Looking at the comments It should be pointed out that most Linux exploits in Linux require access with some type of credential. This exploit was documented and patched on 1/25/2022. Anything not patched will be VULNERABLE! Most Windows exploits can be done remotely through RDP / SMB vulnerabilities and do not require access. This video was simply to demonstrate a bad Linux exploit that effects a large amount of systems. It shouldn't need to be said, but I'll say it anyways "Linux is far more secure than Windows".
@EdSchroedinger2 жыл бұрын
yeah... reading the comments you should also point out that you not necessarily need 'local access' as in: get you hands on that exact physical machine, but rather some sort of shell account would suffice. but if there's just one thing to take away from this video is: KEEP YOUR FRIGGIN SYSTEM UPDATED! ...because there's other exploits in the wild that might give you some sort of shell access already. escalating privileges from there is just the step to make things 'actively' become really nasty in progress... even tho some people might find the title a little click-baity for said reasons, still great video and a quite sobering reminder! thanks for the heads up man, keep up the good work! 😎👍
@nosbig982 жыл бұрын
Of a positive note, Debian Stable version installed with minimal package sets (for services like web servers and such) do not have policykit (and therefore pkexec) installed by default. You should always check and always stay up to date, but Debian Stable is less of a target in this specific case.
@starivuk65612 жыл бұрын
On linux Mint cinnamon pkexec version 0.105 , I can't find where to update pkexec . Update manager show system is up to date ?
@Darkk69692 жыл бұрын
@@starivuk6561 If you go to /usr/bin and check the file date. It should show Jan 12 which means it's already patched. I'm on Mint as well.
@Darkk69692 жыл бұрын
@@nosbig98 Yep, it's one of the reasons why I love straight Debian for my servers and workstations. Less bloatware.
@aidananderson16972 жыл бұрын
Yep, tried it on a Centos 7 system with 22 outstanding updates and it was affected. Updated and all fine now. Thanks for the heads up Chris! Good job.
@kuhluhOG2 жыл бұрын
Considering that CentOS 7 still has support (unlike CentOS 8), this is actually interesting.
@ChrisTitusTech2 жыл бұрын
Yeah I used to love Red Hat but I am still pretty mad at them for the CentOS 8 removal of support after it was recently released.
@kuhluhOG2 жыл бұрын
@@ChrisTitusTech understandable
@markh.66872 жыл бұрын
Chris: "Don't take advice from some guy in a KZbin video.....wait, hold up!!" Great work as always, Chris.
@PlanetEleethal2 жыл бұрын
Just tested this on my ubuntu servers and everything was fine. They were already up to date though, thanks for the heads up!
@bologna30482 жыл бұрын
The title and thumbnail cracked me up, I'm onto your shenanigans Chris!
@markh.66872 жыл бұрын
Next video title: "Don't fall for clickbait!--Click here!" :)
@joschafinger1262 жыл бұрын
Linux *is* safer -just as long as you keep it to date. Being FOSS is a two-edged sword: any vulnerability will be visible to both good and bad actors. That is, it'll be easy to exploit for a very short time indeed, while closed-source weaknesses will be harder to exploit for a much, much longer time. Edit (PS): Use Linux, keep it up to date.
@matyasmarkkovacs83362 жыл бұрын
Windows is closed source, still gets more attacks from hackers, because it has more vulnerabilities. Most of them don't get revealed just by reading the source code.
@joschafinger1262 жыл бұрын
@@matyasmarkkovacs8336 @Mátyás Márk Kovács My point exactly. Big target + closed-source = loads of vulnerabilities that take ages to (perhaps) get patched. Meanwhile, smaller target + open-source = fewer vulnerabilities for shorter time periods, just as long as the community stays vigilant. An easily visible source code means that vulnerabilities are more easily spotted from both sides, was my point. And I'd trust user/devs in a community trying to improve a project they believe in over corporate slaves exploited by a company that has contracts with NSA, CIA, Mossad, and a couple thousand private agencies any time.
@tohur2 жыл бұрын
@@joschafinger126 In the server world Linux is the bigger target but this just goes to show the power of opensource
@krozareq2 жыл бұрын
A zero-day on any OS is going to be quickly exploited. There's been a lot of kiddie scripts on Windows that stayed unpatched for far too long.
@joschafinger1262 жыл бұрын
@@krozareq Aye. How long would those holes have lasted in Linux?
@krozareq2 жыл бұрын
Yeah the polkit vulnerability was patched in Arch before it was even made public.
@jg98322 жыл бұрын
Would you consider making a video breaking down Void Linux? I know it's a bit more advanced, but I can't seem to find any other channels/videos that do as good a job as yours at introducing such advanced distros to new users in such informative/educational ways. Keep up the good work!
@thorbjrnhellehaven57662 жыл бұрын
I wouldn't say "gain access", as you have to be logged in, but sure gain higher level of access.
@penguin17142 жыл бұрын
I knew this was going to be clickbait as soon as I saw "Chris Titus Tech", but I clicked it anyways... Lesson learned
@XenonG2 жыл бұрын
You can now do something with those locked down no more software support Linux routers, excellent!
@gnul2 жыл бұрын
On a deeper level - question, I remember a special Linux permission, which allows any user to run a program as the owner of the program, which is root in most cases; things like sudo and doas which are normal programs at the end probably use exactly that I guess to be able to run as root to make others being able to run things as root, as long as the program (running as root without root privileges by the executing user) is not vulnerable, it should just be fine, but of course when sudo has buffer overflow whatever you could elevate permissions without intended permission. So am I right that a normal program, e.g. vs code, firefox, vim, nano,.., which does not have the special permission like I guess things like sudo has, which runs as the user who runs it, that it is always not exploitable to gain root access, of course as long as the kernel itself does not have a magic vulnerability? I mean imagine getting root access when running neofetch, I think this would be ridiculous and a once within 10k years kernel bug. :D Sry, am not native English speaker.
@gnul2 жыл бұрын
Of course only really special programs should have that permission to run the program as root by anyone, dangerous permission, but somehow su and sudo need to work.
@JohnDoe-ou7br2 жыл бұрын
Pretty impressive for a non-native english speaker
@lev16172 жыл бұрын
Love The Vid Chris!
@ivailogeimara2 жыл бұрын
This seams to require gcc. I tried running a pre-compiled (compiled on my other PC) version on my server (Rocky Linux) and it didn't work. But when I compiled it on my server it worked (made me root). However my server doesn't have gcc installed (I installed it briefly for the test and removed it afterwards) so it's not really easy to exploit it seams. I don't know why you would have gcc on a server. That was yesterday. Today the patch was released and nothing works anymore.
@jongeduard2 жыл бұрын
Open source software is certainly not free of bugs it's no different in that, but what I like about it is that they get fixed so quickly, because of the very large community around it. It's especially the open source software bugs that soon become world news. But that's a good thing. Think about the Log4J bug. Proprietary software bugs can continue to exist for many years, silently causing many problems, like vulnerabilities only known by criminals, getting fixed after a long time or without getting fixed at all.
@user784052 жыл бұрын
some reason..it doesn't work on void linux...its only distro is different than any linux out there...i been using it so far...many folks to scared to use it but trust me, its well worth the trouble to get it running completely
@joe287532 жыл бұрын
I love that Rocky Linux is a thing now after the whole CentOS thing.
@grimslade02 жыл бұрын
Oh no.. Chris recklessly forgot to put on his balaclava before going out and crazy hackermanning. Looks like his next video will have to be streamed from the Ecuadorian Embassy again.
@zeknoss2 жыл бұрын
this video urged me to ssh into my server and update it even tho i just did it an hour ago... dayyum :)
@donaldmickunas85522 жыл бұрын
Hey Chris, This could be a nightmare in a corporate environment with all kinds of users. However, in my case, not an issue. I am the only one with access to my system and I use a wierd password to boot. Also, I keep my system updated. So this won't work anyway. Debian is very good about security updates. Great Video as always. Keep on Rocking it, amigo. 🙂
@vladislavkaras4912 жыл бұрын
Thanks for the video! It was a really good reason to update our systems :P
@bertblankenstein37382 жыл бұрын
Decided to do around of updates. Don't forget to update firmware on other devices like routers that may run Linux under the hood.
@unknownworld82382 жыл бұрын
ooo, 36 minutes ago this vid was posted when I saw it. This means that I have time to break in my locked pc!!!! 😱
@kurnma37762 жыл бұрын
Linux may not have as many viruses, but it doesn't mean it's virus-proof. Update your systems, use strong passwords, check any link or attachment, and never download from untrusted sources.
@master1382 жыл бұрын
This. I need these kind of contents. Thanks chris
@genxjack722 жыл бұрын
To my horror, this exploit worked on my latest Debian 11 Bullseye machine, which was fully updated last week! Updating today patched it.
@RicoCantrell2 жыл бұрын
Love your videos brother.
@johntilghman2 жыл бұрын
Just one more reason whenever I am making a golden image for installs with VMWare I never put GCC or any dev tools in the package list for a production host.
@johntilghman2 жыл бұрын
@Watcher you are correct, I was just saying that Dev tools on a production host isn't a good idea.
@EdSchroedinger2 жыл бұрын
...well, a.o. tinycc also does the job, doesn't need root, and you can well easily get binaries ready for most architectures including arm... no need for fully fledged gnu compiler suite 😏
@johntilghman2 жыл бұрын
@@EdSchroedinger In a well monitored and locked down production environment this shouldn't be a thing that could happen. This is why I am glad admins run the hosts and not users.
@EdSchroedinger2 жыл бұрын
@@johntilghman and the keywords here are 'well monitored'... and it also entails to be 'well maintained'... that's in certainly many larger corporal environments standard as of today, yet... but pentesters also can tell you one or another story. and regarding blackhat attitude is a thing, and regarding the many not so well monitored/maintained systems, it's a sheer miracle that actually comparably little sith went down yet like ...hard 😆
@johntilghman2 жыл бұрын
@@EdSchroedinger I hate to say it but I work in multiple corporate IT and it's sad to know that the data breaches we are but a minority of what there could be if they all got reported.
@kevinwetsch52092 жыл бұрын
I remember doing a hack the Box challenge. I remember trying this exploit to elevate my user to root once I had my reverse shell.
@LawlessSentry2 жыл бұрын
Isn't this the second polkit vulnerability in a short while? First one was a timing attack or something and now this.
@marsovac3 ай бұрын
Will you cover the new 9.9 severity unauthenticated remote code execution vulnerability for Linux when they reveal the details to the public?
@user784052 жыл бұрын
also i was backing artix beginning 2021...but when i heard about void linux many times, its completely different from both ...both don't support systemD ..but one need loginD while VOID linux is optional to have it running and work without with KDE desktop without issue that many said it required logind but my surprise over void, when i disable it logind from booting...it still run KDE without any trace of logind in the process scripts...for artix..its forcing everyone to use stronger passwords and forcing them to not disable environment file from etc folder, and it come with many many separted settings for S6, dinit, suite66, runit but runit doesn't need settings or neither openrc..but some reason its in package repository for every initd of user pick..it sound like artix wasn't been honest in beginning with its users that its not really completely systemd free when they can't quite figure out how get running other desktop environment that need it ...like kde and gnome, but with void..it work completely without any systemd or any need extra files for each configurations, the trick is VOID is only system is also linux foundation free as well, it does not support linux licenses like gnu or gpl and that is fine for me and perfect system that is BSD-2 CLAUSE SYSTEM that is distro is first of its kind to be part of BSD with linux kernel hybrid
@ronnierush93792 жыл бұрын
Very interesting Thanks. Quick Question: Probably not ? but would this exploit work on an android phone ?
@alexgouzanov32192 жыл бұрын
Like the approach instead of show the news. NICE :) thank you.
@tuckersguitarfiasco2 жыл бұрын
Here’s the thing: I’m on Fedora and I’m pretty sure I’m CentOS is red hat based also. Does this effect Fedora Or any other red hat based distros?
@ChrisTitusTech2 жыл бұрын
All Linux distros with pkexec that is unpatched prior to January 2022 will be effected. So pretty much any unpatched distro.
@paulg33362 жыл бұрын
You could also use a 12lb sledge hammer to smash the system into tiny pieces if you were standing next to it i.e. were "local"
@HermesFibonacci3 ай бұрын
The worst thing you can do is use windows subsystem for Linux. You might as well install McAfee which is just as dangerous
@conceptrat2 жыл бұрын
Wouldn't combining this with Log4jshell give the ability to elevate to root remotely?
@tmvkrpxl01352 жыл бұрын
Yeah, remote execution vulnerabilities can be chained with root elevation exploit to be even more dangerous
@melitgreybeardivey74362 жыл бұрын
So how vulnerable are embedded linux systems such as smart tvs? Are update routines remotely run?
@minigpracing30682 жыл бұрын
Raspberry Pi os? Or things like Armbian for some of the other boards?
@gdvissch2 жыл бұрын
Can’t remember a remote code execution on linux …. Hmmmmmm log4j rings any bells?
@alexberezin35132 жыл бұрын
Clickbait title aside, nice demo and reminder, Chris! Thanks!
@dmc7162 жыл бұрын
What if you upload old vulnerable pkexec in the same folder and modify script to call ./pkexec, will it still work? If we presume we can upload stuff to /home/hacker user?
@jeschinstad2 жыл бұрын
This is a good demonstration of the purpose of mandatory access control. Sure, there can be a bug in sudo or a bug in pkexec, but if a user or program should never have any reason to run either, then why were they allowed to? And, even if you do somehow get root by some unknown means, because that's how exploits work, then why should you be able to do whatever you want just because you're root? You should still only be allowed to do the things you are supposed to do. A simple way to play around with confined root accounts on Ubuntu, is to do sudo snap run --shell vlc, or some other snap.
@toasty77132 жыл бұрын
Hi, a few days ago I did a deep scan on my pc because the windows button didn’t work. It said I had hack tool, I found out it could come with some bad viruses and tried to reset my pc but every time I try it fails. Do you know anything I could do to get rid of the virus?
@StaceyAyodele2 жыл бұрын
So what version of pkexec is vulnerable? Cause I know that there was an update pushed for it I believe with Ubuntu based systems recently...I just wanna make sure my systems are safe?
@kbaeve2 жыл бұрын
I mean, if you as a hacker literally have yo be at the computer you wanna hack - why you not just bring a usb with some distro and get access to all of it out of the box? It saved tons of machines, but it can just as much be used the other way around 😅
@EdSchroedinger2 жыл бұрын
nope, u just need to get yourself a user shell for which you then might be able to escalate privileges to root... no need to 'physically' access the box itself.
@ClifffSVK2 жыл бұрын
What if the storage is encrypted?
@kbaeve2 жыл бұрын
@@ClifffSVK 🤷♂️ Follow this guide I guess 😂
@arthurwatts16802 жыл бұрын
Must resist Titus' clickbait ! Must resist Titus' clickbait ! Wait .... damn. Ah,well, I was probably already on an NSA watchlist anyway ;)
@p4radigm9892 жыл бұрын
this channel has more clickbait than Linus now. here's my favorite program (use gcc) main() { setuid(0); seteuid(0); setgid(0); setegid(0); execl("/bin/bash","bash","-i",0); }
@mrlithium692 жыл бұрын
the brainpower that went into thinking of these mechanisms while at the same time failing to understand why this wont work is remarkable. your clickbait beats all because its wrong.
@p4radigm9892 жыл бұрын
@@mrlithium69 it's called a rootshell, and it worked well enough for me. of course you need to hack root first, lol.
@p4radigm9892 жыл бұрын
@@mrlithium69 presenting a 12yo exploit as 'you can hack any linux server' is just dumb clickbait. i guess you agree with that at least.
@p4radigm9892 жыл бұрын
@@mrlithium69 the point of the short prog is just to set your effective uid to root, because often when you hack root you only hacked UID and not EUID, which is somewhat limiting to the fun.
@toyomade2 жыл бұрын
Asked in the TAILS subreddit but may as well ask here as well. Can this be used against TAILS with persistence? I understand some Linux but far from a daily driver of it. So while I think this is saying they’d already have to have access to the system I want to make sure I understand correctly
@ChrisTitusTech2 жыл бұрын
Yes, any Linux system not patched prior to 1/25/2022 can be exploited with this.
@toyomade2 жыл бұрын
@@ChrisTitusTech wow that’s sketchy, thanks for the heads up
@zoltan19532 жыл бұрын
Could you do a video on how to customize zsh without oh-my-zsh? I keep looking and everything that I find is either very poorly explained or uses oh-my-zsh.
@ChrisTitusTech2 жыл бұрын
Done kzbin.info/www/bejne/nXjQc4icgsaKg7c
@GamePlayByFaks2 жыл бұрын
So decided to record sudo exploit that was rampant and got fixed :).
@MichaelJHathaway2 жыл бұрын
If you were using Centos, you should consider using Rhel.
@mrlithium692 жыл бұрын
Can you do a video on why you dont use Centos anymore?
@tylerdean9802 жыл бұрын
Because centos has been dead for like a year now
@benjamindreyer98842 жыл бұрын
I guess it wouldn’t be that difficult to port this to a remote exectution application with some reverse shell or something. Cool to see that its already patched in the new updates!
@desertfish742 жыл бұрын
Title is clickbait
@AnzanHoshinRoshi2 жыл бұрын
Thank you, Chris.
@jamess17872 жыл бұрын
ShellShock was a pretty nasty remote code execution vuln.
@mathesonstep2 жыл бұрын
Couldn't get this working on CentOS 8 but I am betting that's just a bug in the code
@maybeanonymous68462 жыл бұрын
Well at least now a lot of problems will be fixed and have attention
@matiasm.31242 жыл бұрын
Dude don't exec exploits in your daily box
@PeterWolfe20122 жыл бұрын
12 years?! Wow, that's even older than the systemd ultimate backdoor.
@BobiIvanov2 жыл бұрын
if only someone knew how to use the 'id' command to illustrate that they are actually root
@RealRogerFK2 жыл бұрын
mom wake up they finally found the NSA backdoor
@adambrown39182 жыл бұрын
Great video! Time for me to update some systems. Gulp! 😨
@gJonii2 жыл бұрын
I wasn't expecting this level of clickbait from this channel. Maybe I had misjudged this channel.
@jan_harald2 жыл бұрын
THE PROPHECY IS TRUE! ALL YOUR BASE ARE BELONG TO US, TO RETURN! all your systems are belong to us
@cyberp0et2 жыл бұрын
I am reverting back to Windows 98. Take that, forced windows 10 updates! Security by obscurity :D
@ChrisTitusTech2 жыл бұрын
Lol make sure you use Win 98 SE ;) That first edition was a bit rough.
@cyberp0et2 жыл бұрын
@@ChrisTitusTech Obviously. And added USB drivers and KernelEX :D (Actually this is what I intend to do. In the meanwhilr I am actually using a PC from around 2008 with Windows 98 SE that has an old scanner and a dot matrix printer (24 pin) :)
@alicethegrinsecatz16112 жыл бұрын
As long as the exploit doesn't work remotely and is patched soon, everything is fine, except the vulnerable exploit of the Windows fanboys who misused it to claim Windows would be the more secured system. 😀
@battlebuddy45172 жыл бұрын
I'm gonna be real for you buddy Linux fanboys are way more annoying when they fight over which distro or desktop is the best
@petehalsey45292 жыл бұрын
Was selinux enforcing?
@mrlithium692 жыл бұрын
No, but that wouldnt be enough to claim full protection from the attack, just make it more difficult. Since the whole point of pkexec is to elevate to root, that has to be part of the normal policy, so that would still be allowed. Running random GCC compiled programs scripts to trigger it would hopefully be whats prevented though. So you would have to trigger it in a convoluted series of loopholes.
@Leha__7772 жыл бұрын
Polkit was patched already
@Leha__7772 жыл бұрын
@Watcher that's why patch management is important
@tanaymanerikar65032 жыл бұрын
Clicked because of the thumbnail
@kajoma17822 жыл бұрын
Just sleep for the night and then tomorrow it's not gonna work anymore.
@kajoma17822 жыл бұрын
@Watcher Im soo late to the party my bad
@ixiahj2 жыл бұрын
Kind of hard to exploit open source. A bajillion eyes are better than a dozen.
@jjenner24522 жыл бұрын
Click bait title was misleading so a thumbs down.
@darkyassin2 жыл бұрын
Never seen someone remote exploit Windows except when someone enabled Active directory and remote desktop and had a weak password. Most remote exploits happen on Linux. Windows is more secure than Linux when it comes to exploits.
@darkyassin2 жыл бұрын
@Watcher everything you said is true and I know that and what I said is true as well :) because Linux is used more on servers they get targeted a lot by hackers and hence remote exploits gets discovered. Still Windows servers are less likely to get exploited, I have tested running a Windows server and a Linux server on a dedicated server machine with OVH and the minute my Linux server started, I started seeing thousands of attacks on SSH, Mail services and the server slowed down and accessing my hosted website on the server started taking longer times. When I switched to Windows I no longer saw any attacks. It seems that Windows has a better firewall overall and people are more likely to target Linux.
@ChrisTitusTech2 жыл бұрын
Your smoking crack... Look up metasploit, an unpatched Windows system is a kids playground.
@killertruth1862 жыл бұрын
@@ChrisTitusTech Log4j as well.
@killertruth1862 жыл бұрын
@Watcher Log4j was the most recent.
@killertruth1862 жыл бұрын
@Watcher Ddossing is practically a meme.
@saruu9322 жыл бұрын
If linux were to take the place of windows in terms of popularity pretty sure it would be a total mess with hundred of exploits freaking out programmers' mind
@Masaliantiikeri2 жыл бұрын
If you take step backwards from consumer space you'll notice that Linux is more battle tested and everywhere.
@ChrisP8722 жыл бұрын
You're absolutely right. A lot of people here are forgetting a lot of the attacks on Windows are through popular software or phishing. If Linux was THE Desktop OS and Windows was THE Server OS then people would be complaining about all the exploits done to Linux.
@mradminus2 жыл бұрын
Chris: I have no idea why you would even do a video like this.. you know better and that's whats bother me the most..
@ChrisTitusTech2 жыл бұрын
? It's about informing people to patch their systems. This is how you test for the exploit and make sure your system is up to date.
@Character-kj7nj2 жыл бұрын
Title is kinda overhyped.
@MouseHunteR77n2 жыл бұрын
I hope patch this soon
@ChrisTitusTech2 жыл бұрын
Patched on 1/25/2022
@Alkaris2 жыл бұрын
There's that security audit tool which can run vulnerability checks on your system and provide useful information on how to fix said issues with links and documentation of vulnerability exploits.
@rjbradlow2 жыл бұрын
and yet someone would have to crack into a user account in order to do anything locally. Good luck with that. Patch a LINUX system? Who does that? ... lol, everyone but losers.
@jeffyramalho2 жыл бұрын
Subscribed
@will.is.famous28682 жыл бұрын
hi chris
@jdwdrums2 жыл бұрын
Correct pronunciation is 'CENT OH ESS' ;)
@mrlithium692 жыл бұрын
better than "F stab".
@DaltonMyWorld2 жыл бұрын
👍🏿
@user-zn2fe3wr4x2 жыл бұрын
lol
@isg322 жыл бұрын
proud to be indian, lol
@toma.cnc12 жыл бұрын
Change the bloody title.............
@travisgoesthere2 жыл бұрын
WHen you can only exploit old systems then it isnt gaining access to any Linux system lol. Clickbait
@ChrisTitusTech2 жыл бұрын
Lol, well at 1/25 is when the zero day hit and was ANY system. Linux is just very fast at patching this exploit. Anything not patched prior to 1/25 this can be used.
@unknownuser22962 жыл бұрын
Cool, immutable Linux give you extra security too
@pwnwriter2 жыл бұрын
Lmao normies don't use Linux. & Who uses Linux they know how to deal with these exploits. Why fear when your 'Btw' brain is with you.
@breakingthe4thwall2602 жыл бұрын
Linux ,Linux, Linux. all this talk about which is better Linux or windows is like people bragging their cooking is better than every one elses cooking. that's at best a subjective statement and so is the claim that one is better than the other and that one is safer than the other!
@ahmadhadwan2 жыл бұрын
Most linux exploits are patched on the same day they are discovered, and do not require a forced update that closes all of your programs and deletes your unsaved work, while this exploit also requires access to your password protected user. However windows itself has keyloggers built into it, and exploits take a shit ton of time to get fixed by a forced windows update, that doesn't even tell you what is it fixing.