Questions tagged [unix]
Unix is a family of multiuser, multitasking operating system that is widely used in workstations, servers and embedded devices. The best-known Unix variant is Linux.
154 questions
0 votes
1 answer
201 views
What are the security related challenges in implementing something like Unix sudo?
There exist several sudo alternatives (systemd's run0, OpenBSD and doas, etc.), all created after sudo has been an established tool, allegedly for security reasons. If someone were to implement Unix ...
0 votes
1 answer
174 views
I have access to companies internal files through SSRF and Path traversal both but want to leverage it further to website takeover
I have access to companies internal files through SSRF and Path traversal both but want to leverage it further to website takeover. Thus I can increase the impact and get more bounty then what they ...
0 votes
1 answer
131 views
Why does this method of modifying kernel memory work?
I have no experience of kernel programming or anything low level. I just watched this video and at 21:10 the presenter started to talk about modifying kernel memory using two pointers. From my ...
1 vote
1 answer
1k views
Is TLS needed on loopback for local security?
So the scenario is that we have a server shared with a number of users, with me being the server administrator and able to determine permission assignments. The server is running a service on loopback ...
0 votes
3 answers
448 views
Would FreeBSD and OpenBSD have similar known-past-vulnerability stats if they were configured similarly?
OpenBSD has had much fewer "code execution" vulnerabilities and even fewer exploits than FreeBSD, according to https://cvedetails.com : https://www.cvedetails.com/product/163/Openbsd-...
2 votes
1 answer
2k views
Private IPC between two processes
I am writing a C program in which I have a client on a process and a server on another process on the same machine. I don't know much about IPC, I would like to have a "channel" that allows ...
1 vote
1 answer
1k views
Reverse PHP shell exit when netcat listening
My reverse shell is exiting when i lsten it with netcat: here is netcat output: listening on [any] 5555 ... connect to [10.9.3.117] from (UNKNOWN) [10.10.47.117] 37602 bash: cannot set terminal ...
0 votes
1 answer
372 views
Using ATA Secure Erase after buying a second-hand laptop : is this enough?
I bought a second-hand laptop from a stranger. My (totally unjustified) concern is that there might be malware on the device. According to this answer, there is no easy fix if it's malicious firmware. ...
4 votes
3 answers
2k views
On a single user laptop does it make sense to have a separte password for root and the user?
I have a laptop on which I'm the only user. While installing the laptop I was wondering why I should choose a different password for the root account and user account. My reasoning is: The change of ...
1 vote
1 answer
596 views
Pass the Hash & Unix
Purpose: test if PtH (Pass the hash) is feasible against Unix box Scenario: Windows host (Windows Server 2008) vulnerable to eternalblue got Administration hash as part of the post-exploitation ...
1 vote
3 answers
2k views
Grep Commands with User Input
I'm curious if there is a way to make user input safe for grep commands. I have a search box that should allow an end user to search a directory recursively for files containing a string. I could ...
5 votes
1 answer
1k views
GPG Agent SSH Forward Pinentry
I have GPG agent forwarding via SSH RemoteForward working, up to a point: I can list my private and public keys on the remote host. If I try to decrypt a file remotely, the PIN is prompted for but ...
1 vote
1 answer
582 views
Feeding entropy pool with my own data [duplicate]
Let's state that I have a huge bunch of truly unpredictable random data in file "random.bin". The random data has been created outside of my system and has been securely transfered into my ...
0 votes
0 answers
165 views
Pwnable: Process has its own home directory
I recently started to do the pwnable.tw challenges. I have no problem understanding the actual buffer-overflow and shellcode injection. However, after the shell is spawned, the flag is read from /...
3 votes
1 answer
1k views
Sanitising a file/folder path from user input
I have an external server make backups of my main server via scp and a backup-only user account. I successfully restricted it to scp only using GNU Rush. The scp command below executed on the backup ...