this post was submitted on 10 Jul 2025
12 points (100.0% liked)

Linux

56365 readers
540 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 6 years ago
MODERATORS
 

Sort of command that would pull a download that is self executed to the host machine?

That's worded a bit fucky, if I need to elaborate, please chime in.

you are viewing a single comment's thread
view the rest of the comments
[–] whostosay@lemmy.world 1 points 4 days ago (1 children)

Is there anything that is specific to ssh that would allow for this? Like a command that would allow something to execute back to the other machine similar to downloading? I'm not well versed just kind of a napkin idea I thought of.

[–] sprite0@sh.itjust.works 3 points 4 days ago* (last edited 4 days ago) (2 children)

you can't know what system architecture is on the ssh client side. It could be a mac, a windows or linux box, android or ios, beos, amigaos, etc.

So even if you could get ssh to pass malicious code how would you know what code to pass?

What you're asking for is nigh impossible i think.

[–] whostosay@lemmy.world 1 points 4 days ago (1 children)

And when you say "can't know" do you mean it would be impossible to tell strictly through SSH?

[–] sprite0@sh.itjust.works 3 points 4 days ago (1 children)

the ssh protocol doesn't provide any mechanism for your server to identity the client host architecture, nor does it provide any mechanism i'm aware of to send any payloads back to the host client for arbitrary execution.

The thing is ssh is a protocol and it's implementation is not going to be identical across clients.

So if you found a bug in an ssh client that allowed for this your hypothetical attack vector would only work on intruders using that broken client. ssh is one of the most scrutinized protocols there are and you should be a hero if you found this bug. what you're asking for, if it were as easy as you might hope, well ssh wouldn't be the ubiquitous security connection protocol if it were simple like that right?

[–] whostosay@lemmy.world 3 points 4 days ago (1 children)

Very true. Thanks for the education. SSH to me is just magic portal that lets me talk to my server in my closet lmao

[–] sprite0@sh.itjust.works 1 points 4 days ago

it's a fun thought experiment as it's a very complex protocol

[–] whostosay@lemmy.world 1 points 4 days ago

I kind of figured it would be a shot in the dark, some scripting could definitely be done to assess that, and even run code per major OS depending on some automated recon.

Let's say you've got that figured out, and the user is running putty on windows as an administrator. Is there anything that could take advantage of that fact?

I feel like this would be way easier/more feasible to run a script on your own machine as a defensive measure like OC mentioned early, but just more asking our of curiosity. I'm not skilled enough to even imagine what to do with this or write it, but I am fascinated by security stuff.