Registered since September 28th, 2017
Has a total of 3445 bookmarks.
Showing top Tags within 1 bookmarks
Tag selected: privileged.
Saved by uncleflo on January 4th, 2019.
If a user wants to execute a command, he has to first log in into a system. But some users in the system have /bin/false or /sbin/nologin set as a default shell in the /etc/password file. If I change /bin/bash to /bin/false in case of my user, I won't be able to log in into the system, so I also won't be able to run commands. But the shellless users do it anyway: How can a user without a shell execute a command? In POSIX, every running process has three User IDs (UIDs) associated with it; the real UID, which identifies the user who launched the process, the effective UID, which is used to determine what resources the process can access, and the saved Set-User-ID (SUID), which is the effective UID the process had when it started (at the point of the last exec() call). Of these, the effective UID is the most significant, since it is the one used when determining access control decisions regarding the process.
No further bookmarks found.