I have a C wrapper programme which basically execute a shell script. The shell script has 700 as permission and oracle is owner of the shell script.
The C execuatble has 4711 permission so that means that it has setuid bit set and group and others can execute the C executable.
The reason why I am... (2 Replies)
I have a file containing social security numbers with the format ###-##-####. I need to read each record in this file, reformat the SSN to the format #########, and write the record with the reformatted SSN to a new file. I am a UNIX newbie. I think I need to use either the sed or awk commands, but... (2 Replies)
In Solaris 9, when I built users, there was an option for No Password -- Setuid Only. Now that I'm using Solaris 10, I no longer can find that option.
Is there an equivalent option of No Password --Setuid Only in Solaris 10?
Thanks,
LeonD (1 Reply)
Hi all,
I am parsing command line options using getopts.
The problem is that mandatory argument options following ":" is taking next option as argument if it is not followed by any argument.
Below is the script:
while getopts :hd:t:s:l:p:f: opt
do
case "$opt" in
-h|-\?)... (2 Replies)
Hey all, I need to remove the ro option from an fs on a zone. Does anyone know how to do this without removing the fs and recreating it?
fs:
dir: /home/em23/prod
special: /export/zones/em23/root/ftp/prod
raw not specified
type: lofs
options: (1 Reply)
To find all the files in your home directory that have been edited in some way since the last tar file, use this command:
find . -newer backup.tar.gz
Is anyone familiar with an older solution?
looking to identify files older then 15mins across several directories.
thanks,
manny (2 Replies)
Hi Gurus,
I need your suggestions,to implement setuid.
Here is the situation. I have a user xyz on a solaris zone.He needs to install a package using a pkgadd command but i guess only a root can run that .Is there any way I can set the setuid bit on the pkgadd which is in the location... (6 Replies)
Just learning about the privilege escalation method provided by setuid. Correct me if I am wrong but what it does is change the uid of the current process to whatever uid I set. Right ?
So what stops me from writing my own C program and calling setuid(0) within it and gaining root privileges ?
... (2 Replies)
Discussion started by: sreyan32
2 Replies
LEARN ABOUT LINUX
checksecurity
CHECKSECURITY(8) System Manager's Manual CHECKSECURITY(8)NAME
checksecurity - Run a collection of simple system checks
SYNOPSIS
checksecurity
DESCRIPTION
The checksecurity command runs a small collection of simple system checks which are designed to catch a few common security issues. check-
security is run by cron in a daily basis.
CONFIGURATION
The checksecurity.conf file defines several configuration variables: MAILTO, CHECK_DISKFREE, CHECK_PASSWD and CHECK_SETUID LOGDIR. Each is
described below.
The checksecurity program works with a collection of plugins which are located in /usr/share/checksecurity and are configured individually
by their own configuration file.
CHECK_PASSWD If this is set to TRUE then the check-passwd script will be invoked. This script is designed to report upon system accounts
which have no passwords. CHECK_DISKFREE If this is set to TRUE then the check-diskfree script will be invoked and will allow an alert to
be sent if there is any mounted partition is running short on disk space. CHECK_SETUID If this is set to TRUE then the check-setuid script
will be invoked, this will compare the setuid binaries upon the system to those that existed previously and show the differences.
FILES
/etc/checksecurity.conf
checksecurity configuration file
SEE-ALSO
See also check-diskfree(8), check-setuid(8), and check-passwd(8)Debian Linux 2 February 1997 CHECKSECURITY(8)