On 10/30/23 18:36, Samuel Sieb wrote:
On 10/30/23 18:15, ToddAndMargo via users wrote:
Hi All,
It seems to me that since /etc/sudoers is visible from a
standard user account, that all a bad guy has to do is
cat the file, find some program that is elevated, then
overwrite that program with his e
On 10/30/23 19:11, Todd Zullinger wrote:
Samuel Sieb wrote:
On 10/30/23 18:15, ToddAndMargo via users wrote:
Hi All,
It seems to me that since /etc/sudoers is visible from a
standard user account, that all a bad guy has to do is
cat the file, find some program that is elevated, then
overwrite
Samuel Sieb wrote:
> On 10/30/23 18:15, ToddAndMargo via users wrote:
>> Hi All,
>>
>> It seems to me that since /etc/sudoers is visible from a
>> standard user account, that all a bad guy has to do is
>> cat the file, find some program that is elevated, then
>> overwrite that program with his evi
On 10/30/23 18:15, ToddAndMargo via users wrote:
Hi All,
It seems to me that since /etc/sudoers is visible from a
standard user account, that all a bad guy has to do is
cat the file, find some program that is elevated, then
overwrite that program with his evil deeds, and boom,
you are hacked.
A
Hi All,
It seems to me that since /etc/sudoers is visible from a
standard user account, that all a bad guy has to do is
cat the file, find some program that is elevated, then
overwrite that program with his evil deeds, and boom,
you are hacked.
Am I missing something?
-T
--
~~