Skip to main content

Questions tagged [root]

2 votes
1 answer
79 views

In my organization, there is an enterprise version of Postgres (in-house developed) that implements a Transparent data encryption scheme. The way to encrypt a DB is: Create an encryption key, and a ...
cantthinkofcoolname's user avatar
10 votes
3 answers
3k views

A number of Linux distros, for quite a while now, by default install no root passwords and always require sudo from another user to become root. Examples are Ubuntu and AWS. This is implemented with ...
Kevin Keane's user avatar
  • 1,201
1 vote
1 answer
159 views

HashiCorp Vault Agent creates a sidecar that talks to the Vault server and injects secrets as files into containers, where the files are located under /vault/secrets/. "render all defined ...
PatPanda's user avatar
  • 111
3 votes
0 answers
811 views

You'll see stuff like the first comment here that adding the --no-sandbox flag when launching puppeteer "is a giant security hole" (upvoted many times). Puppeteer troubleshooting docs say &...
Lance Pollard's user avatar
1 vote
0 answers
154 views

At work, we are deploying a new VoIP solution, and as part of that, we are supposed to install a custom root certificate on our computers and mobile devices. The manufacturer of that VoIP solution ...
Torsten Bronger's user avatar
1 vote
1 answer
624 views

We all know that disabling access to root over ssh is essential for security, that's not what I'm referring to here. I have seen a security best-practice recommendation to either completely disable ...
Kevin Keane's user avatar
  • 1,201
1 vote
1 answer
471 views

I am working on security testing of an android application. There is a root detection in the Android application. objection, frida etc. It is possible to bypass this with ways. My main question is: ...
Exnovan's user avatar
  • 35
0 votes
2 answers
234 views

Sometimes a process crashes and IT department has to log into the server and do a sudo systemctl restart apache2. The idea was now to create a wepage an another server (of course) where users can ...
Hannes's user avatar
  • 151
3 votes
1 answer
796 views

Is there a security risk with running rsync as root to copy potentially malicious files? Or for that matter with any read command like cp, cat, du? Background: I'm moving data from various systems ...
Fizz Khalifa's user avatar
-1 votes
2 answers
1k views

Studing pentest, I was astonished by how easy it was to backdoor a Linux machine after I got root. I just needed to compile a program like this: #define _GNU_SOURCE #include <stdlib.h> #include &...
psico_disk's user avatar
1 vote
0 answers
705 views

Is there any way to get into the root file system in android with an already installed msfvenom apk in reverse_tcp (to get the whatsapp encryption key)
LWX 's user avatar
  • 11
0 votes
3 answers
459 views

According to wikipedia, Linux's security compared to Windows is generally due to "the malware's lack of root access." Why doesn't Windows just fix this?
atolnay's user avatar
  • 17
7 votes
2 answers
2k views

Usually we place things in /opt so they are owned by root but normal users can execute them. This prevents normal users modifying the binaries so they cannot execute arbitrary stuff. However, to put ...
Poperton's user avatar
  • 317
0 votes
0 answers
193 views

Is it possible to inject code into RAM using physical access? For example desolder the RAM chips, solder something between the original RAM chip and the phone motherboard, and use that to directly ...
userdatagram's user avatar
3 votes
2 answers
1k views

Assuming that I can delete arbitrary files on a linux system as a non-privileged user, what methods exist to escalate my privileges this way?
user16910689's user avatar

15 30 50 per page
1
2 3 4 5 6