Well the OP can check for a zero exploit easily, just google his OS for 
discussion of one.

As for not patched CVE's if the OP has disabled the automatic updating then of 
course all bets are off.

Finding a network vulnerability on the LAN isn't hacking that workstation you 
are on

A non-root user can start a process allowing remote access but the remote will 
still only be at that user's permission level

Linux (at least ubuntu) does not have a usable root password unless root 
changes it

Etc. etc.  means nothing

In other words - if he just installed Linux, using defaults, did not turn off 
updating, did not give his users root access, and in other words, did 
everything you are supposed to do - he has nothing to worry about.

Ted

-----Original Message-----
From: PLUG <[email protected]> On Behalf Of Tomas Kuchta
Sent: Friday, January 26, 2024 8:23 AM
To: Portland Linux/Unix Group <[email protected]>
Subject: Re: [PLUG] virus check methods

On Fri, Jan 26, 2024, 02:41 Ted Mittelstaedt <[email protected]> wrote:

> How in the world is a regular non-root user going to install a rootkit 
> on a Linux workstation?.
>

Not patched CVEs, zero day exploits, establishing network connection to LAN and 
finding vulnerability, starting/establishing user process allowing remote 
access, password scans, etc., etc.

Reply via email to