Silent Leaks: Harvesting Secrets from Shared Linux Environments
Cernica Ionut Cosmin
DEF CON 33 · Day 2 · Main Stage
Cernica Ionut Cosmin, an application security engineer and bug bounty hunter, presents a systematic examination of information leakage vectors in shared Linux environments — hosting panels, developmen
AI review
Systematic enumeration of secret leakage vectors in shared Linux environments — ps argument visibility, /proc access, temp file handling, inotify-based collection — without privilege escalation. Practical and grounded in real bug bounty work, but largely documents known Linux behavior rather than novel techniques.