Skip to main content

All Questions

Tagged with
Filter by
Sorted by
Tagged with
2 votes
0 answers
3k views

What exactly is the pkexec bug and how to patch it on CentOS 7? [closed]

There is bug in pkexec program, CVE-2021-4034, which when exploited allows access to root shell. Is the best way to fix an unpatched CentOS 7 server to just apply the temporary fix of running chmod ...
Aulis Ronkainen's user avatar
2 votes
1 answer
205 views

Does yum enforce cryptographic authentication and integrity validation by default for all packages? (CentOS, RHEL)

Does the yum package manager in CentOS/RHEL-based systems require successful cryptographic authentication and integrity validation for all packages? I know that software downloaded with apt-get ...
Michael Altfield's user avatar
0 votes
1 answer
429 views

Exploting a Stack Buffer Overflow vulnerability to get privilege access to system

I am trying to complete a buffer overflow challenge. The code I am trying to exploit is below. I can only use the command line in a Linux environment. I understand that writing more than 100 ...
Travis Taylor's user avatar
0 votes
0 answers
34 views

How to recover a hacked site with WSO Shell [duplicate]

Recently wordpress site on centos 7 server is hacked and WSO shell was uploaded. Ive checked other sites and nothing was changed, Im using centos web panel and the root password also was not changed. ...
Pc Monk's user avatar
1 vote
2 answers
549 views

What config files and logs files of a Linux system (CentOS 7) deserve to be monitored by a SIEM?

I am not a security expert (I am more a software developer) and I am working on a project related to a SIEM installation (Wazuh). This installation is only a demo for a customer, in a second time a ...
AndreaNobili's user avatar
1 vote
1 answer
430 views

Shell escaping vs. /etc/sudoers. What's the difference?

I am trying to grasp some basic principles of security in Linux (I used Centos 8.0 and Kali 2020 in the example below). I found that providing you have an account in a particular system that is in the ...
lord_sommersby's user avatar
2 votes
1 answer
997 views

ASLR doesn't work?

I have following code: #include <stdio.h> #include <stdlib.h> int main() { int *ptr1 = malloc(16); int val1 = 0x12345678; printf("stack: %p\nheap: %p\n", &...
qwertyuiqwertyui's user avatar
3 votes
1 answer
233 views

Exposure of /etc/ssh, risks?

I accidentally exposed the keys in /etc/ssh What is the risk? I think it will allow someone to impersonate the server and conduct MITM. Will it let someone SSH into the server? I think not because ...
unixadmin's user avatar
2 votes
0 answers
516 views

How do I create exceptions on Wazuh (OSSEC)?

I currently have a setup with OSSEC and AIDE running on our servers. We are currently receiving a daily alert for each agent when AIDE runs and changes audit.log. I want to make an exception for ...
Thiago Escobar's user avatar
1 vote
1 answer
391 views

Is it dangerous to keep permissions at 666 to member file on SELinux?

I just installed SELinux. I read a lot of tutorials but I am not very comfortable with SELinux. On CentOS help page , I can see that some files in /selinux/ are writable by other user : https://www....
user avatar
5 votes
2 answers
505 views

How to build arbitrary Dockerfile Images Without Compromising Host

I'm building a server that will build images directly from Dockerfile: docker build -t arbitrarydocker . This docker file will be built on the same server as other client Dockerfiles, which may have ...
Dr.Knowitall's user avatar
5 votes
1 answer
2k views

FIPS 140-2 ready linux distribution

We're preparing for FIPS 140-2 project and trying to minimize the effort in the software space. So - is there FIPS 140-2 ready Linux distribution that you can just install and not even touch the ...
KostaZ's user avatar
  • 153
2 votes
1 answer
194 views

Preventing Website Directory Listing

When my CentOS 7 Apache web server was compromised recently, which hosts multiple sites, a script was uploaded to one of the sites and then used to add files to any other sites on the server that had ...
user avatar
11 votes
4 answers
56k views

Privilege escalation using passwd file

If I have a world writeable /etc/passwd file on a system, how can I escalate my privileges to root? I am currently a underprivileged user. The underlying OS is CentOS 7.2 in case you are wondering I ...
Airbourne's user avatar
  • 291
0 votes
1 answer
543 views

RFI - Is this possible even if you use an Application Server?

Since JBoss is acting as a middleware - Application Server - I was wondering if it's still possible to face with File Inclusion attacks.(?) The reason I was wandering so is that in such a case, no ...
Parsa Samet's user avatar
5 votes
1 answer
311 views

System-Level Network Security (Packet Classification and etc.) - SELinux and Libnftnl

I read that Libnftnl is a userspace library providing a low-level netlink programming interface to the in-kernel nf_tables subsystem and it uses NFTables. Since it's a kernel related topic, at the ...
Parsa Samet's user avatar
14 votes
1 answer
1k views

Determining httpd PHP Scripts with Auditd

Background I have an issue on my server where some hole is allowing malicious PHP files to be written to any world-writable directories beneath the web root. It is not currently causing any harm, as I ...
user avatar
3 votes
1 answer
3k views

What's the motivation for excluing /usr/local/bin from root's PATH?

I just discovered that root's PATH on CentOS does not include /usr/local/bin. What's the rationale for this? I'm tempted to add it to the PATH but I don't know what vulnerabilities that might ...
spraff's user avatar
  • 315
1 vote
1 answer
113 views

On a Linux server, is it safe to store a script containing DBI credentials in the cgi-bin of the DocumentRoot?

I understand that (at least on Linux servers) the custom is to create a ScriptAlias from a cgi-bin directory located inside the DocumentRoot (i.e. /var/www/html/cgi-bin/) to a cgi-bin directory ...
Jonathan's user avatar
3 votes
2 answers
2k views

Decoding injected PHP malicious code in my server

I've found on internet similar issues, and I compared the code. This one is different. I recently found out that the CentOS LAMP webserver we use for development in our office was infected by a piece ...
Zorgatone's user avatar
  • 135
3 votes
1 answer
5k views

My sendmail started sending spam; what is causing it to do so? [closed]

Today my sendmail service started sending e-mail to various addresses. /var/spool/mail: From [email protected] Fri Jan 30 22:15:30 2015 Return-Path: <[email protected]&...
IS4's user avatar
  • 131
2 votes
2 answers
2k views

Limit Packets Per Second

Since last week I have been seeing something fishy and it seems to be worsening. I tried many firewalls and they seem to be useless. I blocked all unwanted ports and only few ports are open so I found ...
WMax's user avatar
  • 31
0 votes
1 answer
525 views

Joomla Linux Permissions

I installed Joomla 3 to /var/www/html directory in Cent OS 6 server. Currently /var/www/html is owned by apache:apache. What is the recommended permissions for Joomla installation on Linux in ...
Kasun's user avatar
  • 794
1 vote
1 answer
220 views

Can shellshock be used on a system with public webpages but restricted server access?

I want to know if my servers are still vulnerable under the following conditions... My servers are private - only myself and trusted developers have access to them We have enabled executables within ...
Boz's user avatar
  • 575
5 votes
3 answers
7k views

CentOS for security testing?

I am a QA Engineer, but have been tasked with creating a security testing platform. I have many years with Backtrack/Kali and my primary OS are Arch and Ubuntu. The Systems guys here gave me a CentOS ...
user2120790's user avatar
1 vote
1 answer
671 views

Installing Joomla with nobody:nobody user/group (CentOS/cPanel)

If you are installing Joomla via cPanel's File Manager to your mywebsite.com (user mywebsite) account, you will upload the package to your server and extract the archive. All files will have the user ...
Yatko's user avatar
  • 111
1 vote
1 answer
2k views

Afraid about SSH on my Linux system

I've checked my Linux server (Centos 6) with rkhunter. I found the following in rkhunter log [14:38:54] Checking if SSH protocol v1 is allowed [ Warning ] [14:38:54] Warning: The SSH ...
Kumar's user avatar
  • 161
3 votes
1 answer
3k views

How to remove ssh rootkits? [duplicate]

I checked my linux server with rkhunter, I got following warning messages, ... [00:35:35] Found file '/usr/include/gpm2.h'. Possible rootkit: Trojaned SSH daemon [00:35:35] ...
Kumar's user avatar
  • 161
4 votes
2 answers
5k views

Need advice on linux server being hacked

I'm currently trying to find out how one of our CentOS servers was compromised. We were experiencing malware on our sites. After searching, I finally found the malware injecting into the sites. As it ...
davidbehan's user avatar
3 votes
1 answer
16k views

Retrieving saved password from Firefox on Linux [closed]

I know there are ways to get the cookies from browsers in Windows and retrieve and decrypt saved passwords from them. Is there a similar way to do so on CentOS?
Melkar Muallem's user avatar
5 votes
2 answers
12k views

How to hack linux via Local File Inclusion vulnerability?

During my penetration testing, I found a local file inclusion vulnerability. In fact this vulnerability existed in mailwatch <= 1.0.4, and its exploit existed in Exploit-DB. I tried to exploit the ...
user1028's user avatar
  • 437
12 votes
3 answers
14k views

Is CentOS a good choice from a security perspective?

How secure is the CentOS Linux distribution? I noticed there were times when there were no up-to-date patches for some version of CentOS (e.g., 5.6). I read this on some mailing list that I can't ...
LanceBaynes's user avatar
  • 6,299