Silent Leaks: Harvesting Secrets from Shared Linux Environments

Cernica Ionut Cosmin

DEF CON 33 · Day 2 · Main Stage

Cernica Ionut Cosmin, an application security engineer and bug bounty hunter, presents a systematic examination of information leakage vectors in shared Linux environments — hosting panels, developmen

AI review

Systematic enumeration of secret leakage vectors in shared Linux environments — ps argument visibility, /proc access, temp file handling, inotify-based collection — without privilege escalation. Practical and grounded in real bug bounty work, but largely documents known Linux behavior rather than novel techniques.

Watch on YouTube