LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 09-23-2019, 01:49 PM   #16
ondoho
LQ Addict
 
Registered: Dec 2013
Posts: 19,872
Blog Entries: 12

Rep: Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053

Folks, everything you give OP here will be half-digested, then thrown back at you, revealing piles of half-truths and confirmation bias: OP does not draw conclusions from something they understood, they just draw lines between various familiar sounding words and phrases, thinking they actually understood something...
Which then leads to sentences like:
"So root access is important to get hacked, but the browser does not really have to be open, right?"
As a whole, this is actually harmful to understanding security and assessing potential risk, both for OP and others that might pass by here.
 
4 members found this post helpful.
Old 09-23-2019, 01:57 PM   #17
TB0ne
LQ Guru
 
Registered: Jul 2003
Location: Birmingham, Alabama
Distribution: SuSE, RedHat, Slack,CentOS
Posts: 26,654

Rep: Reputation: 7970Reputation: 7970Reputation: 7970Reputation: 7970Reputation: 7970Reputation: 7970Reputation: 7970Reputation: 7970Reputation: 7970Reputation: 7970Reputation: 7970
Quote:
Originally Posted by ondoho View Post
Folks, everything you give OP here will be half-digested, then thrown back at you, revealing piles of half-truths and confirmation bias: OP does not draw conclusions from something they understood, they just draw lines between various familiar sounding words and phrases, thinking they actually understood something...
Which then leads to sentences like:
"So root access is important to get hacked, but the browser does not really have to be open, right?"
As a whole, this is actually harmful to understanding security and assessing potential risk, both for OP and others that might pass by here.
Was thinking this same thing; reminds me of the four other posters in recent memory that have 'hackers' after them.
 
Old 09-23-2019, 03:38 PM   #18
Firerat
Senior Member
 
Registered: Oct 2008
Distribution: Debian sid
Posts: 2,683

Rep: Reputation: 783Reputation: 783Reputation: 783Reputation: 783Reputation: 783Reputation: 783Reputation: 783
I don't understand how it has taken you all so long to see it
 
Old 10-05-2019, 11:57 AM   #19
TokTok
Member
 
Registered: Oct 2019
Posts: 230

Rep: Reputation: Disabled
Quote:
Originally Posted by jsbjsb001 View Post
While vast majority of malware aimed at the desktop is written to infect Windows systems; for one thing, a lot of that malware set's itself to be started when the system starts, and then will monitor things like, running processes, opened files, websites visited, keystrokes, etc. An important point is that, none of that requires any web browser to actually be "open"/running.

For seconds, it's entirely possible to write the same sort of malware for any system, including Linux distro's. There was the "Hand of Thief" malware written for Linux, which will monitor things like which files are opened, running processes, websites visited, etc I believe. From what I remember, it did rely on the user explicitly becoming root themselves to get superuser rights, otherwise it was limited to running under the current user - because it didn't have the code to crack Linux's user privilege system. Again, it doesn't rely on any web browser running for malware to do it's business, regardless of the operating system being used.

Interest from malware developers to target Linux more will only increase. Although, a lot of recent Linux malware is more aimed at server Linux, bar maybe "cryptomining" malware. Also, in a lot of cases, Linux makes a good "distribution point" for malware - even if Linux itself isn't directly effected itself. Because Linux machines usually stay up for long periods of time without requiring a reboot, and well, there's a lot of Linux servers around.
What about the IME-Intel Management Engine start before the actual os ? The VNC Vieweruses this and can operate in safe mode even after a re-boot,can be used to install anything. I think this is how most infections we hear about are occuring, installed by default in servers-VPS presents a serious risk. I forgot to mention AMD has the same thing, most likely mobile phones have the same thing, like the gov. required chip`s for tracking.

Last edited by TokTok; 10-05-2019 at 12:01 PM. Reason: Need to include something
 
Old 10-10-2019, 07:10 AM   #20
hddfsck
Member
 
Registered: Aug 2019
Distribution: Debian; Ubuntu
Posts: 122

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by jsbjsb001 View Post
While vast majority of malware aimed at the desktop is written to infect Windows systems; for one thing, a lot of that malware set's itself to be started when the system starts, and then will monitor things like, running processes, opened files, websites visited, keystrokes, etc. An important point is that, none of that requires any web browser to actually be "open"/running.

For seconds, it's entirely possible to write the same sort of malware for any system, including Linux distro's. There was the "Hand of Thief" malware written for Linux, which will monitor things like which files are opened, running processes, websites visited, etc I believe. From what I remember, it did rely on the user explicitly becoming root themselves to get superuser rights, otherwise it was limited to running under the current user - because it didn't have the code to crack Linux's user privilege system. Again, it doesn't rely on any web browser running for malware to do it's business, regardless of the operating system being used.

Interest from malware developers to target Linux more will only increase. Although, a lot of recent Linux malware is more aimed at server Linux, bar maybe "cryptomining" malware. Also, in a lot of cases, Linux makes a good "distribution point" for malware - even if Linux itself isn't directly effected itself. Because Linux machines usually stay up for long periods of time without requiring a reboot, and well, there's a lot of Linux servers around.
...

Thanks for the input! The key word in my question is the word "see". Maybe I didn't make it clear what I meant by this word, and that is my fault. Simply, I was asking if the hacker can visually see my monitor / screen.

I have been told in the past that if my browser is not open when someone has remote access to my computer, concomitant with them "not" having the desktop password, that they can not visually see my monitor. That's what I was asking 100% - I should have made that point clearer. But I am glad to have had you mention some of the other things that could possibly go on.

However, from what I have read, 'outside of the visual aspect', a hacker can not install keyloggers in linux without root access.

As you mentioned, "From what I remember, it did rely on the user explicitly becoming root themselves to get superuser rights, otherwise it was limited to running under the current user - because it didn't have the code to crack Linux's user privilege system."

Thus, as I don't know one way or the other, I wonder if root access is needed for the following that you mentioned: running processes, opened files, websites visited? My guess would be no.

I appreciate your mature comments, thank you.

Last edited by hddfsck; 10-10-2019 at 07:15 AM.
 
Old 10-10-2019, 07:36 AM   #21
ntubski
Senior Member
 
Registered: Nov 2005
Distribution: Debian, Arch
Posts: 3,783

Rep: Reputation: 2083Reputation: 2083Reputation: 2083Reputation: 2083Reputation: 2083Reputation: 2083Reputation: 2083Reputation: 2083Reputation: 2083Reputation: 2083Reputation: 2083
Quote:
Originally Posted by hddfsck View Post
a hacker can not install keyloggers in linux without root access.
AFAIK, under X, keyloggers don't need root access. I think the situation might be different with Wayland though.

http://theinvisiblethings.blogspot.c...isolation.html
 
Old 10-10-2019, 07:53 AM   #22
hddfsck
Member
 
Registered: Aug 2019
Distribution: Debian; Ubuntu
Posts: 122

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by TenTenths View Post
You've been told:



If your machine is infected then you have to assume that whoever it is can see anything and everything you are doing, can access anything you can access, can see any files you open, can record every single thing you type on the keyboard including bank details, passwords, root password, ANYTHING. Doesn't matter if a browser or anything is open or closed you have to assume that they have access to everything you have access to.
Thanks. If you believe that they can visually see my monitor's screen without any browser open, has anyone ever shown a way that this could be achieved? In other words, is it 'really' known that someone can see my monitor's screen when there is no active browser? Thank you.
 
Old 10-10-2019, 07:54 AM   #23
hddfsck
Member
 
Registered: Aug 2019
Distribution: Debian; Ubuntu
Posts: 122

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by ntubski View Post
AFAIK, under X, keyloggers don't need root access. I think the situation might be different with Wayland though.

http://theinvisiblethings.blogspot.c...isolation.html
Thanks. What exactly is "under X"? As a sidenote, my question does not pertain to physical access.

Last edited by hddfsck; 10-10-2019 at 07:56 AM.
 
Old 10-10-2019, 07:59 AM   #24
TenTenths
Senior Member
 
Registered: Aug 2011
Location: Dublin
Distribution: Centos 5 / 6 / 7
Posts: 3,475

Rep: Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553
Quote:
Originally Posted by hddfsck View Post
Thanks. If you believe that they can visually see my monitor's screen without any browser open, has anyone ever shown a way that this could be achieved? In other words, is it 'really' known that someone can see my monitor's screen when there is no active browser? Thank you.
Take your pick from https://attack.mitre.org/techniques/T1113/ although as you don't actually want to believe what I've told you I'm sure you won't believe the other 100 sources mentioned on that page.
 
1 members found this post helpful.
Old 10-10-2019, 08:06 AM   #25
hddfsck
Member
 
Registered: Aug 2019
Distribution: Debian; Ubuntu
Posts: 122

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by TenTenths View Post
Take your pick from https://attack.mitre.org/techniques/T1113/ although as you don't actually want to believe what I've told you I'm sure you won't believe the other 100 sources mentioned on that page.
I'm just trying to discern what is proven, and what is theory, plus, I have different experts telling me different things. Basically, by asking, I am researching to come to a conclusion. Thanks.

update: I did look at the link - very interesting.

Last edited by hddfsck; 10-10-2019 at 08:56 AM.
 
Old 10-10-2019, 09:09 AM   #26
Samsonite2010
Member
 
Registered: Apr 2015
Distribution: Debian
Posts: 267
Blog Entries: 1

Rep: Reputation: 117Reputation: 117
I think the key aspect is what any piece of malware is designed to do. It might be that to visually see what is on your screen, a piece of malware could be written to send images back to base - that would not necessarily require root privileges (would it?). So if you can take screenshots or record your desktop without root - perhaps malware can also.

Probably a more pragmatic approach is to learn how to monitor your own system, you could then keep an eye on things and it should become quite apparent if anything dodgy is happening.
 
1 members found this post helpful.
Old 10-10-2019, 06:55 PM   #27
ntubski
Senior Member
 
Registered: Nov 2005
Distribution: Debian, Arch
Posts: 3,783

Rep: Reputation: 2083Reputation: 2083Reputation: 2083Reputation: 2083Reputation: 2083Reputation: 2083Reputation: 2083Reputation: 2083Reputation: 2083Reputation: 2083Reputation: 2083
Quote:
Originally Posted by hddfsck View Post
What exactly is "under X"?
By "under X", I meant, when running X Windows, which is the traditional graphics system for Unix-like OSes. Wayland is a newer replacement, optionally used in some Linux distributions.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
i can hear people when they talk but they can't hear me what do i do to fix this? dobieg Linux - Newbie 3 07-08-2014 09:15 PM
There seems to be constant unauthorized traffic on my computer. maestro52 Linux - Security 3 08-27-2008 03:28 PM
How do I block IP's to prevent unauthorized SSH login attempts? leofoxx Linux - Security 6 05-23-2005 09:36 PM
Suse 9.2 Samba, cant see Windows computers, but they can see Linux Whiskers Linux - Networking 6 05-08-2005 04:16 PM
can't see other machines but they can see each other Silly22 Linux - Networking 1 11-20-2002 03:28 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 08:51 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration