Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers. Closed 4 years ago. This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to
Tag: security
Explain Linux commit message that patches/secures POP SS followed by a #BP interrupt (INT3)
This is in reference to CVE-2018-8897 (which appears related to CVE-2018-1087), described as follows: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer’s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as
Linux bash to iterate over apache access_log files and send mail
I need a linux bash script which send me an email if any results appear in searches made in the apache logs. I have a very simple method (sentence) to look into SQL Injection attacks, which simply searches for some keywords used in SQLi. Is this: So now I would like to be able to launch it in several access_log
After securing my webserver (rpi) from foreign ssh logins, I found this perl script on my computer. Can someone tell me what it does? [closed]
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers. This question does not appear to be about programming within the scope defined in the help center. Closed 5 years ago. Improve this question There was an account named “user” that would be used for these logins, which would be from all over the world.
Starting container as a non-root user vs starting as root and then downgrade to non-root
I am creating some Docker images and I am reading how others have been doing this. I have identified three general patterns when it comes to the user that runs processes inside the container: It uses root user for everything (spawned process(es) inside container run under root). It uses root user, does some stuff, then downgrades to non-root user (so
Read /proc//fd/ without full root access
I have a program (https://github.com/raboof/connbeat) that relies on /proc/[pid]/fd/* to find processes given a (networking) inode. /proc/[pid]/fd can only be read by root, but I’d like to drop privileges as much as possible for security. Is there some way I could (efficiently) get to the relationship between processes and inodes without requiring full root rights? Perhaps some syscall that I
Security updates pending even with unattended-upgrades on Debian
I installed a few days ago the unattended-upgrades package to install automatically the security updates on my debian 8 system. I notice when I run : That I have a few security updates pending. What’s wrong with my configuration? Answer You need either /etc/apt/apt.conf.d/20auto-upgrades or /etc/apt/apt.conf.d/02periodic and they must contain lines APT::Periodic::Update-Package-Lists “1”; and APT::Periodic::Unattended-Upgrade “1”;. Run (as root) dpkg-reconfigure
Strange public key in authorized_keys
I’m using Linux VPS as a web server (haproxy+nginx+java+mysql+memcached+redis+solr), for security reason, I disabled password login and using key instead. These days, I can’t login to my server, when using VPS console to login, I found some strange public key in the /root/.ssh/authroized_keys, and my own public key was removed: What does that mean? is any hacker try to login
Can a malware prompt the user to type the system password? [closed]
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers. This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question
How can I use the set-guid (i.e., set group identification) vulnerability to execute a file with limited permissions?
How can I use the set-guid bit vulnerability to execute a file /bin/grade which is owned by root using the following 3 vulnerable programs? I am not root nor part of the bsp* groups so my access to the programs is limited to read & execute only. For the file /bin/grade, I only have read access, but I want to