Archive for the ‘Linux hacking’ Category

Hackers Planted Backdoor in Webmin, Popular Utility for Linux/Unix Servers

August 20th, 2019
Following the public disclosure of a critical zero-day vulnerability in Webmin last week, the project's maintainers today revealed that the flaw was not actually the result of a coding mistake made by the programmers. Instead, it was secretly planted by an unknown hacker who successfully managed to inject a backdoor at some point in its build infrastructure—that surprisingly persisted into

Posted in backdoor malware, hacking Linux servers, Linux hacking, linux security, Linux server, Linux Software, remote code execution, Vulnerability, Webmin | Comments (0)

Your Linux Can Get Hacked Just by Opening a File in Vim or Neovim Editor

June 10th, 2019
Linux users, beware! If you haven't recently updated your Linux operating system, especially the command-line text editor utility, do not even try to view the content of a file using Vim or Neovim. Security researcher Armin Razmjou recently discovered a high-severity arbitrary OS command execution vulnerability (CVE-2019-12735) in Vim and Neovim—two most popular and powerful command-line

Posted in cyber security, hacking linux, Linux hacking, linux security, Linux Vulnerability, vim, vim editor, Vulnerability | Comments (0)

New Flaws Re-Enable DMA Attacks On Wide Range of Modern Computers

February 27th, 2019
Security researchers have discovered a new class of security vulnerabilities that impacts all major operating systems, including Microsoft Windows, Apple macOS, Linux, and FreeBSD, allowing attackers to bypass protection mechanisms introduced to defend against DMA attacks. Known for years, Direct memory access (DMA)-based attacks let an attacker compromise a targeted computer in a matter of

Posted in Apple macOS, DMA Attack, freebsd, hacking news, hardware hacking, Hardware Trojan, Linux hacking, Thunderbolt Port, Vulnerability, windows hacking | Comments (0)

RunC Flaw Lets Attackers Escape Linux Containers to Gain Root on Hosts

February 12th, 2019
A serious security vulnerability has been discovered in the core runC container code that affects several open-source container management systems, potentially allowing attackers to escape Linux container and obtain unauthorized, root-level access to the host operating system. The vulnerability, identified as CVE-2019-5736, was discovered by open source security researchers Adam Iwaniuk and

Posted in Amazon AWS, Cloud hosting, docker, Google Cloud, hacking news, how to hack linux, Kubernetes, linux, linux container, Linux hacking, redhat linux, SELinux, Suse Linux, Virtualization software | Comments (0)

Critical RCE Flaw in Linux APT Allows Remote Attackers to Hack Systems

January 22nd, 2019
Just in time… Some cybersecurity experts this week arguing over Twitter in favor of not using HTTPS and suggesting software developers to only rely on signature-based package verification, just because APT on Linux also does the same. Ironically, a security researcher just today revealed details of a new critical remote code execution flaw in the apt-get utility that can be exploited by a

Posted in APT, hacking news, linux, Linux APT, Linux hacking, Linux Vulnerability, man-in-the-middle attack, Software security, Vulnerability | Comments (0)

3 New CIA-developed Hacking Tools For MacOS & Linux Exposed

July 27th, 2017

WikiLeaks has just published a new set of classified documents linked to another CIA project, dubbed ‘Imperial,’ which reveals details of at least three CIA-developed hacking tools and implants designed to target computers running Apple Mac OS X and different flavours of Linux operating systems.

If you are a regular reader of THN, you must be aware that this latest revelation by the

Posted in Apple mac malware, CIA Hacking Tools, hacking computers, hacking tools, Linux hacking, Linux Rootkit, mac os rootkit, mac os x hacking, rootkit | Comments (0)

Linux Kernel Gets Patch For Years-Old Serious Vulnerability

March 16th, 2017

Another dangerous vulnerability has been discovered in Linux kernel that dates back to 2009 and affects a large number of Linux distros, including Red Hat, Debian, Fedora, OpenSUSE, and Ubuntu.

The latest Linux kernel flaw (CVE-2017-2636), which existed in the Linux kernel for the past seven years, allows a local unprivileged user to gain root privileges on affected systems or cause a denial

Posted in Buffer Overflow, double free vulnerability, how to hack linux, Linux hacking, Linux kernel, Linux kernel exploit, Linux Vulnerability, memory corruption vulnerability, Vulnerability | Comments (0)

5-Year-Old Linux Kernel Local Privilege Escalation Flaw Discovered

December 7th, 2016

A 5-year-old serious privilege-escalation vulnerability has been discovered in Linux kernel that affects almost every distro of the Linux operating system, including Redhat, and Ubuntu.

Over a month back, a nine-year-old privilege-escalation vulnerability, dubbed “Dirty COW,” was discovered in the Linux kernel that affected every distro of the open-source operating system, including Red Hat,

Posted in Denial of Service, hacking news, how to hack linux, Linux hacking, Linux kernel, Linux kernel exploit, linux security, Linux Vulnerability, server hacking, Vulnerability | Comments (0)

This Hack Gives Linux Root Shell Just By Pressing ‘ENTER’ for 70 Seconds

November 16th, 2016

A hacker with little more than a minute can bypass the authentication procedures on some Linux systems just by holding down the Enter key for around 70 seconds.

The result? The act grants the hacker a shell with root privileges, which allows them to gain complete remote control over encrypted Linux machine.

The security issue relies due to a vulnerability (CVE-2016-4484) in the

Posted in Debian linux, Denial of Service, elevation of privilege, hacking news, information disclosure, Linux exploit, Linux hacking, Linux Unified Key Setup, Linux Vulnerability | Comments (0)

Internet Traffic Hijacking Linux Flaw Affects 80% of Android Devices

August 16th, 2016

An estimated 80 percent of Android smartphones and tablets running Android 4.4 KitKat and higher are vulnerable to a recently disclosed Linux kernel flaw that allows hackers to terminate connections, spy on unencrypted traffic or inject malware into the parties’ communications.

Even the latest Android Nougat Preview is considered to be vulnerable.
<!– adsense –>
The security flaw was first

Posted in hacking news, how to hack android, Linux hacking, Linux kernel, linux security, TCP protocol, Vulnerability | Comments (0)