Top Banner
40

ch01 - Hacking Linux Exposed

Feb 12, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: ch01 - Hacking Linux Exposed
Page 2: ch01 - Hacking Linux Exposed

T

Page 3: ch01 - Hacking Linux Exposed

Internet) they’d like to make available, or maybe they just want to store MP3s or theirMPEGs of questionable moral content.

They Want Your Data Crackers may want your business’s trade secrets for personal use orto sell. Or they may want your bank records or credit card numbers.

They Want to Destroy They may just want to wreak havoc. The sad fact is that some peo-ple in the world like to sabotage other people’s computer systems for no other reasonthan that they can. Maybe they think it is cool, or maybe they have destructive personali-

Page 4: ch01 - Hacking Linux Exposed
Page 5: ch01 - Hacking Linux Exposed
Page 6: ch01 - Hacking Linux Exposed
Page 7: ch01 - Hacking Linux Exposed
Page 8: ch01 - Hacking Linux Exposed
Page 9: ch01 - Hacking Linux Exposed
Page 10: ch01 - Hacking Linux Exposed
Page 11: ch01 - Hacking Linux Exposed

printing functions (lp stands for line printer). The actual system users on your machinedepend on your Linux distribution and the software you have installed.

Linux GroupsLinux implements the concept of groups. A group is a collection of one or more users. It isoften convenient to collect a number of users together to define properties for the group,suc927.s onvtrolson ywhatthe y can or cannot access

Page 12: ch01 - Hacking Linux Exposed
Page 13: ch01 - Hacking Linux Exposed
Page 14: ch01 - Hacking Linux Exposed
Page 15: ch01 - Hacking Linux Exposed
Page 16: ch01 - Hacking Linux Exposed
Page 17: ch01 - Hacking Linux Exposed
Page 18: ch01 - Hacking Linux Exposed
Page 19: ch01 - Hacking Linux Exposed
Page 20: ch01 - Hacking Linux Exposed
Page 21: ch01 - Hacking Linux Exposed
Page 22: ch01 - Hacking Linux Exposed
Page 23: ch01 - Hacking Linux Exposed
Page 24: ch01 - Hacking Linux Exposed
Page 25: ch01 - Hacking Linux Exposed
Page 26: ch01 - Hacking Linux Exposed
Page 27: ch01 - Hacking Linux Exposed
Page 28: ch01 - Hacking Linux Exposed

In this example, chroot will change root to the /usr/local/convict directoryand then run your program, /bin/convict. Because the chroot is performed first, theprogram /bin/convict actually resides in /usr/local/convict/bin/convicton the real filesystem.

Setting Up a chroot Jail DirectoryOne problem withchrooting your software is that all the programs and libraries that areneeded by your software must be copied into the chroot directory, which we usuallycall a chroot

Page 29: ch01 - Hacking Linux Exposed
Page 30: ch01 - Hacking Linux Exposed
Page 31: ch01 - Hacking Linux Exposed
Page 32: ch01 - Hacking Linux Exposed
Page 33: ch01 - Hacking Linux Exposed
Page 34: ch01 - Hacking Linux Exposed
Page 35: ch01 - Hacking Linux Exposed
Page 36: ch01 - Hacking Linux Exposed
Page 37: ch01 - Hacking Linux Exposed
Page 38: ch01 - Hacking Linux Exposed
Page 39: ch01 - Hacking Linux Exposed
Page 40: ch01 - Hacking Linux Exposed