Well the OP can check for a zero exploit easily, just google his OS for discussion of one.
As for not patched CVE's if the OP has disabled the automatic updating then of course all bets are off. Finding a network vulnerability on the LAN isn't hacking that workstation you are on A non-root user can start a process allowing remote access but the remote will still only be at that user's permission level Linux (at least ubuntu) does not have a usable root password unless root changes it Etc. etc. means nothing In other words - if he just installed Linux, using defaults, did not turn off updating, did not give his users root access, and in other words, did everything you are supposed to do - he has nothing to worry about. Ted -----Original Message----- From: PLUG <[email protected]> On Behalf Of Tomas Kuchta Sent: Friday, January 26, 2024 8:23 AM To: Portland Linux/Unix Group <[email protected]> Subject: Re: [PLUG] virus check methods On Fri, Jan 26, 2024, 02:41 Ted Mittelstaedt <[email protected]> wrote: > How in the world is a regular non-root user going to install a rootkit > on a Linux workstation?. > Not patched CVEs, zero day exploits, establishing network connection to LAN and finding vulnerability, starting/establishing user process allowing remote access, password scans, etc., etc.
