[ Date Index ] [ Thread Index ] [ <= Previous by date / thread ] [ Next by date / thread => ]
Just been reading the LinuxUser mag and tried this from Joanna Rutkowska
It shows how insecure a root shell can be
in a terminal
do
( you need the package "xorg-x11-apps" to do this)
[kevin@kevinspc ~]$ xinput list
â Virtual core pointer id=2 [master pointer (3)]
â â Virtual core XTEST pointer id=4 [slave pointer
(2)]
â â Microsoft Microsoft Wireless Optical Mouse 1.0A id=9 [slave
pointer (2)]
â Virtual core keyboard id=3 [master keyboard (2)]
â Virtual core XTEST keyboard id=5 [slave keyboard
(3)]
â Power Button id=6 [slave keyboard
(3)]
â Power Button id=7 [slave keyboard
(3)]
â ov519 id=8 [slave keyboard
(3)]
â AT Translated Set 2 keyboard id=10 [slave keyboard
(3)]
â i2c IR (HVR 1110) id=11 [slave keyboard
(3)]
note the AT id = 8
type in
xinput --test 8
then in a root terminal type some commands
and see the keyboard codes as root types
remember you are just a normal user ?
perhaps in a bash script you could redirect the output of xinput to
Dev/null or just Never install the Xorg-X11-apps
--
Regards
Kevin Lucas
Minions Post Master(Sub)
Eleven Years in the Making!
www.minionsbandb.co.uk
www.tearooms.minionsbandb.co.uk
FaceBook Minions_shop
Po House, Minions,
Liskeard Cornwall
PL14 5LE
01579363386
--
The Mailing List for the Devon & Cornwall LUG
http://mailman.dclug.org.uk/listinfo/list
FAQ: http://www.dcglug.org.uk/listfaq