Skip to content
March 25, 2026

IOSEC.IN

Ideas, Observations & Stories in Cybersecurity

  • About Me
    • Contact Us
    • Privacy Policy
  • AI
  • Web Security
    • Install Sqlmap on Windows
    • OS Command Injection : Simple yet effective
    • Back Refresh Attack Vulnerability on QualysGuard- Your browser’s back button can do more than you think !!
    • CSV Macro Injection
    • SQL Injection- Not a Cup of Cake
  • Operating System
    • Linux
  • Certification
  • Cyber Security
    • Cryptography
    • Cloud Security
  • Blog
Newsletter
Random News
  • Home
  • Operating System

Category: Operating System

  • Operating System
  • Web Security
8 years ago

OS Command Injection : Simple yet effective

What is OS Command Injection OS Command Injection is a vulnerability which describes improper neutralization of special elements. It can result in modification of the intended OS command that is sent to a downstream component. So, OS command injection weaknesses can expose an environment to an attacker even if he does not have direct access…

Read More
Shekhar Suman42 mins
  • Operating System
8 years ago

Kernel bridge is melting down – Meltdown Vulnerability with POC on Ubuntu/Kali(Intel)

Hello folks ! I know it has been a long while since I wrote on this weblog. But the start of this year was much enthusiastic in terms of newly discovered vulnerabilities. Yes I am talking about Spectre and Meltdown So today we will discuss about Meltdown.  What the heck it is ! Spectre and Meltdown…

Read More
Shekhar Suman02 mins

Author Info

Shekhar Suman

Security isn't a feature. It's an architecture decision.

-----

I'm Shekhar Suman — a cybersecurity professional and trainer with over a 15 years of experience in Offensive and Defensive security. I work with organizations to harden their security architecture and with teams to build the mindset that makes it stick.

This blog is where I think out loud about the problems worth solving.

-----

All views expressed here are personal and do not reflect my employer's prospective.

Categories

  • AI
  • Certification
  • Cloud Security
  • Cryptography
  • Cyber Security
  • Linux
  • Mobile Application Security
  • Operating System
  • OT Security
  • Secure SDLC
  • Web Security

Recent Posts

  • Security as Code: Getting Started with OPA and Rego — Part 1
  • AI Is Flooding Open Source — And Most of It Won’t Survive (2026)
  • CVE-to-OT Impact Translator – COIT
  • LANCE: An Open Source Framework for Automated Red Teaming of LLMs (2025)
  • Jailbreaking vs. Prompt Injection: Same Problem, Different Names — Or Is It?

Recent Comments

  1. End-to-End LLM Security Architecture: How All the Defenses Fit Together - IOSEC.IN on Multi-Agent Prompt Injection: When One Poisoned Node Corrupts the Entire Swarm
  2. End-to-End LLM Security Architecture: How All the Defenses Fit Together - IOSEC.IN on Indirect Prompt Injection in RAG Pipelines: The Riskiest AI Threat Enterprise Teams Are Ignoring
  3. End-to-End LLM Security Architecture: How All the Defenses Fit Together - IOSEC.IN on Prompt Injection: The Vulnerability Nobody Is Taking Seriously Enough
  4. Multi-Agent Prompt Injection: When One Poisoned Node Corrupts the Entire Swarm - IOSEC.IN on Indirect Prompt Injection in RAG Pipelines: The Riskiest AI Threat Enterprise Teams Are Ignoring
  5. Indirect Prompt Injection in RAG Pipelines: The Riskiest AI Threat Enterprise Teams Are Ignoring - IOSEC.IN on Prompt Injection: The Vulnerability Nobody Is Taking Seriously Enough

Archives

  • March 2026
  • February 2026
  • January 2026
  • August 2025
  • February 2024
  • January 2024
  • November 2021
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • May 2017
  • January 2017
  • December 2016
  • March 2016
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
iosec.in Powered By BlazeThemes.