Vista (in)Security via Back|Track

Linux can be very easily hacked with pysical access. What is your point?
I know that a machine that someone has physical access to can be easily hacked... that's why I said so in my post.

My point is that if you're going to allow a program to run under the context of the system user regardless of a user's credentials (or lack of, in this case), then you really should make sure that nobody can replace that executable with another one of their choice.
 
Interesting little trick, while I agree anything can be done with physical access, many of these kind of attacks can and should be prevented, Microsoft need to improve their security model, which still even today has many flaws.
 
If you have physical access to this disk you can do a similar thing in *nix (e.g just replace /bin/login). So I don't see what your point is.
 
Last edited:
If you have physical access to this disk you can do a similar thing in *nix (e.g just replace /bin/login). So I don't see what your point is.
Fair enough. Didn't realise that would work in *nix, so I've just been reading up on it. Turning up some interesting info :)
 
Physical access on *nix would infact be easier than pie with Backtrack.. mount, chroot anyone?

Oh, and if you're that interested.. download a bootable CD called "SuperUtilities" and (if you find the right one) it'll be a Gentoo based live-cd that can reset all passwords.
 
Last edited:
Interesting little trick, while I agree anything can be done with physical access, many of these kind of attacks can and should be prevented, Microsoft need to improve their security model, which still even today has many flaws.

Every Operating System has security flaws. Including *nix. Although I do see what you are saying and partly agree.

More people tend to poke holes in Mirosoft systems than *nix, its more fun. ;)
 
Fair enough. Didn't realise that would work in *nix, so I've just been reading up on it. Turning up some interesting info :)

or just append 'single init=/bin/bash' to grub infact :) Nice root prompt.
Then, mount -o remount,rw /
And then you can change whatever you want.
If someone has physical access to the box, you have lost :P
 
If someone has physical access to the box, you have lost :P

If someone has physical access to the box, and the entire hard drive is encrypted, they have lost. :D

Well, they could still open the case / keyboard and plant some sort of keylogging device or point a hidden camera at your keyboard.
 
If someone has physical access to the box, and the entire hard drive is encrypted, they have lost. :D

Hardware hacking and freezing ram attacks aside. Hmm not really... there's a ton of writable memory most people don't think about. BIOS, MBR, APCI,flashable memory on your ethernet card, etc..) - All depends how much work you want to put into it. Coding rootkits for embedded chips is not trivial but there are many points you can intercept data.
 
Last edited:
Back
Top Bottom