Skip to content

Tag: security

Meaning of the read permission for binary executable?

I am interested in the full impact of the read permission for binary executables. Indeed, I have encountered some behaviors that I wish to understand. Let’s say I have a C program that just call sleep(300). When the binary has the read permission, I am able to inspect the /proc/$PID folder associated with the running program. But when I removed

Validation URL information with nginx

We have API application, which uses many customers. Every customer have API token, which he passed in GET request. Example from access log: We want to create whitelist for tokens and limit the number of connections per second for each of the tokens using nginx. Can you advise something on the implementation of this task? Answer The limit_req directive controls

Can I block a new process execution using Kprobe?

Kprobe has a pre-handler function vaguely documented as followed: I was wondering if one can use this function (or any other Kprobe feature) to prevent a process from being executed forked. Answer As documented in the kernel documentation, you can change the execution path by changing the appropriate register (e.g., IP register in x86): So you might be able