"DirtyCred" Gives Hackers Full Control of Linux and Android Systems

Поделиться
HTML-код
  • Опубликовано: 7 окт 2024
  • In this video I discuss the dirty cred vulnerability that allows for an unprivileged user to escalate privileges to root on the Linux kernel (all architectures) the bug is also believe to present in the android kernel and docker images using the Linux kernel.
    Link to slides
    zplin.me/paper...
    Link to github repo
    github.com/Mar...
    ₿💰💵💲Help Support the Channel by Donating Crypto💲💵💰₿
    Monero
    45F2bNHVcRzXVBsvZ5giyvKGAgm6LFhMsjUUVPTEtdgJJ5SNyxzSNUmFSBR5qCCWLpjiUjYMkmZoX9b3cChNjvxR7kvh436
    Bitcoin
    3MMKHXPQrGHEsmdHaAGD59FWhKFGeUsAxV
    Ethereum
    0xeA4DA3F9BAb091Eb86921CA6E41712438f4E5079
    Litecoin
    MBfrxLJMuw26hbVi2MjCVDFkkExz8rYvUF
    Dash
    Xh9PXPEy5RoLJgFDGYCDjrbXdjshMaYerz
    Zcash
    t1aWtU5SBpxuUWBSwDKy4gTkT2T1ZwtFvrr
    Chainlink
    0x0f7f21D267d2C9dbae17fd8c20012eFEA3678F14
    Bitcoin Cash
    qz2st00dtu9e79zrq5wshsgaxsjw299n7c69th8ryp
    Etherum Classic
    0xeA641e59913960f578ad39A6B4d02051A5556BfC
    USD Coin
    0x0B045f743A693b225630862a3464B52fefE79FdB
    Subscribe to my RUclips channel goo.gl/9U10Wz
    and be sure to click that notification bell so you know when new videos are released.

Комментарии • 754

  • @rainbowbunchie8237
    @rainbowbunchie8237 2 года назад +726

    TL;DW: Go abuse this to root your Android device and modify your OS before the security patch drops from your manufacturer.

    • @pewu1927
      @pewu1927 2 года назад +120

      I found this video and thought: "Damn, I can root my phone this way". I can't root it with normal ways cuz i have blocked bootloader and no code, but yeah, gonna try that

    • @TwelveLetter956
      @TwelveLetter956 2 года назад +183

      Kid named locked bootloader and propiretary firmware code:

    • @username54487
      @username54487 2 года назад +39

      i was thinking the same exact thing! i've got a samsung a54, and the thing is locked down tight...anyone have any idea how to use this on an adroid device with user/terminal access? maybe modify the exploit code for sudo access or a root group? this would be an AWESOME way for TONS of phone modders to root their devices before the phone gets patched! lets come up with something!

    • @username54487
      @username54487 2 года назад +13

      hmm, i compiled this on my arch desktop as well as a raspberry pi running aarch64, and i get the same error:
      "fsconfig: Invalid argument
      [-] failed to write, retry..."

    • @WilliamHollinger2019
      @WilliamHollinger2019 2 года назад +13

      I want to reuse old android phones to run windows I know it is the worst os but to recycle old devices.

  • @MrMoto655
    @MrMoto655 2 года назад +273

    This is why I do all my computing on paper

    • @awakege6337
      @awakege6337 2 года назад +12

      😎

    • @everyhandletaken
      @everyhandletaken 2 года назад +22

      I hope you run your sudo commands on red paper, so you remember it’s potentially dangerous.

    • @keithberjeron763
      @keithberjeron763 2 года назад +14

      "let Me search for that file..." ;; Opens a file cabinet;;

    • @KatyaAbc575
      @KatyaAbc575 2 года назад +10

      Until your paper connects to the Internet and gets hacked.

    • @Kilogya
      @Kilogya 2 года назад +5

      @@keithberjeron763 * takes about 10 seconds or more depending on their file system management techniques *

  • @snugasapugonarug
    @snugasapugonarug 2 года назад +562

    This is getting to the point where you should just turn off your internet whenever you don't explicitly need it.

    • @theopendoor3716
      @theopendoor3716 2 года назад +76

      Or use windows so you are pre-hacked :p

    • @Radovanslav
      @Radovanslav 2 года назад +10

      @@theopendoor3716 time to mix up some concrete then lol

    • @chrissi.enbyYT
      @chrissi.enbyYT 2 года назад +2

      @@theopendoor3716 pre hacked?

    • @BruceCarbonLakeriver
      @BruceCarbonLakeriver 2 года назад +35

      @@chrissi.enbyYT Yep b/ Windows is glowing AF

    • @chrissi.enbyYT
      @chrissi.enbyYT 2 года назад

      @@BruceCarbonLakeriver what u mean

  • @leonidas14775
    @leonidas14775 2 года назад +180

    For android, this is a good thing and a bad thing. You can root previously unrootable phones. But so can badguys, who can permanently lock you out of your device.

    • @silverywingsagain
      @silverywingsagain 2 года назад +10

      How? there's no unprivileged users able to remotely log into an android phone. By default android doesn't even include a sudo binary. Are you sure you understand what this exploit does? You would have to willingly download and execute malware for this to be effective on android, at which point your security is fucked with or without DirtyCred.

    • @autistadolinux5336
      @autistadolinux5336 2 года назад +4

      @@silverywingsagain you can include yourself now, lol.

    • @MrAwesomenesh
      @MrAwesomenesh 2 года назад +2

      Well to be a little more explicit, androids can generally be rooted with common procedures but the issue comes with advanced cellular features locked behind A/B partitions (pitched as partitioning to help with live updates) that break when edited. Some have magisk/xposed modules that re-establish those security features allowing a rooted android to actually be usable. Thankfully, it means that if this was leveraged to gain root access to any given android it would likely break most networking to begin with

    • @winnie8614
      @winnie8614 2 года назад +4

      @@silverywingsagain you are downloading whatever software from PlayStore. But it somehow guarded by android OS, uless you give permission to storage/camera/etc. After this exploit you would be vulnurable to bad apps in paly store.

    • @winnie8614
      @winnie8614 2 года назад +3

      @@silverywingsagain There are actually two different exploits. One for processes and second for files. For one with processes no code published yet.
      But you can use files to get executable. Just need to owerwrite any binary with suid(root) on device.

  • @frontlinetomcat
    @frontlinetomcat 2 года назад +1582

    That's why TempleOS is best

    • @DeuxisWasTaken
      @DeuxisWasTaken 2 года назад +968

      You can't have privilege escalation bugs if you run everything at ring-0, big brain moment

    • @robertpaulson8790
      @robertpaulson8790 2 года назад +51

      Checkmate root kit

    • @salpertia
      @salpertia 2 года назад +147

      @Hope You are alone, child. There is only darkness for you, and only death for your people. These ancients are just the beginning. I will command a great and terrible army, and we will sail to a billion worlds. We will sail until every light has been extinguished. You are strong, child, but I am beyond strength. I am the end, and I have come for you. Hope.

    • @MentalOutlaw
      @MentalOutlaw  2 года назад +530

      Run literally everything in ring 0, what escalation?

    • @johnarnold893
      @johnarnold893 2 года назад +8

      Front line, you are joking, right?

  • @ashishpatel350
    @ashishpatel350 2 года назад +64

    so this is what all those people mean when they say "you need to check your privilege"

  • @nabbikill
    @nabbikill 2 года назад +319

    write(fd, "HACKED", 6) does not write "HACKED" to the line 6, "6" is the buffer size, which is the length of the "HACKED" string. it is needed as there are different buffer representations that can be given to the syscall.

  • @GameSmilexD
    @GameSmilexD 2 года назад +162

    Memory management vulns are scarce but when they appear it's always a giant mess

  • @capability-snob
    @capability-snob 2 года назад +37

    "sales people doing provisioning" picturing an ansible task that gets a salesperson on the telephone and gives them instructions to build out your cloud infrastructure over text to speech

    • @silverywingsagain
      @silverywingsagain 2 года назад

      Imagine that shit? If you're letting your rank and file spin up infrastructure directly you're objectively bad at your job.

  • @BenitoF2009
    @BenitoF2009 2 года назад +157

    Linux: "There's a biiig bug. But you have to sit on the on the Keyboard in front of the pc to use it."
    Windows: "... before you turn on your machine make sure that it isn't connected to the outside world!"

    • @BruceCarbonLakeriver
      @BruceCarbonLakeriver 2 года назад +2

      I had the same thought LOL

    • @rogo7330
      @rogo7330 2 года назад +16

      Actually you don't for this. If you, as it was said in the video, have an unpriviliged access to machine and can launch arbitrary code - boom, you have a root.
      It's a serious bug, and it will be interesting to see what is the ROOT (lmao) of this problem.

    • @silverywingsagain
      @silverywingsagain 2 года назад +6

      @@rogo7330 Shell access is the same as being at the keyboard in UNIX. If you have unprivileged access to a machine you can still run arbitrary code and do a ton of damage even without root. The root of the problem is that computers use buffers, and buffers can overflow. Unless you can think of a completely different paradigm, exploits will always exist. The solution is to make sure USERS don't have unprivileged access, only APPS and SERVICES do. Then you can implement security on a case by case basis instead of trying to "herd cats" on a system-wide basis.
      Of course all of this is better than windows and mac where escalation is boiled down to a brain-dead popup that 99% of users will click "OK" without thinking.

    • @rogo7330
      @rogo7330 2 года назад +4

      @@silverywingsagain "apps and services" are users. You at the keyboard not doing much unless you executing something. If you as user only answering questions from apps and services ("There is 10 people in the room. Is it true? [y/n]", "Press Enter to continue", etc.), you can't do much. If your service or app is a big clusterfuck of code that doing some weird shit and because of that you put it inside docker or something - there it is, just put some symbols into Minecraft chat on the server and you have access to minecraft server's user and its shell.

    • @xybersurfer
      @xybersurfer 2 года назад

      you are so butthurt, that you to bring up Windows

  • @QualityDoggo
    @QualityDoggo 2 года назад +114

    Privilege escalation is a bigger deal on Linux not only because they're servers... but because Windows/MacOS are usually "single user admin" and you hardly have to escalate to do anything.

    • @DistrosProjects
      @DistrosProjects 2 года назад +8

      Windows yes, macOS no. macOS is a (very locked down) UNIX system at its core since 2001 and requires privilege execution to write to system files, however applications can be installed without the administrator password as long as your account is an administrator (and not a "Standard") account. However, privilege escalation bugs can't usually cause any harm to a system (besides deleting/stealing files, but that could be done without admin privileges) due to Apple making the system files read only, even to root, by default in 2015, and further when they put them on a read-only partition.

    • @PvtAnonymous
      @PvtAnonymous 2 года назад +7

      @@DistrosProjects I guess you're mainly talking about SIP here. And yeah, for most macOS users, it makes sense. Most are dumb enough to just click "yes" to anything the computer asks and thus infect the system. For more experienced users it's not really necessary I guess, but still pretty useful.

    • @blkspade23
      @blkspade23 2 года назад +3

      @@DistrosProjects UAC does the same thing in Windows for admin users, as MacOS. The 1st user on MacOS is always an admin just like Windows. The only difference is MacOS prompts the user to enter their password, where as UAC just asks the user Yes or No. UAC made most malware happy to run in userspace, which subsequently became the exact same behavior in MacOS.

    • @necrolog3797
      @necrolog3797 2 года назад

      @@blkspade23 you can log as user and use an admin password for UAC. i couldnt quite make it practical but it works

    • @socvirnylestela5878
      @socvirnylestela5878 2 года назад +1

      @Kris Nicholson you got it wrong. Unix is Unix, Linux is a Unix-clone (others call it Unix-like) and never shared some code from Unix . Hence, you can't just say Unix is derived Linux. :) other points are correct though.

  • @dreamhollow
    @dreamhollow 2 года назад +382

    Dear god, I hope they're able to patch this quickly. It could be a disaster for the entire internet if hackers managed to take down entire major servers.

    • @jokroast6912
      @jokroast6912 2 года назад +90

      Do not click the sussy link from Hope because like... he sends it to multiple people

    • @briani7858
      @briani7858 2 года назад +3

      same. this is a big one.

    • @tacokoneko
      @tacokoneko 2 года назад +29

      i have a factory locked bootloader Android phone (SM-G960U) so as soon as i saw this notification i turned off the phone, i want to learn how to do this exploit so i can use it to root my phone before AT&T and samsung force upgrade its kernel to a patched one, this is 100% legal reason to perform this exploit right?

    • @s0nnyburnett
      @s0nnyburnett 2 года назад +7

      I long for the day the internet is dead.

    • @trollerjakthetrollinggod-e7761
      @trollerjakthetrollinggod-e7761 2 года назад +2

      It's not as likely to happen. Servers have a much smaller attack surface than regular computers.

  • @SCTproductionsJ5
    @SCTproductionsJ5 2 года назад +88

    So what you're saying is: *don't update* if you want to root your phone, but *do update* your computer running Linux, yeah?

    • @NJ-wb1cz
      @NJ-wb1cz 2 года назад +2

      It's super bad actually. Now literally any app on your phone can do whatever the developer wants with everything that's on your phone
      And many phones will never be patched

    • @aquaponieee
      @aquaponieee 2 года назад +1

      @@NJ-wb1cz well, don't install shitware but only FOSS apps from developers you trust

    • @roger8772
      @roger8772 2 года назад

      @Omelette au Fromage Just buy from a manufacturer that will let you unlock the bootloader. I got a google pixel straight from google and i can unlock it and root it without any magic

  • @erickvond6825
    @erickvond6825 2 года назад +6

    This was interesting and could explain how some roommates got into my Linux NAS a few years back. Thanks for the content...

  • @tjgdddfcn
    @tjgdddfcn 2 года назад +5

    little did the penguin know this was a planned sabotage by the rustceans to overthrow C and rewrite the kernel in rust

  • @renakunisaki
    @renakunisaki 2 года назад +9

    Oh no! Better switch to an even less secure system so I don't need to worry about this one bug.

  • @jokroast6912
    @jokroast6912 2 года назад +25

    Dude imagine installing Roblox on somebodies system by force

  • @floppa9415
    @floppa9415 2 года назад +13

    You know, I like to point the positives - and this could maybe allow plenty of phones to be be rooted.

  • @mranderson2048
    @mranderson2048 2 года назад +1

    May the RUclips algorithm bless the channel with growth and prosperity forever.

  • @lowhigh3426
    @lowhigh3426 2 года назад +14

    That's why you should always delete the Linux kernel to remove any bloat and run Linux from a spaghetti.

  • @bashisobsolete.pythonismyn6321
    @bashisobsolete.pythonismyn6321 2 года назад +12

    openBSD users be like: "what's a privilege escalation?"

  • @yellowkll2853
    @yellowkll2853 2 года назад +10

    10:08
    last argument of 'write' is number of bytes to write, not a line number.

  • @Theineluctable_SOME_CANT
    @Theineluctable_SOME_CANT 2 года назад +3

    "Remember that time we did the updates to OPEN VMS?
    Wasn't that version 4.4?
    Yeah, we broke our own security and OPEN VMS turned into:
    WIDE OPEN VMS!"

  • @memphisartguy2
    @memphisartguy2 2 года назад +1

    Pretty Cool one of Siemens 101 Classes in cyber security is called 'From Web to Root". Where we use a weak user base system to get admins account and then use a form to executed shell code in turn giving use a remote login and use this exploit to take over the docker to get to the host shell with SU access. It just took 4 hours to teach a whole class to do this with most not having an ounce of training or Linux knowledge.

  • @user-hk3ej4hk7m
    @user-hk3ej4hk7m 2 года назад +12

    It's almost as if C is not good for memory management

    • @bbseal6174
      @bbseal6174 2 года назад

      SHUT UP

    • @duncanw9901
      @duncanw9901 2 года назад +7

      Well, C is good for memory management, and that's the problem...
      Because _people_ aren't good at memory management

  • @Darthborg
    @Darthborg 2 года назад +5

    Hurray my favorite topic for content

  • @lucidadragon
    @lucidadragon 2 года назад +21

    "Use after free" Oh god no, I can hear the Rust developers stampeding over the hills to proclaim their superiority once again.

    • @tauon_
      @tauon_ 2 года назад +1

      they're here

  • @noeljose
    @noeljose 2 года назад

    an year ago, i switched to Linux because of you. its awesome and thank you

  • @broyojo
    @broyojo 2 года назад +28

    sad that most of our critical, low-level infrastructure is using unsafe languages. the amount of code is so large in these projects that not one single person can manage or know it all. vulnerabilities become inevitable

    • @breakfast7595
      @breakfast7595 2 года назад +11

      Still better than Microsoft or Apple. Not that it _shouldn't_ be fixed. But rather that it _can_ be fixed

    • @ratchicken8159
      @ratchicken8159 2 года назад

      Wdym unsafe

    • @WofWca
      @WofWca 2 года назад +7

      @@ratchicken8159 he means that it's very easy to introduce a vulnerability writing in C because it allows you to do practically anything, it doesn't check for memory management errors, unlike say, Rust, with its borrow checker, or Python, where you don't have to manage memory at all.

    • @ratchicken8159
      @ratchicken8159 2 года назад +1

      @@WofWca yes ofc but making a language memory safe doesnt solve all the vulnerabilities
      only a couple

    • @WofWca
      @WofWca 2 года назад +7

      @@ratchicken8159 well, a ton of vulnerabilities are memory-related, including this one, so I'd say using safer tools is worth.

  • @JodyBruchon
    @JodyBruchon 2 года назад +15

    I hate containers. I hate all-in-one packaging like Flatpak. Both are used so inappropriately all the damn time. _edit to add, since I was asked "why are those bad?":_ You know how the end of firmware updates for IoT stuff like a wireless router means that the router is forever frozen with all its security flaws after firmware stops being put out? Now imagine that for every program on your system. That's the problem with "containers." They package everything required for a program at the time of building, including the version of every single library in use on the build system. If, say, glibc (the most common/widely used Linux C standard library that the vast majority of software uses in some capacity) patches a horribly massive flaw and you update your packages and the fixed glibc build is in those, it does not update the glibc instance in ANY of your containerized software. This is just one facet; it completely avoids the point of reusable shared library code as well, blah blah.

    • @TwelveLetter956
      @TwelveLetter956 2 года назад +1

      Can you elaborate further why it's bad?

    • @joemamium
      @joemamium 2 года назад +9

      @@TwelveLetter956 He's got bitten by a rabid container when he was a child 😔😔😔😔😔

    • @JodyBruchon
      @JodyBruchon 2 года назад +4

      @@TwelveLetter956 Oh god. Where do I start? You know how the end of firmware updates for IoT stuff like a wireless router means that the router is forever frozen with all its security flaws after firmware stops being put out? Now imagine that for every program on your system. That's the problem with "containers." They package *everything* required for a program at the time of building, *including the version of every single library in use on the build system.* If, say, glibc (the most common/widely used Linux C standard library that the vast majority of software uses in some capacity) patches a horribly massive flaw and you update your packages and the fixed glibc build is in those, *it does not update the glibc instance in ANY of your containerized software.* This is just one facet; it completely avoids the point of reusable shared library code as well, blah blah.

    • @Cookiekeks
      @Cookiekeks 2 года назад +4

      But you can update containers as well?

    • @WyvernDotRed
      @WyvernDotRed 2 года назад +1

      @@Cookiekeks the problem is that you have to rely on the application developer to update it.
      Though when normal software packs it's own dependencies it's the same, but this is rarer and usually requires using the system wide updated ones.
      FlatPak allows for ways of having the runtime updated normally, but it depends on the choice of the developer.
      And if they abandon the software, it becomes insecure or breaks in the future.

  • @CoolFire666
    @CoolFire666 2 года назад +9

    Good thing I don't run a public access Linux shell host where there's lots of unprivileged and untrusted users on a system...

  • @BlackOps78321
    @BlackOps78321 2 года назад +19

    It usually is not Linux itself but, the fact that those addons and plugins all made by random people who think they're edgy, then introduce a vulnerability. Of course they left a ton of them. The problem is, of course, if it's a vulnerability in a 'widely used' component. You're giving total nobodies ability to make these things most of the time, even when talking about the more popular linux distros. There's likely even more than Windows at this point, considering they started actually trying to secure things, probably after Windows XP. Even then it's still useful to have exploits like this imo because I'd rather be able to mod my kernel or do what I want.
    For example, I wanted to make a new exploit for fun. Within 3 days I found a way to exploit the NVidia Driver (latest/current ones).. You can then shut down any antivirus or access any game process without even trying because it just accesses most of them already. No one even knows and it's completely private how their drivers work. Maybe a few have recently released more about dxgkrnl vulnerabilities, but, those can be easily found now because of that. Now there's like 3 other things you can hook down the line from that, including the driver itself.

    • @Cookiekeks
      @Cookiekeks 2 года назад +1

      Have you reported the exploit?

    • @emachine003
      @emachine003 2 года назад

      @@Cookiekeks this, nvidia probably has a bounty for this sort of thing

    • @NJ-wb1cz
      @NJ-wb1cz 2 года назад +1

      @@Cookiekeks this person is simply daydreaming about things

  • @WitchMedusa
    @WitchMedusa 2 года назад +10

    I wonder if this effects GrapheneOS because they use a hardened memory allocator, it would be nice to see thay spare them

  • @densidste9137
    @densidste9137 2 года назад +20

    another defcon another look into 10 year old vulnerabilities.

    • @jokroast6912
      @jokroast6912 2 года назад +7

      DO not click on the sussy YT link from Hope. They spam it to multiple people.

    • @TheGhostFart
      @TheGhostFart 2 года назад +2

      @@jokroast6912 good job looking like a bot

    • @WofWca
      @WofWca 2 года назад

      @@TheGhostFart good job looking like a bot

    • @jokroast6912
      @jokroast6912 2 года назад

      @@TheGhostFart right on m8. Im out here tho. Warning people

    • @anonsforever_
      @anonsforever_ 2 года назад

      Defcon run the world. We are all just lucky to coexist with them.

  • @ShaunakHub
    @ShaunakHub 2 года назад +8

    Biggest problem are old Android devices which no longer receive security updates...

    • @bow-89
      @bow-89 2 года назад +1

      Bad news for my 2011 Samsung Galaxy Mini

  • @dr07828
    @dr07828 2 года назад +1

    This is neat. I tried it out. I check all of my systems to see if they were vuln, and everything seemed to be patched. Nice testing tool. But I also played around with it. This could very easily be a copy past script fast and bang in. We all know plenty of systems admins out there slow to update....

  • @silverywingsagain
    @silverywingsagain 2 года назад +46

    Dirty pipe has been known about forever, this is a local exploit. Secure your infrastructure properly and it's a non issue. If you already have access to a system there will always be another overflow exploit waiting to be found. It's basically intrinsic to how programming works. You can isolate and prevent individual cases but nothing will ever really prevent a user who already has access to a system from escalating privileges.

    • @minikame2272
      @minikame2272 2 года назад +3

      You can't architect your way around this if your entire service is built on shared tenants

    • @gg-gn3re
      @gg-gn3re 2 года назад

      yep these are all over on every system, on windows you can just delete the keychain file and gain access to everything

    • @LordNementon
      @LordNementon 2 года назад +2

      @@gg-gn3re If you can do that, you already are admin ... 😹

    • @gg-gn3re
      @gg-gn3re 2 года назад

      @@LordNementon no you aren't. You boot into another OS and delete it, dummy. you can't do this on windows login.

    • @LordNementon
      @LordNementon 2 года назад +2

      @@gg-gn3re If you assume your bootloader isn't protected and you do not use disk encryption, yeah maybe.
      Let's say, you already are admin of the hardware in that case 🙃

  • @Veshremy
    @Veshremy 2 года назад +12

    i don’t think that’s good

    • @mmccall0813
      @mmccall0813 2 года назад

      gonna have to agree with you here

    • @MixedVictor
      @MixedVictor 2 года назад +12

      ratio bot

    • @shinwaffle767
      @shinwaffle767 2 года назад +1

      yeah it ain't looking good chief

    • @jokroast6912
      @jokroast6912 2 года назад +1

      Do not click on the sussy YT link from Hope. They are sending it to multiple people.

    • @friendofp.24
      @friendofp.24 2 года назад

      @@jokroast6912 Stop wasting your time. You spend 30 seconds to type a comment and the bot sends out millions in a second. Besides, people on this channel know what bots are.

  • @jokroast6912
    @jokroast6912 2 года назад +13

    I hope the patches come soon.

  • @dany08011
    @dany08011 2 года назад +8

    Some random server running Ubuntu 18.04 without any update: 💀

  • @FaySmash
    @FaySmash 2 года назад +6

    Lets hope for a wave of root on Auto head units/Android/settop boxes/consoles ect!

  • @Tachi107
    @Tachi107 2 года назад +3

    Hey Mental, yesterday Telegram officially became a spooky proprietary platform. I think it could be a good topic for a video, and really useful info to your audience.
    I can link you all the information I've gathered, via email, Matrix, or whatever.

  • @windowsxseven
    @windowsxseven 2 года назад +10

    Check your privilege

    • @ZERARCHIVE2023
      @ZERARCHIVE2023 2 года назад

      White male cis froma poor family and with no future whatsoever.
      10/10 ?

  • @Ultrajamz
    @Ultrajamz 2 года назад +2

    Hilldawg did the big brain corruption move, windows servers, bit bleach, hammers

  • @w1keee
    @w1keee 2 года назад +4

    i'm glad that linux is (probably) going to get rust support, so less of these memory errors happen.

  • @Brancliff
    @Brancliff 2 года назад +79

    Outwaw-chan, pwease do a weview of uwuntuOS, da best distrow of winux for weeaboos uwu

    • @nobafan7515
      @nobafan7515 2 года назад +4

      Is that true? I haven't heard of it.

    • @cirrusradiatus
      @cirrusradiatus 2 года назад +7

      Albania #1

    • @sigmamale4147
      @sigmamale4147 2 года назад +3

      Absolutely disgusting

    • @MentalOutlaw
      @MentalOutlaw  2 года назад +74

      Lol I just looked it up, I didn't think it was possible to make Ubuntu worse but sure enough they found a way!

    • @soapchin
      @soapchin 2 года назад +10

      @@MentalOutlaw Better than windows

  • @96ethanh
    @96ethanh Год назад

    This is so simple. Crazy it took this long to discover it.

  • @NeroMai
    @NeroMai 2 года назад

    Time to break out the Leapfrog OS

  • @nandoxus
    @nandoxus 2 года назад +24

    Reject technology return to monke

  • @ravenecho2410
    @ravenecho2410 2 года назад +37

    monolithic vs microkernels, given enough complexity - or enough utility, macrokernels will always have exploits

    • @randomgeocacher
      @randomgeocacher 2 года назад +2

      Why would a micro kernel be less prone to implementation bugs? I can see some benefits to micro kernels, such as not everything sharing same memory… but implementation bugs where affected functionally is all contained in same subsystem? E.g. making cgroups into its own subsystem wouldn’t help preventing this bug?

    • @ravenecho2410
      @ravenecho2410 2 года назад

      @@randomgeocacher privelage escalation

  • @pootispiker2866
    @pootispiker2866 2 года назад +2

    A bug in the linux kernel? I'm shocked. Shocked!

    • @WofWca
      @WofWca 2 года назад

      Sarcasm, right?

  • @kreuner11
    @kreuner11 2 года назад +2

    Whenever a bug is patched, it's also patched for LTS versions used by Ubuntu and Debian for instance

  • @alexmiranda6107
    @alexmiranda6107 2 года назад +9

    I'll be safe, I use hannah Montana linux

  • @RedStoneMatt
    @RedStoneMatt 2 года назад +4

    This could actually be useful for android
    like imagine this, what if someone made a file explorer that used this exploit to allow writing files anywhere without needing to root the phone! would be incredible

    • @SpongeBlaster
      @SpongeBlaster 2 года назад

      Might as well just root your phone once and do that whenever.

    • @RedStoneMatt
      @RedStoneMatt 2 года назад

      @@SpongeBlaster rooting my phone means resetting my phone, which would cause me lots of trouble

    • @PvtAnonymous
      @PvtAnonymous 2 года назад +2

      bad idea. Once you start modifying files outside of /data, on the next reboot your bootloader will just say "no" and you'll have a nice brick. Things like checksums exist for a reason my man.

    • @RedStoneMatt
      @RedStoneMatt 2 года назад

      @@PvtAnonymous Aw :/

  • @Rudxain
    @Rudxain 2 года назад +7

    4:28 my inner rustacean thought "this wouldn't have happened if the entire Linux kernel was written in Rust", because of a meme by STEMgamer that mentioned "use after free"

    • @peternrdstrm
      @peternrdstrm 2 года назад +2

      True, a rusty linux kernel woul be amazing

    • @Hellohiq10
      @Hellohiq10 2 года назад +4

      @@peternrdstrm no it wouldn’t. Rust as a systems programming language isn’t even memory safe, you have to use unsafe.

    • @w1keee
      @w1keee 2 года назад +3

      @@Hellohiq10 yeah, but the unsafe parts are very clearly marked, and if you make a safe api for that, then you only need to audit the unsafe parts when you have some memory errors

  • @merchant_of_kek5697
    @merchant_of_kek5697 2 года назад +3

    US and Chinese definitely mad about this one.

  • @jons2447
    @jons2447 2 года назад

    Thank you, Kenny!

  • @AshnSilvercorp
    @AshnSilvercorp 2 года назад +3

    when your virtual machine WM is programmed to look like WinXP...

  • @gdmathguy
    @gdmathguy 2 года назад +1

    Idea: A virus that changes the system in such a way that doesn't damage much, but makes it hard for viruses to navigate

  • @anon_y_mousse
    @anon_y_mousse 2 года назад +19

    I'm starting to think that the kernel is full of privilege escalation exploits. A new one seems to be found every other month. :|

    • @ghost-user559
      @ghost-user559 2 года назад +4

      Uh, yes. Why do you think the alphabet agencies and major corporations ALL are fighting to be the “best contributors” to Linux. Linux glows

    • @anon_y_mousse
      @anon_y_mousse 2 года назад

      @@ghost-user559 Ever used Mach or Hurd? How would you rate them?

  • @joesquarepants5354
    @joesquarepants5354 2 года назад

    thank you for your videos

  • @eyephpmyadmin6988
    @eyephpmyadmin6988 2 года назад

    Love your channel

  • @kaluth7668
    @kaluth7668 2 года назад +1

    I like how you gave up on censoring the gun 1/3rd of the way through. :D

  • @assulaimi7973
    @assulaimi7973 Год назад

    Hello, thank you for the good explanation, does the attack you conducted correspond to an insider attack or an attacker with remote access?

  • @pelufaz8435
    @pelufaz8435 2 года назад

    OH BOY Muta has something to talk about

  • @SWAGCOWVIDEO
    @SWAGCOWVIDEO 2 года назад +3

    Wouldn't corpos limit low level pissons to a short list (or protected directory) of pre-authorized programs anyway on company server hardware? Besides that, it blows my mind that Linux lets you access/modify pages of memory allocated by other users without permissions or segmentation faults. Would modern computers really suffer that much of a performance loss if the kernel checked when unprivileged users attempted to read/write to a memory address that had previously been freed by them?

  • @saucypingas3768
    @saucypingas3768 2 года назад +1

    Nice vid, mind doing a video about vim plugins? I started learning vim now to fit in wiv the femboys, great progress so far, and vim plugins seem quite hard to understand

  • @computerexpert69
    @computerexpert69 2 года назад +1

    Hey Mental, Can you do a video about android degoogled roms (like arrowos, havocos etc. Because calyx or graphene or lineage is not supported for some phones. [like mine] )
    Also great video.

  • @danielbaker1248
    @danielbaker1248 2 года назад +26

    I am completely a beginner when it comes to computers/ linux, so I have one question: how does a hacker even get the chance to use this security problem on your personal computer?
    Do you have to download malware?

    • @ThisCanNotBTheFuture
      @ThisCanNotBTheFuture 2 года назад +43

      The biggest risk is to servers running critical applications to business, infrastructure, etc. compared to one's personal computer. But to address the essence of your question, they'd first have to penetrate the system they're targeting--be that from targeted phishing, exploiting a vulnerable process running on a server's open port, brute forcing login credentials, etc.

    • @danielbaker1248
      @danielbaker1248 2 года назад +12

      @@ThisCanNotBTheFuture damn.... not good. Thanks for the info.

    • @mareksniknais5415
      @mareksniknais5415 2 года назад +7

      if you are a web developer you install and execute all kind of crap.

    • @pelic9608
      @pelic9608 2 года назад +16

      Difference between local and remote exploit. This is a local one. Like the examples he gave in the video, this is an issue with e.g. rogue employees.
      And there's possibly no way of screening all those people. Take a 1st level support guy, for example. Easy to get in and if the whole infrastructure is Linux, you start with exploiting the system you're allowed to work on. You gain root on that and then go from there. There's almost always some ssh key or config with a password lying around that gives you access to another system. Rinse and repeat...
      But mind you, this isn't financial advice - or so.

    • @keatonhatch6213
      @keatonhatch6213 2 года назад +7

      This is used after they’re in your system. So either they are in physical possession of your computer or you download malware that creates a back door they can remote into.

  • @hashkeeper
    @hashkeeper 2 года назад

    something else to patch up, great. somebody man the bilge! thanks for the info.

  • @GameSmilexD
    @GameSmilexD 2 года назад +11

    Windows 10 still has 2016 bugs they recognised and didn't patch so this is the least of OS creepiness

  • @samuelmatheson9655
    @samuelmatheson9655 2 года назад +9

    Bout to get 5 TB of mega storage

    • @WofWca
      @WofWca 2 года назад +1

      Bout to take it from you.

  • @notafbihoneypot8487
    @notafbihoneypot8487 2 года назад +3

    Good thing I run Qubes OS on my neighbors PC with VNC

  • @scheimong
    @scheimong 2 года назад

    I let out a small chuckle when I heard "use after free". Who would have thunk it.

  • @shockwaverc1369
    @shockwaverc1369 2 года назад +28

    will this make android phones easier to root ?

    • @skeletonbones6995
      @skeletonbones6995 2 года назад

      Extremely easy.

    • @username54487
      @username54487 2 года назад

      @@skeletonbones6995 i was thinking the same exact thing! i've got a samsung a54, and the thing is locked down tight...Skeleton, can you say some ideas how to use this on an adroid device with user/terminal access? maybe modify the exploit code for sudo access or a root group? this would be an AWESOME way for TONS of phone modders to root their devices before the phone gets patched! thanks!

    • @username54487
      @username54487 2 года назад

      @_____ haha...if only it were that easy i would've stuck this POS in the fertilizer long ago. i seriously want to get root on my phone before updating patches. theres no /etc/passwd or shadow or group, so i'm not sure how to use this yet. i believe user accounts on android are stored in db. gonna first try the code on my phone to see if it works first

    • @username54487
      @username54487 2 года назад

      hmm, i tried this on my arch desktop as well as a raspberry pi running aarch64, and i get the same error:
      "fsconfig: Invalid argument
      [-] failed to write, retry..."

    • @amogus7
      @amogus7 2 года назад

      overwrite /system/bin/runas, just like dirtycow
      oh wait dm-verity

  • @_droid
    @_droid 2 года назад +3

    FYI, "daemon" is pronounced "demon".
    Of course there are millions of vulnerable devices that will continue to be vulnerable because manufacturers don't do security updates for very long. Very handy if you want to full control your own hardware though.

    • @pvshka
      @pvshka 2 года назад

      No, it's pronounced "day-mon"

    • @_droid
      @_droid 2 года назад

      @@pvshka Go to wikipedia /wiki/Daemon_(computing)#Terminology

  • @deersakamoto2167
    @deersakamoto2167 2 года назад +2

    Thoughts on Louis Rossman joining FUTO? He's now sort of making the kind of videos you make

  • @ggsap
    @ggsap 2 года назад

    I can just hear the seytonic music playing in the background and it wont stop 😔

  • @techtheguy5180
    @techtheguy5180 2 года назад +1

    I love privilege escalation vulnerabilities! I can root my Huawei phone😁

  • @Ultrajamz
    @Ultrajamz 2 года назад +10

    Big oof, how much did glows pay Linus to get this backdoor in?

  • @dumkastriker
    @dumkastriker 2 года назад

    I feel privileged writing these comments.

  •  2 года назад +1

    This is also why you should encrypt your linux installment..
    If I get raw access to the /etc/sudoers file, I can escalate anyone I want to.
    This is why macOS encrypts their install disks by default now. (this is also to mitigate the single root boot mode vulnerability of tampering with the installed environment by requiring a password before booting)
    I used the single root boot to add my own account to the sudoers, which is not the same as this exploit, but Apple has had that vulnerability for a long time (also fixed it for a long time).
    Seriously, encrypt your Mac and Linux installs to prevent these types of primary attacks.

    • @eDoc2020
      @eDoc2020 2 года назад

      I don't see how disk encryption is at all related.

    •  2 года назад

      @@eDoc2020 well, think about it.
      If your disk is unencrypted (and thus clearly your files are accessible when you mount the partition), I could spin up an environment that ignores linux filesystem access rules and edit them, creating a new user with root privileges.
      If your disk is encrypted, you’ll need the password before you can mount it and edit any files.
      The point is privilege escalation.
      With physical access to the device, if your disk is not encrypted, you’re vulnerable to these types of attacks.

    • @eDoc2020
      @eDoc2020 2 года назад +1

      @ Even with disk encryption like that somebody could install a modified bootloader which steals your password. Given enough skill/resources physical access can break any digital security.

    •  2 года назад

      @@eDoc2020 yes, they could..
      Altering the bootloader to listen to the entering of this password is another vector of attack that comes on top of the previously mentioned vulnerability.
      It’s a new issue.
      But if you don’t encrypt your disk, I could much more easily walk through the door than if you did.
      Security is never total, but you’re trying to make it as hard as possible for anyone to gain unauthorised access.
      Altering that bootloader to give you that password would require fairly specialised knowledge, and takes more time to accomplish.
      It’s “safer”, not bulletproof.

    •  2 года назад

      @@eDoc2020 again..
      I’m not saying it is bulletproof..
      But are you trying to say that because “someone can break the glass to get in you shouldn’t install a lock..”?

  • @barms9768
    @barms9768 2 года назад

    I'm convinced that soon companies are going to come up with some serious air-gap security solutions. At least they should. It seems most just keep to the "Everyone in the company uses the same network!" model, which always results in lulz.

  • @digitalunity
    @digitalunity 2 года назад

    "Linux is safer than any other OS."
    "I have Root Control of your computer."

  • @altwrightyt
    @altwrightyt 2 года назад +1

    The NSA and Unit 8200 have probably been using it for years.

    • @Oreoezi
      @Oreoezi 2 года назад +2

      For what, exactly? You first need to ssh into the server in order to escalate privileges.

    • @renakunisaki
      @renakunisaki 2 года назад +2

      Why use this when they can just remote into the CPU itself?

  • @MrTechfreak1
    @MrTechfreak1 2 года назад +4

    if this works on android we can root phones with locked boot loaders

    • @username54487
      @username54487 2 года назад

      hmm, i compiled this on my arch desktop as well as a raspberry pi running aarch64, and i get the same error:
      "fsconfig: Invalid argument
      [-] failed to write, retry..."

  • @chillingstateinhabitant
    @chillingstateinhabitant 2 года назад

    Woah nice I hope nothing bad happens next

  • @wolfmercer
    @wolfmercer 2 года назад +5

    could this help with being able to installing degoogled OS on all android devices?

    • @ChimeraX0401
      @ChimeraX0401 2 года назад +1

      I dont think you can install custom roms using this vulnerability. I think you can just root your phone even with a locked bootloader unless this vulnerability can also spits out the keys required to unlock it, but I doubt they stored it in the firmware....

  • @nagiaoe2434
    @nagiaoe2434 2 года назад +1

    OH NONONO LINUXSISTERS WHAT HAPPENED?

  • @Gr1ff1n_
    @Gr1ff1n_ 2 года назад +2

    4:25 Pun intended or no

  • @BuildTimeMC
    @BuildTimeMC 2 года назад +2

    If it works on Android then all devices that are bootloader locked is able to be rooted, right?

    • @renakunisaki
      @renakunisaki 2 года назад

      You'd have to re-run it on every boot since this still wouldn't give you a way to modify the system image.

  • @ryanwalker4660
    @ryanwalker4660 2 года назад +1

    this assumes they can get inside...

  • @omgimlovinit
    @omgimlovinit 2 года назад +1

    Internet is broken, it's a major security risk for gov workers and relatives to be using. Solution: Use landline telephone, dsl direct connection, no wifi. There is 0 guarantee, even with all the firewalls etc. No need to unplug , but try to keep all personal data away from hackers..after all, that is what hackers do themselves.

    • @ekremaslan8068
      @ekremaslan8068 2 года назад +1

      You are spitting facts but do you think its possible to do this widely?

  • @hippopilot6750
    @hippopilot6750 2 года назад +1

    Seems like the best place to ask even though it’s a bit off-topic: What’s the go-to custom android OS these days?

    • @rohit31chauhan
      @rohit31chauhan 2 года назад +2

      Pixel Experience, Lineage OS

    • @TheRanguna
      @TheRanguna 2 года назад +1

      Not go to, but promising privacy oriented fork: /e/

    • @hippopilot6750
      @hippopilot6750 2 года назад

      @@rohit31chauhan How's LineageOS-microG? I heard it doesn't update as often as it says.

    • @hippopilot6750
      @hippopilot6750 2 года назад

      Right now I'm just learning everything I can on Android customisation, privacy and rooting so when my warranty expires I'll be able to get straight into what I want.

    • @rohit31chauhan
      @rohit31chauhan 2 года назад

      @@hippopilot6750 don't know what happened to the reply I wrote 2 days ago. But here it goes.
      I don't really have an idea of Lineage OS microG because my device does not have an official LOS build and I have also never used microG on any ROM, always Gapps.

  • @baumstamp5989
    @baumstamp5989 2 года назад +1

    so wait. 2 basic questions.
    in which kernel will this be fixed? 6.0 ? or was it fixed in 5.19, earlier?
    also what are the prerequisites for this? physical access to the machine? or already compromised via other trojan?

  • @oaooaoipip2238
    @oaooaoipip2238 2 года назад +1

    Lesson learned: Check your privileges.

  • @MrRolnicek
    @MrRolnicek 2 года назад +7

    I think this goes to show you that updating the Linux kernel with Rust code is a good idea.
    This is basically a multithreading conflict, right? If we look at each user as a thread and the physical memory as the resource they both want to access, then we find a situation where both users are basically allowed to access the same resource at the same time, a big nono.
    Rust is supposedly REALLY good about doing multithreading properly and safely so I'm sure that would translate here.

  • @timewave02012
    @timewave02012 2 года назад +11

    For a while it seemed like security was finally winning, but it's looking like we need whole new paradigms, like it's the 90s again when nothing was encrypted, and everyone was running Windows 9x lacking privilege separation. Our OSs are broken. Our programming languages are broken. Our hardware is broken.

    • @alexxx4434
      @alexxx4434 2 года назад +4

      ...Our minds are broken. Our souls are broken.

    • @casquinha132
      @casquinha132 2 года назад +2

      You're trying to vouche for perfection, which isn't possible.

    • @silverywingsagain
      @silverywingsagain 2 года назад +4

      Software hasn't seen any real innovation in 20 years. That's what happens when anyone who knows how to actually program is stuck writing frameworks so "software engineers" can pump out the next TikTok.

    • @ZERARCHIVE2023
      @ZERARCHIVE2023 2 года назад +2

      Our world.
      is broken

    • @timewave02012
      @timewave02012 2 года назад

      @@ZERARCHIVE2023 Last century, reality was broken. I grew up with quantum mechanics, but it must have been hard for the people who didn't.

  • @OmegaF77
    @OmegaF77 2 года назад

    Next thing you know the Dirty Sanchez bug will be found in the kernel too.

  • @thefirehawk1495
    @thefirehawk1495 2 года назад +4

    As an IT professional some IT enthusiasts will ask me what I think is the best OS.
    I always respond they're all shit and someone needs to come up with a better way to do things, because we've been doing things the same way for 50 fucking years and yet serious exploits are found on a monthly basis.