Page 1 of 1

So you think Linux is safe?

Posted: Thu 27 Jun 2013, 15:22
by 2byte
Special Report: U.S. cyberwar strategy stokes fear of blowback

http://www.reuters.com/article/2013/05/ ... EL20130510
Reuters reviewed a product catalogue from one large contractor, which was made available on condition the vendor not be named. Scores of programs were listed. Among them was a means to turn any iPhone into a room-wide eavesdropping device. Another was a system for installing spyware on a printer or other device and moving that malware to a nearby computer via radio waves, even when the machines aren't connected to anything.
There were tools for getting access to computers or phones, tools for grabbing different categories of data, and tools for smuggling the information out again. There were versions of each for Windows, Apple and Linux machines.

Posted: Thu 27 Jun 2013, 16:29
by nooby
Good that you told us. We have to encourage the devs
to look into it and see if there is any way to improve Puppy
if it is vulnerable in same way or worse. Due to how different it is
maybe their general ways to approach standard Linux maybe their
script has not inclided Puppy on the other hand if we are number ten
most popular they include Puppy differences in the script.

If standard Linux do this.
If Puppy Linux ask for help from operator :)

Posted: Fri 28 Jun 2013, 06:06
by 8-bit
I recently visited a web site that downloaded a partial file to /tmp before I caught it.
It was an EXE file and I assume it was an attempt to infiltrate Windows.
I cannot remember the site. But the appearance of an unrequested file got to me.

Also, at a site called 4Shared, I tried to download a game tar.gz file.
The site wanted me to download and run a file downloader that happened to be an EXE file.

And when I did a search of their site for the game file name, I was told it did not exist!

So what has happened to you lately that you would consider suspicious?

Posted: Fri 28 Jun 2013, 07:30
by Sylvander
8-bit wrote:So what has happened to you lately that you would consider suspicious?
See:
Was I hacked?

Posted: Fri 28 Jun 2013, 08:08
by jpeps
Sylvander wrote:
8-bit wrote:So what has happened to you lately that you would consider suspicious?
See:
Was I hacked?
Just remember that we're all on the network, so it's important to look, sound, and smell good at all times.

Posted: Fri 28 Jun 2013, 08:46
by Sylvander
jpeps wrote:Just remember that we're all on the network, so it's important to look, sound, and smell good at all times.
Huh?! :?
I don't understand.
Which network are we all on?

Posted: Fri 28 Jun 2013, 14:32
by jpeps
Sylvander wrote:
jpeps wrote:Just remember that we're all on the network, so it's important to look, sound, and smell good at all times.
Huh?! :?
I don't understand.
Which network are we all on?
wireless

http://www.csmonitor.com/Science/2010/0 ... mell-phone

Incidentally, this same chip is being developed for marketing data by tracking physiological responses.

Posted: Fri 28 Jun 2013, 18:52
by linuxbear
... might be true, but it is not that easy to get in my system. My router does not broadcast it's name and protected by a complex password.

my user account is protected by a complicated password
my important personal files are encrypted and my machines are turned off daily

Posted: Tue 02 Jul 2013, 09:06
by Edwardo
linuxbear wrote:... might be true, but it is not that easy to get in my system. My router does not broadcast it's name and protected by a complex password.

my user account is protected by a complicated password
my important personal files are encrypted and my machines are turned off daily
LB wifi has 5 methods to broadcast identification. Disabling SSID is a waste of a cycle. Did you address the other 4?

Further, passwords cannot resist the efforts of a skilled attacker with good cracking tools. 12 digit passwords yield in seconds. It's almost trivial.

Posted: Tue 02 Jul 2013, 19:02
by linuxbear
I am aware that someone with good skills can get in. That's why everything important is encrypted and the machine is completely scrubbed with bleachbit at least 3 times a week.

Posted: Wed 03 Jul 2013, 15:05
by Moose On The Loose
8-bit wrote: So what has happened to you lately that you would consider suspicious?
1) On a Windows-7 machine, I installed the latest updates by leaving it on with that process going for the night. The next morning, the machine ran really .... really .... slow and would not get on a network no matter what I tried. I rolled back to a restore point and it was back to normal. It makes me suspect someone has figured out how to pretend to be Microsoft.

2) I have had quite a few cases of seeing something like a picture with a link that said "something.jpg" or an audio file that says it is "something.wav" that in fact leads to a something.exe. I think that is above "suspicious" and more like "obviously"

3) A while back there was a "political add" that pretended to be a local news story. It qualifies as a mind virus but is worth mentioning because it showed a method. It used one of the IP to location services and some javascript to make it always dated yesterday and be from the (your town) Express. It contained links that it invited you to click on that it claimed where to the newspaper's site but in fact took you to a server run by the political group. The same method could be used to make it appear some local folks want you to click on the thing that put the virus on your computer.

Posted: Tue 16 Jul 2013, 12:36
by redandwhitestripes
Edwardo wrote:
linuxbear wrote:...
Further, passwords cannot resist the efforts of a skilled attacker with good cracking tools. 12 digit passwords yield in seconds. It's almost trivial.
Not the full picture. You need to define "skilled attacker" and "good tools". Brute force attacks can be resisted with a password mixing case, numbers and punctuation.

In the same way anyone's property can be broken into with enough resources, I guess the same holds true for networks, but if you follow simple steps such as using a decent firewall, WPA2 encryption if possible and using strong passwords and up to date software, you have a good chance of holding out against most hackers IMHO.

Posted: Tue 16 Jul 2013, 17:09
by wibble
If someone with the skills and tools and time wants to then sure its possible. But consider how often that will happen... The probability unless you are a political dissident, or subject to a government or corporate investigation are pretty slim.

now improving security to prevent everyday exploits from script kiddies and mail-ware that makes a whole lot of sense. Linux is pretty secure as long as precautions are taken, firewall ect..

I would sweat more on a windows box to be honest. There is a lot more development of exploits for that platform just because of the shear amount of users.

If you think 12 character password strings are bad... IBM mainframes have a maximum length of 8... and also cannot contain spaces or special characters. So from a security point of view they are far more vulnerable platforms when connected to the Internet.

The really scary one for me is wireless, there are so many potential holes and exploits that are inbuilt into the standard. I would not trust it for my sensitive data. And once the 'Internet of things' takes off you will have an even larger problem.

That said I think as time goes on and Linux gets more acceptance there will be more tools and exploits developed for the platform - look at Zeus you don't even need to have a great deal of technical skill to use it.

However I really would like to be able to password the system, I noticed I could do that with attack puppy. would be nice to have that ability with precise.

So you think Linux is safe?

Posted: Thu 08 Aug 2013, 06:29
by Sky Aisling
“Hand of Thief

Re: So you think Linux is safe?

Posted: Thu 08 Aug 2013, 06:55
by Ibidem
https://blogs.rsa.com/thieves-reaching- ... inth3wild/
Secondly, since Linux is open source, vulnerabilities are patched relatively quickly by the community of users. Backing this up is the fact that there aren’t significant exploit packs targeting the platform. In fact, in a conversation with the malware’s sales agent, he himself suggested using email and social engineering as the infection vector.

Posted: Thu 08 Aug 2013, 16:13
by L18L
wibble wrote:... I really would like to be able to password the system, I noticed I could do that with attack puppy. would be nice to have that ability with precise.
I don't know what is attack puppy but I do know to use the command

Code: Select all

passwd