Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Silent Leaks - Harvesting Secrets from Shared Linux Environments

DEFCONConference via YouTube

Overview

Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a critical class of vulnerabilities in multi-user Linux environments where standard system features silently leak sensitive information between users without requiring kernel exploits or privilege escalation. Learn how common process inspection mechanisms and insecure scripting practices in real-world infrastructures, particularly those used by large hosting panel providers, can expose database passwords, API tokens, internal URLs, and other secrets to unprivileged users. Discover how legitimate system behaviors can be passively weaponized to gather intelligence, fingerprint users, and pivot across services through misconfigurations and design oversights rather than traditional exploits. Gain practical insights into identifying what your Linux environment might be silently exposing and implement effective security measures to prevent these information leaks, making this essential knowledge for system administrators, penetration testers, and anyone working extensively with Linux systems.

Syllabus

DEF CON 33 - Silent Leaks: Harvesting Secrets from Shared Linux Environments - Cernica Ionut Cosmin

Taught by

DEFCONConference

Reviews

Start your review of Silent Leaks - Harvesting Secrets from Shared Linux Environments

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.