Dev Miscellaneous
356 subscribers
883 photos
6 videos
5 files
912 links
A channel where you can find developer tips, tools, APIs, resources, memes and interesting contents.

Join our comments chat for more.

Comments chat (friendly :D)
https://t.me/+r_fUfa1bx1g0MGRk
Download Telegram
CVE-2021-3490 – Pwning Linux kernel eBPF on Ubuntu

Researcher published an exploit code for a high-severity privilege escalation flaw in Linux kernel eBPF on Ubuntu machines...

https://securityaffairs.co/wordpress/120688/hacking/cve-2021-3490-linux-kernel-bug.html

@DevMisc
#linux #vulnerability #cve
Linux Cheat Sheet For Beginners

If you're not using the terminal, Linux commands may appear scary at first by once you start using them you will understand them very easily On a Linux system, there are numerous commands for executing operations and procedures...

https://dev.to/suhailkakar/linux-cheat-sheet-for-beginners-5830

@DevMisc
#linux #security #cheatsheet
DistroTest - Test it before you hate it...

On this website you will find many operating systems, which you can test directly online without a installation.

https://distrotest.net/

@DevMisc
#misc #linux #os
How to set up Windows Subsystem for Linux (WSL)

Are you a programmer, engineer, or student who wants to run Linux tools, but you're stuck with a Windows Computer? The solution is WSL!

https://medium.com/@josiah.alen.brown/how-to-set-up-windows-subsystem-for-linux-wsl

@DevMisc
#wsl #linux #workflow
Bashcrawl

Learn Linux commands by playing a simple text adventure.

https://gitlab.com/slackermedia/bashcrawl

@DevMisc
#learn #linux #fun #misc
JSLinux

Run Linux or other Operating Systems in your browser!

https://bellard.org/jslinux/

@DevMisc
#web #linux #misc
Linux x86 program start up

This is for people who want to understand how programs get loaded under linux. In particular it talks about dynamically loaded x86 ELF files.

http://dbp-consulting.com/tutorials/...

@DevMisc
#linux #elf #lowlevel #x86
A file even root can't delete! [chattr +i]

https://youtu.be/eXUCrIhTsM0

@DevMisc
#linux #filesystem #misc
👍2
How efficient can cat(1) be?

Various methods to create your own cat (with code), and comparisons between said methods.

https://ariadne.space/2022/07/17/how-efficient-can-cat1-be/

@DevMisc
#linux #c #coreutils #misc
🔥2💩1
How to (Kinda) Download More RAM

That's right. Jest no more.

https://blog.horner.tj/how-to-kinda-download-more-ram

@DevMisc
#fun #linux #misc
🐳7
⚠️ RegreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems

- The vulnerability is a regression of a previous issue (CVE-2006-5051) that was introduced in OpenSSH 8.5p1 in October 2020.
- The vulnerability allows for remote code execution as root on glibc-based Linux systems due to the SIGALRM handler calling non-async-signal-safe functions like syslog().
- Older vulnerable OpenSSH versions like 3.4p1 and 4.2p1 can be exploited by interrupting free() calls and leveraging heap corruption techniques like unlink() and House of Mind.
- Newer vulnerable versions like 9.2p1 can be exploited by interrupting malloc() calls and corrupting FILE structures to gain arbitrary code execution.
- Precise timing and network delay mitigation techniques are critical to winning the signal handler race condition.
- The exploit requires carefully crafting the heap layout and leveraging leftover data from previous allocations.
- OpenBSD is not vulnerable because it uses a safer syslog_r() function in its SIGALRM handler.
- The vulnerability is present in the default configuration of OpenSSH and affects the privileged sshd process.
- Significant effort and multiple iterations were required to develop reliable exploits for the different OpenSSH versions.
- The research demonstrates the continued need for vigilance in secure software development, as even a well-designed system like OpenSSH can have subtle regressions that introduce critical vulnerabilities.


https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt

@DevMisc (🟠 comments)
#security #ssh #linux
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥2