Tagged articles
10 articles
Page 1 of 1
MaGe Linux Operations
MaGe Linux Operations
Jun 30, 2024 · Information Security

How to Break Out of Docker Containers and Gain Root Access on Linux

This tutorial walks through Docker privilege‑escalation techniques, showing how to enumerate Docker permissions, exploit docker group membership, use GTFOBins and LinPEAS, and break out of both privileged and non‑privileged containers to obtain a root shell on the host.

Container SecurityDockerLinux
0 likes · 25 min read
How to Break Out of Docker Containers and Gain Root Access on Linux
Liangxu Linux
Liangxu Linux
May 28, 2023 · Information Security

How to Harden a Linux Server: SSH, User Management, and Sudo Tweaks

This guide walks through practical steps to secure a Linux server, including modifying SSH settings, disabling ping responses, managing users and groups, protecting critical account files, creating new users, and configuring sudo or UID changes to control root access.

LinuxRoot AccessSSH
0 likes · 6 min read
How to Harden a Linux Server: SSH, User Management, and Sudo Tweaks
Liangxu Linux
Liangxu Linux
May 10, 2023 · Information Security

Boost Your Server Security: Essential SSH, User, and Root Hardening Steps

This guide walks you through practical steps to secure a newly purchased Linux server, covering SSH configuration changes, disabling ping responses, thorough user and group management, creating new accounts, and three reliable methods to grant root privileges safely.

LinuxRoot AccessSSH Hardening
0 likes · 6 min read
Boost Your Server Security: Essential SSH, User, and Root Hardening Steps
Liangxu Linux
Liangxu Linux
May 5, 2023 · Information Security

Boost Your Server’s Defense: Essential SSH and User Security Tweaks

Learn practical steps to harden a Linux server—including changing the SSH port, disabling root login, blocking ping, managing users and groups, securing critical system files, and configuring sudo—so you can protect your machine from common attacks and unauthorized access.

LinuxRoot AccessSSH
0 likes · 6 min read
Boost Your Server’s Defense: Essential SSH and User Security Tweaks
21CTO
21CTO
Nov 19, 2020 · Information Security

How to Exploit and Patch Ubuntu’s Silent Sudo User Vulnerability

This article explains a critical Ubuntu flaw that lets a standard user create a new sudo account and gain root privileges without a system password, details the step‑by‑step exploitation process, and outlines the official patches released to fix the issue.

CVEExploitLinux security
0 likes · 6 min read
How to Exploit and Patch Ubuntu’s Silent Sudo User Vulnerability
21CTO
21CTO
Aug 13, 2017 · Information Security

How Researchers Root Amazon Echo to Turn It Into a Stealthy Audio Spy

Security researchers discovered a physical attack vector on Amazon Echo that exposes its debug panel and allows booting from an external SD card, enabling persistent root access, covert audio streaming, and a full remote control backdoor, with detailed hardware and firmware exploitation steps provided.

Amazon EchoRoot Accessaudio eavesdropping
0 likes · 11 min read
How Researchers Root Amazon Echo to Turn It Into a Stealthy Audio Spy
MaGe Linux Operations
MaGe Linux Operations
Jul 22, 2017 · Information Security

8 Proven Ways to Harden Linux System Security

This article outlines eight practical techniques—including using shadow passwords, disabling unnecessary services, keeping the kernel up‑to‑date, enforcing strong login passwords, managing user privileges, limiting root access, employing SSH, and removing risky r‑commands—to significantly improve the security of a Linux system.

LinuxRoot AccessSystem Hardening
0 likes · 11 min read
8 Proven Ways to Harden Linux System Security