First page Back Continue Last page Summary Graphic
A Survey of Vulnerability and Attacks
SUID Scripts and Programs
- scripts and programs that run with the real or effective user identifier (UID) set to someone else other the user who invoked the script or program.
Trusted Hosts
- The use of trusted host files often permits an exploit of one system to spread throughout an entire network.
- /etc/hosts.equiv
- $HOME/.rhosts