December 2024 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Blog Stats
- 75,849 hits
Tag Archives: Linux
Rowhammer
Intel-compatible PCs running Linux are exploitable through the physical weaknesses in certain varieties of DDR DRAM (double data rate dynamic random-access memory) chips and gaining higher kernel privileges on the system. Google’s Project Zero has released an in-depth article on … Continue reading
Posted in Security Blog
Tagged ddr, DRAM, exploit, Google, how to exploit, Linux, project zero, rowhammer
Comments Off on Rowhammer
Ghost to the Shell
During a code audit, researchers at Qualys discovered a buffer overflow in the __nss_hostname_digits_dots() function of glibc which can get access to the shell. The GHOST vulnerability is a serious weakness in the Linux glibc library. It allows attackers to … Continue reading
Posted in Security Blog
Tagged 2015, gethost, GHOST, Linux, qualys, vulnerability
Comments Off on Ghost to the Shell
Is that a Mouse in your Pocket or?
You ready to bring unauthorized hardware on my ‘secure’ network? Mouse-box, the computer in a mouse, is still in prototype. All we know right now is that it is running ChromeOS or Linux. Maybe a variant of Kali will work too. … Continue reading
WOPBOT BotNet
A botnet runs on Linux and Linux variant servers, named wopbot that uses the Bash Shellshock bug to auto-infect others. The wopbot botnet is active and scanning the internet for vulnerable systems, including network ranges at the United States Department … Continue reading
Posted in Security Blog
Tagged 2014, apache, bash shell, botnets, DDoS, hackers, hacking, Linux, network security, shellshock, wopbot
Comments Off on WOPBOT BotNet
BASH (Bourne-Again SHell) ShellShock Bug
Stephane Chazelas, IT Manager at SeeByte, discovered a vulnerability in bash, related to how environment variables are processed: trailing code in function definitions was executed, independent of the variable name. For those unknowing, Bash is a command processor, typically run … Continue reading
Posted in Security Blog
Tagged 2014, bash shell, Linux, patching, scanning, security, vulnerabilities, vulnerability assessment
Comments Off on BASH (Bourne-Again SHell) ShellShock Bug