|
DataMuseum.dkPresents historical artifacts from the history of: DKUUG/EUUG Conference tapes |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about DKUUG/EUUG Conference tapes Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: T i
Length: 950 (0x3b6) Types: TextFile Names: »init_kuang«
└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen └─⟦3da311d67⟧ »./cops/1.04/cops_104.tar.Z« └─⟦6a2577110⟧ └─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen └─⟦6a2577110⟧ »./cops/1.04/cops_104.tar« └─⟦this⟧ »cops_104/init_kuang«
# /* Copyright 1985 Robert W. Baldwin */ # /* Copyright 1986 Robert W. Baldwin */ ############################################### # Kuang: Rule based computer security checker. ############################################### CAT=/bin/cat ECHO=/bin/echo # # Initialization. # ./clearfiles # # First setup what we have access to. # The uids.k file must include the user 'OTHER' meaning the world access bits. # Add any other UIDs accessible to the attacker (e.g., ftp, daemon). # # Directly accessible user IDs. $CAT >uids.k <<END OTHER END # Commented out example of how to set up above: # #$CAT >uids.k <<END #guest #df #foo #END # # Directly accessible group IDs. # This usually includes a group like 'users', which most users are in. # $CAT >gids.k <<END END # Commented out example of how to set up above: # #$CAT >gids.k <<END #guest #END # # Setup the primary goal(s). # $ECHO Setting up goal #>/dev/tty ./addto uids root DO ANYTHING