06-14-2013
sudo would be the normal approach to running a program as super user.
Changing the ownership and giving write privilege to everyone for /usr/bin seems super crazy too.
And as this has nothing to do with Red Hat, I've moved the thread to another forum.
9 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
I have been adding new users on a system(SOLARIS 8), and one of these 'nice'(?) users has got back to me to complain that his full name isnt showing up when he does the following at the command prompt :
$ finger <login_id>
You see when I added the users details at the command line using... (2 Replies)
Discussion started by: Kanu77
2 Replies
2. UNIX for Dummies Questions & Answers
Dear All,
I am new to linux administration. what is the tool that is used to admin the linux server from remote client using telnet session.
It can be used on the server also but start from command line with out Xwindows.
just like SMIT in AIX.
With Regards,
Varma. (1 Reply)
Discussion started by: jarkvarma
1 Replies
3. Solaris
Folks - any advice on lp commands etc..
I dont use printers on solaris servers, neither do we have any installed but I need to know as much as possible for the solaris admin course...
Any advice on good sources of information for printing commands in general? (1 Reply)
Discussion started by: frustrated1
1 Replies
4. Shell Programming and Scripting
I've been tasked to check whether the user of a script has administrative privileges (as they are needed to run certain parts of the script), and if not notify the user to run the script with admin privileges.
Since the script is to be widely distributed, controlling the file rights will not be... (6 Replies)
Discussion started by: gliesian
6 Replies
5. Debian
Hi everyone, I have an issue with a project of mine. I have to run a program on a terminal which requires to be logged in as su to have it run it. Given that I'm having problem to use expect to give the password I'd like to change the privilege of that program from SU to normal user ( I have the SU... (13 Replies)
Discussion started by: gaisselick87
13 Replies
6. Windows & DOS: Issues & Discussions
Hello,
I have apparently lost all domain admin privledges in Samba. I have had several problems ever since I installed the 1/31 Solaris patch cluster. I had to roll out one Samba update (146363-01), which denied all logons network access. However, this particular problem seems to have begun... (0 Replies)
Discussion started by: stringman
0 Replies
7. Shell Programming and Scripting
Hi,
I need to work on restricting the Linux commands to the ADMIN user to some extent. It means for example, Admin users should not use passwd command to change the password of "root" or other important accounts like oracle, etc.,
So, I want to know which commands should be restricted upto which... (5 Replies)
Discussion started by: Dpu
5 Replies
8. Shell Programming and Scripting
( sleep 3
echo ${LOGIN}
sleep 2
echo ${PSWD}
sleep 2
while read line
do
echo "$line"
PID=$?
sleep 2
kill -9 $PID
done < temp
sleep 5
echo "exit" ) | telnet ${HOST}
while is executing only command and exits. (5 Replies)
Discussion started by: sooda
5 Replies
9. What is on Your Mind?
I am planning to choose my career as Unix/Linux Admin or a DBA. But I have come to know from forums and few admins like the job will be 24/7. I have few questions on that.
Can we get "DAY" shifts in any one of the admin Job ?
Can't we have shift timings in any company ?
Eventhough the... (7 Replies)
Discussion started by: Jacktts
7 Replies
LEARN ABOUT MINIX
captest
CAPTEST:(8) System Administration Utilities CAPTEST:(8)
NAME
captest - a program to demonstrate capabilities
SYNOPSIS
captest [ --drop-all | --drop-caps | --id ] [ --lock ] [ --text ]
DESCRIPTION
captest is a program that demonstrates and prints out the current process capabilities. Each option prints the same report. It will output
current capabilities. then it will try to access /etc/shadow directly to show if that can be done. Then it creates a child process that
attempts to read /etc/shadow and outputs the results of that. Then it outputs the capabilities that a child process would have.
You can also apply file system capabilities to this program to study how they work. For example, filecap /usr/bin/captest chown. Then run
captest as a normal user. Another interesting test is to make captest suid root so that you can see what the interaction is between root's
credentials and capabilities. For example, chmod 4755 /usr/bin/captest. When run as a normal user, the program will see if privilege esca-
lation is possible. But do not leave this app setuid root after you are don testing so that an attacker cannot take advantage of it.
OPTIONS
--drop-all
This drops all capabilities and clears the bounding set.
--drop-caps
This drops just traditional capabilities.
--id This changes to uid and gid 99, drops supplemental groups, and clears the bounding set.
--text This option outputs the effective capabilities in text rather than numerically.
--lock This prevents the ability for child processes to regain privileges if the uid is 0.
SEE ALSO
filecap(8), capabilities(7)
AUTHOR
Steve Grubb
Red Hat June 2009 CAPTEST:(8)