Gain access to any Linux system with this exploit

  Рет қаралды 56,938

Chris Titus Tech

Chris Titus Tech

Күн бұрын

Пікірлер
@ChrisTitusTech
@ChrisTitusTech 2 жыл бұрын
Looking at the comments It should be pointed out that most Linux exploits in Linux require access with some type of credential. This exploit was documented and patched on 1/25/2022. Anything not patched will be VULNERABLE! Most Windows exploits can be done remotely through RDP / SMB vulnerabilities and do not require access. This video was simply to demonstrate a bad Linux exploit that effects a large amount of systems. It shouldn't need to be said, but I'll say it anyways "Linux is far more secure than Windows".
@EdSchroedinger
@EdSchroedinger 2 жыл бұрын
yeah... reading the comments you should also point out that you not necessarily need 'local access' as in: get you hands on that exact physical machine, but rather some sort of shell account would suffice. but if there's just one thing to take away from this video is: KEEP YOUR FRIGGIN SYSTEM UPDATED! ...because there's other exploits in the wild that might give you some sort of shell access already. escalating privileges from there is just the step to make things 'actively' become really nasty in progress... even tho some people might find the title a little click-baity for said reasons, still great video and a quite sobering reminder! thanks for the heads up man, keep up the good work! 😎👍
@nosbig98
@nosbig98 2 жыл бұрын
Of a positive note, Debian Stable version installed with minimal package sets (for services like web servers and such) do not have policykit (and therefore pkexec) installed by default. You should always check and always stay up to date, but Debian Stable is less of a target in this specific case.
@starivuk6561
@starivuk6561 2 жыл бұрын
On linux Mint cinnamon pkexec version 0.105 , I can't find where to update pkexec . Update manager show system is up to date ?
@Darkk6969
@Darkk6969 2 жыл бұрын
@@starivuk6561 If you go to /usr/bin and check the file date. It should show Jan 12 which means it's already patched. I'm on Mint as well.
@Darkk6969
@Darkk6969 2 жыл бұрын
@@nosbig98 Yep, it's one of the reasons why I love straight Debian for my servers and workstations. Less bloatware.
@aidananderson1697
@aidananderson1697 2 жыл бұрын
Yep, tried it on a Centos 7 system with 22 outstanding updates and it was affected. Updated and all fine now. Thanks for the heads up Chris! Good job.
@kuhluhOG
@kuhluhOG 2 жыл бұрын
Considering that CentOS 7 still has support (unlike CentOS 8), this is actually interesting.
@ChrisTitusTech
@ChrisTitusTech 2 жыл бұрын
Yeah I used to love Red Hat but I am still pretty mad at them for the CentOS 8 removal of support after it was recently released.
@kuhluhOG
@kuhluhOG 2 жыл бұрын
@@ChrisTitusTech understandable
@markh.6687
@markh.6687 2 жыл бұрын
Chris: "Don't take advice from some guy in a KZbin video.....wait, hold up!!" Great work as always, Chris.
@PlanetEleethal
@PlanetEleethal 2 жыл бұрын
Just tested this on my ubuntu servers and everything was fine. They were already up to date though, thanks for the heads up!
@bologna3048
@bologna3048 2 жыл бұрын
The title and thumbnail cracked me up, I'm onto your shenanigans Chris!
@markh.6687
@markh.6687 2 жыл бұрын
Next video title: "Don't fall for clickbait!--Click here!" :)
@joschafinger126
@joschafinger126 2 жыл бұрын
Linux *is* safer -just as long as you keep it to date. Being FOSS is a two-edged sword: any vulnerability will be visible to both good and bad actors. That is, it'll be easy to exploit for a very short time indeed, while closed-source weaknesses will be harder to exploit for a much, much longer time. Edit (PS): Use Linux, keep it up to date.
@matyasmarkkovacs8336
@matyasmarkkovacs8336 2 жыл бұрын
Windows is closed source, still gets more attacks from hackers, because it has more vulnerabilities. Most of them don't get revealed just by reading the source code.
@joschafinger126
@joschafinger126 2 жыл бұрын
@@matyasmarkkovacs8336 @Mátyás Márk Kovács My point exactly. Big target + closed-source = loads of vulnerabilities that take ages to (perhaps) get patched. Meanwhile, smaller target + open-source = fewer vulnerabilities for shorter time periods, just as long as the community stays vigilant. An easily visible source code means that vulnerabilities are more easily spotted from both sides, was my point. And I'd trust user/devs in a community trying to improve a project they believe in over corporate slaves exploited by a company that has contracts with NSA, CIA, Mossad, and a couple thousand private agencies any time.
@tohur
@tohur 2 жыл бұрын
@@joschafinger126 In the server world Linux is the bigger target but this just goes to show the power of opensource
@krozareq
@krozareq 2 жыл бұрын
A zero-day on any OS is going to be quickly exploited. There's been a lot of kiddie scripts on Windows that stayed unpatched for far too long.
@joschafinger126
@joschafinger126 2 жыл бұрын
@@krozareq Aye. How long would those holes have lasted in Linux?
@krozareq
@krozareq 2 жыл бұрын
Yeah the polkit vulnerability was patched in Arch before it was even made public.
@jg9832
@jg9832 2 жыл бұрын
Would you consider making a video breaking down Void Linux? I know it's a bit more advanced, but I can't seem to find any other channels/videos that do as good a job as yours at introducing such advanced distros to new users in such informative/educational ways. Keep up the good work!
@thorbjrnhellehaven5766
@thorbjrnhellehaven5766 2 жыл бұрын
I wouldn't say "gain access", as you have to be logged in, but sure gain higher level of access.
@penguin1714
@penguin1714 2 жыл бұрын
I knew this was going to be clickbait as soon as I saw "Chris Titus Tech", but I clicked it anyways... Lesson learned
@XenonG
@XenonG 2 жыл бұрын
You can now do something with those locked down no more software support Linux routers, excellent!
@gnul
@gnul 2 жыл бұрын
On a deeper level - question, I remember a special Linux permission, which allows any user to run a program as the owner of the program, which is root in most cases; things like sudo and doas which are normal programs at the end probably use exactly that I guess to be able to run as root to make others being able to run things as root, as long as the program (running as root without root privileges by the executing user) is not vulnerable, it should just be fine, but of course when sudo has buffer overflow whatever you could elevate permissions without intended permission. So am I right that a normal program, e.g. vs code, firefox, vim, nano,.., which does not have the special permission like I guess things like sudo has, which runs as the user who runs it, that it is always not exploitable to gain root access, of course as long as the kernel itself does not have a magic vulnerability? I mean imagine getting root access when running neofetch, I think this would be ridiculous and a once within 10k years kernel bug. :D Sry, am not native English speaker.
@gnul
@gnul 2 жыл бұрын
Of course only really special programs should have that permission to run the program as root by anyone, dangerous permission, but somehow su and sudo need to work.
@JohnDoe-ou7br
@JohnDoe-ou7br 2 жыл бұрын
Pretty impressive for a non-native english speaker
@lev1617
@lev1617 2 жыл бұрын
Love The Vid Chris!
@ivailogeimara
@ivailogeimara 2 жыл бұрын
This seams to require gcc. I tried running a pre-compiled (compiled on my other PC) version on my server (Rocky Linux) and it didn't work. But when I compiled it on my server it worked (made me root). However my server doesn't have gcc installed (I installed it briefly for the test and removed it afterwards) so it's not really easy to exploit it seams. I don't know why you would have gcc on a server. That was yesterday. Today the patch was released and nothing works anymore.
@jongeduard
@jongeduard 2 жыл бұрын
Open source software is certainly not free of bugs it's no different in that, but what I like about it is that they get fixed so quickly, because of the very large community around it. It's especially the open source software bugs that soon become world news. But that's a good thing. Think about the Log4J bug. Proprietary software bugs can continue to exist for many years, silently causing many problems, like vulnerabilities only known by criminals, getting fixed after a long time or without getting fixed at all.
@user78405
@user78405 2 жыл бұрын
some reason..it doesn't work on void linux...its only distro is different than any linux out there...i been using it so far...many folks to scared to use it but trust me, its well worth the trouble to get it running completely
@joe28753
@joe28753 2 жыл бұрын
I love that Rocky Linux is a thing now after the whole CentOS thing.
@grimslade0
@grimslade0 2 жыл бұрын
Oh no.. Chris recklessly forgot to put on his balaclava before going out and crazy hackermanning. Looks like his next video will have to be streamed from the Ecuadorian Embassy again.
@zeknoss
@zeknoss 2 жыл бұрын
this video urged me to ssh into my server and update it even tho i just did it an hour ago... dayyum :)
@donaldmickunas8552
@donaldmickunas8552 2 жыл бұрын
Hey Chris, This could be a nightmare in a corporate environment with all kinds of users. However, in my case, not an issue. I am the only one with access to my system and I use a wierd password to boot. Also, I keep my system updated. So this won't work anyway. Debian is very good about security updates. Great Video as always. Keep on Rocking it, amigo. 🙂
@vladislavkaras491
@vladislavkaras491 2 жыл бұрын
Thanks for the video! It was a really good reason to update our systems :P
@bertblankenstein3738
@bertblankenstein3738 2 жыл бұрын
Decided to do around of updates. Don't forget to update firmware on other devices like routers that may run Linux under the hood.
@unknownworld8238
@unknownworld8238 2 жыл бұрын
ooo, 36 minutes ago this vid was posted when I saw it. This means that I have time to break in my locked pc!!!! 😱
@kurnma3776
@kurnma3776 2 жыл бұрын
Linux may not have as many viruses, but it doesn't mean it's virus-proof. Update your systems, use strong passwords, check any link or attachment, and never download from untrusted sources.
@master138
@master138 2 жыл бұрын
This. I need these kind of contents. Thanks chris
@genxjack72
@genxjack72 2 жыл бұрын
To my horror, this exploit worked on my latest Debian 11 Bullseye machine, which was fully updated last week! Updating today patched it.
@RicoCantrell
@RicoCantrell 2 жыл бұрын
Love your videos brother.
@johntilghman
@johntilghman 2 жыл бұрын
Just one more reason whenever I am making a golden image for installs with VMWare I never put GCC or any dev tools in the package list for a production host.
@johntilghman
@johntilghman 2 жыл бұрын
@Watcher you are correct, I was just saying that Dev tools on a production host isn't a good idea.
@EdSchroedinger
@EdSchroedinger 2 жыл бұрын
...well, a.o. tinycc also does the job, doesn't need root, and you can well easily get binaries ready for most architectures including arm... no need for fully fledged gnu compiler suite 😏
@johntilghman
@johntilghman 2 жыл бұрын
@@EdSchroedinger In a well monitored and locked down production environment this shouldn't be a thing that could happen. This is why I am glad admins run the hosts and not users.
@EdSchroedinger
@EdSchroedinger 2 жыл бұрын
@@johntilghman and the keywords here are 'well monitored'... and it also entails to be 'well maintained'... that's in certainly many larger corporal environments standard as of today, yet... but pentesters also can tell you one or another story. and regarding blackhat attitude is a thing, and regarding the many not so well monitored/maintained systems, it's a sheer miracle that actually comparably little sith went down yet like ...hard 😆
@johntilghman
@johntilghman 2 жыл бұрын
@@EdSchroedinger I hate to say it but I work in multiple corporate IT and it's sad to know that the data breaches we are but a minority of what there could be if they all got reported.
@kevinwetsch5209
@kevinwetsch5209 2 жыл бұрын
I remember doing a hack the Box challenge. I remember trying this exploit to elevate my user to root once I had my reverse shell.
@LawlessSentry
@LawlessSentry 2 жыл бұрын
Isn't this the second polkit vulnerability in a short while? First one was a timing attack or something and now this.
@marsovac
@marsovac 3 ай бұрын
Will you cover the new 9.9 severity unauthenticated remote code execution vulnerability for Linux when they reveal the details to the public?
@user78405
@user78405 2 жыл бұрын
also i was backing artix beginning 2021...but when i heard about void linux many times, its completely different from both ...both don't support systemD ..but one need loginD while VOID linux is optional to have it running and work without with KDE desktop without issue that many said it required logind but my surprise over void, when i disable it logind from booting...it still run KDE without any trace of logind in the process scripts...for artix..its forcing everyone to use stronger passwords and forcing them to not disable environment file from etc folder, and it come with many many separted settings for S6, dinit, suite66, runit but runit doesn't need settings or neither openrc..but some reason its in package repository for every initd of user pick..it sound like artix wasn't been honest in beginning with its users that its not really completely systemd free when they can't quite figure out how get running other desktop environment that need it ...like kde and gnome, but with void..it work completely without any systemd or any need extra files for each configurations, the trick is VOID is only system is also linux foundation free as well, it does not support linux licenses like gnu or gpl and that is fine for me and perfect system that is BSD-2 CLAUSE SYSTEM that is distro is first of its kind to be part of BSD with linux kernel hybrid
@ronnierush9379
@ronnierush9379 2 жыл бұрын
Very interesting Thanks. Quick Question: Probably not ? but would this exploit work on an android phone ?
@alexgouzanov3219
@alexgouzanov3219 2 жыл бұрын
Like the approach instead of show the news. NICE :) thank you.
@tuckersguitarfiasco
@tuckersguitarfiasco 2 жыл бұрын
Here’s the thing: I’m on Fedora and I’m pretty sure I’m CentOS is red hat based also. Does this effect Fedora Or any other red hat based distros?
@ChrisTitusTech
@ChrisTitusTech 2 жыл бұрын
All Linux distros with pkexec that is unpatched prior to January 2022 will be effected. So pretty much any unpatched distro.
@paulg3336
@paulg3336 2 жыл бұрын
You could also use a 12lb sledge hammer to smash the system into tiny pieces if you were standing next to it i.e. were "local"
@HermesFibonacci
@HermesFibonacci 3 ай бұрын
The worst thing you can do is use windows subsystem for Linux. You might as well install McAfee which is just as dangerous
@conceptrat
@conceptrat 2 жыл бұрын
Wouldn't combining this with Log4jshell give the ability to elevate to root remotely?
@tmvkrpxl0135
@tmvkrpxl0135 2 жыл бұрын
Yeah, remote execution vulnerabilities can be chained with root elevation exploit to be even more dangerous
@melitgreybeardivey7436
@melitgreybeardivey7436 2 жыл бұрын
So how vulnerable are embedded linux systems such as smart tvs? Are update routines remotely run?
@minigpracing3068
@minigpracing3068 2 жыл бұрын
Raspberry Pi os? Or things like Armbian for some of the other boards?
@gdvissch
@gdvissch 2 жыл бұрын
Can’t remember a remote code execution on linux …. Hmmmmmm log4j rings any bells?
@alexberezin3513
@alexberezin3513 2 жыл бұрын
Clickbait title aside, nice demo and reminder, Chris! Thanks!
@dmc716
@dmc716 2 жыл бұрын
What if you upload old vulnerable pkexec in the same folder and modify script to call ./pkexec, will it still work? If we presume we can upload stuff to /home/hacker user?
@jeschinstad
@jeschinstad 2 жыл бұрын
This is a good demonstration of the purpose of mandatory access control. Sure, there can be a bug in sudo or a bug in pkexec, but if a user or program should never have any reason to run either, then why were they allowed to? And, even if you do somehow get root by some unknown means, because that's how exploits work, then why should you be able to do whatever you want just because you're root? You should still only be allowed to do the things you are supposed to do. A simple way to play around with confined root accounts on Ubuntu, is to do sudo snap run --shell vlc, or some other snap.
@toasty7713
@toasty7713 2 жыл бұрын
Hi, a few days ago I did a deep scan on my pc because the windows button didn’t work. It said I had hack tool, I found out it could come with some bad viruses and tried to reset my pc but every time I try it fails. Do you know anything I could do to get rid of the virus?
@StaceyAyodele
@StaceyAyodele 2 жыл бұрын
So what version of pkexec is vulnerable? Cause I know that there was an update pushed for it I believe with Ubuntu based systems recently...I just wanna make sure my systems are safe?
@kbaeve
@kbaeve 2 жыл бұрын
I mean, if you as a hacker literally have yo be at the computer you wanna hack - why you not just bring a usb with some distro and get access to all of it out of the box? It saved tons of machines, but it can just as much be used the other way around 😅
@EdSchroedinger
@EdSchroedinger 2 жыл бұрын
nope, u just need to get yourself a user shell for which you then might be able to escalate privileges to root... no need to 'physically' access the box itself.
@ClifffSVK
@ClifffSVK 2 жыл бұрын
What if the storage is encrypted?
@kbaeve
@kbaeve 2 жыл бұрын
@@ClifffSVK 🤷‍♂️ Follow this guide I guess 😂
@arthurwatts1680
@arthurwatts1680 2 жыл бұрын
Must resist Titus' clickbait ! Must resist Titus' clickbait ! Wait .... damn. Ah,well, I was probably already on an NSA watchlist anyway ;)
@p4radigm989
@p4radigm989 2 жыл бұрын
this channel has more clickbait than Linus now. here's my favorite program (use gcc) main() { setuid(0); seteuid(0); setgid(0); setegid(0); execl("/bin/bash","bash","-i",0); }
@mrlithium69
@mrlithium69 2 жыл бұрын
the brainpower that went into thinking of these mechanisms while at the same time failing to understand why this wont work is remarkable. your clickbait beats all because its wrong.
@p4radigm989
@p4radigm989 2 жыл бұрын
@@mrlithium69 it's called a rootshell, and it worked well enough for me. of course you need to hack root first, lol.
@p4radigm989
@p4radigm989 2 жыл бұрын
@@mrlithium69 presenting a 12yo exploit as 'you can hack any linux server' is just dumb clickbait. i guess you agree with that at least.
@p4radigm989
@p4radigm989 2 жыл бұрын
@@mrlithium69 the point of the short prog is just to set your effective uid to root, because often when you hack root you only hacked UID and not EUID, which is somewhat limiting to the fun.
@toyomade
@toyomade 2 жыл бұрын
Asked in the TAILS subreddit but may as well ask here as well. Can this be used against TAILS with persistence? I understand some Linux but far from a daily driver of it. So while I think this is saying they’d already have to have access to the system I want to make sure I understand correctly
@ChrisTitusTech
@ChrisTitusTech 2 жыл бұрын
Yes, any Linux system not patched prior to 1/25/2022 can be exploited with this.
@toyomade
@toyomade 2 жыл бұрын
@@ChrisTitusTech wow that’s sketchy, thanks for the heads up
@zoltan1953
@zoltan1953 2 жыл бұрын
Could you do a video on how to customize zsh without oh-my-zsh? I keep looking and everything that I find is either very poorly explained or uses oh-my-zsh.
@ChrisTitusTech
@ChrisTitusTech 2 жыл бұрын
Done kzbin.info/www/bejne/nXjQc4icgsaKg7c
@GamePlayByFaks
@GamePlayByFaks 2 жыл бұрын
So decided to record sudo exploit that was rampant and got fixed :).
@MichaelJHathaway
@MichaelJHathaway 2 жыл бұрын
If you were using Centos, you should consider using Rhel.
@mrlithium69
@mrlithium69 2 жыл бұрын
Can you do a video on why you dont use Centos anymore?
@tylerdean980
@tylerdean980 2 жыл бұрын
Because centos has been dead for like a year now
@benjamindreyer9884
@benjamindreyer9884 2 жыл бұрын
I guess it wouldn’t be that difficult to port this to a remote exectution application with some reverse shell or something. Cool to see that its already patched in the new updates!
@desertfish74
@desertfish74 2 жыл бұрын
Title is clickbait
@AnzanHoshinRoshi
@AnzanHoshinRoshi 2 жыл бұрын
Thank you, Chris.
@jamess1787
@jamess1787 2 жыл бұрын
ShellShock was a pretty nasty remote code execution vuln.
@mathesonstep
@mathesonstep 2 жыл бұрын
Couldn't get this working on CentOS 8 but I am betting that's just a bug in the code
@maybeanonymous6846
@maybeanonymous6846 2 жыл бұрын
Well at least now a lot of problems will be fixed and have attention
@matiasm.3124
@matiasm.3124 2 жыл бұрын
Dude don't exec exploits in your daily box
@PeterWolfe2012
@PeterWolfe2012 2 жыл бұрын
12 years?! Wow, that's even older than the systemd ultimate backdoor.
@BobiIvanov
@BobiIvanov 2 жыл бұрын
if only someone knew how to use the 'id' command to illustrate that they are actually root
@RealRogerFK
@RealRogerFK 2 жыл бұрын
mom wake up they finally found the NSA backdoor
@adambrown3918
@adambrown3918 2 жыл бұрын
Great video! Time for me to update some systems. Gulp! 😨
@gJonii
@gJonii 2 жыл бұрын
I wasn't expecting this level of clickbait from this channel. Maybe I had misjudged this channel.
@jan_harald
@jan_harald 2 жыл бұрын
THE PROPHECY IS TRUE! ALL YOUR BASE ARE BELONG TO US, TO RETURN! all your systems are belong to us
@cyberp0et
@cyberp0et 2 жыл бұрын
I am reverting back to Windows 98. Take that, forced windows 10 updates! Security by obscurity :D
@ChrisTitusTech
@ChrisTitusTech 2 жыл бұрын
Lol make sure you use Win 98 SE ;) That first edition was a bit rough.
@cyberp0et
@cyberp0et 2 жыл бұрын
@@ChrisTitusTech Obviously. And added USB drivers and KernelEX :D (Actually this is what I intend to do. In the meanwhilr I am actually using a PC from around 2008 with Windows 98 SE that has an old scanner and a dot matrix printer (24 pin) :)
@alicethegrinsecatz1611
@alicethegrinsecatz1611 2 жыл бұрын
As long as the exploit doesn't work remotely and is patched soon, everything is fine, except the vulnerable exploit of the Windows fanboys who misused it to claim Windows would be the more secured system. 😀
@battlebuddy4517
@battlebuddy4517 2 жыл бұрын
I'm gonna be real for you buddy Linux fanboys are way more annoying when they fight over which distro or desktop is the best
@petehalsey4529
@petehalsey4529 2 жыл бұрын
Was selinux enforcing?
@mrlithium69
@mrlithium69 2 жыл бұрын
No, but that wouldnt be enough to claim full protection from the attack, just make it more difficult. Since the whole point of pkexec is to elevate to root, that has to be part of the normal policy, so that would still be allowed. Running random GCC compiled programs scripts to trigger it would hopefully be whats prevented though. So you would have to trigger it in a convoluted series of loopholes.
@Leha__777
@Leha__777 2 жыл бұрын
Polkit was patched already
@Leha__777
@Leha__777 2 жыл бұрын
@Watcher that's why patch management is important
@tanaymanerikar6503
@tanaymanerikar6503 2 жыл бұрын
Clicked because of the thumbnail
@kajoma1782
@kajoma1782 2 жыл бұрын
Just sleep for the night and then tomorrow it's not gonna work anymore.
@kajoma1782
@kajoma1782 2 жыл бұрын
@Watcher Im soo late to the party my bad
@ixiahj
@ixiahj 2 жыл бұрын
Kind of hard to exploit open source. A bajillion eyes are better than a dozen.
@jjenner2452
@jjenner2452 2 жыл бұрын
Click bait title was misleading so a thumbs down.
@darkyassin
@darkyassin 2 жыл бұрын
Never seen someone remote exploit Windows except when someone enabled Active directory and remote desktop and had a weak password. Most remote exploits happen on Linux. Windows is more secure than Linux when it comes to exploits.
@darkyassin
@darkyassin 2 жыл бұрын
@Watcher everything you said is true and I know that and what I said is true as well :) because Linux is used more on servers they get targeted a lot by hackers and hence remote exploits gets discovered. Still Windows servers are less likely to get exploited, I have tested running a Windows server and a Linux server on a dedicated server machine with OVH and the minute my Linux server started, I started seeing thousands of attacks on SSH, Mail services and the server slowed down and accessing my hosted website on the server started taking longer times. When I switched to Windows I no longer saw any attacks. It seems that Windows has a better firewall overall and people are more likely to target Linux.
@ChrisTitusTech
@ChrisTitusTech 2 жыл бұрын
Your smoking crack... Look up metasploit, an unpatched Windows system is a kids playground.
@killertruth186
@killertruth186 2 жыл бұрын
@@ChrisTitusTech Log4j as well.
@killertruth186
@killertruth186 2 жыл бұрын
@Watcher Log4j was the most recent.
@killertruth186
@killertruth186 2 жыл бұрын
@Watcher Ddossing is practically a meme.
@saruu932
@saruu932 2 жыл бұрын
If linux were to take the place of windows in terms of popularity pretty sure it would be a total mess with hundred of exploits freaking out programmers' mind
@Masaliantiikeri
@Masaliantiikeri 2 жыл бұрын
If you take step backwards from consumer space you'll notice that Linux is more battle tested and everywhere.
@ChrisP872
@ChrisP872 2 жыл бұрын
You're absolutely right. A lot of people here are forgetting a lot of the attacks on Windows are through popular software or phishing. If Linux was THE Desktop OS and Windows was THE Server OS then people would be complaining about all the exploits done to Linux.
@mradminus
@mradminus 2 жыл бұрын
Chris: I have no idea why you would even do a video like this.. you know better and that's whats bother me the most..
@ChrisTitusTech
@ChrisTitusTech 2 жыл бұрын
? It's about informing people to patch their systems. This is how you test for the exploit and make sure your system is up to date.
@Character-kj7nj
@Character-kj7nj 2 жыл бұрын
Title is kinda overhyped.
@MouseHunteR77n
@MouseHunteR77n 2 жыл бұрын
I hope patch this soon
@ChrisTitusTech
@ChrisTitusTech 2 жыл бұрын
Patched on 1/25/2022
@Alkaris
@Alkaris 2 жыл бұрын
There's that security audit tool which can run vulnerability checks on your system and provide useful information on how to fix said issues with links and documentation of vulnerability exploits.
@rjbradlow
@rjbradlow 2 жыл бұрын
and yet someone would have to crack into a user account in order to do anything locally. Good luck with that. Patch a LINUX system? Who does that? ... lol, everyone but losers.
@jeffyramalho
@jeffyramalho 2 жыл бұрын
Subscribed
@will.is.famous2868
@will.is.famous2868 2 жыл бұрын
hi chris
@jdwdrums
@jdwdrums 2 жыл бұрын
Correct pronunciation is 'CENT OH ESS' ;)
@mrlithium69
@mrlithium69 2 жыл бұрын
better than "F stab".
@DaltonMyWorld
@DaltonMyWorld 2 жыл бұрын
👍🏿
@user-zn2fe3wr4x
@user-zn2fe3wr4x 2 жыл бұрын
lol
@isg32
@isg32 2 жыл бұрын
proud to be indian, lol
@toma.cnc1
@toma.cnc1 2 жыл бұрын
Change the bloody title.............
@travisgoesthere
@travisgoesthere 2 жыл бұрын
WHen you can only exploit old systems then it isnt gaining access to any Linux system lol. Clickbait
@ChrisTitusTech
@ChrisTitusTech 2 жыл бұрын
Lol, well at 1/25 is when the zero day hit and was ANY system. Linux is just very fast at patching this exploit. Anything not patched prior to 1/25 this can be used.
@unknownuser2296
@unknownuser2296 2 жыл бұрын
Cool, immutable Linux give you extra security too
@pwnwriter
@pwnwriter 2 жыл бұрын
Lmao normies don't use Linux. & Who uses Linux they know how to deal with these exploits. Why fear when your 'Btw' brain is with you.
@breakingthe4thwall260
@breakingthe4thwall260 2 жыл бұрын
Linux ,Linux, Linux. all this talk about which is better Linux or windows is like people bragging their cooking is better than every one elses cooking. that's at best a subjective statement and so is the claim that one is better than the other and that one is safer than the other!
@ahmadhadwan
@ahmadhadwan 2 жыл бұрын
Most linux exploits are patched on the same day they are discovered, and do not require a forced update that closes all of your programs and deletes your unsaved work, while this exploit also requires access to your password protected user. However windows itself has keyloggers built into it, and exploits take a shit ton of time to get fixed by a forced windows update, that doesn't even tell you what is it fixing.
How to do a Checkup on Linux
14:29
Chris Titus Tech
Рет қаралды 21 М.
The Biggest Linux Security Mistakes
9:44
Chris Titus Tech
Рет қаралды 185 М.
Tuna 🍣 ​⁠@patrickzeinali ​⁠@ChefRush
00:48
albert_cancook
Рет қаралды 148 МЛН
It works #beatbox #tiktok
00:34
BeatboxJCOP
Рет қаралды 41 МЛН
Quilt Challenge, No Skills, Just Luck#Funnyfamily #Partygames #Funny
00:32
Family Games Media
Рет қаралды 55 МЛН
黑天使只对C罗有感觉#short #angel #clown
00:39
Super Beauty team
Рет қаралды 36 МЛН
this SSH exploit is absolutely wild
11:59
Low Level
Рет қаралды 343 М.
researchers find an unfixable bug in EVERY ARM cpu
9:48
Low Level
Рет қаралды 558 М.
Problems You will Encounter on Linux (and How to Solve Them)
23:01
Rob Braxman Tech
Рет қаралды 164 М.
The New Outlook is TERRIBLE
20:19
Chris Titus Tech
Рет қаралды 147 М.
new linux exploit is absolutely insane
8:29
Low Level
Рет қаралды 432 М.
SSH Honeypot in 4 Minutes - Trap Hackers in Your Server
4:48
Wolfgang's Channel
Рет қаралды 775 М.
UwUntu Linux - The Operating System for Weeaboos (oh boy)
8:50
Michael MJD
Рет қаралды 1,2 МЛН
Linux Malware and Securing Your System
13:59
Chris Titus Tech
Рет қаралды 89 М.
Why I Code on Linux Instead of Windows
7:34
ForrestKnight
Рет қаралды 982 М.
Tuna 🍣 ​⁠@patrickzeinali ​⁠@ChefRush
00:48
albert_cancook
Рет қаралды 148 МЛН