Then again, I'm putting together a CTF vulnimage and it's definitely going to be systemd-based. Bonus if you pwn it that way!https://twitter.com/marsroverdriver/status/881550176384503808 …
-
-
Replying to @marcan42
please come up with an attack vector where you're already root and need root. Did you even understand this """vulnerability"""?
1 reply 0 retweets 0 likes -
Replying to @CounterPillow
I already have, but I'd be spoiling CTF levels if I went into details ;)
1 reply 0 retweets 0 likes -
Replying to @marcan42
If it relies on some really dumb setup like generating unit files from unprivileged user input, then there's many ways to abuse that
2 replies 0 retweets 0 likes -
Replying to @CounterPillow
There are also many ways to get it right were it not for this systemd stupidity.
2 replies 0 retweets 1 like -
Replying to @marcan42 @CounterPillow
I wonder how paranoid people will now be copy/pasting systemd scripts from stackoverflow. Just need one malicious person to ruin it
1 reply 0 retweets 1 like -
Something like replacing placing a User=nobody where nobody is actually made with one or two utf-8 lookalike chars.
1 reply 1 retweet 8 likes -
I once wrote a lab script containing Linux shell commands in MS Word. It silently converted my -s into ‐s. Students tried to copy-paste...
1 reply 0 retweets 0 likes
A certain word processor's smart quote feature once brought down a datacenter cluster at a certain large internet company.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.