How can you find out about the suid programs on your system: the thing to do is to get a list of all suid programs on your system and start the boring task of going through them.
But, again, fear not for logic is your best friend here. Just browse through the list of all suid programs, and find those that you use, sometimes or frequently or never use.
But, I must warn you, the list could be looooong. Ok, here we go, type the following line of course as root :. And the output, after a while, it depends on the amount of suid programs on your system will resemble something like this. These are also dangerous, as they provide more ways to manipulate with your system.
Also, an unowned file may be a signal indicating an intruder on your system. Add a comment. Active Oldest Votes. Improve this answer. Roman Nikitchenko Roman Nikitchenko I appreciate your answer, but it still doesn't work.
You are not in group 0. David Hoelzer David Hoelzer Change chown root. Note: some file systems require the setuid allowed option to be set when mounted. In order to allow setuid operations. Check your mountpoint. Sign up or log in Sign up using Google. Sign up using Facebook. Sign up using Email and Password. Post as a guest Name. Email Required, but never shown.
The Overflow Blog. Stack Gives Back Add a comment. Active Oldest Votes. Improve this answer. Armali Armali Below comes from setuid 2 : The setuid function sets the real and effective user IDs and the saved set-user-ID of the current process to the specified value.
Sign up or log in Sign up using Google. Sign up using Facebook. Sign up using Email and Password. Post as a guest Name. Email Required, but never shown. The Overflow Blog.
Stack Gives Back Safety in numbers: crowdsourcing data on nefarious IP addresses. Featured on Meta.
0コメント