Sponsored Content
Full Discussion: Spoofing paths.
Top Forums UNIX for Advanced & Expert Users Spoofing paths. Post 302153705 by ranj@chn on Wednesday 26th of December 2007 07:57:25 AM
Old 12-26-2007
modify PATH

Try modifying the PATH variable. if you are calling script2 from script1 like this
Code:
$> cat script1.sh
#!/bin/ksh
export PATH=/some/user/dir
script2.sh args

then, changing PATH wont be a solution. If the PATH is not set in the script1.sh before calling script2.sh like
Code:
$> cat script1.sh
#!/bin/ksh
script2.sh args

then try this
Code:
$> export PATH=.:$PATH
$> which script2.sh -->check if this is pointing to the correct script
$> script1.sh --> this should call the required script2.sh

I hope I understood the requirement clearly!!!
 

7 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Spoofing a From Address in SMTP

Hi, I am currently using Mailx to send a mail message from my unix account via an SMTP relay. This is working ok. However from the recipient end the FROM address they see on mails received is <unix account>@<domain> eg prod@liveserver.com Is there anyway I can spoof this FROM address from the... (1 Reply)
Discussion started by: jimthompson
1 Replies

2. Cybersecurity

Help Make a spoofing DNS using pcap library

Hello all, i need your quick help. I have assignment project class to make a program using pcap library to spoofing DNS in linux environment. Can anyone help me, because i'm newbie in network security and in C?:confused: Regards, ptrfw (1 Reply)
Discussion started by: riska_bali
1 Replies

3. Cybersecurity

MAC Address spoofing

There is a question in the SCO section asking for information on how to change the MAC address of a NIC. Is there a valid reason for wanting to change the MAC address? (1 Reply)
Discussion started by: jgt
1 Replies

4. Solaris

MAC spoofing a virtual NIC on Solaris 5.0

Hi everybody! I'm facing a problem and I doubt about the solution (I'm not very familiar with old *NIXs). An external network supplier (let's call them "telco") just installed new communication components that filters MAC addresses. I have a Solaris 5 server, with 1 NIC (hte0) which is... (6 Replies)
Discussion started by: Isharfoxat
6 Replies

5. OS X (Apple)

ethernet mac spoofing

I tried to use the command sudo ifconfig en0 ether xx:xx:xx:xx:xx:xx to do mac spoofing for internet connection in my office. It works only for 5 minutes. Every time after about 5mins, the Internet will be disconnected. :wall: Any one knows how to solve this problem? Thanks. (6 Replies)
Discussion started by: andrewust
6 Replies

6. IP Networking

Protection against arp spoofing

Hi, I'm trying to find a way to protect my network against arp spoofing. What it is: An attacker sends fake arp packets in the network, identifying himself as the router. All network traffic is then redirected to this attacker. How to protect myself: In my opinion, the best possible... (2 Replies)
Discussion started by: chrisperry
2 Replies

7. UNIX for Dummies Questions & Answers

Running into problems while spoofing IP Address

I have a machine (IP:192.168.1.185) and i want to send spoofed IP address (e.g. 192.168.1.212) to another machine(192.168.1.213) . I am using a spoofing program for this which uses raw sockets. Now whenever i pass the parameters(spoofed ip addr and destination) to the output of the program, i... (2 Replies)
Discussion started by: syncmaster
2 Replies
FILECAP:(8)						  System Administration Utilities					       FILECAP:(8)

NAME
filecap - a program to see capabilities SYNOPSIS
filecap [ -a | -d | /dir | /dir/file [cap1 cap2 ...] ] DESCRIPTION
filecap is a program that prints out a report of programs with file based capabilities. If a file is not in the report or there is no report at all, no capabilities were found. For expedience, the default is to check only the directories in the PATH environmental variable. If the -a command line option is given, then all directories will be checked. If a directory is passed, it will recursively check that directory. If a path to a file is given, it will only check that file. If the path to the file includes capabilities, then they are written to the file. OPTIONS
-a This tells the program to show all capabilities starting from the / directory. Normally the PATH environmental variable is used to show you capabilities on files you are likely to execute. -d This dumps all capabilities for reference. EXAMPLES
To check file capabilities in $PATH: filecap To check file capabilities of whole system: filecap -a To check file capabilities recursively in a directory: filecap /usr To check file capabilities of a specific program: filecap /bin/passwd To list all possible capabilities: filecap -d To set a file capability on a specific program: filecap /bin/ping net_raw net_admin SEE ALSO
pscap(8), netcap(8), capabilities(7). AUTHOR
Steve Grubb Red Hat March 2009 FILECAP:(8)
All times are GMT -4. The time now is 09:52 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy