Gaining Root Access: Exploiting Linux Using a New Heap Overflow Vulnerability
Watch our latest webinar with Ultimate Windows Security and Kev Breen.
Organizations operating using a heterogeneous environment realize the value of using Linux systems to provide specific services critical to the business. However, these systems are just as much under attack as their Windows counterparts, making it equally as important to understand how they are being compromised, as well as ensuring they receive security updates.
In the last year, we’ve seen attacks on Linux systems grow in number, with the latest in 2021, dubbed ‘Baron Samedit’, which allows attackers to leverage several vulnerable versions of the admin command Sudo to elevate themselves from a normal user to one with root access to the Linux system.
In this webinar, Microsoft MVP and cybersecurity expert Nick Cavalancia explores this topic by covering:
- Just how problematic are attacks on Linux
- Some of the tactics and techniques used by attackers when Linux is the target
- Mapping these attacks to the MITRE Framework
In addition, our own Director of Cyber Threat Research, Kev Breen, discusses the new Baron Samedit heap overflow vulnerability in Linux discovered by Qualsys, and takes a look at this attack from two perspectives:
- Running the exploit, including uploading, compiling, and executing the exploit to gain access
- Planning a defense that includes shipping audit logs, identifying the compromise, and responding to the attack
Latest Blog posts
Patch Newsday: 14 September 2021 – Lousy Browsers and Arsey RCEs Edit
15 September 2021
Analyzing the CVE-2021-40444 exploit
13 September 2021
Take the power back: Tool-up against a notorious global threat group with our new FIN7 series
13 September 2021
Episode 44: Rotten Apple or Privacy Nuts?
2 September 2021
Patch Newsday 10 August: Ironic exploitation and the spectre of PrintNightmare
10 August 2021
Kaseya supply chain attack: Prepare to respond with the Cyber Crisis Simulator
27 July 2021