12-24-2007
Spoofing paths.
There is a program that I am trying to run on a shell account. It depends on another program, which I have also copied to the shell account. Both are in my home directory, yet the first program has a different path hardcoded into it, which I cannot use because of permissions problems.
How can I trick the first program into running the second one from a different path?
Last edited by fahadsadah; 12-25-2007 at 04:47 AM..
Reason: typo
7 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi, I am currently using Mailx to send a mail message from my unix account via an SMTP relay. This is working ok.
However from the recipient end the FROM address they see on mails received is <unix account>@<domain> eg prod@liveserver.com
Is there anyway I can spoof this FROM address from the... (1 Reply)
Discussion started by: jimthompson
1 Replies
2. Cybersecurity
Hello all, i need your quick help. I have assignment project class to make a program using pcap library to spoofing DNS in linux environment. Can anyone help me, because i'm newbie in network security and in C?:confused:
Regards,
ptrfw (1 Reply)
Discussion started by: riska_bali
1 Replies
3. Cybersecurity
There is a question in the SCO section asking for information on how to change the MAC address of a NIC. Is there a valid reason for wanting to change the MAC address? (1 Reply)
Discussion started by: jgt
1 Replies
4. Solaris
Hi everybody!
I'm facing a problem and I doubt about the solution (I'm not very familiar with old *NIXs).
An external network supplier (let's call them "telco") just installed new communication components that filters MAC addresses.
I have a Solaris 5 server, with 1 NIC (hte0) which is... (6 Replies)
Discussion started by: Isharfoxat
6 Replies
5. OS X (Apple)
I tried to use the command
sudo ifconfig en0 ether xx:xx:xx:xx:xx:xx
to do mac spoofing for internet connection in my office. It works only for 5 minutes. Every time after about 5mins, the Internet will be disconnected. :wall:
Any one knows how to solve this problem? Thanks. (6 Replies)
Discussion started by: andrewust
6 Replies
6. IP Networking
Hi, I'm trying to find a way to protect my network against arp spoofing.
What it is:
An attacker sends fake arp packets in the network, identifying himself as the router. All network traffic is then redirected to this attacker.
How to protect myself:
In my opinion, the best possible... (2 Replies)
Discussion started by: chrisperry
2 Replies
7. UNIX for Dummies Questions & Answers
I have a machine (IP:192.168.1.185) and i want to send spoofed IP address (e.g. 192.168.1.212) to another machine(192.168.1.213) . I am using a spoofing program for this which uses raw sockets.
Now whenever i pass the parameters(spoofed ip addr and destination) to the output of the program, i... (2 Replies)
Discussion started by: syncmaster
2 Replies
CHSH(1) User Commands CHSH(1)
NAME
chsh - change login shell
SYNOPSIS
chsh [options] [LOGIN]
DESCRIPTION
The chsh command changes the user login shell. This determines the name of the user's initial login command. A normal user may only change
the login shell for her own account; the superuser may change the login shell for any account.
OPTIONS
The options which apply to the chsh command are:
-h, --help
Display help message and exit.
-R, --root CHROOT_DIR
Apply changes in the CHROOT_DIR directory and use the configuration files from the CHROOT_DIR directory.
-s, --shell SHELL
The name of the user's new login shell. Setting this field to blank causes the system to select the default login shell.
If the -s option is not selected, chsh operates in an interactive fashion, prompting the user with the current login shell. Enter the new
value to change the shell, or leave the line blank to use the current one. The current shell is displayed between a pair of [ ] marks.
NOTE
The only restriction placed on the login shell is that the command name must be listed in /etc/shells, unless the invoker is the superuser,
and then any value may be added. An account with a restricted login shell may not change her login shell. For this reason, placing /bin/rsh
in /etc/shells is discouraged since accidentally changing to a restricted shell would prevent the user from ever changing her login shell
back to its original value.
FILES
/etc/passwd
User account information.
/etc/shells
List of valid login shells.
/etc/login.defs
Shadow password suite configuration.
SEE ALSO
chfn(1), login.defs(5), passwd(5).
shadow-utils 4.5 01/25/2018 CHSH(1)