Skip to main content

Questions tagged [unix]

Unix is a family of multiuser, multitasking operating system that is widely used in workstations, servers and embedded devices. The best-known Unix variant is Linux.

0 votes
1 answer
201 views

There exist several sudo alternatives (systemd's run0, OpenBSD and doas, etc.), all created after sudo has been an established tool, allegedly for security reasons. If someone were to implement Unix ...
Oliver Gondža's user avatar
0 votes
1 answer
174 views

I have access to companies internal files through SSRF and Path traversal both but want to leverage it further to website takeover. Thus I can increase the impact and get more bounty then what they ...
oo7hacker's user avatar
0 votes
1 answer
131 views

I have no experience of kernel programming or anything low level. I just watched this video and at 21:10 the presenter started to talk about modifying kernel memory using two pointers. From my ...
Nicholas Humphrey's user avatar
1 vote
1 answer
1k views

So the scenario is that we have a server shared with a number of users, with me being the server administrator and able to determine permission assignments. The server is running a service on loopback ...
Chaser hkj's user avatar
0 votes
3 answers
448 views

OpenBSD has had much fewer "code execution" vulnerabilities and even fewer exploits than FreeBSD, according to https://cvedetails.com : https://www.cvedetails.com/product/163/Openbsd-...
MWB's user avatar
  • 353
2 votes
1 answer
2k views

I am writing a C program in which I have a client on a process and a server on another process on the same machine. I don't know much about IPC, I would like to have a "channel" that allows ...
Andrea Rubi's user avatar
1 vote
1 answer
1k views

My reverse shell is exiting when i lsten it with netcat: here is netcat output: listening on [any] 5555 ... connect to [10.9.3.117] from (UNKNOWN) [10.10.47.117] 37602 bash: cannot set terminal ...
Grainbox's user avatar
0 votes
1 answer
372 views

I bought a second-hand laptop from a stranger. My (totally unjustified) concern is that there might be malware on the device. According to this answer, there is no easy fix if it's malicious firmware. ...
Banjo's user avatar
  • 33
4 votes
3 answers
2k views

I have a laptop on which I'm the only user. While installing the laptop I was wondering why I should choose a different password for the root account and user account. My reasoning is: The change of ...
Martijn de Munnik's user avatar
1 vote
1 answer
596 views

Purpose: test if PtH (Pass the hash) is feasible against Unix box Scenario: Windows host (Windows Server 2008) vulnerable to eternalblue got Administration hash as part of the post-exploitation ...
t5j's user avatar
  • 49
1 vote
3 answers
2k views

I'm curious if there is a way to make user input safe for grep commands. I have a search box that should allow an end user to search a directory recursively for files containing a string. I could ...
Billy Bones's user avatar
5 votes
1 answer
1k views

I have GPG agent forwarding via SSH RemoteForward working, up to a point: I can list my private and public keys on the remote host. If I try to decrypt a file remotely, the PIN is prompted for but ...
ephemeric's user avatar
1 vote
1 answer
582 views

Let's state that I have a huge bunch of truly unpredictable random data in file "random.bin". The random data has been created outside of my system and has been securely transfered into my ...
Algiz's user avatar
  • 111
0 votes
0 answers
165 views

I recently started to do the pwnable.tw challenges. I have no problem understanding the actual buffer-overflow and shellcode injection. However, after the shell is spawned, the flag is read from /...
Sam's user avatar
  • 1
3 votes
1 answer
1k views

I have an external server make backups of my main server via scp and a backup-only user account. I successfully restricted it to scp only using GNU Rush. The scp command below executed on the backup ...
ᴍᴇʜᴏᴠ's user avatar

15 30 50 per page
1
2 3 4 5
11