How can be path variable be used to trick user

Assignment Help Operating System
Reference no: EM131774951

Topic: Operating Systems Security

Part -1

Cloud Computing

Google Cloud
Setting up Google cloud account
Creating project
Creating virtual machine (host computer without any OS)
Installing image (installing an OS)
Starting command shell via SHH
Testing shell commands
Writing shell script
Making shell script executable
Running shell script

Use Google Cloud Starting Page
Use Free Use Option
Register as Paying User
Use Home Menu Option
Create New Machine
Create VM Machine/Instance
Instance Creation Shell Commands
Cloud Instance Creation Shell Cmmand
Install OS (Use Ready OS Image)
Install Red Hat Linux

Shell Script

Use vi editor and create shell script that prints some table in the C-like format style.

Try to execute newly created shell script file without an x flag.
The file cannot be found by the shell program.
Verify script file content using cat command.

Part - 2:

Cloud Computing
UNIX/Linux PATH Variable

Google Cloud
Reading PATH variable value
adding directory to the PATH string values
Using PATH to run programs as commands
Using PATH to select version of the same program as default
Possible hacks using PATH variable.

Reading PATH Variable
PATH string value helps shell and file system find program files.

Using PATH to Run Program
PATH values list possible directories where program file may be found/located.

Precise Program File Location
Absolute or relative program file directory location can be explicitly used to provide the file to the shell.

Same Files with Different Programs
Create new subdirectory and create in it another shell script with the same name script01.

New Working Directory
Create new/another shell script with the same name script01 in the new working directory.

New Shell Script
Use vi editor and make new shell script in the new working directory.

New Script Access Permissions
Change new script file access permission to become executable.

Modifying PATH Variable
Add two working directories to the PATH variable string using shell variable $ dereferencing operator.

Verify Script File Access Permissions
Verify that two script files with the same name script01 are executable.

Scripts as Commands
The first directory listed in the PATH string that contains needed script file is used.

Question: Scripts as Commands

The first directory listed in the PATH string that contains needed script file is used.
How can be PATH variable be used to trick user to execute viral program that has the same name as the commonly used application/utility program?

Reference no: EM131774951

Questions Cloud

Discuss how should this gain be treated : it had accumulated depreciation of $15,000 and an adjusted basis of $35,000. For the year 2015, how should this gain be treated
Find the marginal rate of transformation : Consider the following utility function and corresponding marginal rate of substitution for consumption, C and leisure, and L: U = and MRS =
Prepare journal entries to record the transactions : Prepare journal entries to record the transactions for the current month
Identify the nash equilibria strategies and payoffs : Consider the game depicted below. Player 1 decides between A or B in stage 1 of the game, and between G or H in stage 3 (if it is reached).
How can be path variable be used to trick user : How can be PATH variable be used to trick user to execute viral program that has the same name as the commonly used application/utility program?
Example scenarios of when to seek for financial help : What do you consider to be some good example scenarios of when to seek for financial help?
Discuss the street improvement bond debt service fund : the Street Improvement Bond Debt Service Fund for year 2017. Budgetary entries have no effect on the government-wide accounting records
Strategic planning is carried out effectively : How would you consider the decision making process could take place so that the strategic planning is carried out effectively?
What is the quantity exported or imported by each country : Consider the Heckscher-Ohlin model from the slides in the case of no factor substitution. The production technology of food and cloth are.

Reviews

len1774951

12/20/2017 6:52:41 AM

Topic: Operating Systems Security Detailed Question: This is an assignment for my Operating Systems Security class. Main description of what needs to be done is in the Powerpoints. The homework description is at the end. Please include screenshots of the work. ATT Shell Scripting Files are for reference and probably wont be needed.

Write a Review

Operating System Questions & Answers

  Implementation of algorithms for process management

The Shortest Job Next (SJN) algorithm queues processes in a way that the ones that use the shortest CPU cycle will be selected for running rst.

  Develop a user mode command interpreter

Develop a user mode command interpreter which support list-short.

  Memory allocation in operating system

Analysis and implementation of algorithms for memory allocation in operating system, Explain First- t and best- t methods are used in memory allocation in operating systems.

  Stand alone child process

Forking the child process

  Write a multi-threaded program

Write a multi-threaded program to solve producer and consumer problem

  Marginal and average cost curves

n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.

  Simulating operating systems scheduling

Simulate the long-term scheduler, the short-term scheduler and the I/O scheduler of the computer using the First-Come-First-Serve algorithm.

  Issues with trusted platform module

Research paper discussing the issues with Trusted Platform Module (TPM)

  Threads

Explain a complication that concurrent processing adds to an operating system.

  Design and programming

Use the semaphore methods to control the concurrency of the solution

  Virtual machines

Virtual machines supported by a host operating system

  Discuss an application that benefits barrier synchronization

Discuss an application that would benefit from the use of barrier synchronization

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd