Set-UID is an important security mechanism in Unix operating systems. When a
Set-UID program runs, it assumes the owner's privileges. For example, if the
program's owner is root, then when anyone runs this program, the program gains
the root's privileges during its execution. Set-UID allows us to do many
interesting things, but unfortunately, it is also the culprit of many bad
things. The objective of this lab is for students to understand
what risks such privileged programs face and how they can be attacked
if there are mistakes in the code.
Please give us your feedback on this lab using this feedback form. | |
The SEED Labs project is open source. If you are interested in contributing to this project, please check out our Github page: https://github.com/seed-labs/seed-labs. |