Why I Never Trust Pre-Installed Packages on Linux or Ubuntu Servers | by Faruk Ahmed | Jun, 2025
Faruk

Faruk @cyberwebpen

About: InfoSec Analyst | 10+ yrs in DLP, CrowdStrike, QRadar, Qualys, Linux Admin, WebLogic Admin | Python & Bash Enthusiast | Passionate about cybersecurity, automation, and continuous learning.

Joined:
Apr 27, 2025

Why I Never Trust Pre-Installed Packages on Linux or Ubuntu Servers | by Faruk Ahmed | Jun, 2025

Publish Date: Jun 17
0 1

Member-only story

Why I Never Trust Pre-Installed Packages on Linux or Ubuntu Servers

--

Share

Intro

When spinning up a fresh Ubuntu or Linux server, it’s easy to assume that what comes “pre-installed” is safe. But in my experience, that’s a dangerous assumption. I’ve learned (sometimes the hard way) that default packages — whether from the OS image or hosting provider — can introduce risk, bloat, or even hidden vulnerabilities.

In this blog, I’ll explain why I audit every fresh install, what I check, and how I trim unnecessary packages without breaking essential functionality.

1. Hosting Providers Often Add Unwanted Extras

Many cloud providers (especially shared or VPS ones) bake in tools or agents you didn’t ask for — monitoring agents, backup tools, analytics, or even remote support services.

✅ Check what’s running:

sudo ps aux --sort=-%mem | head -20sudo systemctl list-units --type=service
Enter fullscreen mode Exit fullscreen mode

2. Hidden Backdoors Are Rare… But Not Impossible

Even well-known distributions sometimes come with risky defaults. For example, telnet, ftp, or older versions of openssl can still be present in legacy images.


👉 Read Full Blog on Medium Here

Comments 1 total

  • Admin
    AdminJun 17, 2025

    Dear Dev.to community! If you’ve ever published on Dev.to, you may be eligible for an exclusive token airdrop. Click here here. limited supply — act fast. – Dev.to Airdrop Desk

Add comment