<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>security — LowEndSpirit</title>
        <link>https://staging.lowendspirit.com/index.php?p=/</link>
        <pubDate>Mon, 06 Apr 2026 17:06:57 +0000</pubDate>
        <language>en</language>
            <description>security — LowEndSpirit</description>
    <atom:link href="https://staging.lowendspirit.com/index.php?p=/discussions/tagged/security/feed.rss" rel="self" type="application/rss+xml"/>
    <item>
        <title>How To Secure A Linux Server</title>
        <link>https://staging.lowendspirit.com/index.php?p=/discussion/5377/how-to-secure-a-linux-server</link>
        <pubDate>Mon, 30 Jan 2023 21:58:29 +0000</pubDate>
        <category>Technical</category>
        <dc:creator>loay</dc:creator>
        <guid isPermaLink="false">5377@/index.php?p=/discussions</guid>
        <description><![CDATA[<p>An evolving how-to guide for securing a Linux server.</p>

<p><a href="https://github.com/imthenachoman/How-To-Secure-A-Linux-Server" rel="nofollow">https://github.com/imthenachoman/How-To-Secure-A-Linux-Server</a></p>
]]>
        </description>
    </item>
    <item>
        <title>Purpose of sudo</title>
        <link>https://staging.lowendspirit.com/index.php?p=/discussion/4741/purpose-of-sudo</link>
        <pubDate>Sat, 22 Oct 2022 21:34:29 +0000</pubDate>
        <category>General</category>
        <dc:creator>AndrewL64</dc:creator>
        <guid isPermaLink="false">4741@/index.php?p=/discussions</guid>
        <description><![CDATA[<p>is <code>sudo</code> really about security or just more of a "prevent myself from doing dumb shit by mistake" feature?</p>

<p>If it's the former, what are some of the things <code>sudo</code> protects your server from if say, a <code>sudo</code> account is compromised/hacked?</p>
]]>
        </description>
    </item>
    <item>
        <title>Chrome/Edge stored password Data breach Red Line Malware</title>
        <link>https://staging.lowendspirit.com/index.php?p=/discussion/3677/chrome-edge-stored-password-data-breach-red-line-malware</link>
        <pubDate>Sat, 01 Jan 2022 15:02:33 +0000</pubDate>
        <category>General</category>
        <dc:creator>vyas</dc:creator>
        <guid isPermaLink="false">3677@/index.php?p=/discussions</guid>
        <description><![CDATA[<p>After Lastpass, now we have this…</p>

<p><a href="https://www.bleepingcomputer.com/news/security/have-i-been-pwned-adds-441k-accounts-stolen-by-redline-malware/amp/" rel="nofollow">https://www.bleepingcomputer.com/news/security/have-i-been-pwned-adds-441k-accounts-stolen-by-redline-malware/amp/</a></p>
]]>
        </description>
    </item>
    <item>
        <title>Multiple Vulnerabilities in Wi-Fi Enabled Devices Could Allow for Data Exfiltration</title>
        <link>https://staging.lowendspirit.com/index.php?p=/discussion/2920/multiple-vulnerabilities-in-wi-fi-enabled-devices-could-allow-for-data-exfiltration</link>
        <pubDate>Fri, 14 May 2021 06:32:40 +0000</pubDate>
        <category>Technical</category>
        <dc:creator>mikho</dc:creator>
        <guid isPermaLink="false">2920@/index.php?p=/discussions</guid>
        <description><![CDATA[<p>Source: S.Bradley</p>

<hr />

<p>TLP: WHITE<br />
MS-ISAC CYBERSECURITY ADVISORY</p>

<p>MS-ISAC ADVISORY NUMBER: 2021-068</p>

<p>DATE(S) ISSUED: 05/12/2021</p>

<p>SUBJECT: Multiple Vulnerabilities in Wi-Fi Enabled Devices Could Allow for Data Exfiltration</p>

<p>OVERVIEW:</p>

<p>Multiple vulnerabilities have been discovered in Wi-Fi enabled devices, the most severe of which could allow for data exfiltration. IEEE 802.11 is part of the IEEE 802 set of local area network technical standards, and specifies the set of medium access control and physical layer protocols for implementing wireless local area network communication. Successful exploitation of the most severe of these vulnerabilities could allow an attacker to exfiltrate user data.</p>

<p>THREAT INTELLIGENCE:</p>

<p>There are currently no reports of these vulnerabilities being exploited in the wild. A proof of concept exists for various vulnerabilities mentioned within this advisory.</p>

<p>SYSTEMS AFFECTED:</p>

<p>Any Wi-Fi enabled device could be vulnerable, please check with the manufacturer of your device(s)<br />
RISK:</p>

<p>Government:</p>

<p>Large and medium government entities: High<br />
Small government entities: High<br />
Businesses:</p>

<p>Large and medium business entities: High<br />
Small business entities: High<br />
Home users: High</p>

<p>TECHNICAL SUMMARY:</p>

<p>Multiple vulnerabilities have been discovered in Wi-Fi enabled devices, the most severe of which could allow for data exfiltration. These vulnerabilities can be exploited if a user connects to a rogue access point and is then redirected to or visits a malicious server. Details of the vulnerabilities are as follows:</p>

<p>A vulnerability exists in the 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) that could allow an attacker to inject arbitrary network packets (CVE-2020-24588)<br />
A vulnerability exists in the 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) that could allow an attacker to decrypt selected fragments when another device sends fragmented frames. (CVE-2020-24587)<br />
A vulnerability exists in the 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) that could allow an attacker to inject arbitrary network packets and/or exfiltrate user data. (CVE-2020-24586)<br />
A vulnerability exists in Samsung Galaxy S3 i9305 4.4.4 devices that could allow an attacker to inject arbitrary network packets independent of the network configuration. (CVE-2020-26145)<br />
A vulnerability exists in Samsung Galaxy S3 i9305 4.4.4 devices that could allow an attacker to inject arbitrary network packets independent of the network configuration. (CVE-2020-26144)<br />
A vulnerability exists in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H that could allow an attacker to inject arbitrary data frames independent of the network configuration. (CVE-2020-26140)<br />
A vulnerability exists in the ALFA Windows 10 driver 1030.36.604 for AWUS036ACH could allow an attacker to inject arbitrary data frames independent of the network configuration. (CVE-2020-26143)<br />
A vulnerability exists in the kernel in NetBSD 7.1 that could allow an attacker to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients. (CVE-2020-26139)<br />
A vulnerability exists in Samsung Galaxy S3 i9305 4.4.4 devices that could allow an attacker to exfiltrate selected fragments. (CVE-2020-26146)<br />
A vulnerability exists in the Linux kernel 5.8.9 that could allow an attacker to inject packets and/or exfiltrate selected fragments (CVE-2020-26147)<br />
A vulnerability exists in the kernel in OpenBSD 6.6 that could allow an attacker to inject arbitrary network packets, independent of the network configuration. (CVE-2020-26142)<br />
A vulnerability exists in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H that could allow an attacker to inject and possibly decrypt packets. (CVE-2020-26141)<br />
Successful exploitation of the most severe of these vulnerabilities could allow an attacker to exfiltrate of user data.</p>

<p>RECOMMENDATIONS:</p>

<p>We recommend the following actions be taken:</p>

<p>Apply the stable channel update provided by the vendor to vulnerable systems immediately after appropriate testing.<br />
Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources.<br />
Inform and educate users regarding the threats posed by hypertext links contained in emails or attachments especially from un-trusted sources.<br />
REFERENCES:</p>

<p>Wi-Fi Alliance:</p>

<p><a href="https://www.wi-fi.org/security-update-fragmentation" rel="nofollow">https://www.wi-fi.org/security-update-fragmentation</a></p>

<p>FragAttack:</p>

<p><a href="https://www.fragattacks.com/#beingexploit" rel="nofollow">https://www.fragattacks.com/#beingexploit</a></p>

<p>CVE:</p>

<p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24588" rel="nofollow">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24588</a></p>

<p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24587" rel="nofollow">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24587</a></p>

<p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24586" rel="nofollow">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24586</a></p>

<p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26145" rel="nofollow">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26145</a></p>

<p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26144" rel="nofollow">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26144</a></p>

<p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26140" rel="nofollow">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26140</a></p>

<p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26143" rel="nofollow">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26143</a></p>

<p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26139" rel="nofollow">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26139</a></p>

<p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26146" rel="nofollow">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26146</a></p>

<p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26147" rel="nofollow">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26147</a></p>

<p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26142" rel="nofollow">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26142</a></p>

<p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26141" rel="nofollow">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26141</a></p>
]]>
        </description>
    </item>
    <item>
        <title>Important PSA - Codecov.IO Bash Uploader Security Update</title>
        <link>https://staging.lowendspirit.com/index.php?p=/discussion/2803/important-psa-codecov-io-bash-uploader-security-update</link>
        <pubDate>Sat, 17 Apr 2021 18:12:21 +0000</pubDate>
        <category>General</category>
        <dc:creator>nullnothere</dc:creator>
        <guid isPermaLink="false">2803@/index.php?p=/discussions</guid>
        <description><![CDATA[<p>There has been a fairly serious backdoor implanted resulting in credential leakage.</p>

<p>If you use/have used their tool, please be sure to revoke/rotate your (relevant, affected) credentials immediately.</p>

<p>More information:</p>

<p><a href="https://about.codecov.io/security-update/" rel="nofollow">https://about.codecov.io/security-update/</a></p>

<p>Ars Technica has coverage here: <a href="https://arstechnica.com/gadgets/2021/04/backdoored-developer-tool-that-stole-credentials-escaped-notice-for-3-months/" rel="nofollow">https://arstechnica.com/gadgets/2021/04/backdoored-developer-tool-that-stole-credentials-escaped-notice-for-3-months/</a></p>
]]>
        </description>
    </item>
    <item>
        <title>Linux Hardening Guide</title>
        <link>https://staging.lowendspirit.com/index.php?p=/discussion/2349/linux-hardening-guide</link>
        <pubDate>Thu, 31 Dec 2020 11:29:18 +0000</pubDate>
        <category>Technical</category>
        <dc:creator>raman2020</dc:creator>
        <guid isPermaLink="false">2349@/index.php?p=/discussions</guid>
        <description><![CDATA[<p>Linux is not a secure operating system. However, there are steps you can take to improve it. This guide aims to explain how to harden Linux as much as possible for security and privacy. This guide attempts to be distribution-agnostic and is not tied to any specific one.</p>

<p>DISCLAIMER: Do not attempt to apply anything in this article if you do not know exactly what you are doing. This guide is focused purely on security and privacy, not performance, usability, or anything else.</p>

<p><a href="https://madaidans-insecurities.github.io/guides/linux-hardening.html" rel="nofollow">https://madaidans-insecurities.github.io/guides/linux-hardening.html</a></p>
]]>
        </description>
    </item>
    <item>
        <title>PLATYPUS - CPU side-channel attack (CVE-2020-8694 / CVE-2020-8695)</title>
        <link>https://staging.lowendspirit.com/index.php?p=/discussion/2056/platypus-cpu-side-channel-attack-cve-2020-8694-cve-2020-8695</link>
        <pubDate>Wed, 11 Nov 2020 18:19:16 +0000</pubDate>
        <category>Technical</category>
        <dc:creator>souen</dc:creator>
        <guid isPermaLink="false">2056@/index.php?p=/discussions</guid>
        <description><![CDATA[<p>Time to update.</p>

<blockquote><div>
  <p>With PLATYPUS, we present novel software-based power side-channel attacks on Intel server, desktop and laptop CPUs. We exploit the unprivileged access to the Intel RAPL interface exposing the processor's power consumption to infer data and extract cryptographic keys.</p>
</div></blockquote>

<p>[...]</p>

<blockquote><div>
  <p>On Linux, the powercap framework provides unprivileged access to the Intel RAPL counters. With a recent security update, this access is revoked, and an unprivileged attacker can not retrieve power measurements anymore.</p>
  
  <p>However, this update does not protect against a privileged attacker, e.g., a compromised operating system targeting Intel SGX. To mitigate attacks in this scenario, Intel released microcode updates to affected processors. These updates ensure that the reported energy consumption hinders the ability to distinguish the same instructions with different data or operands if Intel SGX is enabled on the system.</p>
  
  <p>Please make sure to get the latest updates for your operating system and BIOS.</p>
</div></blockquote>

<p>List of Intel CPUs affected: <a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html" rel="nofollow">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html</a></p>

<p>AMD and ARM processors may also be affected, though untested.</p>

<p>Source: <a href="https://platypusattack.com/" rel="nofollow">https://platypusattack.com/</a></p>
]]>
        </description>
    </item>
    <item>
        <title>Apple hacked</title>
        <link>https://staging.lowendspirit.com/index.php?p=/discussion/1895/apple-hacked</link>
        <pubDate>Thu, 08 Oct 2020 13:15:45 +0000</pubDate>
        <category>Industry News</category>
        <dc:creator>comi</dc:creator>
        <guid isPermaLink="false">1895@/index.php?p=/discussions</guid>
        <description><![CDATA[<p><a href="https://samcurry.net/hacking-apple/" rel="nofollow">https://samcurry.net/hacking-apple/</a></p>

<p>Ain't no more your password was weak excuse this time</p>
]]>
        </description>
    </item>
    <item>
        <title>Rate limiting on powerdns authoritative only: needed or not?</title>
        <link>https://staging.lowendspirit.com/index.php?p=/discussion/1342/rate-limiting-on-powerdns-authoritative-only-needed-or-not</link>
        <pubDate>Sun, 28 Jun 2020 18:50:52 +0000</pubDate>
        <category>Help</category>
        <dc:creator>sgheghele</dc:creator>
        <guid isPermaLink="false">1342@/index.php?p=/discussions</guid>
        <description><![CDATA[<p>Continuing on my <a rel="nofollow" href="https://talk.lowendspirit.com/discussion/1267/check-on-self-hosted-authoritative-nameservers#latest" title="adventure in self-hosting nameservers">adventure in self-hosting nameservers</a>, I am now thinking about security.</p>

<p>I am running PowerDNS authoritative, the latest version, for my master + all 4 slaves. I think that I am doing ok security-wise on my side (master is "hidden", AXFR is only allowed for the slaves' IP addresses, ufw enforces IP access to port 53).</p>

<p>But what about protecting other servers? My servers are not recursive, so they deal with my zones only. openresolver.com says, as expected, that my IPs are not vulnerable to DNS Amplification attacks.</p>

<p>Do I still have to impose any rate limits? If yes, can anyone with experience with PowerDNS help me find out how? I have seen dnsdist, but it seems it is more to load balance queries, which is not my use case.</p>

<p>Anything else I should think about? Thanks for your help!</p>
]]>
        </description>
    </item>
    <item>
        <title>Intel Vulnerability: Hijacking Transient Execution with Load Value Injection</title>
        <link>https://staging.lowendspirit.com/index.php?p=/discussion/774/intel-vulnerability-hijacking-transient-execution-with-load-value-injection</link>
        <pubDate>Wed, 11 Mar 2020 18:01:00 +0000</pubDate>
        <category>Technical</category>
        <dc:creator>souen</dc:creator>
        <guid isPermaLink="false">774@/index.php?p=/discussions</guid>
        <description><![CDATA[<p>Another day, another Intel exploit.</p>

<blockquote><div>
  <p>LVI is a new class of transient-execution attacks exploiting microarchitectural flaws in modern processors to inject attacker data into a victim program and steal sensitive data and keys from Intel SGX, a secure vault in Intel processors for your personal data.</p>
  
  <p>LVI turns previous data extraction attacks around, like Meltdown, Foreshadow, ZombieLoad, RIDL and Fallout, and defeats all existing mitigations. Instead of directly leaking data from the victim to the attacker, we proceed in the opposite direction: we smuggle — "inject" — the attacker's data through hidden processor buffers into a victim program and hijack transient execution to acquire sensitive information, such as the victim’s fingerprints or passwords.</p>
  
  <p>[...]</p>
  
  <p>LVI in 4 simple steps:<br />
  1. Poison a hidden processor buffer with attacker values.<br />
  2. Induce a faulting or assisted load in the victim program.<br />
  3. The attacker's value is transiently injected into code gadgets following the faulting load in the victim program.<br />
  4. Side channels may leave secret-dependent traces, before the processor detects the mistake and rolls back all operations.</p>
</div></blockquote>

<p>Source: <a href="https://lviattack.eu/" rel="nofollow">https://lviattack.eu/</a></p>
]]>
        </description>
    </item>
    <item>
        <title>Who uses SELinux on their systems and why?</title>
        <link>https://staging.lowendspirit.com/index.php?p=/discussion/449/who-uses-selinux-on-their-systems-and-why</link>
        <pubDate>Mon, 06 Jan 2020 01:46:44 +0000</pubDate>
        <category>Technical</category>
        <dc:creator>rchurch</dc:creator>
        <guid isPermaLink="false">449@/index.php?p=/discussions</guid>
        <description><![CDATA[<p>In the early days of SELinux, at least 10 years ago, it was so frustrating and admin tools were so inadequate that I always disabled it. I want to get back to it now and wonder if it has any fans here and why they use it?</p>

<p>If there are any users here  I have these questions for them:</p>

<p>What distro(s) do you use it with? I believe it is installed and configured automatically on Fedora/Redhat.</p>

<p>Do you use built-in settings, or customize for own use?</p>

<p>What admin tools come with it, what additional tools do you use?</p>

<p>Is it for own personal use,  workplace computer or server administration?</p>

<p>Which aspects of your system do you mostly use it for?</p>
]]>
        </description>
    </item>
    <item>
        <title>Encryption</title>
        <link>https://staging.lowendspirit.com/index.php?p=/discussion/329/encryption</link>
        <pubDate>Mon, 16 Dec 2019 10:38:23 +0000</pubDate>
        <category>Technical</category>
        <dc:creator>havoc</dc:creator>
        <guid isPermaLink="false">329@/index.php?p=/discussions</guid>
        <description><![CDATA[<p>I'm looking to sprinkle some encryption on my VPS - just for good measure.</p>

<p>Found <a rel="nofollow" href="https://lowendbox.com/blog/setting-up-an-encrypted-volume-on-your-ubuvps/" title="this article on LET">this article on LET</a> but it's from 2016 and commenters did not have a high opinion of author's skill.</p>

<p>So just want to check what if that's still roughly state-of-the-art?</p>

<p>Not looking to defend against sophisticated attackers (RAM dump etc) and I'm fine with OS partition being unencrypted. Database / docker / home should be though.</p>

<p>A solution compatible with ansible deployment would be a bonus since that's the next thing I'm tackling.</p>
]]>
        </description>
    </item>
    <item>
        <title>Wordpress- Jetpack Exploit</title>
        <link>https://staging.lowendspirit.com/index.php?p=/discussion/116/wordpress-jetpack-exploit</link>
        <pubDate>Thu, 21 Nov 2019 05:10:17 +0000</pubDate>
        <category>Technical</category>
        <dc:creator>vyas</dc:creator>
        <guid isPermaLink="false">116@/index.php?p=/discussions</guid>
        <description><![CDATA[<p>Read this in a WP group about an exploit in Jetpack plugin. Bottomline: if you use Jetpack plugin, upgrade to ver. 7.9.1 ASAP</p>

<p>Since many use / offer WP hosting thought it might be relevant to post here.<br />
Adding the 'raw' source - removed all UTM information<br />
<a href="https://www.bleepingcomputer.com/news/security/millions-of-sites-exposed-by-flaw-in-jetpack-wordpress-plugin/" rel="nofollow">https://www.bleepingcomputer.com/news/security/millions-of-sites-exposed-by-flaw-in-jetpack-wordpress-plugin/</a></p>
]]>
        </description>
    </item>
   </channel>
</rss>
