this post was submitted on 19 Jun 2025
116 points (96.8% liked)

Linux

55577 readers
1476 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 6 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 5 points 4 days ago

No, there are other ways to get access to your machine without needing it. In general you can classify vulnerabilities as either code execution or privilege escalation, a code execution vulnerability allows an attacker to execute code on your machine, a privilege escalation allows him to break barriers that you might have imposed on him.

For example, if you're running service X as root, and someone manages to find a way to use something on service X to execute code, they might get a reverse shell to your box and run anything there. So you might set service X to run as your user instead of root, now that vulnerability is less important because it only compromises your user, but the attacker could use this one in conjunction with the other one to gain control of your user, then escalate to become root.

If this is something you're interested in, there's a cool website called hackthebox where you have to do these sort of things for real. If you want to have an idea on how it looks, there are some excellent videos here showing walkthroughs for many of them he boxes, I recommend checking something labeled easy since these boxes can get quite complex, but it will give you a good idea of the steps attackers need to take to compromise your system