Question: After poking around your Unix - based system as the user laura , you stumble to find the following file in / sbin : -
After poking around your Unixbased system as the user laura you stumble to find the following file in sbin :
rwsrwxrx root laura K May : ping
What's the potential security vulnerability? How might you use this file to escalate your privileges to root? Assume that ping does not have any vulnerabilities in its implementation. Modern versions of Linux try to prevent this security escalation. What is the defensive behavior?
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
