Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers. Closed 4 years ago. This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-top…
Tag: security
Explain Linux commit message that patches/secures POP SS followed by a #BP interrupt (INT3)
This is in reference to CVE-2018-8897 (which appears related to CVE-2018-1087), described as follows: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer’s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting…
Linux bash to iterate over apache access_log files and send mail
I need a linux bash script which send me an email if any results appear in searches made in the apache logs. I have a very simple method (sentence) to look into SQL Injection attacks, which simply searches for some keywords used in SQLi. Is this: So now I would like to be able to launch it in several access_l…
After securing my webserver (rpi) from foreign ssh logins, I found this perl script on my computer. Can someone tell me what it does? [closed]
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers. This question does not appear to be about programming within the scope defined in the help center. Closed 5 years ago. Improve this question There was an account named “user” that would be used fo…
Starting container as a non-root user vs starting as root and then downgrade to non-root
I am creating some Docker images and I am reading how others have been doing this. I have identified three general patterns when it comes to the user that runs processes inside the container: It uses root user for everything (spawned process(es) inside container run under root). It uses root user, does some s…
Read /proc//fd/ without full root access
I have a program (https://github.com/raboof/connbeat) that relies on /proc/[pid]/fd/* to find processes given a (networking) inode. /proc/[pid]/fd can only be read by root, but I’d like to drop privileges as much as possible for security. Is there some way I could (efficiently) get to the relationship b…
Security updates pending even with unattended-upgrades on Debian
I installed a few days ago the unattended-upgrades package to install automatically the security updates on my debian 8 system. I notice when I run : That I have a few security updates pending. What’s wrong with my configuration? Answer You need either /etc/apt/apt.conf.d/20auto-upgrades or /etc/apt/apt…
Strange public key in authorized_keys
I’m using Linux VPS as a web server (haproxy+nginx+java+mysql+memcached+redis+solr), for security reason, I disabled password login and using key instead. These days, I can’t login to my server, when using VPS console to login, I found some strange public key in the /root/.ssh/authroized_keys, and…
Can a malware prompt the user to type the system password? [closed]
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers. This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack …
How can I use the set-guid (i.e., set group identification) vulnerability to execute a file with limited permissions?
How can I use the set-guid bit vulnerability to execute a file /bin/grade which is owned by root using the following 3 vulnerable programs? I am not root nor part of the bsp* groups so my access to the programs is limited to read & execute only. For the file /bin/grade, I only have read access, but I want…