Happy Monday fellow Linux geeks and Open Source enthusiasts! In this week's newsletter we continue our exclusive coverage of BlackHat USA 2022, focusing on detecting kernel exploits with eBPF and a File Descriptor vulnerability that was exposed at this year's event, and the lessons we can take away from this discovery. 

We also share how system administrators can practice creating stronger passwords by using password cracker tools to test these passwords.

Hope you enjoy!

Yours in Open Source,

Brittany Signature 150

BlackHat USA 2022: Return to Sender - Detecting Kernel Exploits with eBPF

32.Lock Code CircularLet's take a brief look at what Guillaume Fournier from Datadog presented at Blackhat USA 2022: “One of the fastest growing subsystems in the Linux Kernel is, without any doubt, eBPF (extended Berkeley Packet Filter). Now I know you may be wondering: what exactly is eBPF? Well, let's go through it together!   

Learn more about blackhat usa 2022 return to sender detecting kernel exploits with ebpf

 

Password Guessing as an Attack Vector

29.WorldMap PinPadFor system administrators, there can be no settlement for weak passwords as unauthorized access can potentially lead to catastrophic consequences such as loss of valuable data. System administrators can practice creating stronger passwords by using password cracker tools to test these passwords.    

Learn more about password guessing as an attack vector

BlackHat USA 2022: Devils Are in the File Descriptors

20.Lock AbstractDigital Circular

Learn more about blackhat usa 2022 devils are in the file descriptors