Published: Sept. 30, 2024, 1 a.m.
We explain the one-packet attack on CUPS and discuss its real-world implications. Plus, a Meshtastic update and more.
Sponsored By:
\n
Support LINUX Unplugged
Links:
- \U0001f4a5 Gets Sats Quick and Easy with Strike
- \U0001f4fb LINUX Unplugged on Fountain.FM
- Attacking UNIX Systems via CUPS \u2014 A remote unauthenticated attacker can silently replace existing printers\u2019 (or install new ones) IPP urls with a malicious one, resulting in arbitrary command execution (on the computer) when a print job is started (from that computer).
- Marcus Hutchins Scan finds 107,287 servers responding to the UDP port 631 \u2014 Instead of relying on Shodan data, I performed my own internet-wide scan using a distributed network of servers. This resulted in discovering drastically more exposed cups-browsed instances, causing my total count to rise from 13,289 to 107,287.
- Shodan on X: 75,000 exposed CUPS daemons on the Internet
- Annual Membership \u2014 Put your support on automatic with our annual plan, and get one month of membership for free!
- nodeboard \u2014 Your Ultimate Digital Inventory Manager
- Lightning Pay
- activate-linux \u2014 The "Activate Windows" watermark ported to Linux
- Install Frog on Linux | Flathub \u2014 Extract text from images, websites, videos, and QR codes by taking a picture of the source.
- Clapgrep \u2014 Ever had a folder full of PDF files, where you knew, somewhere in there, is what you're looking for. But you did not know in which file. So you had to search each of them at a time...