System Software-I. Unit 8.
Process Credentials.
Permissions at the user level.
Determining the access category.
Real and effective IDs.
The setuid and setgid special permission bits.
System calls.
Hacking attempt setuid(0).
Script to identify setuid-root and setgid programs.
Saved-set UID.
The setres[u|g]id(2) system calls.
Source code.
Exercises.
Go back to Main Menu
Last Updated 18 Oct, 2020 14:18. <vadimov@i.ua>