this post was submitted on 13 Apr 2024
459 points (97.3% liked)

Technology

34975 readers
123 users here now

This is the official technology community of Lemmy.ml for all news related to creation and use of technology, and to facilitate civil, meaningful discussion around it.


Ask in DM before posting product reviews or ads. All such posts otherwise are subject to removal.


Rules:

1: All Lemmy rules apply

2: Do not post low effort posts

3: NEVER post naziped*gore stuff

4: Always post article URLs or their archived version URLs as sources, NOT screenshots. Help the blind users.

5: personal rants of Big Tech CEOs like Elon Musk are unwelcome (does not include posts about their companies affecting wide range of people)

6: no advertisement posts unless verified as legitimate and non-exploitative/non-consumerist

7: crypto related posts, unless essential, are disallowed

founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] Umbrias@beehaw.org 0 points 7 months ago (1 children)

I don't think it really matters whether a potential adversary has a 'head start' all that much, security through obscurity doesn't work super well when it's going to be deployed to thousands of easily accessible devices anyway. It'd only just be a defense in depth, but even then meh. But it's neither here nor there, they'll do it whatever way they feel is best.

[–] Zuberi@lemmy.dbzer0.com 1 points 7 months ago (1 children)

Basically all of social engineering is to get exactly what you're talking about, a "head start"

Go to their LinkedIn: does the head engineer have MySQL version X on his skills, resume, job description, etc? Maybe somebody even endorsed them for it? "Wow they are THE best database administrator"

Now you know who you need to hack for their database access AND what zero days to research.

ANY info will be an attack vector

[–] Umbrias@beehaw.org 0 points 7 months ago* (last edited 7 months ago)

Social engineering is to gain access circumventing downcode, not really "get a head start"...

Most attacks are entirely social engineering. You're not breaking into secure databases by pulling ridiculous zero day backdoors when it's much easier to convince an intern to download a file or give you access directly. These super involved attacks are state actors, and no amount of trying to hide what Linux version is being modified will do anything for you there.

State actors of course also use social engineering

Ultimately the point is hacking really doesn't involve the kind of subterfuge you're describing here in a way where " what Linux is it " matters at all. I mean, windows is used for secure systems across the world, it's hardly secretive.