Found the error Not allowed to load local resource: file:///etc/passwd while looking at infosec.pub’s communities page. There’s a community called “ignore me” that adds a few image tags trying to steal your passwd file.

You have to be extremely poorly configured for this to work, but the red flags you see should keep you on your toes for the red flags you don’t.

You are viewing a single thread.
View all comments
10 points

Holy shit this is kind of unsettling. Though I would expect ALL major browsers to reject reading any local files like this… would this kind of thing actually succeed somewhere/somehow?

permalink
report
reply
5 points

If you ran your browser as root and configured your browser to load local resources on non-local domains maybe. I think you can do that in chrome://flags but you have to explicitly list the domains allowed to do it.

I’m hoping this is just a bad joke.

permalink
report
parent
reply

[This comment has been deleted by an automated system]

permalink
report
parent
reply
2 points

you don’t need to be root to read /etc/passwd

permalink
report
parent
reply
4 points

That’s because passwd doesn’t store the password hashes. Just user names.

permalink
report
parent
reply
3 points
*

Are you sure? What do you get when you run $ cat /etc/passwd in terminal? Just paste the results here 😇

Edit: to anyone reading this on the future, don’t actually do this, it was a joke

permalink
report
parent
reply
0 points

Yeah, seems highly unlikely to ever yield any results. Even if you did manage to read a file, you have to get lucky finding a password hash in a rainbow table or the password being shit enough to crack.

permalink
report
parent
reply
1 point

I cracked the BMC on my workstation motherboard by binwalking the publicly available firmware and finding, to my delight and dread, that the built in root user password was laughably weak. If a top5 motherboard manufacturer is still doing shit like that, users are too.

I also work in support and have seen first hand the bananas things people do, even smart people that should know better

permalink
report
parent
reply
1 point

Also generally the actual password (or rather its hash) is stored in /etc/shadow on most systems from the past 20 odd years.

permalink
report
parent
reply

Technology

!technology@beehaw.org

Create post

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community’s icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

Community stats

  • 2.8K

    Monthly active users

  • 3.4K

    Posts

  • 78K

    Comments