Do all the things like ++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatarSign Up
bugtittyfish91812dThat's actually pretty interesting and looks pretty dang easy
kolaente372112dJust because Linux is more secure does not mean it prevents dumb admins from setting insecure and overused passwords
endor404112dDon't confuse living in a bunker with leaving the door open. Linux is just a tool, it's up to the end user to set it up correctly. At least with open source systems you can see where the issue is and try to fix it, rather than have to pray that a single company didn't screw up in the dark.
aviophile51012d“Cplusplus is a terrible language”
@kolaente That's not what these scripts are about. It's mostly about enumeration of services and files.
(But I yet have to get used to using them. Like 14 yrs on Linux boxes, but never approached them as an attacker. - Now for the first time it really took some time to get a shell and not lose it - now I'm stuck at getting root, while other claimed it was a 30sec job.)
Maer50812dThe main issue though is, that everyone thinks they set their system up properly and securely - yet almost nobody has.
Ease of use can be a factor too. One can argue whether or not system A is more secure than system B, if at peak performance with the optimal setup system A outperforms system B in all aspects w.r.t. security, yet 90% of users "in the wild" run system A configurations that are inferior to system B configurations in the wild.
This is an exaggeration obviously, the point is that the security discussion is mostly too black and white.
Yamakuzure216212dI do not trust someone who calls programs like nmap or sqlmap "hacking tools".
Further, scanning all IP addresses found with nmap, or something else, will make all the alarm bells ring at the owners end. If it is a target worth attacking, it will most probably not run by idiots.
Most sophisticated firewalls will block IP addresses that are caught port scanning anyway
Further he gains access script kiddy style on a server set up by someone who hasn't got a clue what they are doing.
The rooting and pivoting stuff, however, is really interesting!
@Yamakuzure Sure nmap can be quite "loud", that's why he says you need to take foreign/bought servers. Hide with tor and VPN.
Don't want to try too hard convincing you the guy is the real deal,.. but consider he/she's fluent in at least three languages, two of his jobs even have Wikipedia articles *and he never got caught* despite pissing of a lot of people with connections to state affairs
@Maer yeah, the user's preferences and customizations have a lot to do in system security. But that's a secondary problem IMO.
But there are oh so many users who have no hugging idea how to do things right... so I'd like to mention a different problem:
There are systems SysA, that should be configured to remain secure.
And there are systems SysB, that should be configured to become secure.
A granny might have a stock setup of SysB and only use it to read emails from her children. And yet she's a subject for SysB exploits. Whereas if she had SysB she'd have to deliberately make changes to make it insecure.
Also, by "secure" I mean "secure enough". A complete 100% security is a pipe dream. It's like taking a walk in the forest and believing you won't get bit by mosquitos (SysB) and waiting for a bus in a middle of the city and hoing there will be no mosquitos (SysA).
As for OP, scripts did not show me any exploits on a stock Linux installation. The only thing the second script did show is a looong list of all my files and their permissions. Which is useless - I already know what permissions my files have...
As for /proc contents' permissions, they are protected by kernel, since it is a virtual filesystem. I don't see the point for script#2...
Seriously, what's the point of this warning?
W: [privileged_writable] (running /home/netikras/bin/pingloss) /home/netikras/bin is owned by user netikras (YOU) (group netikras), non-root user (drwxr-xr-x)
Is this a security issue? :D Ridiculous
phorkyas104011d@netikras My first reaction was similar. It's not that you push a button and your root shell pops up. It's just basic enumeration, gather as much as you can with commands as trivial as "ps aux | grep root", but they can give you hints.
It's the first time I try it - no sysadmin nor pentester - and so I fail. There were like hundreds CVE for the vmware-tools and mysql on that Ubuntu 16.04 box, I tried. For the latter I found two I'd have to chain together (first to get mysql user, then root - but didn't work yet).
For a stock desktop installation you'd probably not expect much to show up, but (real) server might be a different animal. Lots of services with elevated rights, that need constant patching, wrong directory ACL can already bite, etc.
Yamakuzure216211dWell, the whole article revolves around servers. User desktops are uninteresting anyway, as you don't get to them via their public IP anyway.
finally got root. schouldn't have taken so long..
To take the attacker's point of view is really so different.
Your Job Suck?
Take a quick quiz from Triplebyte to skip the job search hassles and jump to final interviews at hot tech firms
Get a Better Job
gururaju34*Now that's what I call a Hacker* MOTHER OF ALL AUTOMATIONS This seems a long post. but you will definitely ...
creedasaurus65Another dev on my team just got a new machine. Before he came in today I made two separate USB installers and ...
linuxxx64This guy at my last internship. A windows fanboy to the fucking max! He was saying how he'd never use anythi...