Skip to main content

Questions tagged [ubuntu]

Ubuntu is a Linux version derived from Debian. For questions about Ubuntu that are not about security, please post on [AskUbuntu.SE].

0votes
1answer
76views

FIDO2 Yubikey, systemd-cryptenroll Options - Differences of --fido2-with-client-pin --fido2-with-user-presence --fido2-with-user-verification

I added a FIDO2 token to my encrypted root parition with systemd-cryptenroll <DISK> --fido2-with-client-pin=true \ --fido2-with-user-presence \ --fido2-device=auto The tool has three ...
Janning Vygen's user avatar
0votes
1answer
312views

Secure home network running Linux

I'm using Kubuntu 24.04. In my understanding, antivirus in Linux is not really a thing or needed, so my question is targetted specifically about firewall. For a home laptop that will run server ...
Jim's user avatar
  • 221
0votes
1answer
164views

relative path in suid binary - what prevents a local privilege escalation?

If I am not wrong, Ubuntu 24.04.01 LTS has the "dirname" linux binary in a suid bit file with relative path, not absolute (which is a security issue due to that a user can change his "...
robert8819's user avatar
0votes
0answers
116views

Ubuntu 24.04 and SUID

I'm trying to understand SUID privilege escalation and I'm trying to recreate some issues. But both all my scripts and binaries drop the SUID-Bit and get executed with the user with which I'm ...
hilmbert's user avatar
1vote
0answers
48views

commands to setup Ubuntu firewall rules from the terminal for T-Pot

Considering T-Pot System Placement Which are the commands to configure Ubuntu firewall from the terminal, in order for the T-pot to work properly.
XPDIN's user avatar
2votes
2answers
157views

checking for the existence of PondRAT malware and eliminating it from Linux (Ubuntu)

News have been going around about the PondRAT exploit that can come from certain Python packages. I have a bunch of Python projects and, while I'm pretty sure I haven't directly downloaded any of the ...
bitterman's user avatar
1vote
0answers
78views

Ubuntu - snap potential security issues (for privilege escalation) [closed]

Ubuntu snap is quite a hot topic. Therefore I am curious, what security risks are known for it? Which misconfigurations are possible? And are there any misconfigurations which can be used to escalate ...
hilmbert's user avatar
1vote
1answer
135views

Auto-unlock private key: which implications?

On my system (Ubuntu 22.04) I have encrypted my private key with a passphrase and added it to the ssh agent with ssh-add. On use of the key, I am prompted with the option "Automatically unlock ...
Antonello's user avatar
3votes
3answers
2kviews

How resiliant is a private key passphase to brute force attacks?

in the documentation of Ubuntu ssh keys, I was surprised to read "If your RSA key has a strong passphrase, it might take your attacker a few hours to guess by brute force.". Really? A good ...
Antonello's user avatar
3votes
4answers
674views

Beginner in VPN, how to pick a safe one?

I am interested in understanding VPNs and being able to evaluate which commercial one to use. I understand that using the wrong one is a big compromise and I am very skeptical that checking for books ...
smith's user avatar
0votes
0answers
40views

Python os.system() does not change EUID to 0, but os.execl() does, why? [duplicate]

I was working on a Capture the Flag (CTF) challenge that involved a setuid-enabled binary, '/usr/bin/python', where the owner is 'root.' I assumed the user was "www-data", with UID=33. The ...
theptr104's user avatar
0votes
1answer
142views

Do I need to implement additional security measures for my self-hosted container web app?

Could you please suggest if I need to do anything else to ensure that my server is secure against the most common attacks? Currently it seems fine to me, but I would highly appreciate if someone with ...
dooshnila's user avatar
0votes
1answer
83views

Random Requests Trying To Download Virus On Server?

So, I was hosting my website on fastapi, and then I saw this 2 requests on my server. I found that there was link, that was linking to file named "shk" on random ip adresses. I tried to ...
OJector's user avatar
1vote
1answer
209views

Creating bootable USB from a compromised OS. Is it safe?

If we buy for instance a laptop with an OS pre-installed e.g. Ubuntu and but the original seller was not reputable and there are doubts with the preinstall. My question is: if we use the laptop to ...
Jim's user avatar
  • 221
1vote
2answers
129views

Detecting if application connects remotely in linux

Consider me the average Linux user. I know the basics of shell scripting and intermediate Python. However, I have very limited knowledge of system admin or security related matters. Background: Say ...
ciru_4011's user avatar

153050per page
close