06-08-2006
Permissions
Hi everyone, I'm looking for some information concerning Unix permissions. I am new to Unix and am doing research for a graduate class. Given the permissions below, can anyone give me five unique exploits that would be available to a hacker/cracker given this configuaration?
-rw-rw-rw- 1 root root 948 Feb 04 08:32 shadow
-rwxrwxrwx 1 root root 1823 Feb 04 08:32 passwd
I have been trying to do Google searches and have not been having much luck wading through all of the hits. Any help will be greatly appreciated. Thanks and have a great day.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
with permission set to d-wx--x--x directoryname
Why can't I do a long-listing on this directory? Is read access necessary? (1 Reply)
Discussion started by: mma_buc_98
1 Replies
2. UNIX for Dummies Questions & Answers
Can anyone help explain the "s" in the below permissions example. I was reading about the "sticky bit" (t) but I am a little confused.
On file "test"
wolf% chmod 4777 test
wolf% ls -l
total 4
drwx------ 2 john staff 512 Mar 19 21:34 nsmail
-rwsrwxrwx 1 john staff ... (2 Replies)
Discussion started by: finster
2 Replies
3. UNIX for Dummies Questions & Answers
I saved a perl code in xemacs. I used an xterminal to execute it but unix said that I don't have permission. I saved the files in my home directory. How do I change the permission. This is hat unix said:
-ksh: ./names.pl: cannot execute (5 Replies)
Discussion started by: lnatz
5 Replies
4. HP-UX
Hey,
We've got quite a strange problem on our hands here. We are running an HP 9000/800 B.11.00.
I've just created a new group in /etc/group which i called, let's say newgroup . Then I added 4 users to the group, namely user1, user2, user3, user4 . The command grpchk shows no strange things... (4 Replies)
Discussion started by: chrizz
4 Replies
5. UNIX for Dummies Questions & Answers
to prohibit 'others' from deleting files, what should we omit: write or execute?
thx (9 Replies)
Discussion started by: melanie_pfefer
9 Replies
6. HP-UX
Hi,
I am a Unix Admin. I have to give the permissions to a user for creating new file in a directory in HP-Ux 11.11 system since he cannot able to create a new file in the directory.
Thanks in advance.
Mike (3 Replies)
Discussion started by: Mike1234
3 Replies
7. Shell Programming and Scripting
My /tmp is set with the following permissions (777) and a 't' at the end.
My umask is set to 022.
When I create a directory under /tmp (tmp/xx) it gets created as 755
as expected.
Yet when I create a file within that directory (/tmp/xx/yy) the permissions
are not 755 they are 644.
... (1 Reply)
Discussion started by: BeefStu
1 Replies
8. Shell Programming and Scripting
Hi, I am creating a ksh script to search for a string of text inside files within a directory tree. Some of these file are going to be read/execute only. I know to use chmod to change the permissions of the file, but I want to preserve the original permissions after writing to the file. How can I... (3 Replies)
Discussion started by: right_coaster
3 Replies
9. UNIX for Dummies Questions & Answers
Hi,
I have noticed that on my Linux box there is a nice feature which make it impossible for specified member (owner, group or other) to have an given access if a member from which we would expect it more don't have that access.
So it is impossible to read file by all if others have set read... (3 Replies)
Discussion started by: DavidMax
3 Replies
10. Shell Programming and Scripting
Hi guys,
i write the below script to make the user get to the directory that interesting. Now what I am trying is to check the permissions of the directory and if the directory exists to check the reading options.
echo "Please enter your desire folder directory ( \yourfolders) ?: \c"
... (9 Replies)
Discussion started by: mikerousse
9 Replies
NBDST(8) BSD System Manager's Manual NBDST(8)
NAME
nbdst -- NetBoot deferred shadow tool
SYNOPSIS
nbdst [-recycle | -preallocate size] devnode shadowfile
DESCRIPTION
nbdst is used during NetBoot to associate a shadow file with the disk image being used as the root device. After the shadow file is attached,
subsequent writes to the root device will be redirected to the shadow file, which normally resides on local storage. nbdst is invoked by
/etc/rc.netboot
ARGUMENTS
The following arguments must be specified:
devnode The device node of the root device, in the form "disk0"
shadowfile Path to a shadow file which will be created and associated with the NetBoot root device
OPTIONS
-recycle If a shadow file already exists, reset it and use it again. Otherwise, information written to an existing shadow file will reap-
pear. Reusing a previous shadow file without resetting it requires that the shadow file be created with the same base image.
-preallocate size
Set the shadow file to the given size up front. This forces a reset of the shadow file (like -recycle).
NOTE
nbdst can only be run as root.
SEE ALSO
hdiutil(1), hdik(8)
Mac OS X 29 Apr 2003 Mac OS X