Spoofing paths.

Thread Tools Search this Thread
Top Forums UNIX for Advanced & Expert Users Spoofing paths.
# 1  
Old 12-24-2007
Spoofing paths.

There is a program that I am trying to run on a shell account. It depends on another program, which I have also copied to the shell account. Both are in my home directory, yet the first program has a different path hardcoded into it, which I cannot use because of permissions problems.

How can I trick the first program into running the second one from a different path?

Last edited by fahadsadah; 12-25-2007 at 04:47 AM.. Reason: typo
# 2  
Old 12-24-2007
chroot, but it sounds like alot of overkill.
# 3  
Old 12-25-2007
The whole reason I was trying to spoof the path was because I didn't have root - are there any alterenatives that can be run as a standard user please?

Thank you for your help.
# 4  
Old 12-26-2007
modify PATH

Try modifying the PATH variable. if you are calling script2 from script1 like this
$> cat script1.sh
export PATH=/some/user/dir
script2.sh args

then, changing PATH wont be a solution. If the PATH is not set in the script1.sh before calling script2.sh like
$> cat script1.sh
script2.sh args

then try this
$> export PATH=.:$PATH
$> which script2.sh -->check if this is pointing to the correct script
$> script1.sh --> this should call the required script2.sh

I hope I understood the requirement clearly!!!
Login or Register to Ask a Question

Previous Thread | Next Thread

7 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Running into problems while spoofing IP Address

I have a machine (IP: and i want to send spoofed IP address (e.g. to another machine( . I am using a spoofing program for this which uses raw sockets. Now whenever i pass the parameters(spoofed ip addr and destination) to the output of the program, i... (2 Replies)
Discussion started by: syncmaster
2 Replies

2. IP Networking

Protection against arp spoofing

Hi, I'm trying to find a way to protect my network against arp spoofing. What it is: An attacker sends fake arp packets in the network, identifying himself as the router. All network traffic is then redirected to this attacker. How to protect myself: In my opinion, the best possible... (2 Replies)
Discussion started by: chrisperry
2 Replies

3. OS X (Apple)

ethernet mac spoofing

I tried to use the command sudo ifconfig en0 ether xx:xx:xx:xx:xx:xx to do mac spoofing for internet connection in my office. It works only for 5 minutes. Every time after about 5mins, the Internet will be disconnected. :wall: Any one knows how to solve this problem? Thanks. (6 Replies)
Discussion started by: andrewust
6 Replies

4. Solaris

MAC spoofing a virtual NIC on Solaris 5.0

Hi everybody! I'm facing a problem and I doubt about the solution (I'm not very familiar with old *NIXs). An external network supplier (let's call them "telco") just installed new communication components that filters MAC addresses. I have a Solaris 5 server, with 1 NIC (hte0) which is... (6 Replies)
Discussion started by: Isharfoxat
6 Replies

5. Cybersecurity

MAC Address spoofing

There is a question in the SCO section asking for information on how to change the MAC address of a NIC. Is there a valid reason for wanting to change the MAC address? (1 Reply)
Discussion started by: jgt
1 Replies

6. Cybersecurity

Help Make a spoofing DNS using pcap library

Hello all, i need your quick help. I have assignment project class to make a program using pcap library to spoofing DNS in linux environment. Can anyone help me, because i'm newbie in network security and in C?:confused: Regards, ptrfw (1 Reply)
Discussion started by: riska_bali
1 Replies

7. UNIX for Dummies Questions & Answers

Spoofing a From Address in SMTP

Hi, I am currently using Mailx to send a mail message from my unix account via an SMTP relay. This is working ok. However from the recipient end the FROM address they see on mails received is <unix account>@<domain> eg prod@liveserver.com Is there anyway I can spoof this FROM address from the... (1 Reply)
Discussion started by: jimthompson
1 Replies
Login or Register to Ask a Question