How do I run an email alert when a specific piece of code is run?SETUP for sending Mail via postfix to GMAILPreferred mailer in UbuntuUnable to get email cache on mail clients on raring ringtailD-Link DWA-130 rev E1 RTL8191SU hard time connectingHow to run an interactive script before xserver shutdown?I would like to be able to take a screen shot every 6 hours and email it

Is there any problem with students seeing faculty naked in university gym?

Was there an autocomplete utility in MS-DOS?

What makes a character irredeemable?

Could the Queen overturn the UK Supreme Court ruling regarding prorogation of Parliament?

Was "чёрствый" ever a synonym for fresh in Russian?

Mac no longer boots

I've been fired, was allowed to announce it as if I quit and given extra notice, how to handle the questions?

Colleague's grant application resembles my PhD thesis

Are there any NP complete problems in SUB EXP TIME?

How to explain that the sums of numerators over sums of denominators isn't the same as the mean of ratios?

Did the Humans find out about Gaius Baltar's role in the sabotage of the fleet?

Manager told a colleague of mine I was getting fired soon

How dangerous are my worn rims?

What are some ways to season that don't rely on garlic and onions?

In search of a pedagogically simple example of asymmetric encryption routine?

From Art to Offices

Did Joe Biden "stop a prosecution" into his son in Ukraine? And did he brag about stopping the prosecution?

Could Boris Johnson face criminal charges for illegally proroguing Parliament?

Did S. Lang prove Kuratowski–Zorn lemma without Axiom of choice or Well-ordering theorem?

Airport Security - advanced check, 4th amendment breach

SHA3-255, one bit less

Has Boris Johnson ever referred to any of his opponents as "traitors"?

As an interviewer, how to conduct interviews with candidates you already know will be rejected?

Driving test in New Zealand?



How do I run an email alert when a specific piece of code is run?


SETUP for sending Mail via postfix to GMAILPreferred mailer in UbuntuUnable to get email cache on mail clients on raring ringtailD-Link DWA-130 rev E1 RTL8191SU hard time connectingHow to run an interactive script before xserver shutdown?I would like to be able to take a screen shot every 6 hours and email it






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty
margin-bottom:0;









0















I am looking to set up an email alert every time the dirty cow exploit is run as a type of alarm or trigger that is set off every time the code is run, but I have no idea how. I am running it on Ubuntu 14.04 as it is a vulnerable system to the attack.



Any help would be appreciated.










share|improve this question
































    0















    I am looking to set up an email alert every time the dirty cow exploit is run as a type of alarm or trigger that is set off every time the code is run, but I have no idea how. I am running it on Ubuntu 14.04 as it is a vulnerable system to the attack.



    Any help would be appreciated.










    share|improve this question




























      0












      0








      0








      I am looking to set up an email alert every time the dirty cow exploit is run as a type of alarm or trigger that is set off every time the code is run, but I have no idea how. I am running it on Ubuntu 14.04 as it is a vulnerable system to the attack.



      Any help would be appreciated.










      share|improve this question
















      I am looking to set up an email alert every time the dirty cow exploit is run as a type of alarm or trigger that is set off every time the code is run, but I have no idea how. I am running it on Ubuntu 14.04 as it is a vulnerable system to the attack.



      Any help would be appreciated.







      14.04 email






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited Apr 16 at 15:17









      Philippe Delteil

      1,1141 gold badge11 silver badges23 bronze badges




      1,1141 gold badge11 silver badges23 bronze badges










      asked Apr 16 at 13:47









      u Ahsinu Ahsin

      11 bronze badge




      11 bronze badge























          1 Answer
          1






          active

          oldest

          votes


















          0
















          Assuming that you are referring to the Dirty COW (CVE-2016-5195) privilege escalation vulnerability in the Linux Kernel, then per https://dirtycow.ninja/:




          Can I detect if someone has exploited this against me?



          Exploitation of this bug does not leave any trace of anything abnormal happening to the logs.




          Therefore, there is no clear way to detect if the code has been executed on your system.




          However, if you're really that concerned, you should be aware that the Ubuntu Security Team has already provided a patch for DirtyCOW in the standard linux kernels in Trusty, so if you simply do a standard apt-get update && apt-get dist-upgrade and upgrade the Linux packages on your system, you'll be patched against this vulnerability.






          share|improve this answer



























          • If im not mistaken remote exploit goes via httpd or apache, so cant we log attempts like that ?

            – Sergiy Kolodyazhnyy
            Apr 16 at 15:36











          • @SergiyKolodyazhnyy You'd need a customized plugin in Apache that would be able to pick up specific remote exploit code. That said, it'd be better to just run an IDS/IPS like Snort with the rulesets for that loaded into it to deny access and protect, AND issue the alerts, than try and set it up themselves. However, OP doesn't indicate how they would be vulnerable to the attack. Also, if they simply update their server with the repos to the latest kernel in the repos, they get patched for Dirty COW quickly (people.canonical.com/~ubuntu-security/cve/2016/…).

            – Thomas Ward
            Apr 16 at 16:28












          Your Answer








          StackExchange.ready(function()
          var channelOptions =
          tags: "".split(" "),
          id: "89"
          ;
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function()
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled)
          StackExchange.using("snippets", function()
          createEditor();
          );

          else
          createEditor();

          );

          function createEditor()
          StackExchange.prepareEditor(
          heartbeatType: 'answer',
          autoActivateHeartbeat: false,
          convertImagesToLinks: true,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: 10,
          bindNavPrevention: true,
          postfix: "",
          imageUploader:
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/4.0/"u003ecc by-sa 4.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          ,
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          );



          );














          draft saved

          draft discarded
















          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1134378%2fhow-do-i-run-an-email-alert-when-a-specific-piece-of-code-is-run%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown

























          1 Answer
          1






          active

          oldest

          votes








          1 Answer
          1






          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes









          0
















          Assuming that you are referring to the Dirty COW (CVE-2016-5195) privilege escalation vulnerability in the Linux Kernel, then per https://dirtycow.ninja/:




          Can I detect if someone has exploited this against me?



          Exploitation of this bug does not leave any trace of anything abnormal happening to the logs.




          Therefore, there is no clear way to detect if the code has been executed on your system.




          However, if you're really that concerned, you should be aware that the Ubuntu Security Team has already provided a patch for DirtyCOW in the standard linux kernels in Trusty, so if you simply do a standard apt-get update && apt-get dist-upgrade and upgrade the Linux packages on your system, you'll be patched against this vulnerability.






          share|improve this answer



























          • If im not mistaken remote exploit goes via httpd or apache, so cant we log attempts like that ?

            – Sergiy Kolodyazhnyy
            Apr 16 at 15:36











          • @SergiyKolodyazhnyy You'd need a customized plugin in Apache that would be able to pick up specific remote exploit code. That said, it'd be better to just run an IDS/IPS like Snort with the rulesets for that loaded into it to deny access and protect, AND issue the alerts, than try and set it up themselves. However, OP doesn't indicate how they would be vulnerable to the attack. Also, if they simply update their server with the repos to the latest kernel in the repos, they get patched for Dirty COW quickly (people.canonical.com/~ubuntu-security/cve/2016/…).

            – Thomas Ward
            Apr 16 at 16:28















          0
















          Assuming that you are referring to the Dirty COW (CVE-2016-5195) privilege escalation vulnerability in the Linux Kernel, then per https://dirtycow.ninja/:




          Can I detect if someone has exploited this against me?



          Exploitation of this bug does not leave any trace of anything abnormal happening to the logs.




          Therefore, there is no clear way to detect if the code has been executed on your system.




          However, if you're really that concerned, you should be aware that the Ubuntu Security Team has already provided a patch for DirtyCOW in the standard linux kernels in Trusty, so if you simply do a standard apt-get update && apt-get dist-upgrade and upgrade the Linux packages on your system, you'll be patched against this vulnerability.






          share|improve this answer



























          • If im not mistaken remote exploit goes via httpd or apache, so cant we log attempts like that ?

            – Sergiy Kolodyazhnyy
            Apr 16 at 15:36











          • @SergiyKolodyazhnyy You'd need a customized plugin in Apache that would be able to pick up specific remote exploit code. That said, it'd be better to just run an IDS/IPS like Snort with the rulesets for that loaded into it to deny access and protect, AND issue the alerts, than try and set it up themselves. However, OP doesn't indicate how they would be vulnerable to the attack. Also, if they simply update their server with the repos to the latest kernel in the repos, they get patched for Dirty COW quickly (people.canonical.com/~ubuntu-security/cve/2016/…).

            – Thomas Ward
            Apr 16 at 16:28













          0














          0










          0









          Assuming that you are referring to the Dirty COW (CVE-2016-5195) privilege escalation vulnerability in the Linux Kernel, then per https://dirtycow.ninja/:




          Can I detect if someone has exploited this against me?



          Exploitation of this bug does not leave any trace of anything abnormal happening to the logs.




          Therefore, there is no clear way to detect if the code has been executed on your system.




          However, if you're really that concerned, you should be aware that the Ubuntu Security Team has already provided a patch for DirtyCOW in the standard linux kernels in Trusty, so if you simply do a standard apt-get update && apt-get dist-upgrade and upgrade the Linux packages on your system, you'll be patched against this vulnerability.






          share|improve this answer















          Assuming that you are referring to the Dirty COW (CVE-2016-5195) privilege escalation vulnerability in the Linux Kernel, then per https://dirtycow.ninja/:




          Can I detect if someone has exploited this against me?



          Exploitation of this bug does not leave any trace of anything abnormal happening to the logs.




          Therefore, there is no clear way to detect if the code has been executed on your system.




          However, if you're really that concerned, you should be aware that the Ubuntu Security Team has already provided a patch for DirtyCOW in the standard linux kernels in Trusty, so if you simply do a standard apt-get update && apt-get dist-upgrade and upgrade the Linux packages on your system, you'll be patched against this vulnerability.







          share|improve this answer














          share|improve this answer



          share|improve this answer








          edited Apr 16 at 16:29

























          answered Apr 16 at 14:01









          Thomas WardThomas Ward

          48.1k23 gold badges129 silver badges186 bronze badges




          48.1k23 gold badges129 silver badges186 bronze badges















          • If im not mistaken remote exploit goes via httpd or apache, so cant we log attempts like that ?

            – Sergiy Kolodyazhnyy
            Apr 16 at 15:36











          • @SergiyKolodyazhnyy You'd need a customized plugin in Apache that would be able to pick up specific remote exploit code. That said, it'd be better to just run an IDS/IPS like Snort with the rulesets for that loaded into it to deny access and protect, AND issue the alerts, than try and set it up themselves. However, OP doesn't indicate how they would be vulnerable to the attack. Also, if they simply update their server with the repos to the latest kernel in the repos, they get patched for Dirty COW quickly (people.canonical.com/~ubuntu-security/cve/2016/…).

            – Thomas Ward
            Apr 16 at 16:28

















          • If im not mistaken remote exploit goes via httpd or apache, so cant we log attempts like that ?

            – Sergiy Kolodyazhnyy
            Apr 16 at 15:36











          • @SergiyKolodyazhnyy You'd need a customized plugin in Apache that would be able to pick up specific remote exploit code. That said, it'd be better to just run an IDS/IPS like Snort with the rulesets for that loaded into it to deny access and protect, AND issue the alerts, than try and set it up themselves. However, OP doesn't indicate how they would be vulnerable to the attack. Also, if they simply update their server with the repos to the latest kernel in the repos, they get patched for Dirty COW quickly (people.canonical.com/~ubuntu-security/cve/2016/…).

            – Thomas Ward
            Apr 16 at 16:28
















          If im not mistaken remote exploit goes via httpd or apache, so cant we log attempts like that ?

          – Sergiy Kolodyazhnyy
          Apr 16 at 15:36





          If im not mistaken remote exploit goes via httpd or apache, so cant we log attempts like that ?

          – Sergiy Kolodyazhnyy
          Apr 16 at 15:36













          @SergiyKolodyazhnyy You'd need a customized plugin in Apache that would be able to pick up specific remote exploit code. That said, it'd be better to just run an IDS/IPS like Snort with the rulesets for that loaded into it to deny access and protect, AND issue the alerts, than try and set it up themselves. However, OP doesn't indicate how they would be vulnerable to the attack. Also, if they simply update their server with the repos to the latest kernel in the repos, they get patched for Dirty COW quickly (people.canonical.com/~ubuntu-security/cve/2016/…).

          – Thomas Ward
          Apr 16 at 16:28





          @SergiyKolodyazhnyy You'd need a customized plugin in Apache that would be able to pick up specific remote exploit code. That said, it'd be better to just run an IDS/IPS like Snort with the rulesets for that loaded into it to deny access and protect, AND issue the alerts, than try and set it up themselves. However, OP doesn't indicate how they would be vulnerable to the attack. Also, if they simply update their server with the repos to the latest kernel in the repos, they get patched for Dirty COW quickly (people.canonical.com/~ubuntu-security/cve/2016/…).

          – Thomas Ward
          Apr 16 at 16:28


















          draft saved

          draft discarded















































          Thanks for contributing an answer to Ask Ubuntu!


          • Please be sure to answer the question. Provide details and share your research!

          But avoid


          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.

          To learn more, see our tips on writing great answers.




          draft saved


          draft discarded














          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1134378%2fhow-do-i-run-an-email-alert-when-a-specific-piece-of-code-is-run%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown





















































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown

































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown







          Popular posts from this blog

          Tamil (spriik) Luke uk diar | Nawigatjuun

          Align equal signs while including text over equalitiesAMS align: left aligned text/math plus multicolumn alignmentMultiple alignmentsAligning equations in multiple placesNumbering and aligning an equation with multiple columnsHow to align one equation with another multline equationUsing \ in environments inside the begintabularxNumber equations and preserving alignment of equal signsHow can I align equations to the left and to the right?Double equation alignment problem within align enviromentAligned within align: Why are they right-aligned?

          Where does the image of a data connector as a sharp metal spike originate from?Where does the concept of infected people turning into zombies only after death originate from?Where does the motif of a reanimated human head originate?Where did the notion that Dragons could speak originate?Where does the archetypal image of the 'Grey' alien come from?Where did the suffix '-Man' originate?Where does the notion of being injured or killed by an illusion originate?Where did the term “sophont” originate?Where does the trope of magic spells being driven by advanced technology originate from?Where did the term “the living impaired” originate?