Skip to content
March 2, 2026

IOSEC.IN

Ideas, Observations & Stories in Cybersecurity

  • About Me
    • Contact Us
    • Privacy Policy
  • AI
  • Web Security
    • Install Sqlmap on Windows
    • OS Command Injection : Simple yet effective
    • Back Refresh Attack Vulnerability on QualysGuard- Your browser’s back button can do more than you think !!
    • CSV Macro Injection
    • SQL Injection- Not a Cup of Cake
  • Operating System
    • Linux
  • Certification
  • Cyber Security
    • Cryptography
    • Cloud Security
  • Blog
Newsletter
Random News
  • Home
  • Password

Tag: Password

  • Linux
11 years ago

Shadows are there to protect your Passwords (How Shadow-Utils is storing your password in Linux)

Our world would have been exponentially more peaceful if there was no fear of theft. We would’ve left our doors open but still enjoyed our privacy and security. Unfortunately looking at the current scenario, that’s a rather impossible fiasco. And hence the need for doors and locks. A similar case is applicable for the digital…

Read More
Shekhar Suman01 mins

Author Info

Shekhar Suman

Security isn't a feature. It's an architecture decision.

-----

I'm Shekhar Suman — a cybersecurity professional and trainer with over a 15 years of experience in Offensive and Defensive security. I work with organizations to harden their security architecture and with teams to build the mindset that makes it stick.

This blog is where I think out loud about the problems worth solving.

-----

All views expressed here are personal and do not reflect my employer's prospective.

Categories

  • AI
  • Certification
  • Cloud Security
  • Cryptography
  • Cyber Security
  • Linux
  • Mobile Application Security
  • Operating System
  • Secure SDLC
  • Web Security

Recent Posts

  • Multi-Agent Prompt Injection: When One Poisoned Node Corrupts the Entire Swarm
  • Indirect Prompt Injection in RAG Pipelines: The Riskiest AI Threat Enterprise Teams Are Ignoring
  • Prompt Injection: The Vulnerability Nobody Is Taking Seriously Enough
  • Failure of Secure SDLC: Why Vulnerabilities Still Ship
  • Passing GIAC Security Leadership (GSLC) Exam

Recent Comments

  1. Multi-Agent Prompt Injection: When One Poisoned Node Corrupts the Entire Swarm - IOSEC.IN on Indirect Prompt Injection in RAG Pipelines: The Riskiest AI Threat Enterprise Teams Are Ignoring
  2. Indirect Prompt Injection in RAG Pipelines: The Riskiest AI Threat Enterprise Teams Are Ignoring - IOSEC.IN on Prompt Injection: The Vulnerability Nobody Is Taking Seriously Enough
  3. Passing GIAC Security Leadership (GSLC) Exam - IOSEC.IN on CSSLP: A Journey of Relearning How Security Should Be Built
  4. Akira Ransomware: Techniques, Payloads on Ransomware 101: Understanding the Threat
  5. Insecure Deserialization in .NET: Risk and Fixing Legacy Code - iosec.in on Insecure Deserialization: A Silent Killer in Modern Applications

Archives

  • February 2026
  • January 2026
  • August 2025
  • February 2024
  • January 2024
  • November 2021
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • May 2017
  • January 2017
  • December 2016
  • March 2016
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
iosec.in Powered By BlazeThemes.