Describe the “Trojan horse” technique for capturing a super-user password.

What will be an ideal response?


One might capture the super-user password via a “Trojan Horse” technique by creating a shell
script called “su” that prompted for the root password just like the real su command does and
writes it to a file and exits. By placing it somewhere ahead of the real su in the super-user’s
PATH, they might execute your version instead.

Computer Science & Information Technology

You might also like to view...

16. The term OS stands for

a. Operating System b. Oscillating System c. Operations Services d. Nothing

Computer Science & Information Technology

Suppose a method p has the following heading:

``` public static int[][] p() ``` What return statement may be used in p()? a. return 1; b. return {1, 2, 3}; c. return int[]{1, 2, 3}; d. return new int[]{1, 2, 3}; e. return new int[][]{{1, 2, 3}, {2, 4, 5}};

Computer Science & Information Technology

Which command is used to change one dimension (height or width) of an object, causing the other dimension to change automatically to maintain the proportion?

A) Fill B) Crop to Shade C) Crop D) Lock aspect ratio

Computer Science & Information Technology

The first version of HTML was a descendent from what other language?

A) XML B) SGML C) HTTP D) XHTML

Computer Science & Information Technology