Skip to content
March 6, 2026

IOSEC.IN

Ideas, Observations & Stories in Cybersecurity

  • About Me
    • Contact Us
    • Privacy Policy
  • AI
  • Web Security
    • Install Sqlmap on Windows
    • OS Command Injection : Simple yet effective
    • Back Refresh Attack Vulnerability on QualysGuard- Your browser’s back button can do more than you think !!
    • CSV Macro Injection
    • SQL Injection- Not a Cup of Cake
  • Operating System
    • Linux
  • Certification
  • Cyber Security
    • Cryptography
    • Cloud Security
  • Blog
Newsletter
Random News
  • Home
  • Operating System

Category: Operating System

  • Operating System
  • Web Security
8 years ago

OS Command Injection : Simple yet effective

What is OS Command Injection OS Command Injection is a vulnerability which describes improper neutralization of special elements. It can result in modification of the intended OS command that is sent to a downstream component. So, OS command injection weaknesses can expose an environment to an attacker even if he does not have direct access…

Read More
Shekhar Suman42 mins
  • Operating System
8 years ago

Kernel bridge is melting down – Meltdown Vulnerability with POC on Ubuntu/Kali(Intel)

Hello folks ! I know it has been a long while since I wrote on this weblog. But the start of this year was much enthusiastic in terms of newly discovered vulnerabilities. Yes I am talking about Spectre and Meltdown So today we will discuss about Meltdown.  What the heck it is ! Spectre and Meltdown…

Read More
Shekhar Suman02 mins

Author Info

Shekhar Suman

Security isn't a feature. It's an architecture decision.

-----

I'm Shekhar Suman — a cybersecurity professional and trainer with over a 15 years of experience in Offensive and Defensive security. I work with organizations to harden their security architecture and with teams to build the mindset that makes it stick.

This blog is where I think out loud about the problems worth solving.

-----

All views expressed here are personal and do not reflect my employer's prospective.

Categories

  • AI
  • Certification
  • Cloud Security
  • Cryptography
  • Cyber Security
  • Linux
  • Mobile Application Security
  • Operating System
  • Secure SDLC
  • Web Security

Recent Posts

  • End-to-End LLM Security Architecture: How All the Defenses Fit Together
  • Multi-Agent Prompt Injection: When One Poisoned Node Corrupts the Entire Swarm
  • Indirect Prompt Injection in RAG Pipelines: The Riskiest AI Threat Enterprise Teams Are Ignoring
  • Prompt Injection: The Vulnerability Nobody Is Taking Seriously Enough
  • Failure of Secure SDLC: Why Vulnerabilities Still Ship

Recent Comments

  1. Multi-Agent Prompt Injection: When One Poisoned Node Corrupts the Entire Swarm - IOSEC.IN on Indirect Prompt Injection in RAG Pipelines: The Riskiest AI Threat Enterprise Teams Are Ignoring
  2. Indirect Prompt Injection in RAG Pipelines: The Riskiest AI Threat Enterprise Teams Are Ignoring - IOSEC.IN on Prompt Injection: The Vulnerability Nobody Is Taking Seriously Enough
  3. Passing GIAC Security Leadership (GSLC) Exam - IOSEC.IN on CSSLP: A Journey of Relearning How Security Should Be Built
  4. Akira Ransomware: Techniques, Payloads on Ransomware 101: Understanding the Threat
  5. Insecure Deserialization in .NET: Risk and Fixing Legacy Code - iosec.in on Insecure Deserialization: A Silent Killer in Modern Applications

Archives

  • March 2026
  • February 2026
  • January 2026
  • August 2025
  • February 2024
  • January 2024
  • November 2021
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • May 2017
  • January 2017
  • December 2016
  • March 2016
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
iosec.in Powered By BlazeThemes.