Normal view
Organizations Warned of Exploited Linux Vulnerabilities
The flaws allow threat actors to obtain root privileges or bypass authentication via Telnet and gain shell access as root.
The post Organizations Warned of Exploited Linux Vulnerabilities appeared first on SecurityWeek.
Old Attack, New Speed: Researchers Optimize Page Cache Exploits
A team of researchers from the Graz University of Technology in Austria has revived page Linux page cache attacks.
The post Old Attack, New Speed: Researchers Optimize Page Cache Exploits appeared first on SecurityWeek.
New VoidLink malware framework targets Linux cloud servers
01flip: Multi-Platform Ransomware Written in Rust
01flip is a new ransomware family fully written in Rust. Activity linked to 01flip points to alleged dark web data leaks.
The post 01flip: Multi-Platform Ransomware Written in Rust appeared first on Unit 42.

-
Black Hills Information Security, Inc.

- Auditd Field Spoofing: Now You Auditd Me, Now You Auditdonβt
Auditd Field Spoofing: Now You Auditd Me, Now You Auditdonβt
![]()
moth // IntroductionΒ One fateful night in June of 2022, Ethan sent a message to the crew: βAnyone know ways to foolΒ AuditdΒ on Linux?Β IβmΒ trying to figure out how to change theΒ auidΒ (audit [β¦]
The post Auditd Field Spoofing: Now You Auditd Me, Now You Auditdonβt appeared first on Black Hills Information Security, Inc..
Linux System Call MonitoringΒ
![]()
moth // Iβve been diving deep into Linux lately, with my latest kick being exploring the Linux kernel. Iβve found βThe Linux Programming Interfaceβ (TLPI) by Michael Kerrisk, among others, [β¦]
The post Linux System Call MonitoringΒ appeared first on Black Hills Information Security, Inc..
-
Black Hills Information Security, Inc.

- Webcast: Linux Forensics Magical Mystery Tour With Hal Pomeranz
Webcast: Linux Forensics Magical Mystery Tour With Hal Pomeranz
![]()
One of our favorite BHIS guest presenters, Hal Pomeranz, returns for more of the Linux goodness. Roll up for a magical tour through the mysteries of Linux file systems! Relative [β¦]
The post Webcast: Linux Forensics Magical Mystery Tour With Hal Pomeranz appeared first on Black Hills Information Security, Inc..
Webcast: Linux Command Line Dojo with Hal Pomeranz
![]()
In this webcast, we have our friend Hal Pomeranz sharing his massive knowledge on Linux. If youβre new to Linux, or if you know it and just want to hear [β¦]
The post Webcast: Linux Command Line Dojo with Hal Pomeranz appeared first on Black Hills Information Security, Inc..
Fixing EyeWitness Install Errors on Kali Linux
![]()
Darin Roberts // I recently had to install a new gold image as my Kali Linux testing virtual machine.Β Almost on every test I do, I clone the gold image [β¦]
The post Fixing EyeWitness Install Errors on Kali Linux appeared first on Black Hills Information Security, Inc..
-
Black Hills Information Security, Inc.

- How to Crack Passwords in the Cloud with GPU Acceleration (Kali 2017)
How to Crack Passwords in the Cloud with GPU Acceleration (Kali 2017)
![]()
Carrie Roberts* // How does password cracking in the cloud compare to down here on earth? Maybe not as heavenly as imagined. I saw this on the web and got [β¦]
The post How to Crack Passwords in the Cloud with GPU Acceleration (Kali 2017) appeared first on Black Hills Information Security, Inc..
-
Black Hills Information Security, Inc.

- How to DIY a Mobile Hacking Platform β Kali NetHunter on a Rooted Nexus7
How to DIY a Mobile Hacking Platform β Kali NetHunter on a Rooted Nexus7
![]()
Derek Banks // Β As pentesters, it is probably not a surprise that we tend to make fairly heavyΒ use of Kali LinuxΒ on a fairly regular basis. The folks at Offensive [β¦]
The post How to DIY a Mobile Hacking Platform β Kali NetHunter on a Rooted Nexus7 appeared first on Black Hills Information Security, Inc..
Two Button PWNage
![]()
Logan Lembke // Step One: Power. Step Two: Enter. Step Three: ???? Step Four: Profit. In the security industry, we love our encryption. However sometimes, the complexity introduced by encryption [β¦]
The post Two Button PWNage appeared first on Black Hills Information Security, Inc..
Lawrenceβs List 090216
Lawrence Hoffmann // Election fraud is something Iβve mentioned here recently. The reality we must face here is that any time a digital system is used for voting there is [β¦]
The post Lawrenceβs List 090216 appeared first on Black Hills Information Security, Inc..
Time To Bash on Windows (Bourne Again Shell That Is)
Editorβs Note: This is another awesomeΒ guest post from our friend, Robert Schwass. If youβd like to guest post contact us here. Robert Schwass // I had heard the rumors about [β¦]
The post Time To Bash on Windows (Bourne Again Shell That Is) appeared first on Black Hills Information Security, Inc..
Lawrenceβs List 071516
Lawrence Hoffman // Hey, Iβm back! Vacation was great. I spent part of last week on an Island so I was unable to scratch the keep-up-with-the-media itch. Now that Iβm [β¦]
The post Lawrenceβs List 071516 appeared first on Black Hills Information Security, Inc..
Securing Your Way to Restful Sleep with Ansible Galaxy
Jordan Drysdale // Β Life as a βblue-teamerβ can often be a stressful experience. Working in an environment with a strong Linux infrastructure Β can help some, but Ansible Β can help [β¦]
The post Securing Your Way to Restful Sleep with Ansible Galaxy appeared first on Black Hills Information Security, Inc..
SSH Config Files
Ethan Robish // Hereβs a short intro for anyone not familiar with ssh config files, which are usually located at ~/.ssh/config As an example, you have ssh running on port [β¦]
The post SSH Config Files appeared first on Black Hills Information Security, Inc..
Lawrenceβs List 061316
Editorβs Note: Weβll feature Lawrenceβs List every week. Β It will include interesting things heβs come across during the week as heβs an avid consumer of internet garbage and follows a [β¦]
The post Lawrenceβs List 061316 appeared first on Black Hills Information Security, Inc..
How to create a SOHO router using Ubuntu Linux
![]()
Joff Thyer // This post is cross-posted from Packet Header on 3/1/16. __________ Β On Security Weekly Episode 452, I presented a technical segment on how to build your own [β¦]
The post How to create a SOHO router using Ubuntu Linux appeared first on Black Hills Information Security, Inc..





