24
Exe in a bottle (lemmy.sdf.org)
top 50 comments
sorted by: hot top controversial new old
[-] diemartin@sh.itjust.works 6 points 11 months ago
[-] Jumpingspiderman@lemmy.world 0 points 11 months ago

Why does your admin account look like a scrotum?

[-] PixelPinecone@lemmy.today 1 points 11 months ago

Yours doesn’t?

[-] kamen@lemmy.world 3 points 11 months ago* (last edited 11 months ago)

... and yet some of the same people will readily copy-paste random shell scripts into their terminal without fully understanding them.

[-] DragonsInARoom@lemmy.world 2 points 11 months ago

Let me open up my Linux bible and see if its malicious

[-] Huschke@lemmy.world 2 points 11 months ago

But a forum post said it would fix my issue.

[-] f4f4f4f4f4f4f4f4@sopuli.xyz 1 points 10 months ago* (last edited 10 months ago)

Even if you understand the commands, you need to trust the website because a malicious site can use JavaScript to copy something completely different into your clipboard, with a newline character at the end to automatically execute when pasted. (Is the newline exploit fixed in all shells? It used to fail in zsh but work in many others...)

One can also paste into a text editor to verify before pasting into terminal, but what noob is going to know or bother to?

[-] Zacryon@feddit.org 2 points 11 months ago

Remember that time, when it was possible for about 6 years to hack into any Linux system (without drive encryption) which had GRUB by pressing backspace exactly 28 times? Yeah, good old times.

https://www.hmarco.org/bugs/CVE-2015-8370-Grub2-authentication-bypass.html

[-] FiskFisk33@startrek.website 1 points 11 months ago

If the adversary has physical access you are generally pwned either way

[-] phoenixz@lemmy.ca 1 points 11 months ago

Yeah that is not really an "OMG" vulnerability as I can also get into that machine by booting it with a USB drive, or plugging it's drove into my own machine.

[-] SynopsisTantilize@lemm.ee 1 points 11 months ago

Breh. What? I feel naked right now.

[-] f4f4f4f4f4f4f4f4@sopuli.xyz 1 points 10 months ago* (last edited 10 months ago)

Better replace your keyboard everytime you leave it unattended, someone could put a keylogger in it. Don't forget to check for hidden pinhole cameras around that capture you inputting your passwords. Etc, etc. Those even work against an encrypted drive...

[-] SynopsisTantilize@lemm.ee 1 points 10 months ago

To be fair I rotate hardware and DE so often my drives are wiped nearly monthly. But Jesus this is egregious.

[-] f4f4f4f4f4f4f4f4@sopuli.xyz 3 points 10 months ago* (last edited 10 months ago)

grub's always been a hack. The first stage in 512 byte boot sector chainloads the second stage in the space between boot sector and the first sectors of first partition. Second stage chainloads the kernel. (This is my primitive gist.)

grub was never made for security, it just exists in a place where one would think security would be priority... but again, physical access = pwned, etc.

Not quite the same, but funny: I recently unlocked an HDD from a car head unit to prove to a friend that it was only storing music ripped from its CD drive (and the associated minimal CD title database)... Toshiba master HDD password is 32 spaces. 😅

[-] SynopsisTantilize@lemm.ee 1 points 10 months ago

Oh shit hahaha that's straight up disrespectful. Well yea I guess that makes sense but I just never thought to deep about it.

[-] kattfisk@lemmy.dbzer0.com 0 points 11 months ago

That's hyperbole. Such a system can be "hacked" by simply plugging in a usb-stick and booting from that instead, or dozens of other ways.

The only reason to use GRUB authentication I can think of would be in something like a kiosk.

[-] apex32@lemmy.world 2 points 11 months ago

A friend of mine once downloaded something malicious to his Linux machine and wasn't worried about it. Then some time later, while browsing his files from a Windows machine, saw it and was like, "hey, what's this?" Oops.

He's a tech savvy guy, so I'm guessing the fact he had downloaded it himself really let his guard down.

[-] betterdeadthanreddit@lemmy.world 4 points 11 months ago

That's why you don't store your stool samples in the same fridge as your chocolate pudding. Malware goes into the vault.

[-] Lime66@lemmy.world 1 points 11 months ago

Wine automatically running:

[-] Emerald@lemmy.world 1 points 11 months ago

Well if the exe was in a bottle it would be dangerous.

https://usebottles.com/ :D

[-] lath@lemmy.world 0 points 11 months ago

Modern viruses check the os before deciding which type of file to send your way.

[-] LordKitsuna@lemmy.world 1 points 11 months ago

This is why you use a user agent switcher to lie about being windows. It's a form of anti malware!

[-] Neptr@lemmy.blahaj.zone 1 points 11 months ago

Except websites can tell what base OS you run using browser fingerprinting. It os impossible to lie aboit your OS because of the differences in platforms.

[-] WeLoveCastingSpellz@lemmy.dbzer0.com 2 points 11 months ago* (last edited 11 months ago)

You can lie about your fingerprint very much in fact it is the default on librewolf

load more comments (4 replies)
[-] bamboo@lemmy.blahaj.zone 2 points 11 months ago

Generally browser fingerprinting is used to identify individual browser sessions across IP addresses. This mostly takes into account reported features and capabilities of the browser and OS to the website. Fingerprinting isn't looking for specific info your browser reports, it's taking it all and hashing it to get a unique id specific to the browser. Because it's hashed, it can't be reversed to identify the OS from the hash.

Sure a malicious website could Ignore the user agent and probe for some hardware capabilities that are specific to Linux, but that would be a lot of effort to probe various things which are set differently across all different browsers. I can't speak for bad actors, but I wouldn't spend the effort to check if the user agent is spoofed, if 95% of the time it's accurate to get the OS type.

[-] Neptr@lemmy.blahaj.zone -1 points 11 months ago* (last edited 11 months ago)

It is trivial to identify OS platform because browser work differently on each platform. Wjat Librewolf does with useragent on Linux actually is makes users stand out more because it isn't what privacy.resistFingerprinting (RFP) reports on normally.

Hackers (like the comment scenario i was responding to) are substantially more likely to employ platform fingerprint than trust a fale useragent. And loads general websites employ fingerprinting, meaning deviation from default RFP behaviour makes you stand out (more than you already do by using RFP since it is a small pool already).

[-] bamboo@lemmy.blahaj.zone 1 points 11 months ago

Agreed, I'm not saying it's impossible to detect the OS, but it's even more trivial for an adversary to regex the User Agent and serve the malware for that OS. The average user doesn't even know what a User Agent is, and that's who the drive by malware websites are counting on to infect because they're easy targets.

Just like a real fingerprint, that will only identify the fingerprint to a person, not tell you that the fingerprint is from someone who is European. Fingerprints are used to track you across different websites, and build a profile of you for advertising.

load more comments (1 replies)
[-] omgitsaheadcrab@sh.itjust.works 1 points 11 months ago

Pick the least POSIX shell, or roll your own!

[-] madame_gaymes@programming.dev 1 points 11 months ago

Rename all the coreutils. Confuse yourself and the hackers!

[-] dev_null@lemmy.ml 1 points 11 months ago* (last edited 11 months ago)

Do you have any data to back up that claim? I don't think that's true at all, it would be very rare.

[-] lath@lemmy.world 1 points 11 months ago* (last edited 11 months ago)

Do you have any data to back up that claim?

None whatsoever.

I don’t think that’s true at all, it would be very rare.

Suspicious words. You have one, don't you? Don't worry, I won't tell.

[-] dev_null@lemmy.ml 1 points 11 months ago

Why suspicious? I have genuinely never read a news story about a virus sending different versions of itself to different OSs. I'm sure it happens, but it doesn't seem common at all, and you are claiming it very matter-of-factly so I am interested to know more.

load more comments (5 replies)
[-] cappa@feddit.org 0 points 11 months ago

This is were WINE comes handy /s

[-] SapphironZA@sh.itjust.works 2 points 11 months ago

Virus running in wine: "WTF is this place. It's familiar, but it's all wrong!"

[-] Kusimulkku@lemm.ee 1 points 11 months ago
[-] DragonTypeWyvern@midwest.social 0 points 11 months ago

I'm not clicking that link

[-] DmMacniel@feddit.org 1 points 11 months ago

Why? You don't wanna know how well WannaCry runs via Wine? The site is perfectly harmless.

[-] Anafabula@discuss.tchncs.de 0 points 11 months ago* (last edited 11 months ago)

It's just an entry in Wine's AppDB, where they keep track of how well apps run on wine. Like ProtonDB, but for general applications.

[-] DragonTypeWyvern@midwest.social 1 points 11 months ago

Whole bunch of people trying to get me to click this sus link...

You're never gonna do it.

I cast Millennial Paranoia, BOOMERS.

GO BACK TO YOUR CHAIN EMAILS

[-] f4f4f4f4f4f4f4f4@sopuli.xyz 2 points 10 months ago

Jesus, the downvotes! Well, I thought it was funny! 😂

[-] DragonTypeWyvern@midwest.social 2 points 10 months ago

If you comment in Programmer Humor, you have to accept that a lot of the community has problems detecting irony.

load more comments
view more: next ›
this post was submitted on 28 Feb 2025
24 points (100.0% liked)

linuxmemes

29095 readers
192 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack users for any reason. This includes using blanket terms, like "every user of thing".
  • Don't get baited into back-and-forth insults. We are not animals.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn, no politics, no trolling or ragebaiting.
  • Don't come looking for advice, this is not the right community.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, <loves/tolerates/hates> systemd, and wants to interject for a moment. You can stop now.
  • 5. 🇬🇧 Language/язык/Sprache
  • This is primarily an English-speaking community. 🇬🇧🇦🇺🇺🇸
  • Comments written in other languages are allowed.
  • The substance of a post should be comprehensible for people who only speak English.
  • Titles and post bodies written in other languages will be allowed, but only as long as the above rule is observed.
  • 6. (NEW!) Regarding public figuresWe all have our opinions, and certain public figures can be divisive. Keep in mind that this is a community for memes and light-hearted fun, not for airing grievances or leveling accusations.
  • Keep discussions polite and free of disparagement.
  • We are never in possession of all of the facts. Defamatory comments will not be tolerated.
  • Discussions that get too heated will be locked and offending comments removed.
  •  

    Please report posts and comments that break these rules!


    Important: never execute code or follow advice that you don't understand or can't verify, especially here. The word of the day is credibility. This is a meme community -- even the most helpful comments might just be shitposts that can damage your system. Be aware, be smart, don't remove France.

    founded 2 years ago
    MODERATORS