Questions tagged [root]
The root tag has no summary.
86 questions
2 votes
1 answer
79 views
Postgres Transparent data encryption: Can encryption key be protected from root?
In my organization, there is an enterprise version of Postgres (in-house developed) that implements a Transparent data encryption scheme. The way to encrypt a DB is: Create an encryption key, and a ...
10 votes
3 answers
3k views
Linux root account without password - what are the issues, and how to address them?
A number of Linux distros, for quite a while now, by default install no root passwords and always require sudo from another user to become root. Examples are Ubuntu and AWS. This is implemented with ...
1 vote
1 answer
159 views
Root takeover attack on Kubernetes host despite Vault agent
HashiCorp Vault Agent creates a sidecar that talks to the Vault server and injects secrets as files into containers, where the files are located under /vault/secrets/. "render all defined ...
3 votes
0 answers
811 views
How does a hacker get access to the root user when disabling the sandbox in puppeteer, and what does it look like?
You'll see stuff like the first comment here that adding the --no-sandbox flag when launching puppeteer "is a giant security hole" (upvoted many times). Puppeteer troubleshooting docs say &...
1 vote
0 answers
154 views
Is it common practice that vendors put own root certificates on customer devices? [closed]
At work, we are deploying a new VoIP solution, and as part of that, we are supposed to install a custom root certificate on our computers and mobile devices. The manufacturer of that VoIP solution ...
1 vote
1 answer
624 views
disabling root login and using rescue mode
We all know that disabling access to root over ssh is essential for security, that's not what I'm referring to here. I have seen a security best-practice recommendation to either completely disable ...
1 vote
1 answer
471 views
Bypassing root detection qualify as a vulnerability?
I am working on security testing of an android application. There is a root detection in the Android application. objection, frida etc. It is possible to bypass this with ways. My main question is: ...
0 votes
2 answers
234 views
Security risk by setting authorized_key for root user and limiting to one command?
Sometimes a process crashes and IT department has to log into the server and do a sudo systemctl restart apache2. The idea was now to create a wepage an another server (of course) where users can ...
3 votes
1 answer
796 views
Is running rsync as root problematic?
Is there a security risk with running rsync as root to copy potentially malicious files? Or for that matter with any read command like cp, cat, du? Background: I'm moving data from various systems ...
-1 votes
2 answers
1k views
How to backdoor windows?
Studing pentest, I was astonished by how easy it was to backdoor a Linux machine after I got root. I just needed to compile a program like this: #define _GNU_SOURCE #include <stdlib.h> #include &...
1 vote
0 answers
705 views
Get root permission on android for metasploit
Is there any way to get into the root file system in android with an already installed msfvenom apk in reverse_tcp (to get the whatsapp encryption key)
0 votes
3 answers
459 views
What prevents Windows from being as secure as Linux? [duplicate]
According to wikipedia, Linux's security compared to Windows is generally due to "the malware's lack of root access." Why doesn't Windows just fix this?
7 votes
2 answers
2k views
/opt and sudo unzip to /opt, is it safe?
Usually we place things in /opt so they are owned by root but normal users can execute them. This prevents normal users modifying the binaries so they cannot execute arbitrary stuff. However, to put ...
0 votes
0 answers
193 views
Is it possible to inject code using physical memory access to jailbreak phones?
Is it possible to inject code into RAM using physical access? For example desolder the RAM chips, solder something between the original RAM chip and the phone motherboard, and use that to directly ...
3 votes
2 answers
1k views
Privilege escalation through arbitrary file delete
Assuming that I can delete arbitrary files on a linux system as a non-privileged user, what methods exist to escalate my privileges this way?