InterLinkedRxiv

This is a private preprint server. Papers published here have not been published in any academic journals or certified by peer-review. Papers posted here may be used, attributed, or redistributed as long they are cited and unmodified. All papers © InterLinkedRxiv Preprints 2020. This repository has no affiliation with arXiv.


Whitepaper: Potential privilege escalation vulnerability via the file system when Lynx web browser is accessed through guest shell applications

Oct 2020 Albert, N.

Abstract

This whitepaper discusses an unintended configuration-based (non-technical) vulnerability that allows guest users in a poorly secured shell application to exploit loose security restrictions in the Lynx text-based web browser to bypass security mechanisms and access sensitive system information, allowing malicious users to potentially obtain root access to a system and compromise the entire machine. The vulnerability stems from default security settings in the Lynx browser that allow full system access. The factors that allow a successful exploit to occur are discussed as well as several possible mitigations.

Suggested Citation: Albert, N. Whitepaper: Potential privilege escalation vulnerability via the file system when Lynx web browser is accessed through guest shell applications (10/11/2020). Available at https://public.interlinked.us/3


Whitepaper: Unintended lateral movement by privileged users through VoIP switches utilizing Centralized Directories for Interswitch Routing

Oct 2020 Albert, N.

Abstract

This whitepaper discusses an unintended configuration-based (non-technical) vulnerability that allows privileged users of a peer-to-peer VoIP network relying on a centralized directory for the purposes of interswitch routing to move laterally from switches participating in the peer-to-peer network to private switches that do not necessarily have a public presence, which may be potentially undesired behavior. The vulnerability stems not from any particular technical vulnerabilities but from operational and configurational oversights. The factors that allow a successful exploit to occur are discussed as well as several possible mitigations.

Suggested Citation: Albert, N. Whitepaper: Unintended lateral movement by privileged users through VoIP switches utilizing Centralized Directories for Interswitch Routing (10/6/2020). Available at https://public.interlinked.us/2


Public Telephone Dialing Habits and Preferences

Sep 2020 Albert, N.

Abstract

We conduct surveys of the general populous in order to gauge current public sentiments with regards to telephone dialing habits and preferences. We analyze the results collected from these surveys in aggregate and compare them with each other. We observe that there continues to be a strong public favoring of traditional seven-digit dialing and that opposition to ten-digit dialing remains widespread. We additionally find that this continues to be the case in spite of proposals or implementations of public safety initiatives that have stipulated ten-digit dialing be required in certain circumstances. Our results concur with previous studies conducted in this domain that were conducted in the context of number relief, suggesting that historical trends, while potentially less pronounced than they once were, remain valid in the modern era.

Keywords: telecommunications, telephone dialing, landline telephony, wireline telephony, number relief

Suggested Citation: Albert, N. Public Telephone Dialing Habits and Preferences (9/24/2020). Available at https://public.interlinked.us/1