linux-admin.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* Root Permissions
@ 2004-07-01  5:04 Anindya Mozumdar
  2004-07-01  5:34 ` Ahsan Ali
  2004-07-01  8:42 ` Anindya Mozumdar
  0 siblings, 2 replies; 8+ messages in thread
From: Anindya Mozumdar @ 2004-07-01  5:04 UTC (permalink / raw)
  To: linux-admin

Hi,
   The following problem may be trivial to some of you, however my
   knowledge of linux is limited, and I dont understand how can it be
   done.
   In our institute, we use Debian Linux, and the boot loader is lilo.
   For those machines where the lilo password is not set, ANY ONE can
   get a root shell by simply interrupting the boot process and typing
   linux init=/bin/sh in the boot prompt.
   One of my friends obtained a root shell in this manner, and has
   either made some changes, or set up some program, by which he can
   become root any time, without acutally knowing the root password,
   which is known only to our system administrator. What may be the
   possible things he has done to setup his program, and how can it be
   reversed ?
   Thanks in advance.
Anindya Mozumdar.

^ permalink raw reply	[flat|nested] 8+ messages in thread
* RE: Root Permissions
@ 2004-07-01  8:51 Craig McDonald
  0 siblings, 0 replies; 8+ messages in thread
From: Craig McDonald @ 2004-07-01  8:51 UTC (permalink / raw)
  To: 'linux-admin@vger.kernel.org'

www.chkrootkit.org

The above mentioned util will find any rootkits (well, the ones that we
currently know about) and sniffer logs. Shoud be what you are looking for.

Rootkits are fairly easy to find but it is script kiddie behaviour.
I take it you are not involved in administrating these machines at your
institute ?

Craig 


-----Original Message-----
From: Anindya Mozumdar [mailto:anindya@cmi.ac.in]
Sent: 01 July 2004 09:43
To: linux-admin@vger.kernel.org
Subject: Re: Root Permissions


Hi,
   Probably I framed the question badly, so everyone has misunderstood
   what I asked. I am not at all interested in reinstalling or
   preventing my friend from doing what he wants. I wanted to know what
   he may have possibly setup so that he can become root any time, so
   that I can do the same. And I wanted to know how it can be reversed,
   so that my own system is protected from such attacks.
Thanks.
Anindya.

On Thu, Jul 01, 2004 at 10:34:25AM +0530, Anindya Mozumdar wrote:
> Hi,
>    The following problem may be trivial to some of you, however my
>    knowledge of linux is limited, and I dont understand how can it be
>    done.
>    In our institute, we use Debian Linux, and the boot loader is lilo.
>    For those machines where the lilo password is not set, ANY ONE can
>    get a root shell by simply interrupting the boot process and typing
>    linux init=/bin/sh in the boot prompt.
>    One of my friends obtained a root shell in this manner, and has
>    either made some changes, or set up some program, by which he can
>    become root any time, without acutally knowing the root password,
>    which is known only to our system administrator. What may be the
>    possible things he has done to setup his program, and how can it be
>    reversed ?
>    Thanks in advance.
> Anindya Mozumdar.
> -
> To unsubscribe from this list: send the line "unsubscribe linux-admin" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
----------------------------------------------------------------------------
---

Anindya Mozumdar
anindya (at) cmi (dot) ac (dot) in

"Bad language isn't second nature to me - it's first. Bad language and bad
 behaviour. It's a f****** winning combination, you've got to admit."
- Ozzy Osbourne
-
To unsubscribe from this list: send the line "unsubscribe linux-admin" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

^ permalink raw reply	[flat|nested] 8+ messages in thread

end of thread, other threads:[~2004-07-02 18:27 UTC | newest]

Thread overview: 8+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2004-07-01  5:04 Root Permissions Anindya Mozumdar
2004-07-01  5:34 ` Ahsan Ali
2004-07-01  8:13   ` Alexander Economou
2004-07-02 18:27   ` Bradley Hook
2004-07-01  8:42 ` Anindya Mozumdar
2004-07-01 13:25   ` Adam Lang
2004-07-02  7:12   ` Miguel González Castaños
  -- strict thread matches above, loose matches on Subject: below --
2004-07-01  8:51 Craig McDonald

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).