Skip to content

research.securitum.com

securitum.com vulnerabilities researches and cyber security education publications

  • About us
  • Penetration Testing
  • Contact us

Tag: Linux

From the pentester library – several ways to raise privileges in Linux

Łukasz Wierzbicki | May 22, 2017September 30, 2019 | Education

From the text you will find out how: get information about the Linux system use the obtained information to search for local vulnerabilities take advantage of vulnerability (on the example of CVE-2016-5195 – Dirty COW) look for and take use of configuration errors In this article I would like to present how to convert the …

Read more

Linux security monitoring: auditd + OSSEC integration part I

Bartek Jerzman | July 13, 2015September 30, 2019 | Education

This article is devoted to the integration of two well-known and proven open source tools for security monitoring: change audit software for Linux (auditd) and Host IDS OSSEC. The aim of this article is to learn the limitations and use the advantages of both of these tools so that by acting in tandem they can …

Read more

Research updates?

We keep your data private and use it only for research updates newsletter. We also hate spam! Read our Privacy Policy.

Check your inbox or spam folder to confirm your subscription.

For more follow us on Twitter!

Follow @securitum_com

Categories

  • Education 34
  • Research 30
  • Uncategorized 1

Tags

Analysis · Apache · Bug Bounty · Bypass · CA · Camera · Car · Card · CCTV · Censys · Cisco · Cordova · Credit Card · Cryptography · CSS · Desktop · dompurify · Google · Google Chrome · Hack · hacking · Hangouts · HTTP · HTTP/2 · IoT · javascript · Linux · Malware · Mozilla Firefox · NMAP · Payment · Paypass · Race Condition · RCE · Reconnaissance · Shodan · Spoofing · SSL · Takeover · Upload · Vulnerability · Web Hacking · XSS · XSSMas · Zoomeye

Archives

  • 2021 3
  • 2020 10
  • 2019 8
  • 2018 10
  • 2017 18
  • 2016 8
  • 2015 5

Post of the month

18 Nov 2019

XSS in GMail’s AMP4Email via DOM Clobbering

Michał Wnękowicz

Security Research Manager

For this month I propose: "XSS in GMail's AMP4Email via DOM Clobbering" which was nominated to "Top 10 web hacking techniques of 2019" by Portswigger.

READ MORE

Follow us on:

  • LinkedIn
  • Facebook
  • Twitter
  • GitHub

Pages

  • Research Home Page
  • Penetration Testing
  • Privacy Policy
  • About us
  • Contact us

Recent Posts

  • Is running legacy software with no publicly known exploits safe? November 23, 2021
  • Comparison of reverse image searching in popular search engines [OSINT hints] August 11, 2021
  • fail2ban – Remote Code Execution July 26, 2021
  • Helping secure DOMPurify (part 1) December 21, 2020
  • Mutation XSS via namespace confusion – DOMPurify < 2.0.17 bypass September 21, 2020
©2022 research.securitum.com