Information Security Against Penetrating a UNIX System Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

For this example, let us assume that the target system is connected to the Internet, and we are able to obtain root privileges on it. We also assume that we have an unprivileged account on our system, and it has a dynamically loaded kernel – means modules are added to the kernel at run-time through the program loadmodule. The important point to note is that the program loadmodule is privileged because it updates the kernel tables, and therefore, it can allow us, an unprivileged user, to execute a privileged process.

As already mentioned above, the program loadmodule loads the module dynamically. To load the module, the program loadmodule first validates the module as being a dynamically loadable module, and then invokes the dynamic loader ld.so to load the module. The program loadmodule also uses another program, arch, to determine the architecture of the system. The program loadmodule invokes the programs, ld.so and arch, at path “/bin/arch” and “/bin/ld.so” through a library function system.

At this point, we assume that a library function system does not reset any part of the environment. We also assume that in a system call, the environment in which we execute loadmodule, is passed to the subprocesses, and these subprocesses are run as root. Based on our assumption, we set the PATH variable to have “.” as the first directory to force our environment to look for programs in our local directory first, and then in system directories.

The library function system invokes the command interpreter sh. The IFS environment variable has as its value characters used to separate words in commands that sh executes. At this point, we change the value of IFS to include “/”, and reset PATH and IFS environment variables. Now to verify the penetration in a UNIX system, we can write a small program that prints out its effective UID, name it bin, move it to the current working directory, and run loadmodule program. If everything goes right then the process shall print its effective UID as 0 (root).

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, April 22). Information Security Against Penetrating a UNIX System. https://ivypanda.com/essays/information-security-against-penetrating-a-unix-system/

Work Cited

"Information Security Against Penetrating a UNIX System." IvyPanda, 22 Apr. 2022, ivypanda.com/essays/information-security-against-penetrating-a-unix-system/.

References

IvyPanda. (2022) 'Information Security Against Penetrating a UNIX System'. 22 April.

References

IvyPanda. 2022. "Information Security Against Penetrating a UNIX System." April 22, 2022. https://ivypanda.com/essays/information-security-against-penetrating-a-unix-system/.

1. IvyPanda. "Information Security Against Penetrating a UNIX System." April 22, 2022. https://ivypanda.com/essays/information-security-against-penetrating-a-unix-system/.


Bibliography


IvyPanda. "Information Security Against Penetrating a UNIX System." April 22, 2022. https://ivypanda.com/essays/information-security-against-penetrating-a-unix-system/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1