11-28-2018
You still haven't told us what operating system you're using...
Some operating systems NEVER allow shell scripts to be run set-uid.
Some operating systems NEVER allow a running program to be overwritten.
Some operating systems only allow shells specified in a system file to be used to run set-uid scripts.
All of the above are possible reasons why what you're trying might not work on an unspecified operating system.
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
I have a C wrapper programme which basically execute a shell script. The shell script has 700 as permission and oracle is owner of the shell script.
The C execuatble has 4711 permission so that means that it has setuid bit set and group and others can execute the C executable.
The reason why I am... (2 Replies)
Discussion started by: sanjay92
2 Replies
2. UNIX for Dummies Questions & Answers
Hi,
I have been looking at setuid and setgid.
I understand that setuid determines who owns the file and setgid determines which group of people can access the file... yeah?!
But i need to know how to actually use setuid and setgid. I'm guessing chmod will feature somewhere..
Any help... (1 Reply)
Discussion started by: crispy
1 Replies
3. UNIX for Advanced & Expert Users
Hi,
This question deals with Solaris 2.8 and setuid programs. From research I've done so far, setuid programs ignore LD_LIBRARY_PATH; I've proven this and am OK with it. The thing I am not certain of how the C compiler is supposed to behave when it is invoked via a setuid program. Basically,... (0 Replies)
Discussion started by: WolfBoy
0 Replies
4. UNIX for Dummies Questions & Answers
could u plz give me clear idea of spcial permissions setuid,getuid and striky bit . (1 Reply)
Discussion started by: Prem
1 Replies
5. HP-UX
how can I find cpu usage memory usage swap usage and
I want to know CPU usage above X% and contiue Y times and memory usage above X % and contiue Y times
my final destination is monitor process
logical volume usage above X % and number of Logical voluage above
can I not to... (3 Replies)
Discussion started by: alert0919
3 Replies
6. Solaris
Hi All,
Can someone give me some info about setuid or guid topic? Also about sticky bit.
Thanks in advance,
itik (9 Replies)
Discussion started by: itik
9 Replies
7. AIX
How to monitor the IBM AIX server for I/O usage, memory usage, CPU usage, network usage, storage usage? (3 Replies)
Discussion started by: laknar
3 Replies
8. Solaris
Hi Gurus,
I need your suggestions,to implement setuid.
Here is the situation. I have a user xyz on a solaris zone.He needs to install a package using a pkgadd command but i guess only a root can run that .Is there any way I can set the setuid bit on the pkgadd which is in the location... (6 Replies)
Discussion started by: rama krishna
6 Replies
9. UNIX for Dummies Questions & Answers
This is a quote from the Apple security configuration (you can download it from Apple)
" Using ACLs to Restrict Usage of Setuid Programs
The ACL feature of Mac OS X can also be used to restrict the execution of setuid
programs. Restricting the execution of setuid programs to administrators... (3 Replies)
Discussion started by: Vera
3 Replies
10. UNIX for Beginners Questions & Answers
Just learning about the privilege escalation method provided by setuid. Correct me if I am wrong but what it does is change the uid of the current process to whatever uid I set. Right ?
So what stops me from writing my own C program and calling setuid(0) within it and gaining root privileges ?
... (2 Replies)
Discussion started by: sreyan32
2 Replies
synos(1) Mail Avenger 0.8.3 synos(1)
NAME
synos - guess operating system from TCP SYN fingerprint
SYNOPSIS
synos [--mtu mtu] [--db path] syn-fingerprint
DESCRIPTION
synos takes a SYN fingerprint, in the format described for the CLIENT_SYNFP environment variable in the avenger(1) man page, and outputs a
guess as to the type of the client operating system. synos makes use of the OpenBSD SYN fingerprint database (which is also repackaged
with Mail Avenger).
OPTIONS
--mtu val
Certain operating systems set the initial TCP window size based on the maximum transmission unit, or MTU, of the network. For such
operating systems, synos usually checks the window size using both the client's MSS option plus 40 bytes (for TCP and IP headers), or a
hard-coded MTU, which defaults to 1,500 bytes. If either value works, the fingerprint is considered to match the operating system.
You can change the value 1,500 by specifying this option. A value of 0 tells synos to use only the value derived from the MSS option.
--db file
Specifies an alternate location for the SYN fingerprint database.
FILES
/usr/local/share/pf.os
Default location of SYN fingerprint database.
SEE ALSO
avenger(1), asmtpd(8)
The Mail Avenger home page: <http://www.mailavenger.org/>.
The OpenBSD home page: <http://www.openbsd.org/>.
BUGS
The operating system type is determined by heuristics that are not always reliable. Moreover, not all operating systems can be
distinguished. The database may not even contain a client's particular operating system and version.
It is not hard to fool synos deliberately by changing TCP socket options or injecting raw packets onto the network.
AUTHOR
David Mazieres
Mail Avenger 0.8.3 2012-04-05 synos(1)