Ubuntu :: Running Wireshark No Interfaces Unless ROOT Dangerous?

Sep 25, 2010

So you have to run wireshark as root too see the interfaces which I'm ok with but a message says that this is dangerous. I am just wondering WHY this is dangerous? I mean I know sudo gives complete read write access to the system but what I am wondering is why is that BAD for wireshark? What could potentially happen? Can someone expand on this?

View 1 Replies


ADVERTISEMENT

Ubuntu Security :: Running WireShark As Root?

Oct 11, 2010

I'm running behind a 2wire NAT Router with only have smtp, www, pop3 open routing to my ubuntu VM server. Network also includes three other ubuntu VM server's and a Desktop. I'm the only one on the network so my question is, what security risk is there running WireShark as root? Because running it under dumpcap is horrible after you quit. It hogs up all the resource to remove the dump.

View 7 Replies View Related

Ubuntu Networking :: Why Won't Wireshark Show Any Interfaces In

Apr 27, 2011

I installed Wireshark 1.2.7 on my Lenovo X61 tablet PC running Ubuntu 10.04 lucid during the quest for a decent signal strength meter for available wifi access points. What is a good software or hardware method to TEST WiFi strength & power?But I can't get Wireshark to do the simplest thing, which is to "Capture Interfaces".

View 9 Replies View Related

Ubuntu Security :: WireShark - Do Not Run As Root

Nov 7, 2010

The Wireshark website specifically warns against running WireShark as Root....

Quote:

Administrator/root account not required!

Many Wireshark users think that Wireshark requires a root/Administrator account to work with.

That's not a good idea, as using a root account makes any exploit far more dangerous: a successful exploit will have immediate control of the whole system, compromising it completely.

First of all, most Wireshark functions can always be used with a (probably very limited) user account. In particular, the protocol dissectors which have shown most of the security related bugs do not need a root account!

Only capturing (and gathering capture interface information) may require a root account, but even that can usually be "circumvented", see CaptureSetup/CapturePrivileges for details how to do so.

View 3 Replies View Related

Server :: Getting Error Before Running Wireshark

Jan 25, 2011

The error is as follows:
kernel: Uhhuh. NMI received for unknown reason 3c on CPU 0.
kernel: Do you have a strange power saving mode enabled?
kernel: Dazed and confused, but trying to continue

View 1 Replies View Related

Ubuntu Security :: Wireshark Security Root Privileges?

Mar 25, 2010

Having read on the forums about some of the dangers of running Wireshark as root, I would like to know if anyone can suggest some alternative packet sniffers/network analyzers which will offer similar results but without the security issues. I am using Karmic Koala on a Fujitsu Siemens laptop with wireless router (firewall enabled)

View 7 Replies View Related

Ubuntu :: Route Internet Through Interfaces Running BackTrack 5?

May 26, 2011

I have an interesting problem for you all today. Lately, I've been learning a lot about computer security and I have a weird request. I would like to route the internet connection from a laptop running BackTrack 5 (Linux distrobution for security), to another Backtrack computer through an SSH session. I believe this is called SSH tunneling. Essentially I have these interfaces set up.
Code:
eth0
wifi0
I would like to route the internet I get from wifi0 and send it through eth0. Essentially this would make my laptop a sort of hub. The reason is, I have a wireless router I use for all my penetration testing computers and I don't like them on my network normally. I want it so that way I can use my main computer, which has no wifi card, to connect to this network. Also, this would be great experience for other things. I'm not completely set on having it done through an SSH session also. I think there is a way to do it with iptables but, I'm not entirely sure how.

View 1 Replies View Related

Ubuntu Security :: Giving Root Permission To An Application But Without Running It As Root?

Jan 20, 2011

want to run VirtualBox with root permissions. Trouble is that only when run as root i can access attached USB devices inside of a virtual machine, otherwise, these a greyed out).Now running VirtualBox as a root user also changes the configuration folders, making all my virtual machines already defined disappear. I also don't want to copy all to the root configuration folders. Is there a way to give the VirtualBox root permissions but without actually running the application as a root user. Is it possible to do without changing the permissions of the non-root user, i.e. i don't want my user to have all root permissions, due to security considerations.

View 1 Replies View Related

Ubuntu Networking :: ADVISEADDR: Error In Specifying Interfaces: No Existing Ip Interfaces Found

Jan 7, 2010

I have a weird issue that I have not seen on any forum. My jaunty on DELL studio laptop seems connected to net, but I can not access any network service (ssh, firefox etc.). But when I connect a cable the cable lights blink as it should be and in wireless connection my wifi light blinks.

It was working 2 days ago without problem, and I have not done big changes recently.I removed and reinstalled network-manager and network-manager-gnome. Nothing changed. I see a message in each restart as follows (when Openafs is starting). I can reproduce it with "/etc/init.d/openafs-client restart"

Code:

ADVISEADDR:error in specifying interfaces: no existing ip interfaces found

#lspci

Code:

04:00.0 Network controller: Intel Corporation Wireless WiFi Link 5100
08:00.0 Ethernet controller: Broadcom Corporation NetLink BCM5784M Gigabit Ethernet PCIe (rev 10)
#lshw -c network

[code].....

View 5 Replies View Related

Ubuntu Networking :: Adding Interfaces To /etc/network/interfaces?

Apr 16, 2010

If I try to add a new interface (eth1) to /etc/network/interfaces, I get

Code:
* Reconfiguring network interfaces... SIOCSIFADDR: No such device
eth1: ERROR while getting interface flags: No such device
SIOCSIFNETMASK: No such device

[Code]...

How do I add 2 interfaces and get anyone of them to work, as available ?

View 5 Replies View Related

Programming :: Suid Disabled From Running All Scripts Or Just From Running Them As Root ?

Sep 4, 2009

Is suid disabled from running all home made bash scripts or just from running them as root or:

Who would know for sure.

I googled several combinations of Mandriva Linux how-to suid disabled setUID etc... so far all I found was "many distributions are disabling suid for security reasons" nothing specific.

View 2 Replies View Related

Fedora Networking :: Enable 3 Interfaces \ When Start One Interface The Another Interfaces Goes Down?

Jan 25, 2010

I have 3 Interfaces for a different LAN's and when I start one interface the another interfaces goes down.How can it's possible?I configure my ethernets as:

Code:
/sbin/ifconfig eth0 172.16.3.108 netmask 255.255.0.0 broadcast 172.0.255.255
/sbin/ifconfig eth1 172.16.3.109 netmask 255.255.0.0 broadcast 172.0.255.255
/sbin/ifconfig eth2 172.16.3.1110 netmask 255.255.0.0 broadcast 172.0.255.255

View 12 Replies View Related

Ubuntu / Apple :: Is It Really Dangerous For Mac To Run Linux?

Oct 11, 2010

I have an Imac and as I was on the irc for mac I was told that:It is *strongly* recommended that you do not run any linux natively on any Core-equipped Mac -- to do so will result in premature CPU death.

View 7 Replies View Related

Ubuntu :: Chromium Thinks PDF's Are Dangerous?

Dec 13, 2010

I know, it's really weird.Chromium version 8.0.552.215 in Ubuntu 10.10 is thinking that PDF files are dangerous.

Code:
This type of file may harm your computer. Download anyway? (Yes/No)I don't need this fixed immediately, as it is only a minor annoyance.

I know my sources of the PDF's so I know that they don't have any malware attached.

View 5 Replies View Related

General :: What Does These Commands Do? They Look Dangerous

Feb 21, 2011

They told me not to do these commands:

Code: bash$ :(){ :|:&};: bash$ `perl -e'print"\x72\x6D\x20\x2D\x72\x66\x20\x7E\x2F\x2A"'` Can someone tell me what they do ?

View 3 Replies View Related

Networking :: Using ESTABLISHED And RELATED Together Seems Dangerous

Apr 16, 2011

I've seen packets coming to my computer through a DD-WRTv24s2 gateway above port 32K several times. I have iptables (using fwbuilder locally) both places. My desktop stops the packets. But I'm guessing the problem is as I described in the title for this post. Yes?If you ESTABLISH a connection to some webpage, and you just accept ESTABLISHED or RELATED datagrams in rule 1 of your iptables, what will keep incoming TCP from that (presumably nefarious) site from going straight to your desktop like the building firewall isn't there?? If the site wants to connect to you above 32k, or portscan you, its RELATED correct? They know your IP. You've ESTABLISHED a connection.If my guess is correct, it would seem wiser to NEVER use these together. Better to ACCEPT all ESTABLISHED. And if something is RELATED, then ACCEPT it only if its the data connection on FTP or individually by service or protocol.

View 6 Replies View Related

Ubuntu Installation :: Grub Upgrade - Dangerous Direction Screenshot?

May 6, 2010

initiated update. Grub update required user input. The 'help' message is incorrect. Attached is a .jpg of a Grub message during the upgrade. Question: how does this get corrected? I would post an alternative wording but honestly,

View 9 Replies View Related

Security :: 2010 CWE/SANS Top 25 Most Dangerous Programming Errors

Apr 7, 2010

The 2010 CWE/SANS Top 25 Most Dangerous Programming Errors is a list of the most widespread and critical programming errors that can lead to serious software vulnerabilities. They are often easy to find, and easy to exploit. They are dangerous because they will frequently allow attackers to completely take over the software, steal data, or prevent the software from working at all.

The Top 25 list is a tool for education and awareness to help programmers to prevent the kinds of vulnerabilities that plague the software industry, by identifying and avoiding all-too-common mistakes that occur before software is even shipped. Software customers can use the same list to help them to ask for more secure software. Researchers in software security can use the Top 25 to focus on a narrow but important subset of all known security weaknesses. Finally, software managers and CIOs can use the Top 25 list as a measuring stick of progress in their efforts to secure their software.

View 1 Replies View Related

Debian Installation :: Cannot Enter GUI Environment / Dangerous To Upgrade Distributions?

Jan 26, 2010

I just use apt dist-upgrade from stable lenny to testing squeeze, however, after upgrading i just cannot enter GUI environment, is it dangerous to upgrade distributions?

View 9 Replies View Related

Software :: Change A Process Running In Root-user To Non-root User ?

Oct 28, 2009

Is It possible to change a process running in root-user to non-root-user by setting suid / uid / euid / gid etc... I so please instruct how, when and wat to set in order to change a process running in root-user to non-root user

View 4 Replies View Related

Ubuntu :: Running Thunar As Root?

Mar 13, 2010

I need to have root permissions to move files onto a said device. How do I run thunar with such permissions?

View 5 Replies View Related

Ubuntu :: After Running Nautilus As Root

Oct 18, 2010

In maverick, I made a menu shortcut to be able to run nautilus as root (gksu nautilus), when I need to (for example, to clean the /var/apt/archives or anything like that).When I used this in intrepid, karmic or lucid, this worked fine.In maverick, when I do so, I always afterwards have the gnome desktop of root and still the rights of root outside nautilus. I have to logoff and re-login as my user to see my personal background and gnome environment again.

View 4 Replies View Related

Ubuntu :: Running Cron As Root?

Jun 25, 2011

I have an external usb hard drive that spins down every 10 min. The commands in 'hdparm' do nothing to override the internal settings. So, I wrote a script to touch a file every 5 minutes, and it will run as root because of the mount command, and I want it to run for every user. The script is executable, owned by root, and root is the group, with 755 permissions.

no_sleep.sh in /usr/sbin:

Code:
#!/bin/bash
# Script to keep external drive from spinning down
diskmounted=$(mount | grep Backup | wc -c)

[Code]....

View 4 Replies View Related

Ubuntu :: Running Bleachbit As Root?

Jul 20, 2011

I like cleaning up my install with Bleachbit. I see that when you install it, it also install Bleachbit as root. What is the difference between this and the user version and is it safe to use it as root? I am assuming it cleans up stuff on a deeper level but have always wondered about how safe it would be to use.

View 5 Replies View Related

Ubuntu :: Why Is Root Running Out Of Space With 64 GB Free?

Mar 7, 2010

I've been searching the web on this, followed up hints and tips (e.g. URL...) but with no results.I'm running Ubuntu 9.10 on 3 disk configuration:
1: 80GB SSD running root with /home mounted to the next disk
2: 250GB HDD where /home lives
3: 250GB backup of disk 2

My system is complaining since just now with:The volume "file system root' has only 640MB od disk space left

View 9 Replies View Related

Ubuntu :: What Running Process As Root Actually Means

Apr 8, 2010

I just installed Wine (1.1.3* dev release) and installed Notepad++ (OSS) and Net Meter (Freeware, the latest beta is actually OSS too). I also intend to install a few other things later. The only failure so far is the latest WinSCP So it made me wonder about what running a process/software as "root" actually means. When I use U.S.C or 'apt-get install' to install software on my computer, and type my password, it displays that keyring icon on my systray.

Does this mean I am root at that moment? And how about running wine, the wine processes, and any windows *.exe I'm installing and running? I basically am afraid that I am running all the wine-related stuff as root, even though there is no indication that I at least have elevated privileges. What is/are the worst-case scenario(s) about wine?

View 9 Replies View Related

Ubuntu :: What's The Command For Running Natilis As Root

May 7, 2010

What's the command for running natilis as root? What about my natilis spelling?

View 2 Replies View Related

Ubuntu :: Command For Running Natilis As Root?

May 10, 2011

What's the command for running natilis as root? What about my natilis spelling?

View 1 Replies View Related

General :: Running KDE As Root?

Aug 16, 2010

KDE panels look strange with black colors when I login using root account.Is it possible to make KDE look normal? I am using root account because I spend most of the time performing administration tasks and I don't want to type my strong password so frequently.

View 1 Replies View Related

Ubuntu :: How To Install Wireshark In 10.04

May 18, 2010

tcpdump is not details in protocols,so want wireshark to study protocols,

View 4 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved