<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Linux Security Archives - CVTF Studios.net</title>
	<atom:link href="https://cvtfstudios.net/category/linux-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://cvtfstudios.net/category/linux-security/</link>
	<description>Webhosting in the city</description>
	<lastBuildDate>Wed, 30 Jun 2021 12:16:52 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Let&#8217;s Encrypt Revoking 3 Million TLS Certificates</title>
		<link>https://cvtfstudios.net/lets-encrypt-revoking-3-million-tls-certificates/</link>
					<comments>https://cvtfstudios.net/lets-encrypt-revoking-3-million-tls-certificates/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 04 Mar 2020 12:55:35 +0000</pubDate>
				<category><![CDATA[IT Industry]]></category>
		<category><![CDATA[Linux Security]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Web Security]]></category>
		<guid isPermaLink="false">https://cvtfstudios.net/?p=68248</guid>

					<description><![CDATA[<p>The most popular free certificate signing authority Let's Encrypt is going to revoke more than 3 million TLS certificates within the next 24 hours that may have been issued wrongfully due to a bug in its Certificate Authority software. The bug, which Let's Encrypt confirmed on February 29 and was fixed two hours after discovery,  [...]</p>
<p>The post <a href="https://cvtfstudios.net/lets-encrypt-revoking-3-million-tls-certificates/">Let&#8217;s Encrypt Revoking 3 Million TLS Certificates</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div dir="ltr">
<p>The most popular free certificate signing authority <b>Let&#8217;s Encrypt</b> is going to revoke more than 3 million TLS certificates within the next 24 hours that may have been issued wrongfully due to a bug in its Certificate Authority software.</p>
<p>The bug, which Let&#8217;s Encrypt <a href="https://community.letsencrypt.org/t/2020-02-29-caa-rechecking-bug/114591" target="_blank" rel="noopener noreferrer">confirmed</a> on February 29 and was fixed two hours after discovery, impacted the way it checked the domain name ownership before issuing new TLS certificates.</p>
<p>As a result, the bug opened up a scenario where a certificate could be issued even without adequately validating the holder&#8217;s control of a domain name.</p>
<p>The <a href="https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization" target="_blank" rel="noopener noreferrer">Certification Authority Authorization</a> (CAA), an internet security policy, allows domain name holders to indicate to certificate authorities (CAs) whether or not they are authorized to issue digital certificates for a specific domain name.</p>
<div class="ad_two clear"></div>
<p>Let&#8217;s Encrypt considers domain validation results good only for 30 days from the time of validation, after which it rechecks the CAA record authorizing that domain before issuing the certificate. The bug — which was uncovered in the code for Boulder, the certificate signing software used by Let&#8217;s Encrypt — is as follows:</p>
<blockquote class="tr_bq"><p>&#8220;When a certificate request contained N domain names that needed CAA rechecking, Boulder would pick one domain name and check it N times.&#8221; In other words, when Boulder needed to parse, for example, a group of 5 domains names that required CAA rechecking, it would check one domain name 5 times as opposed to checking each of the 5 domains once.</p></blockquote>
<p>The company said the bug was introduced as part of an update back in July 2019.</p>
<p>This means that Let&#8217;s Encrypt might have issued certificates that it shouldn&#8217;t have in the first place, as a result of which it&#8217;s revoking all the TLS certificates that were affected by the bug.</p>
<p>The development comes as Let&#8217;s Encrypt project announced last week that it had issued its <a href="https://thehackernews.com/2020/02/lets-encrypt-ssl-certificate.html" target="_blank" rel="noopener noreferrer">one-billionth free TLS certificate</a> since its launch in 2015.</p>
<div class="separator"><a href="https://1.bp.blogspot.com/-D-UMK4IH20Q/Xl-IC-yQ2DI/AAAAAAAAADg/GLU_4BTJEE8zZ7NOq6a6aSQmIn0QMo27ACLcBGAsYHQ/s728-e100/ssl-error.png"><img decoding="async" title="SSL error page" src="https://1.bp.blogspot.com/-D-UMK4IH20Q/Xl-IC-yQ2DI/AAAAAAAAADg/GLU_4BTJEE8zZ7NOq6a6aSQmIn0QMo27ACLcBGAsYHQ/s728-e100/ssl-error.png" alt="SSL error page" border="0" data-original-height="563" data-original-width="728" /></a></div>
<p>Let&#8217;s Encrypt said <a href="https://community.letsencrypt.org/t/revoking-certain-certificates-on-march-4/114864/" target="_blank" rel="noopener noreferrer">2.6 percent</a> of approximately 116 million active certificates are affected — about 3,048,289 — out of which about one million are duplicates of other affected certificates.</p>
<div class="ad_two clear"></div>
<p>Affected website owners have until 8PM UTC (3PM EST) March 4 to <a href="https://certbot.eff.org/docs/using.html?highlight=renew#renewing-certificates" target="_blank" rel="noopener noreferrer">manually renew and replace their certificates</a>, failing which visitors to the websites will be greeted with <b>TLS security warnings</b> — as the certificates are revoked — until the renewal process is complete.</p>
<p>It&#8217;s worth noting that the certificates issued by Let&#8217;s Encrypt are valid for a period of 90 days, and ACME clients such as Certbot are capable of automatically renewing them.</p>
<p>But with Let&#8217;s Encrypt revoking all impacted certificates, website admins will have to perform a forced renewal to prevent any interruptions.</p>
<p>Besides using the tool <a href="https://checkhost.unboundtest.com/">https://checkhost.unboundtest.com/</a> to check if a certificate needs replacement, Let&#8217;s Encrypt has put together a <a href="https://letsencrypt.org/caaproblem/" target="_blank" rel="noopener noreferrer">downloadable list of affected serial numbers</a>, allowing subscribers to check if their websites rely on an affected certificate.</p>
</div>
<p>&nbsp;</p>
<div class="cf note-b">Have something to say about this article? Comment below or share it with us on <a href="https://www.facebook.com/thehackernews" target="_blank" rel="noopener noreferrer">Facebook</a>, <a href="https://twitter.com/thehackersnews" target="_blank" rel="noopener noreferrer">Twitter</a> or our <a href="https://www.linkedin.com/company/thehackernews/" target="_blank" rel="noopener noreferrer">LinkedIn Group</a>.</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Flets-encrypt-revoking-3-million-tls-certificates%2F&amp;linkname=Let%E2%80%99s%20Encrypt%20Revoking%203%20Million%20TLS%20Certificates" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Flets-encrypt-revoking-3-million-tls-certificates%2F&amp;linkname=Let%E2%80%99s%20Encrypt%20Revoking%203%20Million%20TLS%20Certificates" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Flets-encrypt-revoking-3-million-tls-certificates%2F&amp;linkname=Let%E2%80%99s%20Encrypt%20Revoking%203%20Million%20TLS%20Certificates" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Flets-encrypt-revoking-3-million-tls-certificates%2F&amp;linkname=Let%E2%80%99s%20Encrypt%20Revoking%203%20Million%20TLS%20Certificates" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Flets-encrypt-revoking-3-million-tls-certificates%2F&amp;linkname=Let%E2%80%99s%20Encrypt%20Revoking%203%20Million%20TLS%20Certificates" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Flets-encrypt-revoking-3-million-tls-certificates%2F&amp;linkname=Let%E2%80%99s%20Encrypt%20Revoking%203%20Million%20TLS%20Certificates" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Flets-encrypt-revoking-3-million-tls-certificates%2F&#038;title=Let%E2%80%99s%20Encrypt%20Revoking%203%20Million%20TLS%20Certificates" data-a2a-url="https://cvtfstudios.net/lets-encrypt-revoking-3-million-tls-certificates/" data-a2a-title="Let’s Encrypt Revoking 3 Million TLS Certificates"></a></p><p>The post <a href="https://cvtfstudios.net/lets-encrypt-revoking-3-million-tls-certificates/">Let&#8217;s Encrypt Revoking 3 Million TLS Certificates</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/lets-encrypt-revoking-3-million-tls-certificates/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>15000 compromised servers</title>
		<link>https://cvtfstudios.net/15000-compromised-servers-used-mine-various-cryptocurrencies/</link>
					<comments>https://cvtfstudios.net/15000-compromised-servers-used-mine-various-cryptocurrencies/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 04 Jan 2018 17:56:38 +0000</pubDate>
				<category><![CDATA[IT Industry]]></category>
		<category><![CDATA[Linux Security]]></category>
		<category><![CDATA[Virus and spyware cleaning services]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Botnets]]></category>
		<guid isPermaLink="false">https://cvtfstudios.net/?p=3546</guid>

					<description><![CDATA[<p>Swati Khandelwal Technical Writer, Security Blogger and IT Analyst. She is a Technology Enthusiast with a keen eye on the Cyberspace and other tech related developments. Link: https://thehackernews.com/2017/05/cryptocurrency-mining-botnet.html     A new botnet consisting of more than 15,000 compromised servers has been used to mine various cryptocurrencies, earning  [...]</p>
<p>The post <a href="https://cvtfstudios.net/15000-compromised-servers-used-mine-various-cryptocurrencies/">15000 compromised servers</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:1352px;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-image-element " style="text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);"><span class=" fusion-imageframe imageframe-none imageframe-1 hover-type-zoomin"><img fetchpriority="high" decoding="async" width="745" height="425" title="heatmap of BotNets around the globe" src="https://cvtfstudios.net/wp-content/uploads/2018/01/heatmap-of-BotNets-around-the-globe.png" alt class="img-responsive wp-image-3547" srcset="https://cvtfstudios.net/wp-content/uploads/2018/01/heatmap-of-BotNets-around-the-globe-300x171.png 300w, https://cvtfstudios.net/wp-content/uploads/2018/01/heatmap-of-BotNets-around-the-globe-500x285.png 500w, https://cvtfstudios.net/wp-content/uploads/2018/01/heatmap-of-BotNets-around-the-globe-700x399.png 700w, https://cvtfstudios.net/wp-content/uploads/2018/01/heatmap-of-BotNets-around-the-globe.png 745w" sizes="(max-width: 745px) 100vw, 745px" /></span></div><div class="fusion-section-separator section-separator triangle fusion-section-separator-1" style="--awb-border-top:1px solid rgba(237,238,242,0);--awb-spacer-height:1px;--awb-svg-margin-left:1.92%;--awb-svg-margin-right:1.92%;--awb-svg-margin-left-medium:1.92%;--awb-svg-margin-right-medium:1.92%;--awb-svg-margin-left-small:1.92%;--awb-svg-margin-right-small:1.92%;--awb-icon-color:;"><div class="fusion-section-separator-svg"><div class="divider-candy-arrow top" style="bottom:0px;border-bottom-color: rgba(244,246,247,0);"></div><div class="divider-candy top" style="top:-21px;border-bottom:1px solid rgba(237,238,242,0);border-left:1px solid rgba(237,238,242,0);"></div></div><div class="fusion-section-separator-spacer"><div class="fusion-section-separator-spacer-height"></div></div></div></div></div><div class="fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_3 1_3 fusion-flex-column" style="--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:5.76%;--awb-width-medium:33.333333333333%;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:5.76%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-text fusion-text-1"><div id="aim1915063168749987277">
<div dir="ltr">
<address class="author-info clear">
<div class="author-info-pic">
<figure class="author-img"><img decoding="async" class="alignright" src="https://3.bp.blogspot.com/-HtAkqjuOK1M/Wezp-pHtRiI/AAAAAAAAufA/OgZyPFEhy3YVeSE_5PIgaohtPJefgyUowCLcBGAs/s1600/swati-khandelwal-hackernews.png" alt="Swati - Hacking News" width="125" height="125" /></figure>
</div>
<div class="author-info-bio"></div>
</address>
</div>
<div dir="ltr"></div>
<div dir="ltr"></div>
</div>
</div></div></div><div class="fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_2 1_2 fusion-flex-column" style="--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-text fusion-text-2"><div id="aim1915063168749987277">
<div dir="ltr">
<address class="author-info clear">
<div class="author-info-bio">
<div style="text-align: left;"><a class="authors" href="https://twitter.com/Swati_THN" rel="author"><span class="author-name"><strong>Swati Khandelwal</strong></span></a></div>
<div class="author-bio" style="text-align: left;">Technical Writer, Security Blogger and IT Analyst.</div>
<div class="author-bio" style="text-align: left;">She is a Technology Enthusiast with a keen eye on the Cyberspace and other tech related developments.</div>
<div style="text-align: left;">Link: https://thehackernews.com/2017/05/cryptocurrency-mining-botnet.html</div>
</div>
<div></div>
</address>
</div>
<div dir="ltr"></div>
<div dir="ltr"></div>
</div>
</div></div></div></div></div><div class="fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="max-width:calc( 1300px + 0px );margin-left: calc(-0px / 2 );margin-right: calc(-0px / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-text fusion-text-3"><div id="aim1915063168749987277">
<div dir="ltr">
<p>A new botnet consisting of more than 15,000 compromised servers has been used to mine various cryptocurrencies, earning its master around $25,000 per month.</p>
<p>Mining cryptocurrencies can be a costly investment, as it requires an enormous amount of computing power, but cybercriminals have found an easy money-making solution.</p>
<p>Dubbed BondNet, the botnet was first <a href="https://www.guardicore.com/2017/05/the-bondnet-army/" target="_blank" rel="nofollow noopener noreferrer">spotted</a> in December 2016 by GuardiCore researchers, who traced back the botnet malware developer, using online handle Bond007.01, to China.</p>
</div>
</div>
<div id="aim2915063168749987277">According to the GuardiCore researchers, Bond007.01 is currently using BondNet for mining cryptocurrencies</div>
<div>— primarily Monero, but also ByteCoin, RieCoin, and ZCash</div>
<div>— but they warn that the hacker could easily take full control of compromised servers for malicious purposes, like mounting <a href="https://thehackernews.com/2016/10/ddos-attack-mirai-iot.html" target="_blank" rel="noopener noreferrer">Mirai-style DDoS</a> attacks.</div>
<h3>BondNet&#8217;s Botnet Infrastructure</h3>
<p><span class="main-article-info">One thing that&#8217;s worth noticing is that the botnet operator does not use all infected machines for mining cryptocurrencies. The operator has built its botnet infrastructure of compromised servers with various roles:</span></p>
<p><span class="main-article-info"><b>1. </b>Some infected machines serve as scanning servers to check for vulnerable systems on the Internet by going through a list of IP addresses with open ports that have been compiled with the WinEggDrop TCP port scanner.</span></p>
<p><b>2. </b>Some servers are used as file servers to host the mining software.</p>
<p><b>3. </b>Other infected servers are turned into command-and-control (C&amp;C) servers after they have been equipped with a fork of <a href="https://github.com/dAnjou/goup" target="_blank" rel="nofollow noopener noreferrer">goup</a> — a small open source HTTP server written in Golang.</p>
<blockquote class="tr_bq">
<p>&#8220;Building an attack infrastructure on top of victim machines helps conceal the attacker’s true identity and origin of the attack,&#8221; the GuardiCore researchers explained in their report published Thursday.</p>
</blockquote>
<blockquote class="tr_bq">
<p>&#8220;It also provides high availability infrastructure, which is very helpful when relying on compromised servers, providing infinite backup options in case one of the servers fails or loses connectivity to the internet.&#8221;</p>
</blockquote>
<p><span class="main-article-info">BondNet has already infected more than 15,000 server machines at major institutions around the world, including high-profile global companies, universities, and city councils, while the majority of them runs Windows Server 2008 R2.</span></p>
<p>Additionally, the BondNet botnet adds around 500 new machines to its network each day, and an approximately the same number of servers are delisted.</p>
<h3>Here&#8217;s How to Detect the Threat and How to Mitigate:</h3>
<p><span class="main-article-info"><br />
To prevent your machines from getting hacked, server admins are advised to secure their systems by regularly applying security patches for all software, updating the firmware, and employing stronger passwords.</span></p>
<p>Meanwhile, GuardiCore has also provided <a href="https://www.guardicore.com/2017/05/the-bondnet-army/#network-IOC" target="_blank" rel="nofollow noopener noreferrer">network and file indicators</a> of compromise systems to help server administrators check whether their machines are among compromised ones.</p>
<p>The researchers have also released a <a href="https://www.guardicore.com/2017/05/the-bondnet-army/#cleanup-tool" target="_blank" rel="nofollow noopener noreferrer">detection &amp; cleanup tool</a> (registration is required to download it) to help admins find and remove BondNet bots from their servers, as well as instructions on how to clean the system manually, without using the script.</p>
</div></div></div></div></div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2F15000-compromised-servers-used-mine-various-cryptocurrencies%2F&amp;linkname=15000%20compromised%20servers" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2F15000-compromised-servers-used-mine-various-cryptocurrencies%2F&amp;linkname=15000%20compromised%20servers" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2F15000-compromised-servers-used-mine-various-cryptocurrencies%2F&amp;linkname=15000%20compromised%20servers" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2F15000-compromised-servers-used-mine-various-cryptocurrencies%2F&amp;linkname=15000%20compromised%20servers" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2F15000-compromised-servers-used-mine-various-cryptocurrencies%2F&amp;linkname=15000%20compromised%20servers" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2F15000-compromised-servers-used-mine-various-cryptocurrencies%2F&amp;linkname=15000%20compromised%20servers" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2F15000-compromised-servers-used-mine-various-cryptocurrencies%2F&#038;title=15000%20compromised%20servers" data-a2a-url="https://cvtfstudios.net/15000-compromised-servers-used-mine-various-cryptocurrencies/" data-a2a-title="15000 compromised servers"></a></p><p>The post <a href="https://cvtfstudios.net/15000-compromised-servers-used-mine-various-cryptocurrencies/">15000 compromised servers</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/15000-compromised-servers-used-mine-various-cryptocurrencies/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is the best Linux Distributions for Hacking and Penetration Testing in 2016</title>
		<link>https://cvtfstudios.net/best-linux-distributions-hacking-penetration-testing-2016/</link>
					<comments>https://cvtfstudios.net/best-linux-distributions-hacking-penetration-testing-2016/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 02 Aug 2016 21:09:04 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[Linux Security]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Linux Distributions for Hacking and Penetration Testing]]></category>
		<guid isPermaLink="false">http://cvtfstudios.net/?p=3441</guid>

					<description><![CDATA[<p>Last updated August 1, 2016 By Munif Tanjim- https://itsfoss.com Looking for best Linux to learn hacking? Whether you want to pursue a career in Information Security or you are already working as a security professional or if you are just interested in this specific field of knowledge, a decent Linux distro that suits your purpose  [...]</p>
<p>The post <a href="https://cvtfstudios.net/best-linux-distributions-hacking-penetration-testing-2016/">What is the best Linux Distributions for Hacking and Penetration Testing in 2016</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h6><img decoding="async" class="alignnone wp-image-3447" src="https://cvtfstudios.net/wp-content/uploads/2016/08/kali-wp-june-2014_1920x1200_F-1024x640.png" alt="kali-wp-june-2014_1920x1200_F" width="806" height="504" srcset="https://cvtfstudios.net/wp-content/uploads/2016/08/kali-wp-june-2014_1920x1200_F-300x188.png 300w, https://cvtfstudios.net/wp-content/uploads/2016/08/kali-wp-june-2014_1920x1200_F-500x313.png 500w, https://cvtfstudios.net/wp-content/uploads/2016/08/kali-wp-june-2014_1920x1200_F-700x438.png 700w, https://cvtfstudios.net/wp-content/uploads/2016/08/kali-wp-june-2014_1920x1200_F-1024x640.png 1024w, https://cvtfstudios.net/wp-content/uploads/2016/08/kali-wp-june-2014_1920x1200_F.png 1920w" sizes="(max-width: 806px) 100vw, 806px" /></h6>
<h6>Last updated <time class="entry-modified-time" datetime="2016-08-01T20:42:41+00:00">August 1, 2016</time> By <span class="entry-author"><a class="entry-author-link" href="https://itsfoss.com/author/munif/" rel="author"><span class="entry-author-name">Munif Tanjim</span></a></span>&#8211; <a href="https://itsfoss.com/linux-hacking-penetration-testing/?utm_source=newsletter&amp;utm_medium=email&amp;utm_campaign=linux_and_open_source_stories_this_week">https://itsfoss.com</a></h6>
<p>Looking for <strong>best Linux to learn hacking</strong>?</p>
<p>Whether you want to pursue a career in Information Security or you are already working as a security professional or if you are just interested in this specific field of knowledge, a decent Linux distro that suits your purpose is a must.</p>
<p>There are countless Linux distros for various purposes. Some are designed for specific tasks in mind and others are for different interfaces.</p>
<p>We have seen <a href="https://itsfoss.com/weird-ubuntu-based-linux-distributions/" target="_blank" rel="noopener">weird Ubuntu distributions</a> in an older article. But, today we are going to have a look at a list of some of the <em><strong>best Linux distro to learn hacking</strong> and Penetration Testing</em>.</p>
<p>Before we see the best Linux distros for hackers, I would recommend you to check for <a href="https://shop.itsfoss.com/search?utf8=%E2%9C%93&amp;query=hacking+course" target="_blank" rel="noopener">online hacking courses at our ITSFOSS shop</a>.</p>
<h2>Best Linux hacking distros in 2016</h2>
<p>I have basically listed out various Linux distributions focusing on security. These Linux distros provide various tools that are needed for assessing networking security and other similar tasks. List is in no particular order.</p>
<h3><a class="external external_icon" href="https://www.kali.org/" target="_blank" rel="nofollow noopener">Kali Linux</a></h3>
<p>Kali Linux is the most widely known Linux distro for ethical hacking and penetration testing. Kali Linux was developed by Offensive Security taking on the mantle of <a class="external external_icon" href="https://www.backtrack-linux.org/" target="_blank" rel="nofollow noopener">BackTrack</a>.</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fbest-linux-distributions-hacking-penetration-testing-2016%2F&amp;linkname=What%20is%20the%20best%20Linux%20Distributions%20for%20Hacking%20and%20Penetration%20Testing%20in%202016" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fbest-linux-distributions-hacking-penetration-testing-2016%2F&amp;linkname=What%20is%20the%20best%20Linux%20Distributions%20for%20Hacking%20and%20Penetration%20Testing%20in%202016" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fbest-linux-distributions-hacking-penetration-testing-2016%2F&amp;linkname=What%20is%20the%20best%20Linux%20Distributions%20for%20Hacking%20and%20Penetration%20Testing%20in%202016" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fbest-linux-distributions-hacking-penetration-testing-2016%2F&amp;linkname=What%20is%20the%20best%20Linux%20Distributions%20for%20Hacking%20and%20Penetration%20Testing%20in%202016" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fbest-linux-distributions-hacking-penetration-testing-2016%2F&amp;linkname=What%20is%20the%20best%20Linux%20Distributions%20for%20Hacking%20and%20Penetration%20Testing%20in%202016" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fbest-linux-distributions-hacking-penetration-testing-2016%2F&amp;linkname=What%20is%20the%20best%20Linux%20Distributions%20for%20Hacking%20and%20Penetration%20Testing%20in%202016" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Fbest-linux-distributions-hacking-penetration-testing-2016%2F&#038;title=What%20is%20the%20best%20Linux%20Distributions%20for%20Hacking%20and%20Penetration%20Testing%20in%202016" data-a2a-url="https://cvtfstudios.net/best-linux-distributions-hacking-penetration-testing-2016/" data-a2a-title="What is the best Linux Distributions for Hacking and Penetration Testing in 2016"></a></p><p>The post <a href="https://cvtfstudios.net/best-linux-distributions-hacking-penetration-testing-2016/">What is the best Linux Distributions for Hacking and Penetration Testing in 2016</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/best-linux-distributions-hacking-penetration-testing-2016/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fortinet SSH Backdoor Found In Firewalls</title>
		<link>https://cvtfstudios.net/3399-2/</link>
					<comments>https://cvtfstudios.net/3399-2/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 21 Apr 2016 12:35:29 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[Linux Security]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[Fortinet SSH Backdoor Found In Firewalls]]></category>
		<guid isPermaLink="false">http://cvtfstudios.net/?p=3399</guid>

					<description><![CDATA[<p>    January 14, 2016 So the Fortinet SSH Backdoor, apparently it’s just a management authentication issue. Sorry, what’s that? It looks like a passphrase based admin level access login via SSH to me personally. Which is scary. They are adamantly shouting from rooftops that it was not planted by a 3rd party (NSA? Like  [...]</p>
<p>The post <a href="https://cvtfstudios.net/3399-2/">Fortinet SSH Backdoor Found In Firewalls</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="post-meta"><abbr class="date time published updated" title="2016-01-14T01:55:11+0800"> </abbr></div>
<section class="entry">
<p align="center"><img decoding="async" class="aligncenter" src="https://c2.staticflickr.com/2/1720/24332701546_d394b9b905.jpg" alt="Fortinet SSH Backdoor Found In Firewalls" /></p>
<p>&nbsp;</p>
<p><abbr class="date time published updated" title="2016-01-14T01:55:11+0800">January 14, 2016</abbr></p>
<p>So the Fortinet SSH Backdoor, apparently it’s just a management authentication issue. Sorry, what’s that? It looks like a passphrase based admin level access login via SSH to me personally.</p>
<p>Which is scary.</p>
<p>They are adamantly shouting from rooftops that it was not planted by a 3rd party (<a href="https://www.schneier.com/blog/archives/2015/12/back_door_in_ju.html">NSA? Like Juniper</a>..) or any kind of malicious activity.</p>
<blockquote><p>Enterprise security vendor Fortinet has attempted to explain why its FortiOS firewalls were shipped with hardcoded SSH logins.</p>
<p>It appears Fortinet’s engineers implemented their own method of authentication for logging-into FortiOS-powered devices, and the mechanism ultimately uses a secret passphrase. This code was reverse-engineered by persons unknown, and a Python script to exploit the hole emerged on the Full Disclosure mailing list this week.</p>
<p>Anyone who uses this script against vulnerable firewalls will gain administrator-level command-line access to the equipment. After some outcry on Twitter and beyond, Fortinet responded by saying it has already killed off the dodgy login system.</p>
<p>“This issue was resolved and a patch was made available in July 2014 as part of Fortinet’s commitment to ensuring the quality and integrity of our codebase,” a spokeswoman told El Reg.</p>
<p>“This was not a ‘backdoor’ vulnerability issue but rather a management authentication issue. The issue was identified by our product security team as part of their regular review and testing efforts. After careful analysis and investigation, we were able to verify this issue was not due to any malicious activity by any party, internal or external.”</p>
<p>In a security advisory dated today, Fortinet explained that the issue affects FortiOS versions 4.3.0 to 4.3.16 and 5.0.0 to 5.0.7. This covers FortiOS builds from between November 2012 and July 2014, and it’s certainly possible that some slack IT admins haven’t updated the software since then.</p></blockquote>
<div align="center"></div>
<p>It was actually patched by Fortinet in July 2014, but with edge devices like Firewalls – they don’t often get updated as it usually causes network downtime. So I’d guess there are plenty of firewalls out there very vulnerable to this, which basically gives you full admin access.</p>
<p>You can find the ‘exploit’ script in Python here: <a href="https://seclists.org/fulldisclosure/2016/Jan/26">SSH Backdoor for FortiGate OS Version 4.x up to 5.0.7</a></p>
<blockquote><p>It’s also possible that even if they did update in a timely fashion, their devices could have been breached before the fix was issued.</p>
<p>The login method is used by FortiManager, a tool for controlling any number of Fortinet devices from a central system.</p>
<p>If you are running older code and can’t upgrade, the firewall maker suggests a couple of workarounds. Managers can disable admin access via SSH and use the web interface instead, or the console browser applet for command-line access. If you really need SSH access, then version 5.x can restrict access to SSH to a minimal set of authorized IP addresses.</p>
<p>Whether you call it a backdoor or a “management authentication issue,” it’s still a pretty major issue for some sysadmins, and they are unlikely to be happy about the news.</p>
<p>One significant part of Fortinet’s statement was the assertion that this didn’t come from an external party. Ever since the Juniper backdooring security vendors have been at pains to avoid any suggestion that they are allowing intelligence agencies access to their products.</p>
<p>In the meantime, if you are using FortiOS then make sure the fimrware is up to date. The news of this hole will have the malicious hacking community aflutter and many are no doubt already scanning for vulnerable targets.</p></blockquote>
<p>There are some work arounds, what I’d personally like to see though is more transparency about the process and decisions made that led to this code being on production firewalls. How does this even happen?</p>
<p>And how did they only find it during scheduled review and testing? What kind of testing/QA/CI process do they have?</p>
<p>It all sounds rather fishy to me.</p>
<p>Source: <a href="https://www.theregister.co.uk/2016/01/12/fortinet_bakdoor/">The Register</a></p>
</section>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2F3399-2%2F&amp;linkname=Fortinet%20SSH%20Backdoor%20Found%20In%20Firewalls" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2F3399-2%2F&amp;linkname=Fortinet%20SSH%20Backdoor%20Found%20In%20Firewalls" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2F3399-2%2F&amp;linkname=Fortinet%20SSH%20Backdoor%20Found%20In%20Firewalls" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2F3399-2%2F&amp;linkname=Fortinet%20SSH%20Backdoor%20Found%20In%20Firewalls" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2F3399-2%2F&amp;linkname=Fortinet%20SSH%20Backdoor%20Found%20In%20Firewalls" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2F3399-2%2F&amp;linkname=Fortinet%20SSH%20Backdoor%20Found%20In%20Firewalls" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2F3399-2%2F&#038;title=Fortinet%20SSH%20Backdoor%20Found%20In%20Firewalls" data-a2a-url="https://cvtfstudios.net/3399-2/" data-a2a-title="Fortinet SSH Backdoor Found In Firewalls"></a></p><p>The post <a href="https://cvtfstudios.net/3399-2/">Fortinet SSH Backdoor Found In Firewalls</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/3399-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Use SSH Pipes on Linux</title>
		<link>https://cvtfstudios.net/use-ssh-pipes-linux/</link>
					<comments>https://cvtfstudios.net/use-ssh-pipes-linux/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sun, 20 Mar 2016 13:35:02 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[Linux Security]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Design]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[SSH Pipes on Linux]]></category>
		<guid isPermaLink="false">http://cvtfstudios.net/?p=3319</guid>

					<description><![CDATA[<p>Like most commands on Linux, SSH can be used with input/output redirection via |Unix Pipe. SSH can be used with this pipeline too. The basic concept here is understanding how the Unix pipeline works. When you understand the way pipes work, you can get seriously creative. This article covers what happens when you combine Unix  [...]</p>
<p>The post <a href="https://cvtfstudios.net/use-ssh-pipes-linux/">How to Use SSH Pipes on Linux</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="aligncenter size-large wp-image-70749" src="https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-1024x830.png" alt="" width="1024" height="830" srcset="https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-177x142.png 177w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-200x162.png 200w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-300x243.png 300w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-400x324.png 400w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-500x406.png 500w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-600x487.png 600w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-700x568.png 700w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-800x649.png 800w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-1024x830.png 1024w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy-1200x973.png 1200w, https://cvtfstudios.net/wp-content/uploads/2016/03/SSH-with-Secure-Pipes-macOS-Perfect-Privacy.png 1344w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p>Like most commands on Linux, SSH can be used with input/output redirection via <code>|</code>Unix Pipe. SSH can be used with this pipeline too. The basic concept here is understanding how the Unix pipeline works.<br />
When you understand the way pipes work, you can get seriously creative. This article covers what happens when you combine Unix pipes and SSH. It should be noted that since Unix pipes can be just about anything, there are no doubt going to be commands not on this list would also be useful.</p>
<h2 class="nolinks">Understanding the Unix Pipeline</h2>
<p>Pipes on Unix (and by extension, Linux) are used to chain programs together and make them work together. For example, using <code>cat</code>, you can show the contents of a file, but if you used a pipe, you could chain the <code>cat</code> command to the <code>more</code> command to make the file easier to read through.</p>
<div class="holsh-div">
<div class="bash">
<pre>cat file1 | more</pre>
</div>
</div>
<p>&nbsp;</p>
<p>The basic idea here is this: <code>program1 fileX | program2</code>. It’s not just limited to one file and two programs, though. Piping can get about as advanced as you need it to be with as many modifiers as you can think of.</p>
<p><strong>Note:</strong> Some types of pipes can be done without using the <code>|</code>. Some may use <code>&gt;</code> instead.</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fuse-ssh-pipes-linux%2F&amp;linkname=How%20to%20Use%20SSH%20Pipes%20on%20Linux" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fuse-ssh-pipes-linux%2F&amp;linkname=How%20to%20Use%20SSH%20Pipes%20on%20Linux" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fuse-ssh-pipes-linux%2F&amp;linkname=How%20to%20Use%20SSH%20Pipes%20on%20Linux" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fuse-ssh-pipes-linux%2F&amp;linkname=How%20to%20Use%20SSH%20Pipes%20on%20Linux" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fuse-ssh-pipes-linux%2F&amp;linkname=How%20to%20Use%20SSH%20Pipes%20on%20Linux" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fuse-ssh-pipes-linux%2F&amp;linkname=How%20to%20Use%20SSH%20Pipes%20on%20Linux" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Fuse-ssh-pipes-linux%2F&#038;title=How%20to%20Use%20SSH%20Pipes%20on%20Linux" data-a2a-url="https://cvtfstudios.net/use-ssh-pipes-linux/" data-a2a-title="How to Use SSH Pipes on Linux"></a></p><p>The post <a href="https://cvtfstudios.net/use-ssh-pipes-linux/">How to Use SSH Pipes on Linux</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/use-ssh-pipes-linux/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to upgrade to SSL certificates from SHA1 to SHA2</title>
		<link>https://cvtfstudios.net/upgrade-to-ssl-certificates-from-sha1-to-sha2/</link>
					<comments>https://cvtfstudios.net/upgrade-to-ssl-certificates-from-sha1-to-sha2/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 03 Oct 2014 09:46:48 +0000</pubDate>
				<category><![CDATA[IT Industry]]></category>
		<category><![CDATA[Linux Security]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Web Security]]></category>
		<category><![CDATA[How to upgrade to SSL certificates from SHA1 to SHA2]]></category>
		<guid isPermaLink="false">http://spotlight.themerex.net/?p=1795</guid>

					<description><![CDATA[<p>With Chrome version 39 which is in the process of being released (see footnote), Google has started issuing warnings if a website is using a certificate that has a signature algorithm that uses the older and less secure SHA1. To find out which signature algorithm your secure website is using, in Chrome click on the green  [...]</p>
<p>The post <a href="https://cvtfstudios.net/upgrade-to-ssl-certificates-from-sha1-to-sha2/">How to upgrade to SSL certificates from SHA1 to SHA2</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="aligncenter  wp-image-70788" src="https://cvtfstudios.net/wp-content/uploads/2014/10/sha1-to-sha2.jpeg" alt="" width="1132" height="294" srcset="https://cvtfstudios.net/wp-content/uploads/2014/10/sha1-to-sha2-200x52.jpeg 200w, https://cvtfstudios.net/wp-content/uploads/2014/10/sha1-to-sha2-300x78.jpeg 300w, https://cvtfstudios.net/wp-content/uploads/2014/10/sha1-to-sha2-400x104.jpeg 400w, https://cvtfstudios.net/wp-content/uploads/2014/10/sha1-to-sha2-450x117.jpeg 450w, https://cvtfstudios.net/wp-content/uploads/2014/10/sha1-to-sha2.jpeg 474w" sizes="(max-width: 1132px) 100vw, 1132px" /></p>
<p>With Chrome version 39 which is in the process of being released (see footnote), Google has started issuing warnings if a website is using a certificate that has a signature algorithm that uses the older and less secure SHA1.</p>
<p>To find out which signature algorithm your secure website is using, in Chrome click on the green lock in the location bar. Then click on ‘connection’, then click on ‘certificate information’. You should see something like the image below. Note the ‘Signature algorithm’ is SHA-256 which is one of the SHA2 hashing functions. If you see SHA-1, you need to immediately reissue your certificate using SHA-2 and install the new version.</p>
<p>&nbsp;</p>
<p>So what does it look like in the new version of Chrome when you’re using SHA-1? This is taken from a well known website that has not upgraded yet. Notice the lock with the warning triangle in the location bar. This is the main indication for a site visitor that something is awry. If you then click on the lock it has a further warning with explanation.</p>
<p>&nbsp;</p>
<p>If you do have a website that is using SHA-1, don’t panic. Just sign into GoDaddy or whoever your SSL issuer is. Then go to manage your certificates and they’ll have an option there to reissue your certificate. You’ll need to resubmit your certificate signing request (CSR) but you can just resubmit your old CSR and it will work fine.</p>
<p>Then make sure that you’ve selected SHA-2 or SHA-256 or another <a href="https://en.wikipedia.org/wiki/SHA-2">SHA-2 compatible function</a>. Then reissue the certificate. In GoDaddy’s case it takes about a minute for them to approve your request. If you have an EV certificate it may take longer.</p>
<p>Please share this with other site administrators to make sure that their customers aren’t getting warnings when visiting those all-important secure pages.</p>
<p><strong>Footnote</strong>: Chrome 39 has <a href="https://googlechromereleases.blogspot.com/2014/11/stable-channel-update_18.html">officially been pushed into the “Stable” channe</a>l which is the release channel. It will be pushed out via auto-update to millions of customers in the coming days. The demo above was done with Chrome 40 beta, but what the user sees is identical.</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fupgrade-to-ssl-certificates-from-sha1-to-sha2%2F&amp;linkname=How%20to%20upgrade%20to%20SSL%20certificates%20from%20SHA1%20to%20SHA2" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fupgrade-to-ssl-certificates-from-sha1-to-sha2%2F&amp;linkname=How%20to%20upgrade%20to%20SSL%20certificates%20from%20SHA1%20to%20SHA2" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_whatsapp" href="https://www.addtoany.com/add_to/whatsapp?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fupgrade-to-ssl-certificates-from-sha1-to-sha2%2F&amp;linkname=How%20to%20upgrade%20to%20SSL%20certificates%20from%20SHA1%20to%20SHA2" title="WhatsApp" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fupgrade-to-ssl-certificates-from-sha1-to-sha2%2F&amp;linkname=How%20to%20upgrade%20to%20SSL%20certificates%20from%20SHA1%20to%20SHA2" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fupgrade-to-ssl-certificates-from-sha1-to-sha2%2F&amp;linkname=How%20to%20upgrade%20to%20SSL%20certificates%20from%20SHA1%20to%20SHA2" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_printfriendly" href="https://www.addtoany.com/add_to/printfriendly?linkurl=https%3A%2F%2Fcvtfstudios.net%2Fupgrade-to-ssl-certificates-from-sha1-to-sha2%2F&amp;linkname=How%20to%20upgrade%20to%20SSL%20certificates%20from%20SHA1%20to%20SHA2" title="PrintFriendly" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fcvtfstudios.net%2Fupgrade-to-ssl-certificates-from-sha1-to-sha2%2F&#038;title=How%20to%20upgrade%20to%20SSL%20certificates%20from%20SHA1%20to%20SHA2" data-a2a-url="https://cvtfstudios.net/upgrade-to-ssl-certificates-from-sha1-to-sha2/" data-a2a-title="How to upgrade to SSL certificates from SHA1 to SHA2"></a></p><p>The post <a href="https://cvtfstudios.net/upgrade-to-ssl-certificates-from-sha1-to-sha2/">How to upgrade to SSL certificates from SHA1 to SHA2</a> appeared first on <a href="https://cvtfstudios.net">CVTF Studios.net</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cvtfstudios.net/upgrade-to-ssl-certificates-from-sha1-to-sha2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
