Information Security Against Penetrating a UNIX System Essay

Exclusively available on IvyPanda Available only on IvyPanda

For this example, let us assume that the target system is connected to the Internet, and we are able to obtain root privileges on it. We also assume that we have an unprivileged account on our system, and it has a dynamically loaded kernel – means modules are added to the kernel at run-time through the program loadmodule. The important point to note is that the program loadmodule is privileged because it updates the kernel tables, and therefore, it can allow us, an unprivileged user, to execute a privileged process.

We will write a custom essay on your topic a custom Essay on Information Security Against Penetrating a UNIX System
808 writers online

As already mentioned above, the program loadmodule loads the module dynamically. To load the module, the program loadmodule first validates the module as being a dynamically loadable module, and then invokes the dynamic loader ld.so to load the module. The program loadmodule also uses another program, arch, to determine the architecture of the system. The program loadmodule invokes the programs, ld.so and arch, at path “/bin/arch” and “/bin/ld.so” through a library function system.

At this point, we assume that a library function system does not reset any part of the environment. We also assume that in a system call, the environment in which we execute loadmodule, is passed to the subprocesses, and these subprocesses are run as root. Based on our assumption, we set the PATH variable to have “.” as the first directory to force our environment to look for programs in our local directory first, and then in system directories.

The library function system invokes the command interpreter sh. The IFS environment variable has as its value characters used to separate words in commands that sh executes. At this point, we change the value of IFS to include “/”, and reset PATH and IFS environment variables. Now to verify the penetration in a UNIX system, we can write a small program that prints out its effective UID, name it bin, move it to the current working directory, and run loadmodule program. If everything goes right then the process shall print its effective UID as 0 (root).

Print
Need an custom research paper on Information Security Against Penetrating a UNIX System written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2022, April 22). Information Security Against Penetrating a UNIX System. https://ivypanda.com/essays/information-security-against-penetrating-a-unix-system/

Work Cited

"Information Security Against Penetrating a UNIX System." IvyPanda, 22 Apr. 2022, ivypanda.com/essays/information-security-against-penetrating-a-unix-system/.

References

IvyPanda. (2022) 'Information Security Against Penetrating a UNIX System'. 22 April.

References

IvyPanda. 2022. "Information Security Against Penetrating a UNIX System." April 22, 2022. https://ivypanda.com/essays/information-security-against-penetrating-a-unix-system/.

1. IvyPanda. "Information Security Against Penetrating a UNIX System." April 22, 2022. https://ivypanda.com/essays/information-security-against-penetrating-a-unix-system/.


Bibliography


IvyPanda. "Information Security Against Penetrating a UNIX System." April 22, 2022. https://ivypanda.com/essays/information-security-against-penetrating-a-unix-system/.

Powered by CiteTotal, essay reference generator
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1