One – Solution
  • GNS3 Series
    • Install GNS3 2.2 on Windows10 | Download Link Included
    • Import VirtualBox Images to GNS3
  • Python Series
    • Part I
    • Part II
  • About

Tag: #certification

Cloud Security…

15% Off Enterprise IT & Linux System Admin

12 Feb 2018
Starting February 12, we’re offering 15% off any Enterprise IT & Linux System Administration Training courses. Check out the full details below: Promotion Details15% off any Enterprise IT & Linux…
Attacks…

Nmap Scripts for Recon

5 Dec 201727 Dec 2018
These Nmap NSE Scripts are all included in standard installations of Nmap. Use them to gather additional information on the targets you are scanning. The information can both add context…
Cloud Security…

Create Your Own VPN with AWS

24 Nov 201723 May 2019
Internet users are spoiled for choice when it comes to VPN services, but they either require a monthly subscription, aren’t secure, or are just plain slow. Thankfully, alternatives do exist.…
AppSec…

OWASP – A2 – Broken Authentication and Session Management – LSB

24 Nov 201729 Jun 2018
Threat Agents Consider anonymous external attackers, as well as users with their own accounts, who may attempt to steal accounts from others. Also consider insiders wanting to disguise their actions.…
Cyber Security…

LSB Afilliate Programs

22 Nov 201728 Nov 2017
I thank each and every one of you for visiting my blog, you are the reason we are still able to keep LSB alive. As you may or may not…
AppSec…

Exploiting CSRF under NoScript Conditions

22 Nov 201716 Mar 2019
CSRFs -- or Cross-Site Request Forgery vulnerabilities -- occur when a server accepts requests that can be “spoofed” from a site running on a different domain. The attack goes something like this:…
Dark Net…

Best Darkweb Links

20 Nov 201724 Jul 2020
Disclaimer: We are not responsible for anything you may access or view on the darkweb. This post is for educational purposes. Please be cautious and enter at your own risk,…
AppSec…

A Guide to Not Getting Hacked

20 Nov 20175 Mar 2019
Hackers steal hundreds of millions of passwords in one swoop and occasionally cause large-scale blackouts. The future is probably not going to get better, with real-life disasters caused by internet-connected knick-knacks, smart home robots that could kill…
Cyber Security…

Best firewalls for business

16 Nov 201716 Nov 2017
"There are countless options to choose from when considering firewall protection. Should you invest in an external firewall, stick with a virtual firewall or take the plunge with both? The…

RSS ls -a /Zer0Days

  • [webapps] TLR-2005KSH - Arbitrary File Delete 12 May 2022
  • [webapps] Royal Event Management System 1.0 - 'todate' SQL Injection (Authenticated) 12 May 2022
  • [webapps] College Management System 1.0 - 'course_code' SQL Injection (Authenticated) 12 May 2022
  • [remote] F5 BIG-IP 16.0.x - Remote Code Execution (RCE) 12 May 2022
  • [webapps] TLR-2005KSH - Arbitrary File Upload 11 May 2022

Follow Us

  • Twitter
  • Facebook
  • Tumblr
  • Reddit

RSS Crypto News

  • An error has occurred; the feed is probably down. Try again later.

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,438 other followers

ls /categories

AppSec Attacks Bugs Cryptography Cyber Security Education Encryption Entertainment Exploits Hacking Linux Open Source Operating Systems OWASP Penetration Testing Privacy Security Technology Tips Tutorials

ls /comments

Settinguplimitedcomp… on How to Easily Find Anyone on t…
Foster Eli on Best Darkweb Links
crypstalk21 on Securing Your Crypto Wallet
kioptrix vm on PenTesting: Gaining Root Privi…
Johnny Dickman (@Dar… on The Darknet 2019
XXS Attack – P… on Payload in PDF

ls -a -v /community

ls /MostVisited

  • Best Darkweb Links
    Best Darkweb Links
  • Payload in PDF
    Payload in PDF
  • Crack WPA Handshake using Aircrack with Kali Linux
    Crack WPA Handshake using Aircrack with Kali Linux
  • Write a Ping Sweeper in 4 Lines of Bash
    Write a Ping Sweeper in 4 Lines of Bash
  • Explore The Dark Web Anonymously
    Explore The Dark Web Anonymously
  • BlueKeep - Exploit Windows (RDP Vulnerability) Remotely
    BlueKeep - Exploit Windows (RDP Vulnerability) Remotely
  • Windows Takeover with a PDF File
    Windows Takeover with a PDF File
  • OWASP Security Shepherd- Session Management Challenge One - Solution - LSB
    OWASP Security Shepherd- Session Management Challenge One - Solution - LSB
  • How to Crack a "Master Lock" Combination Lock
    How to Crack a "Master Lock" Combination Lock
  • Import VirtualBox Images to GNS3
    Import VirtualBox Images to GNS3

ls /Archives

Follow Linux Security Blog on WordPress.com

We Use Social Media

  • Twitter
  • Reddit
  • Facebook
  • Tumblr
  • Pinterest
  • YouTube
Create a website or blog at WordPress.com
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
  • Follow Following
    • Linux Security Blog
    • Join 2,438 other followers
    • Already have a WordPress.com account? Log in now.
    • Linux Security Blog
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar