Preview

Lab #1

Powerful Essays
Open Document
Open Document
2039 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab #1
Computer science department
Data security – Lab # 1

Lab Description
Set-UID is an important security mechanism in Unix operating systems. When a Set-UID program is run, it assumes the owner’s privileges. For example, if the program’s owner is root, then when anyone runs this program, the program gains the root’s privileges during its execution. Set-UID allows us to do many interesting things, but unfortunately, it is also the culprit of many bad things. Therefore, the objective of this lab is two-fold: • Appreciate its good side: understand why Set-UID is needed and how it is implemented. • Be aware of its bad side: understand its potential security problems.

Lab Tasks

This is an exploration lab. Your main task is to ”play” with the Set-UID mechanism in Linux, and write a lab report to describe your discoveries. You are required to accomplish the following tasks in Linux: 1) Figure out why “passwd”, “chsh”, and “su” commands need to be Set-UID programs. What will happen if they are not? If you are not familiar with these programs, you should first learn what they can do by reading their manuals.

2) Run Set-UID shell programs in Linux, and describe and explain your observations. • Login as root, copy /bin/zsh to /tmp, and make it a set-root-uid program with permission 4755. Then login as a normal user, and run /tmp/zsh. Will you get root privilege? Please describe your observation. If you cannot find /bin/zsh in your operating system, please use the following command to install it:

• Instead of copying /bin/zsh, this time, copy /bin/bash to /tmp, make it a set-root-uid program. Run /tmp/bash as a normal user. will you get root privilege? Please describe and explain your observation.

3) (Setup for the rest of the tasks) As you can find out from the previous task, /bin/bash has certain built-in protection that prevent the abuse of the Set-UID mechanism. To see the life before such a protection

You May Also Find These Documents Helpful

  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. By implementing a second level identity check to gain access to sensitive systems, applications, and data; you can protect from unauthorized access to the systems, applications, and data.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    lab 1

    • 627 Words
    • 6 Pages

    18. Take a screen shot of the Add or Remove Snap-ins dialog box, showing the two…

    • 627 Words
    • 6 Pages
    Satisfactory Essays
  • Better Essays

    Is418 Project 1-2-3

    • 1343 Words
    • 6 Pages

    First World Bank Savings and Loan's Linux-based infrastructure requires an in-house custom kernel or a kernel provided by a vendor…

    • 1343 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    NT1430 Chapter 6 labs

    • 297 Words
    • 3 Pages

    You should become comfortable using the Linux command line and the online help utilities to manage files and directories.…

    • 297 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Unix is a multifunctional platform capable of handling several users accessing the same applications and files at once. It accomplishes this by setting up a permissions hierarchy and assigning users into groups. As multifunctional as it is, several problems still exist. For one, it has a command line interface. There is no graphical user interface. Second, privilege changes are made either one by one or all at once. Anything else would need to be scripted.…

    • 680 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Jang, Michael H.. Security strategies in Linux platforms and applications. Sudbury, MA: Jones & Bartlett Learning, 2011.…

    • 1335 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Lab 1

    • 567 Words
    • 3 Pages

    Attacker would avoid detection by covering tracks step of the hacking process where they cover up their tracks in the system they hacked into.…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab 2

    • 639 Words
    • 2 Pages

    with varying amounts of data. In order for scanners to detect this type of virus,…

    • 639 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    lab 2

    • 398 Words
    • 2 Pages

    1. Compare the hash values calculated for example.txt that you documented during this lab. Explain in your own words why the hash values will change when the data is modified.…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    4. Why would you use a tool like DevManView while performing a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unix File

    • 566 Words
    • 3 Pages

    In order to understand how to control access to a file in a system that supports 5,000 users to 4,990 of those users, a basic understanding of the file permissions of a file on a UNIX system is necessary. A user has the ability to perform three basic actions to a file, read, write and execute. These three actions will be represented by r, w, and x respectively. A UNIX system uses a combination of these characters to control the file permissions. The first three characters represent the owner’s permissions, the middle three characters represent the group’s permissions, and the last three characters represent others permission. A sample of file permission would look like the following:…

    • 566 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Emc Grabs Procedure

    • 1591 Words
    • 7 Pages

    This script is provided as a means to collect system and/or software configuration for investigations by EMC. To Install : Extract the tar file into a suitable directory using following command, command: tar -xvf emcgrab_<os>_<version>.tar Please ensure that your filesystem has at least 500M free of disk space for temporary files that may be generated during its processing. If running ECC 5.x the resulting tar file could be very large.…

    • 1591 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    SELinux (Security Enhanced Linux) is a mandatory access control in the Linux kernel that was originally developed by NSA (National Security Agency) with direct contributions provided by Red Hat Enterprise Linux (RHEL) via the Fedora Project. In the day and age of identity theft and attempted sabotage from terrorists against our country, it should be very apparent why an organization like NSA had such an interest in heading up development of a more secure way to better protect our nation’s computer systems. In a world so largely dependent on computer systems, inadequate security measures could lead to anything from having a single person’s financial information compromised to an electronic 9/11 against some of our country’s most secure federal computer networks. In the modern computer based society we live in, security is essential to protecting everything from personal desktops all the way up to the most secure federal databases. And many corporate and government level computers are based on the Linux kernel. SELinux has 3 states it can be in if on a system: Enabled, Disabled, and Permissive. Enforcing means SELinux security policy is active, Disabled means SELinux security policy is not active, and Permissive is a diagnostic state commonly used for troubleshooting.…

    • 1126 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Ipc System

    • 2267 Words
    • 10 Pages

    Several IPC mechanisms are available for POSIX systems, including shared memory and message passing. Here, we explore the POSIX API for shared memory. A process must first create a shared-memory segment using the shmget() system call (shmget() is derived from SHared Memory GET). The following example illustrates the use of shmget(): segment id = shmget(IPC PRIVATE, size, S IRUSR | S IWUSR); This first parameter specifies the key (or identifier) of the shared-memory segment. If this is set to IPC PRIVATE, a newshared-memory segment is created. The second parameter specifies the size (in bytes) of the shared-memory segment. Finally, the third parameter identifies the mode, which indicates how the shared-memory segment is to be used—that is, for reading, writing, or both. By setting the mode to S IRUSR | S IWUSR, we are indicating that the owner may read or write to the shared-memory segment. A successful call to shmget() returns an integer identifier for the shared-memory segment. Other processes that want to use this region of shared memory must specify this identifier. Processes that wish to access a shared-memory segment must attach it to their address space using the shmat() (SHared Memory ATtach) system call. The call to shmat() expects three parameters as well. The first is the integer identifier of the shared-memory segment being attached, and the second is a pointer location in memory indicating where the shared memory will be…

    • 2267 Words
    • 10 Pages
    Better Essays
  • Good Essays

    In a multiprogramming and time sharing environment, several users share the system simultaneously. This situation can results in various security problems.…

    • 752 Words
    • 4 Pages
    Good Essays