36

Who said Linux cant be hacked?
Despite of best practises, now I am out of the sudoers list of my own machine.

Comments
  • 5
    Ouch. What if you boot a live CD and edit the list from there?
  • 7
    It's just got less loopholes and it's also a less popular target for hackers just because of the unique market where Linux thrives. Anything is hackable to an extent, just have to find a way to hack it xD
  • 2
    basicly, if u gain physical access to the computer, u own it.
    nothing fancy here..
  • 0
    @620hun It didn't work, had to install a fresh copy of Linux...
  • 0
  • 1
    @CSaratakij Hahha, but the bad guys didnt had any physical access, still they sudoed it...
  • 1
    @aayusharyan oh, I miss read a topic.
    Basicly, like @DucksCanCode said xD
  • 1
    Stick with best practices. Disable services you don't use and secure that you use. Setting up iptables should help you too. Update regularly and be cautious when you install non-repository software.
  • 2
    @CSaratakij What if I have encrypted hard drive :) ?
  • 1
    @CSaratakij Haha, Relax. Its over now. ;-)
  • 1
    @sudoguy Yeah... I'll set up iptables now....
  • 1
    @sudoguy Harder to view ur exact data for sure xD
    but Im not sure if it will protect on runtime.
    (full drive encryption can?)
  • 2
    I was replying on physical access. I know that you can boot live cd or get root access via grub and do what you want with the OS. But I don't know how you can achieve that when there is full drive encryption.

    When you get somehow into OS while running than encryption won't save you much. But I don't know how physical access will help you in this scenario.
  • 1
    @sudoguy But with Full Drive Encryption, if say I'm out of the access list, then technically all my data is gone...
  • 1
    @aayusharyan It depends. The encryption password can't be changed without knowing it (unlike your login password). But we have backups right :) ?
Add Comment