Set-UID Privileged Programs

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/20

flashcard set

Earn XP

Description and Tags

Flashcards covering key vocabulary related to Set-UID Privileged Programs, including definitions of important terms and concepts.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

Privileged Program

A program that is privileged to do important tasks/jobs which a normal user cannot do.

2
New cards

Shadow File

File in Linux where users’ passwords are stored.

3
New cards

Access Control

Basic protection mechanism used in Linux operating system.

4
New cards

User Isolation

Each user will have a different access permissions on a file.

5
New cards

User ID (UID)

Identifies each user on a system.

6
New cards

Root

Has a UID of 0.

7
New cards

Access Control List

Describes which users have which permissions on a file.

8
New cards

passwd program

Used to change password in Linux.

9
New cards

Daemons

Computer program that runs as the background process; needs to run as root or other privileged users.

10
New cards

Set-UID Programs

Program marked with a special bit; special bit tells OS that this is a special program and should be treated specially.

11
New cards

Set-UID Concept

Allow users to run programs with temporary elevated privileges.

12
New cards

Real UID (RUID)

Identifies real owner of process.

13
New cards

Effective UID (EUID)

Identifies privilege of a process; access control is based on this.

14
New cards

/bin/id command(program)

Used to print the user IDs of running processes.

15
New cards

Buffer Overflow

Overflowing a buffer to run malicious code.

16
New cards

Format String Vulnerability

Changing program behavior using user inputs as format strings.

17
New cards

Environment Variables

These are set of named-values e.g. PATH is an environmental variable.

18
New cards

PATH Environment Variable

Used by shell programs to locate a command if the user does not provide the full path for the command.

19
New cards

Capability Leaking

Privileged programs downgrade themselves during execution.

20
New cards

Principle of Isolation

Don’t mix code and data.

21
New cards

Principle of Least Privilege

A privileged program should be given the power which is required to perform it’s tasks.