Bypass Linux Disk Encryption Just By Pressing ‘ENTER’ for 70 Seconds

A hacker with little more than a minute can bypass the authentication procedures on some Linux systems just by holding down the Enter key for around 70 seconds.

The result? The act grants the hacker a shell with root privileges, which allows them to g… Continue reading Bypass Linux Disk Encryption Just By Pressing ‘ENTER’ for 70 Seconds

This Hack Gives Linux Root Shell Just By Pressing ‘ENTER’ for 70 Seconds

A hacker with little more than a minute can bypass the authentication procedures on some Linux systems just by holding down the Enter key for around 70 seconds.

The result? The act grants the hacker a shell with root privileges, which allows them to g… Continue reading This Hack Gives Linux Root Shell Just By Pressing ‘ENTER’ for 70 Seconds

Linux kernel.org Hacker Arrested After Traffic Stop

So it seems the alleged kernel.org hacker has finally been caught, kinda by accident after being stopped for a traffic violation. It was quite a high profile hack, especially in the open source community as anyone downloading kernel files during that period could have theoretically been compromised. It’s unlikely the kernel code was actually…

Read the full post at darknet.org.uk

Continue reading Linux kernel.org Hacker Arrested After Traffic Stop

Warning! This Cross-Platform Malware Can Hack Windows, Linux and OS X Computers

Unlike specially crafted malware specifically developed to take advantage of Windows operating system platform, cyber attackers have started creating cross-platform malware for wider exploitation.

Due to the rise in popularity of Mac OS X and other Wi… Continue reading Warning! This Cross-Platform Malware Can Hack Windows, Linux and OS X Computers

Internet Traffic Hijacking Linux Flaw Affects 80% of Android Devices

An estimated 80 percent of Android smartphones and tablets running Android 4.4 KitKat and higher are vulnerable to a recently disclosed Linux kernel flaw that allows hackers to terminate connections, spy on unencrypted traffic or inject malware into th… Continue reading Internet Traffic Hijacking Linux Flaw Affects 80% of Android Devices

wildpwn – UNIX Wildcard Attack Tool

wildpwn is a Python UNIX wildcard attack tool that helps you generate attacks, based on a paper by Leon Juranic. It’s considered a fairly old-skool attack vector, but it still works quite often. The simple trick behind this technique is that when using shell wildcards, especially asterisk (*), the UNIX shell will interpret files beginning…

Read the full post at darknet.org.uk

Continue reading wildpwn – UNIX Wildcard Attack Tool

Cyborg Hawk Linux – Penetration Testing Linux Distro

Cyborg Hawk Linux is a Ubuntu (Linux) based Penetration Testing Linux Distro developed and designed for ethical hackers and penetration testers. Cyborg Hawk Distro can be used for network security and assessment and also for digital forensics. It also has various tools suited to the testing of Mobile Security and Wireless infrastructure. It’s…

Read the full post at darknet.org.uk

Continue reading Cyborg Hawk Linux – Penetration Testing Linux Distro

The Linux glibc Exploit – What You Need To Know

So the Internet exploded this week with news of a pretty serious glibc exploit, something that everyone pays attention to as every Linux server uses this library and in some cases it can yield remote code execution. In basic terms the glibc DNS client (libresolv) is vulnerable to a stack-based buffer overflow when the getaddrinfo() […]

The…

Read the full post at darknet.org.uk

Continue reading The Linux glibc Exploit – What You Need To Know