Questions tagged [ubuntu]
Ubuntu is a Linux version derived from Debian. For questions about Ubuntu that are not about security, please post on [AskUbuntu.SE].
322 questions
0votes
1answer
76views
FIDO2 Yubikey, systemd-cryptenroll Options - Differences of --fido2-with-client-pin --fido2-with-user-presence --fido2-with-user-verification
I added a FIDO2 token to my encrypted root parition with systemd-cryptenroll <DISK> --fido2-with-client-pin=true \ --fido2-with-user-presence \ --fido2-device=auto The tool has three ...
0votes
1answer
312views
Secure home network running Linux
I'm using Kubuntu 24.04. In my understanding, antivirus in Linux is not really a thing or needed, so my question is targetted specifically about firewall. For a home laptop that will run server ...
0votes
1answer
164views
relative path in suid binary - what prevents a local privilege escalation?
If I am not wrong, Ubuntu 24.04.01 LTS has the "dirname" linux binary in a suid bit file with relative path, not absolute (which is a security issue due to that a user can change his "...
0votes
0answers
116views
Ubuntu 24.04 and SUID
I'm trying to understand SUID privilege escalation and I'm trying to recreate some issues. But both all my scripts and binaries drop the SUID-Bit and get executed with the user with which I'm ...
1vote
0answers
48views
commands to setup Ubuntu firewall rules from the terminal for T-Pot
Considering T-Pot System Placement Which are the commands to configure Ubuntu firewall from the terminal, in order for the T-pot to work properly.
2votes
2answers
157views
checking for the existence of PondRAT malware and eliminating it from Linux (Ubuntu)
News have been going around about the PondRAT exploit that can come from certain Python packages. I have a bunch of Python projects and, while I'm pretty sure I haven't directly downloaded any of the ...
1vote
0answers
78views
Ubuntu - snap potential security issues (for privilege escalation) [closed]
Ubuntu snap is quite a hot topic. Therefore I am curious, what security risks are known for it? Which misconfigurations are possible? And are there any misconfigurations which can be used to escalate ...
1vote
1answer
135views
Auto-unlock private key: which implications?
On my system (Ubuntu 22.04) I have encrypted my private key with a passphrase and added it to the ssh agent with ssh-add. On use of the key, I am prompted with the option "Automatically unlock ...
3votes
3answers
2kviews
How resiliant is a private key passphase to brute force attacks?
in the documentation of Ubuntu ssh keys, I was surprised to read "If your RSA key has a strong passphrase, it might take your attacker a few hours to guess by brute force.". Really? A good ...
3votes
4answers
674views
Beginner in VPN, how to pick a safe one?
I am interested in understanding VPNs and being able to evaluate which commercial one to use. I understand that using the wrong one is a big compromise and I am very skeptical that checking for books ...
0votes
0answers
40views
Python os.system() does not change EUID to 0, but os.execl() does, why? [duplicate]
I was working on a Capture the Flag (CTF) challenge that involved a setuid-enabled binary, '/usr/bin/python', where the owner is 'root.' I assumed the user was "www-data", with UID=33. The ...
0votes
1answer
142views
Do I need to implement additional security measures for my self-hosted container web app?
Could you please suggest if I need to do anything else to ensure that my server is secure against the most common attacks? Currently it seems fine to me, but I would highly appreciate if someone with ...
0votes
1answer
83views
Random Requests Trying To Download Virus On Server?
So, I was hosting my website on fastapi, and then I saw this 2 requests on my server. I found that there was link, that was linking to file named "shk" on random ip adresses. I tried to ...
1vote
1answer
209views
Creating bootable USB from a compromised OS. Is it safe?
If we buy for instance a laptop with an OS pre-installed e.g. Ubuntu and but the original seller was not reputable and there are doubts with the preinstall. My question is: if we use the laptop to ...
1vote
2answers
129views
Detecting if application connects remotely in linux
Consider me the average Linux user. I know the basics of shell scripting and intermediate Python. However, I have very limited knowledge of system admin or security related matters. Background: Say ...