[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y ] [Home]
4chanarchives logo
>The researchers, Hector Marco and Ismael Ripoll from the
Images are sometimes not shown due to bandwidth/network limitations. Refreshing the page usually helps.

You are currently reading a thread in /g/ - Technology

Thread replies: 16
Thread images: 2
File: 1448517386171s.jpg (3 KB, 125x125) Image search: [Google]
1448517386171s.jpg
3 KB, 125x125
>The researchers, Hector Marco and Ismael Ripoll from the Cybersecurity Group at Polytechnic University of Valencia, found that it’s possible to bypass all security of a locked-down Linux machine by exploiting a bug in the Grub2 bootloader. Essentially, hitting backspace 28 times when the machine asks for your username accesses the “Grub rescue shell,” and once there, you can access the computer’s data or install malware.
>use linux they said
>>
Grub isn't linux, friend
>>
>>51904632
it's not, its a boat loader

However, a large number of linux installations use grub 2. This is still a major security flaw
>>
>>51904604
And if you go into grub you can boot into single user sp00ky
>>
>>51904681
and if you boot a live USB, you can read and modify everything :O
WAKE UP SHEEPLE!
>>
>>51904604
So? From the looks of it, you can only exploit it by being in front of the system. Considering /g/ probably doesn't share their computer I don't think it will matter. I'm not even going to bother patching this.

also

>using grub
>2015
>>
>>51904721
which is why you use full disk encryption.
>>
>>51904604
Once you have physical access to hardware, all bets are off.
>>
>>51904604
>>51904344
sage this shit
>>
>>51904783
is the luks stuff secure enough or should i switch to veracrypt?
>>
>>51904604
Please bitch, if your disk isn't fully encrypted everyone can just mount it and remove your shitty password (read: bypassing your password).
>>
Anyone tried this on their own machine? I'm gonna try it later today when I get home.
>>
>>51904604
Still need to bypass encrypted disc lockout, also os x has verbose mode exploit to bypass admin password, and windows has ophcrack vulnerability
>>
File: 0007.gif (24 KB, 128x128) Image search: [Google]
0007.gif
24 KB, 128x128
>>51904604
MFW I use lilo as my boot loader
>>
>mfw I use Windows master race
>>
Well i guess its a good thing i use sys linux
Thread replies: 16
Thread images: 2

banner
banner
[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y] [Home]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
If a post contains personal/copyrighted/illegal content you can contact me at [email protected] with that post and thread number and it will be removed as soon as possible.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com, send takedown notices to them.
This is a 4chan archive - all of the content originated from them. If you need IP information for a Poster - you need to contact them. This website shows only archived content.