Quote:
Originally Posted by rashkae
If you can trick a Linux user to run a linux binary, or even just a script, with malicious intent, there is *nothing* even warning you of the worst possible damage. And while everyone is always focusing of privilege escalation, it's laughable how minor an issue that is for an adversary targeting the user.
|
That's the thing, though. You have to trick a user into running a binary or a script with Linux. If I'm on a website and I'm asked for permission to run an unknown program or script, I'm not going to provide it. I can't imagine why anyone would.