All Questions
32 questions
2
votes
0
answers
3k
views
What exactly is the pkexec bug and how to patch it on CentOS 7? [closed]
There is bug in pkexec program, CVE-2021-4034, which when exploited allows access to root shell.
Is the best way to fix an unpatched CentOS 7 server to just apply the temporary fix of running chmod ...
2
votes
1
answer
205
views
Does yum enforce cryptographic authentication and integrity validation by default for all packages? (CentOS, RHEL)
Does the yum package manager in CentOS/RHEL-based systems require successful cryptographic authentication and integrity validation for all packages?
I know that software downloaded with apt-get ...
0
votes
1
answer
429
views
Exploting a Stack Buffer Overflow vulnerability to get privilege access to system
I am trying to complete a buffer overflow challenge. The code I am trying to exploit is below. I can only use the command line in a Linux environment.
I understand that writing more than 100 ...
0
votes
0
answers
34
views
How to recover a hacked site with WSO Shell [duplicate]
Recently wordpress site on centos 7 server is hacked and WSO shell was uploaded.
Ive checked other sites and nothing was changed, Im using centos web panel and the root password also was not changed.
...
1
vote
2
answers
549
views
What config files and logs files of a Linux system (CentOS 7) deserve to be monitored by a SIEM?
I am not a security expert (I am more a software developer) and I am working on a project related to a SIEM installation (Wazuh). This installation is only a demo for a customer, in a second time a ...
1
vote
1
answer
430
views
Shell escaping vs. /etc/sudoers. What's the difference?
I am trying to grasp some basic principles of security in Linux (I used Centos 8.0 and Kali 2020 in the example below).
I found that providing you have an account in a particular system that is in the ...
2
votes
1
answer
997
views
ASLR doesn't work?
I have following code:
#include <stdio.h>
#include <stdlib.h>
int main()
{
int *ptr1 = malloc(16);
int val1 = 0x12345678;
printf("stack: %p\nheap: %p\n", &...
3
votes
1
answer
233
views
Exposure of /etc/ssh, risks?
I accidentally exposed the keys in /etc/ssh
What is the risk?
I think it will allow someone to impersonate the server and conduct MITM.
Will it let someone SSH into the server? I think not because ...
2
votes
0
answers
516
views
How do I create exceptions on Wazuh (OSSEC)?
I currently have a setup with OSSEC and AIDE running on our servers.
We are currently receiving a daily alert for each agent when AIDE runs and changes audit.log.
I want to make an exception for ...
1
vote
1
answer
391
views
Is it dangerous to keep permissions at 666 to member file on SELinux?
I just installed SELinux. I read a lot of tutorials but I am not very comfortable with SELinux.
On CentOS help page , I can see that some files in
/selinux/ are writable by other user : https://www....
5
votes
2
answers
505
views
How to build arbitrary Dockerfile Images Without Compromising Host
I'm building a server that will build images directly from Dockerfile:
docker build -t arbitrarydocker .
This docker file will be built on the same server as other client Dockerfiles, which may have ...
5
votes
1
answer
2k
views
FIPS 140-2 ready linux distribution
We're preparing for FIPS 140-2 project and trying to minimize the effort in the software space.
So - is there FIPS 140-2 ready Linux distribution that you can just install and not even touch the ...
2
votes
1
answer
194
views
Preventing Website Directory Listing
When my CentOS 7 Apache web server was compromised recently, which hosts multiple sites, a script was uploaded to one of the sites and then used to add files to any other sites on the server that had ...
11
votes
4
answers
56k
views
Privilege escalation using passwd file
If I have a world writeable /etc/passwd file on a system, how can I escalate my privileges to root? I am currently a underprivileged user. The underlying OS is CentOS 7.2 in case you are wondering
I ...
0
votes
1
answer
543
views
RFI - Is this possible even if you use an Application Server?
Since JBoss is acting as a middleware - Application Server - I was wondering if it's still possible to face with File Inclusion attacks.(?) The reason I was wandering so is that in such a case, no ...
5
votes
1
answer
311
views
System-Level Network Security (Packet Classification and etc.) - SELinux and Libnftnl
I read that Libnftnl is a userspace library providing a low-level netlink programming interface to the in-kernel nf_tables subsystem and it uses NFTables.
Since it's a kernel related topic, at the ...
14
votes
1
answer
1k
views
Determining httpd PHP Scripts with Auditd
Background
I have an issue on my server where some hole is allowing malicious PHP files to be written to any world-writable directories beneath the web root. It is not currently causing any harm, as I ...
3
votes
1
answer
3k
views
What's the motivation for excluing /usr/local/bin from root's PATH?
I just discovered that root's PATH on CentOS does not include /usr/local/bin.
What's the rationale for this? I'm tempted to add it to the PATH but I don't know what vulnerabilities that might ...
1
vote
1
answer
113
views
On a Linux server, is it safe to store a script containing DBI credentials in the cgi-bin of the DocumentRoot?
I understand that (at least on Linux servers) the custom is to create a ScriptAlias from a cgi-bin directory located inside the DocumentRoot (i.e. /var/www/html/cgi-bin/) to a cgi-bin directory ...
3
votes
2
answers
2k
views
Decoding injected PHP malicious code in my server
I've found on internet similar issues, and I compared the code. This one is different.
I recently found out that the CentOS LAMP webserver we use for development in our office was infected by a piece ...
3
votes
1
answer
5k
views
My sendmail started sending spam; what is causing it to do so? [closed]
Today my sendmail service started sending e-mail to various addresses.
/var/spool/mail:
From [email protected] Fri Jan 30 22:15:30 2015
Return-Path: <[email protected]&...
2
votes
2
answers
2k
views
Limit Packets Per Second
Since last week I have been seeing something fishy and it seems to be worsening. I tried many firewalls and they seem to be useless. I blocked all unwanted ports and only few ports are open so I found ...
0
votes
1
answer
525
views
Joomla Linux Permissions
I installed Joomla 3 to /var/www/html directory in Cent OS 6 server. Currently /var/www/html is owned by apache:apache.
What is the recommended permissions for Joomla installation on Linux in ...
1
vote
1
answer
220
views
Can shellshock be used on a system with public webpages but restricted server access?
I want to know if my servers are still vulnerable under the following conditions...
My servers are private - only myself and trusted developers have access to them
We have enabled executables within ...
5
votes
3
answers
7k
views
CentOS for security testing?
I am a QA Engineer, but have been tasked with creating a security testing platform. I have many years with Backtrack/Kali and my primary OS are Arch and Ubuntu. The Systems guys here gave me a CentOS ...
1
vote
1
answer
671
views
Installing Joomla with nobody:nobody user/group (CentOS/cPanel)
If you are installing Joomla via cPanel's File Manager to your mywebsite.com (user mywebsite) account, you will upload the package to your server and extract the archive. All files will have the user ...
1
vote
1
answer
2k
views
Afraid about SSH on my Linux system
I've checked my Linux server (Centos 6) with rkhunter. I found the following in rkhunter log
[14:38:54] Checking if SSH protocol v1 is allowed [ Warning ]
[14:38:54] Warning: The SSH ...
3
votes
1
answer
3k
views
How to remove ssh rootkits? [duplicate]
I checked my linux server with rkhunter, I got following warning messages,
...
[00:35:35] Found file '/usr/include/gpm2.h'. Possible
rootkit: Trojaned SSH daemon
[00:35:35] ...
4
votes
2
answers
5k
views
Need advice on linux server being hacked
I'm currently trying to find out how one of our CentOS servers was compromised. We were experiencing malware on our sites. After searching, I finally found the malware injecting into the sites. As it ...
3
votes
1
answer
16k
views
Retrieving saved password from Firefox on Linux [closed]
I know there are ways to get the cookies from browsers in Windows and retrieve and decrypt saved passwords from them. Is there a similar way to do so on CentOS?
5
votes
2
answers
12k
views
How to hack linux via Local File Inclusion vulnerability?
During my penetration testing, I found a local file inclusion vulnerability. In fact this vulnerability existed in mailwatch <= 1.0.4, and its exploit existed in Exploit-DB.
I tried to exploit the ...
12
votes
3
answers
14k
views
Is CentOS a good choice from a security perspective?
How secure is the CentOS Linux distribution? I noticed there were times when there were no up-to-date patches for some version of CentOS (e.g., 5.6). I read this on some mailing list that I can't ...