Archive for the ‘Linux hacking’ Category
Following the public disclosure of a critical zero-day vulnerability in Webmin last week, the project's maintainers today revealed that the flaw was not actually the result of a coding mistake made by the programmers.
Instead, it was secretly planted by an unknown hacker who successfully managed to inject a backdoor at some point in its build infrastructure—that surprisingly persisted into
Posted in backdoor malware, hacking Linux servers, Linux hacking, linux security, Linux server, Linux Software, remote code execution, Vulnerability, Webmin | Comments (0)
Linux users, beware!
If you haven't recently updated your Linux operating system, especially the command-line text editor utility, do not even try to view the content of a file using Vim or Neovim.
Security researcher Armin Razmjou recently discovered a high-severity arbitrary OS command execution vulnerability (CVE-2019-12735) in Vim and Neovim—two most popular and powerful command-line
Posted in cyber security, hacking linux, Linux hacking, linux security, Linux Vulnerability, vim, vim editor, Vulnerability | Comments (0)
Security researchers have discovered a new class of security vulnerabilities that impacts all major operating systems, including Microsoft Windows, Apple macOS, Linux, and FreeBSD, allowing attackers to bypass protection mechanisms introduced to defend against DMA attacks.
Known for years, Direct memory access (DMA)-based attacks let an attacker compromise a targeted computer in a matter of
Posted in Apple macOS, DMA Attack, freebsd, hacking news, hardware hacking, Hardware Trojan, Linux hacking, Thunderbolt Port, Vulnerability, windows hacking | Comments (0)
A serious security vulnerability has been discovered in the core runC container code that affects several open-source container management systems, potentially allowing attackers to escape Linux container and obtain unauthorized, root-level access to the host operating system.
The vulnerability, identified as CVE-2019-5736, was discovered by open source security researchers Adam Iwaniuk and
Posted in Amazon AWS, Cloud hosting, docker, Google Cloud, hacking news, how to hack linux, Kubernetes, linux, linux container, Linux hacking, redhat linux, SELinux, Suse Linux, Virtualization software | Comments (0)
Just in time…
Some cybersecurity experts this week arguing over Twitter in favor of not using HTTPS and suggesting software developers to only rely on signature-based package verification, just because APT on Linux also does the same.
Ironically, a security researcher just today revealed details of a new critical remote code execution flaw in the apt-get utility that can be exploited by a
Posted in APT, hacking news, linux, Linux APT, Linux hacking, Linux Vulnerability, man-in-the-middle attack, Software security, Vulnerability | Comments (0)
WikiLeaks has just published a new set of classified documents linked to another CIA project, dubbed ‘Imperial,’ which reveals details of at least three CIA-developed hacking tools and implants designed to target computers running Apple Mac OS X and different flavours of Linux operating systems.
If you are a regular reader of THN, you must be aware that this latest revelation by the
Posted in Apple mac malware, CIA Hacking Tools, hacking computers, hacking tools, Linux hacking, Linux Rootkit, mac os rootkit, mac os x hacking, rootkit | Comments (0)
Another dangerous vulnerability has been discovered in Linux kernel that dates back to 2009 and affects a large number of Linux distros, including Red Hat, Debian, Fedora, OpenSUSE, and Ubuntu.
The latest Linux kernel flaw (CVE-2017-2636), which existed in the Linux kernel for the past seven years, allows a local unprivileged user to gain root privileges on affected systems or cause a denial
Posted in Buffer Overflow, double free vulnerability, how to hack linux, Linux hacking, Linux kernel, Linux kernel exploit, Linux Vulnerability, memory corruption vulnerability, Vulnerability | Comments (0)
A 5-year-old serious privilege-escalation vulnerability has been discovered in Linux kernel that affects almost every distro of the Linux operating system, including Redhat, and Ubuntu.
Over a month back, a nine-year-old privilege-escalation vulnerability, dubbed “Dirty COW,” was discovered in the Linux kernel that affected every distro of the open-source operating system, including Red Hat,
Posted in Denial of Service, hacking news, how to hack linux, Linux hacking, Linux kernel, Linux kernel exploit, linux security, Linux Vulnerability, server hacking, Vulnerability | Comments (0)
A hacker with little more than a minute can bypass the authentication procedures on some Linux systems just by holding down the Enter key for around 70 seconds.
The result? The act grants the hacker a shell with root privileges, which allows them to gain complete remote control over encrypted Linux machine.
The security issue relies due to a vulnerability (CVE-2016-4484) in the
Posted in Debian linux, Denial of Service, elevation of privilege, hacking news, information disclosure, Linux exploit, Linux hacking, Linux Unified Key Setup, Linux Vulnerability | Comments (0)
An estimated 80 percent of Android smartphones and tablets running Android 4.4 KitKat and higher are vulnerable to a recently disclosed Linux kernel flaw that allows hackers to terminate connections, spy on unencrypted traffic or inject malware into the parties’ communications.
Even the latest Android Nougat Preview is considered to be vulnerable.
<!– adsense –>
The security flaw was first
Posted in hacking news, how to hack android, Linux hacking, Linux kernel, linux security, TCP protocol, Vulnerability | Comments (0)