How to Check File Mount Points, File System Types, and File Status in Linux

Commands related to the file system in Linux are summarized as follows: 1 Environment Operating System: Ubuntu 22.04.5 LTS 2 df -h, to check all mounted points 3 df -h /, to check the mount point of any directory 4 df -hT, to check the file system type of the mounted points 5 mount -l, … Read more

Linux io_uring Proof-of-Concept Rootkit Bypasses System Call-Based Threat Detection Tools

Shake Network Technology NewsClick the right to follow for the latest technology news! Cybersecurity researchers recently demonstrated a proof-of-concept (PoC) Rootkit named “Curing” that utilizes the Linux asynchronous I/O mechanism io_uring to bypass traditional system call monitoring. 01 Significant Blind Spots in Security Tools ARMO stated that this leads to “significant blind spots in Linux … Read more

IT Knowledge Base | Issue 78: The Directory Structure of Linux

The more you act, the more you know; the deeper your knowledge, the further you can go. To stimulate students’ interest and enthusiasm for studying information technology, the School of Information Technology has specially launched the “IT Knowledge Base” column. Continuous effort, like water dripping through stone, conveys the pulse of information, cultivates social talents, … Read more

Linux File Descriptors: The Core Mechanism of System I/O Operations

1. Overview of File Descriptors In Linux and other Unix-like operating systems, file descriptors are a core concept that provides a unified interface for programs to interact with files, devices, and other input/output (<span>I/O</span>) resources. Simply put, a file descriptor acts like a “ticket” or “handle” for programs to access these resources. Whenever a program … Read more

Exposing Linux Security Blind Spots: The io_uring Mechanism Can Bypass Mainstream Detection Tools

Shake Network Technology NewsClick the right to follow for the latest technology news!The ARMO research team recently disclosed significant flaws in Linux runtime security tools, confirming that the io_uring interface allows rootkits (kernel-level malware) to bypass conventional monitoring solutions.Tests show that mainstream tools, including Falco, Tetragon and even Microsoft Defender for Endpoint, are unable to … Read more

Linux Power Management (4) – Power Management Interface

Original:https://mp.weixin.qq.com/s/JX5PS7Cxs9mRzzl96cwzRg 1. Introduction A significant portion of Linux power management deals with functionalities such as Hibernate, Suspend, and Runtime PM. These functionalities are based on a similar logic, known as the “Power Management Interface.” The code for this interface is implemented in files such as “include/linux/pm.h” and “drivers/base/power/main.c.” Its main functions are: to define Device … Read more

Common Operations of Linux LVM

Common Operations of Linux LVM LVM (Logical Volume Manager) is a logical volume manager in Linux used for managing disk storage. It abstracts physical hard disk partitions into Physical Volumes (PV), combines them into Volume Groups (VG), and then divides them into Logical Volumes (LV). LVM supports dynamic resizing of volumes, snapshots, striping, and other … Read more

Linux Privilege Escalation Techniques (Part 1)

• 1. Basics of Linux Permissions • Linux Permission Management • Linux Security Mechanisms • 2. Understanding Various Shells • Interactive Shell and Non-Interactive Shell • Forward Shell and Reverse Shell • Common Reverse Shell Commands • 3. Information Gathering in Linux • Manual Enumeration of Basic Linux Information • Automated Enumeration of Basic Linux … Read more