Tag

Linux security

0 views collected around this technical thread.

OPPO Kernel Craftsman
OPPO Kernel Craftsman
Oct 29, 2021 · Information Security

Linux Security Module (LSM) Fundamentals and Implementation

The article explains the Linux Security Module (LSM) framework, detailing its origins, hook‑based architecture, kernel integration points, initialization process, and how it enables flexible, non‑intrusive security enhancements such as SELinux, allowing multiple security modules to coexist within the Linux kernel.

Kernel SecurityLSMLinux security
0 likes · 9 min read
Linux Security Module (LSM) Fundamentals and Implementation
Efficient Ops
Efficient Ops
Mar 9, 2021 · Information Security

Why the Critical Sudo Vulnerability (CVE‑2021‑3156) Went Unpatched for 10 Years

A heap‑buffer‑overflow bug in sudo (CVE‑2021‑3156) lets any local user obtain root without a password, existed for a decade before being fixed, and can be tested with a simple sudoedit command on vulnerable Linux distributions.

CVE-2021-3156Linux securityheap overflow
0 likes · 6 min read
Why the Critical Sudo Vulnerability (CVE‑2021‑3156) Went Unpatched for 10 Years
Efficient Ops
Efficient Ops
Jan 13, 2021 · Information Security

How to Detect and Eradicate a Hidden Linux Mining Botnet: A Step‑by‑Step Analysis

This article walks through a real‑world Linux mining malware infection, detailing how the attacker hid a malicious cron job, used LD_PRELOAD rootkits, propagated via SSH keys, and how the analyst uncovered and removed the threat using busybox, strace, and careful forensic commands.

Incident ResponseLinux securityRootkit
0 likes · 12 min read
How to Detect and Eradicate a Hidden Linux Mining Botnet: A Step‑by‑Step Analysis
Aikesheng Open Source Community
Aikesheng Open Source Community
Jan 8, 2021 · Information Security

Configuring SELinux for MySQL: Managing Access Controls and Directory Contexts

This article explains how SELinux enforces mandatory access control on Linux, describes its three modes, shows how to view and modify SELinux contexts for MySQL processes and data directories, and provides step‑by‑step commands to add custom paths, logs, PID files, and ports while preserving system security.

Access ControlDatabase AdministrationLinux security
0 likes · 8 min read
Configuring SELinux for MySQL: Managing Access Controls and Directory Contexts
58 Tech
58 Tech
Sep 4, 2020 · Information Security

Understanding ASLR and Buffer Overflow Exploits on Linux

This article explains the concept of Address Space Layout Randomization (ASLR), illustrates how buffer overflow attacks work on Linux, shows step‑by‑step exploitation with disabled ASLR, analyzes memory layout calculations, and discusses the impact of PIE and modern mitigation techniques.

ASLRLinux securityPIE
0 likes · 6 min read
Understanding ASLR and Buffer Overflow Exploits on Linux
Efficient Ops
Efficient Ops
May 31, 2020 · Information Security

Detecting and Eradicating Hidden Linux Mining Malware via Crontab and LD_PRELOAD

This article walks through a real‑world Linux mining malware incident, detailing how the attacker used a malicious crontab entry and LD_PRELOAD to hide processes, the forensic steps to uncover the payload, and practical remediation and hardening measures to prevent future compromises.

Linux securitycrontabcryptocurrency mining
0 likes · 12 min read
Detecting and Eradicating Hidden Linux Mining Malware via Crontab and LD_PRELOAD
DevOps
DevOps
Nov 1, 2018 · Information Security

Docker Security Features: Capabilities, Image Signing, AppArmor, Seccomp, User Namespaces and More

This article explains Docker's built‑in security mechanisms—including Linux kernel capabilities, image signing, AppArmor MAC, Seccomp syscall filtering, user namespaces, SELinux, PID limits and additional kernel hardening tools—provides configuration examples, command‑line demonstrations, and guidance on using them safely.

Container SecurityDockerLinux security
0 likes · 16 min read
Docker Security Features: Capabilities, Image Signing, AppArmor, Seccomp, User Namespaces and More
Practical DevOps Architecture
Practical DevOps Architecture
Sep 6, 2017 · Information Security

Configuring SELinux and iptables on Red Hat/CentOS Systems

This guide explains how to permanently disable SELinux, temporarily change its mode, and provides a comprehensive tutorial on using iptables—including table concepts, basic commands, rule management, scripting, NAT configuration, and saving/restoring firewall rules—on Red Hat/CentOS Linux.

CentOSLinux securitySELinux
0 likes · 16 min read
Configuring SELinux and iptables on Red Hat/CentOS Systems
Efficient Ops
Efficient Ops
May 11, 2017 · Information Security

Mastering Linux Security: Real‑World Attack Vectors and Defense Strategies

This article shares practical insights from a security director at YY Live, detailing the complex Linux security landscape, common vulnerabilities, real‑world attack techniques such as Redis abuse and privilege escalation, and a multi‑layered defense approach that balances rapid business iteration with robust protection.

DDoS mitigationIntrusion DetectionLinux security
0 likes · 21 min read
Mastering Linux Security: Real‑World Attack Vectors and Defense Strategies