WWH education 20-21. Part 2. “Linux”
Lecture#2 Linux 11.17.2020
Lecturer: partyboy
(7:02:18 PM) partyboy: Today you and I will have a lecture on Linux
(7:02:34 PM) partyboy: we'll look at the Linux operating system as the system we'll be running on, as well as the security aspects of this and other operating systems
(7:02:51 PM) partyboy: OS - Operating System
(7:04:20 PM) partyboy: I'll try to explain in plain language how you could theoretically be hacked.
Try to avoid complex terms
I will also give you a colorful idea of hacking the operating system, and more advanced users will read technical information between the lines.
(7:05:04 PM) partyboy: First, let's start with a little educational program: Linux (hereinafter * Lin *) is an operating system, the same as Windows, Mac OS X. It was developed by Linus Torvalds in 1991. In our modern world, servers of the world's largest companies, refrigerators, telephones and much of what we see in life work on the basis of the line.
(7:06:00 PM) partyboy: Linux advantages over other operating systems:
(7:06:25 PM) partyboy: 1. Open source
One of the main advantages of Linux is that it is an open source operating system, meaning its source code is readily available to everyone. Anyone who is capable of coding can contribute, modify, improve, and distribute the code to anyone and for any purpose.
(7:07:42 PM) partyboy: 2. Security
Linux is more secure than other operating systems. However, Linux is not completely secure as it has some malware, but it is less vulnerable than others. Every program in Linux, be it an application or a virus, needs authorization from the administrator in the form of a password. If the password is not entered, the virus will not start. No antivirus software is required in Linux, although it is quite possible to hack you
(7:08:55 PM) partyboy: 3. Working on older computers
(7:09:11 PM) partyboy: 4. Software update
(7:10:10 PM) partyboy: I believe that the user of any operating system, and even more so those who are associated with it at work, need to understand that professional viruses are not an executable file that has been renamed into a document and ask you to run (stealer or warrior). And not always blocking macros will prevent an attacker from executing code on your system.
(7:11:00 PM) partyboy: I work on Linux, but sometimes I use Windows. Further, there will be a lot of negativity about Linux, but it is not connected with any fanatical beliefs, I just want to objectively tell and convince you that no matter what operating system you use, you can be hacked everywhere.
(7:11:54 PM) partyboy: Your choice of operating system matters to your security, privacy and anonymity. Different operating systems suit different needs
The choice is always yours;)
(7:12:18 PM) partyboy: don't get hung up on Linux, start with Windows)
(7:12:42 PM) partyboy: For example, to draw graphics for you I have to leave Linux on Windows as I need Photoshop and other graphics editors, we'll talk about that later. But I think the main message of the information is clear;)
(7:13:24 PM) partyboy: Nobody forbids you to put both Windows and a couple of different Linux distributions on your hard drive) or a USB flash drive)
(7:15:00 PM) partyboy:. A long time ago, when Linux was in its infancy, most of its users were professionals. But over time, distributions, convenient for a simple user, appeared (for example, UBUNTU) and the number of housewife users began to grow. What does any housewife do? That's right, he makes online payments, and where there is money, there flock there like bees to honey, a swarm of various rabble, which wants to improve their finances free of charge. 90% of housewives use Windows - and viruses are developed for this operating system, and only at least 20-30% of housewives will switch to Linux, then big finances will immediately be poured into it for the development of malware. And reports from antivirus companies show a slow but increasing number of such programs.
(7:17:41 PM) partyboy: Here are the basic steps and rules to follow in order to reduce security problems under Linux to almost zero:
(7:17:56 PM) partyboy: Install software exclusively from the official Linux Mint, Ubuntu and Fedora Workstation distribution repositories
(7:18:45 PM) partyboy: What is a repository?
(7:19:02 PM) partyboy: https://im0-tub-ru.yandex.net/i?id=1de03d7b24d10a85b7f327fdfc05525f&n=13
(7:19:16 PM) partyboy: It's a database, an archive, a huge archive of programs. As a comparison - like google play or app store
(7:19:42 PM) partyboy: Install programs only from there. Because they all undergo a rigorous test and there cannot be viruses initially
(7:20:09 PM) partyboy: Don't install any antivirus (yes, that's not a bug!)
(7:20:44 PM) partyboy: On distributions of Ubuntu, Linux Mint, etc, you don't need antivirus software or rootkit removal utilities. After all, if the system is regularly updated, a virus or rootkit will not be able to penetrate it. In addition, in Linux, malicious software downloaded by a user can only function in his home directory. Based on the above, in order to install a virus or rootkit into the system, it will need your password, or the vulnerability of one of the system components. But in the overwhelming majority of cases, he will not be able to use either one or the other;)
(7:22:56 PM) partyboy: Ubuntu checks daily for security updates.
We recommend that you install all proposed security updates as soon as they are released if you want to make your system as secure as possible.
If the vulnerability is found and fixed in a timely manner, it will not be a big problem)
(7:24:07 PM) partyboy: Avoid questionable or third party web browser add-ons !!!
(7:24:16 PM) partyboy: https://otvet.imgsmail.ru/download/46355980_e73047cddf8468c5e2f913bee72cde9a_800.png
(7:26:03 PM) partyboy: If there is no doubt about the quality of the product provided, namely the browser itself, then extensions should not completely relax you.
As a user of your "machine", you should understand that any third-party code can become a serious security problem.
Extensions can not only help you, block pop-ups, but also remember the passwords you enter, keep a log of your visits, and the most annoying thing is to copy your credit card details. =)))
(7:27:53 PM) partyboy: That is, roughly speaking, in whatever protected system you are sitting - you just need to follow the questionable link, then click on the "OK" or "ADD TO MAIN SCREEN" button on the pop-up window and so on - accidentally install the plugin in your browser or, alternatively, start the execution of the JAVA script)
(7:29:11 PM) partyboy: and this script (plugin), to the extent of its coolness, can stupidly steal your cookies, passwords, autoforms, etc.))
(7:29:55 PM) partyboy: But, as a rule, browsers warn that the link is suspicious, there you already think with your head and make a decision)
(7:30:33 PM) partyboy: Now about WINDOWS
(7:30:54 PM) partyboy: In general, I agree, the security of Windows operating systems is gradually improving, but this is not enough, and even more so for us)
(7:31:18 PM) partyboy: The problem is that in these operating systems everything is closely interconnected with the Microsoft servers, all your actions in the system are reported to Microsoft servers as if by strings, Windows also fail, especially in the current version of Windows 10 , the issues related to surveillance and privacy are not particularly related to security tools, but this turns off some people, what to say about us ..
(7:32:07 PM) partyboy: https://wwh-club.cc/index.php?threads/obratnaja-storona-windows.98628/
I would recommend that you read this article.
So that you can look at the whole picture from the outside) (after the lecture)
(7:33:04 PM) partyboy: An important point: If you read the Microsoft license agreement that comes with every Windows operating system, you will see that they will give your encryption key from BitLocker on the first call from law enforcement, and this is in their the queue bumps into the idea of what the fuck is Windows ?! Why do you keep my encryption passwords on your servers, what the fuck? =))))))
(7:35:25 PM) partyboy: The thing is, by ticking the box in the licensing agreement with Microsoft, users are giving corporations control over their data. “We may access, disclose and store for ourselves your personal data, including any content, any files on your devices, in your letters and in other types of personal communications, if we have reason to believe it is necessary to protect our customers or to comply terms and conditions governing the use of our services ”- reads the license agreement.
(7:37:19 PM) partyboy: In other words, whatever you say on the web, write, save, create or download on your computer or any other device with Win 10, it can all be remotely deleted or copied from you - if someone at Microsoft decides they need it. That is, according to the terms of the Microsoft EULA, you do not even need authorization from the authorities to interfere with the privacy of customers and control it!
(7:38:19 PM) partyboy: Now let's talk about Linux distributions)
(7:38:57 PM) partyboy: We'll take a look at the more standard operating systems: Ubuntu, Debian, Kali, Tails, and others - again, they all have reasonably robust security features.
(7:39:48 PM) partyboy: Debian is a Linux based operating system, it is a Linux distribution. It is composed entirely of free and open source software, most of which is under the GNU General Public License.
(7:41:08 PM) partyboy: The Debian distribution contains over 51,000 compiled software packages that are packaged in a great format for easy installation on your machine.
They are all free.
It looks like a tower)
At the base is the core, above it are the main tools, then all the programs that you run on your computer follow.
At the top of this tower is Debian, carefully organizing and putting it all together so that all the components can work together.
(7:42:39 PM) partyboy: See https://wiki.debian.org/Derivatives/Census for all Debian derivative distributions.
Many of them are security-critical operating systems like Kali, Tails, and so on.
The Debian project does an excellent job of providing security updates for Debian.
(7:43:33 PM) partyboy: Kali Linux is a GNU / Linux-LiveCD that emerged from the merger of WHAX and the Auditor Security Collection. The project was created by Mati Aharoni and Max Moser. Designed primarily for safety tests.
(7:44:39 PM) partyboy: Tails is a Debian-based Linux distribution built for privacy and anonymity. It is a continuation of the development of OS Incognito.
All outgoing connections are wrapped in the anonymous Tor network, and all non-anonymous ones are blocked.
The system is designed to boot from LiveCD or LiveUSB and leaves no trace on the machine where it was used.
The Tor Project is the main sponsor of TAILS.
The operating system is recommended for use by the Free Press Foundation and was also used by Edward Snowden to expose PRISM.
(7:45:46 PM) partyboy: Use it only for surfing, for example, surfing is a browser, communication, etc. that is, one-time meals like surfing and mustache)
(7:47:22 PM) partyboy: Linux is an amazing system that you need to learn to work with and will become your true friend.
It's like with a pet, how you train it, how to master it, it will be so flexible and half-shy for you =))
(7:49:24 PM) partyboy: The choice of OS is always yours! Test, study, try and everything will be ok;)
(7:51:05 PM) partyboy: Now ask questions in turn, put +
(7:52:00 PM) RedHeadCockatoo: 1. As a Linux user: how long does it take to "figure out" the system from scratch?
2. I heard that IOS is a closed OS. Is it relatively safe to carry out transactions from an old / new / personally used iPhone? Or it will not work, because company YUSA, and provide data to their own services at the first request?
3. in the lecture part (Tails) LiveCD and LiveUSB are indicated. What is it?
(7:54:18 PM) partyboy: 1) half a day, 10 hours, if 24 hours is to the brain - you will fumble so that you can explain to others)
2) I do this and don't worry) I won't go further than my village anyway)))
3) it is one and the same. you can just burn the system to USB or CD - well, there is no difference)
(7:54:23 PM) RedHeadCockatoo: 4. And some literature recommendations for learning Linux. I'm not going to myself (at the moment), maybe someone from the trainers will be happy right now
(7:54:43 PM) partyboy: 4. google bro)
(7:55:13 PM) goldenbaum: 1. What about mac os? Is it possible for the first time to work with it without a VM using a sphere
2. If on my Mac it has already happened: I bought a card on bingo directly from safari and climbed wwh also from my safari, am I crazy already? Maybe I'm already on some list of suspects and can sit down?)
(7:56:55 PM) partyboy: 1) I wouldn't work through a mac at all - fuck this gimora? )
2) I do not know how your Yabloko people collect information there, but in general, of course, the Pindos are in the courses about your laptop) but nevertheless forget it) drive in and do not worry)
(7:57:11 PM) Nexxtip: How much one-time surfing do we recommend TAILS, just google what is interesting and go out, or let's say it's okay to chat on the same WWH?
(7:57:34 PM) partyboy: ok
(7:57:50 PM) Izolentna: So it's better to use Tails for surfing, and take something else for work? How many do you need to have? : D
(7:58:17 PM) partyboy: it all depends on paranoia) you can have one system
(7:59:27 PM) partyboy: Friends, the lecture is not the most interesting - I'll tell you right away) but in the future many of you will want to switch to lin (linux)
(8:00:02 PM) Koba787: 1 - from the point of view of the security of our work, how much is Linux safer than the same Windows with a sphere and all that?
2 - which distributor would you recommend, what to start to deal with and then use in your work?
(8:00:10 PM) Cash.Delivery: Linux discussion? Have you already talked about FDE + SecureBoot?
(8:01:25 PM) partyboy: 1) the same, but the work itself initially under Linux is easier in safety
2) Xubuntu, Linux Mint
(8:01:43 PM) AK-Baks: At first, if you use Windows in conjunction with VPN and WMware, and after the session you clean CCleaner, will there be any norms? After all, it takes time to master at least the base on Lina, and we are all hungry here))))
(8:02:13 PM) partyboy: AK-Baks - that's right! start with Windows
(8:03:02 PM) htuf: Using TOR to surf and read wwh. Does he really protect me from prying eyes outside the onion net? So far, I have not used VPN separately and am reading from the main computer. (I understand that torus uses a lot of vpn sequentially)
(8:04:26 PM) partyboy: htuf: - I can't say anything here) contact the developers of the torus) but at least they haven't accepted me yet, and I'm giving a lecture =)
(8:05:04 PM) Temporary: Sorian for offtopic - why is it recommended to install Veracrypt? Is it put on Lin?
(8:05:20 PM) partyboy: yes) but I don't put
(8:05:39 PM) Qqmalo: maybe I'm a brake, but I don't understand all this fuss about linkus and Windows, we create vr, so we also put vpn, isn't it all that serious? isn't this combination enough?
(8:06:53 PM) partyboy: enough) just linux is one of the operating systems, and my task is to tell you that the world is not only made of Windows and poppy;)
(8:07:12 PM) ZellyBoBa: 1. Why is tails mentioned in the lecture, and let's say not heads / whonix, is it preferable in terms of security or is it due to the fact that it is more common?
(8:07:25 PM) Cash.Delivery: partyboy: Debian + FDE + SecureBoot + killswitch for WireGuard is it reliable? How can you describe the WireGuard protocol itself? It is better than OpenVPN in terms of surveillance security.
Is LUKS full-disk a sufficient security measure?
Well, that joke with the keys that were found with SecureBoot
(8:08:16 PM) partyboy: 1) everyone's choice. we give * pop systems * and programs (personally me), so that it would be clearer
(8:09:01 PM) partyboy: Cash.Delivery - write to ls on forum, this is a long answer
(8:09:45 PM) OTJlU4HUK: Are there some encrypted Linux laptops for sale on some onion marketplaces? How do you feel about buying such a device?
(8:10:47 PM) partyboy: Bad, because it’s not clear what they wrote to you on such a flash drive - this is the main aspect. The second point - you can sit for 3-4 hours and stir this up for yourself)
(8:11:07 PM) Yarah: at what point in carding did you feel like you needed to switch to linux for security?
(8:11:30 PM) partyboy: I originally worked on Linux;) I didn't have to switch
(8:11:49 PM) centurion_52: How safer is it to sit through windows + whonix than just through Windows? Should you switch to Linux after whonix in the future?
(8:12:27 PM) partyboy: Start working on windows, as you get the first profit - look towards development there)
(8:17:37 PM) Koba787: 1 - is it not possible to just install the wrong Linux from Google?
2 - since I have high hopes for the sphere - is it multiplatform?
3 - if the sphere flies on Linux and disguises everything, can you use the Russian version of the OS, or how is the English distribution necessary with Windows?
4 - can CashDelivery write a question to the forum with questions / answers? we are all interested in a sufficient measure of protection for Linux, including)))
(8:19:11 PM) partyboy: 1) not if you download the distribution from the official site
2) yes
3) no difference
4) yes
Don't forget that we have a private channel with the most up-to-date information and material, please contact our support team @ouhom2 to enter