Advanced Exercises


8.

Give the command

$ /sbin/fuser -uv /


What is this a list of? Why is it so long? Give the same command as root (or ask the system administrator to do so and email you the results). How does this list differ from the first? Why is it different?

9.

When it puts files in a lost+found directory, fsck has lost the directory information for the files and thus has lost the names of the files. Each file is given a new name, which is the same as the inode number for the file:

$ ls lg lost+found rwrr 1 alex pubs   110 Jun 10 10:55 51262


What can you do to identify these files and restore them?

10.

Take a look at /usr/bin/lesspipe.sh. Explain what it does and six ways it works.

11.

Why are setuid shell scripts inherently unsafe?

12.

When a user logs in, you would like the system to first check the local /etc/passwd file for a username and then check NIS. How do you implement this strategy?

13.

Some older kernels contain a vulnerability that allows a local user to gain root privileges. Explain how this kind of vulnerability negates the value of a chroot jail.




A Practical Guide to Red Hat Linux
A Practical Guide to Red HatВ® LinuxВ®: Fedoraв„ў Core and Red Hat Enterprise Linux (3rd Edition)
ISBN: 0132280272
EAN: 2147483647
Year: 2006
Pages: 383

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net