<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: manipulating login process in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/manipulating-login-process/m-p/2694274#M56227</link>
    <description>Well actually, these "relatively harmless" files, and are not considered to be the first choice of hackers. Instead, I'd be on the lookout for root shells, trojans, unauthorised .rhosts files, executables with user-bit on, etc.&lt;BR /&gt;Have a look at &lt;A href="http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x1cd9f715edc6d5118ff10090279cd0f9,00.html" target="_blank"&gt;http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x1cd9f715edc6d5118ff10090279cd0f9,00.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Hope this helps.</description>
    <pubDate>Mon, 01 Apr 2002 07:09:11 GMT</pubDate>
    <dc:creator>Deepak Extross</dc:creator>
    <dc:date>2002-04-01T07:09:11Z</dc:date>
    <item>
      <title>manipulating login process</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/manipulating-login-process/m-p/2694273#M56226</link>
      <description>hi,&lt;BR /&gt;&lt;BR /&gt;i have question in manipulating login process.&lt;BR /&gt;&lt;BR /&gt;aside from /etc/warnings and /etc/motd are their other files that can be edited by hackers?&lt;BR /&gt;&lt;BR /&gt;an experts advise would greatly help me secure our servers.&lt;BR /&gt;&lt;BR /&gt;thanks in advance&lt;BR /&gt;Jr&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 01 Apr 2002 06:20:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/manipulating-login-process/m-p/2694273#M56226</guid>
      <dc:creator>JRiggs</dc:creator>
      <dc:date>2002-04-01T06:20:20Z</dc:date>
    </item>
    <item>
      <title>Re: manipulating login process</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/manipulating-login-process/m-p/2694274#M56227</link>
      <description>Well actually, these "relatively harmless" files, and are not considered to be the first choice of hackers. Instead, I'd be on the lookout for root shells, trojans, unauthorised .rhosts files, executables with user-bit on, etc.&lt;BR /&gt;Have a look at &lt;A href="http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x1cd9f715edc6d5118ff10090279cd0f9,00.html" target="_blank"&gt;http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x1cd9f715edc6d5118ff10090279cd0f9,00.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Hope this helps.</description>
      <pubDate>Mon, 01 Apr 2002 07:09:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/manipulating-login-process/m-p/2694274#M56227</guid>
      <dc:creator>Deepak Extross</dc:creator>
      <dc:date>2002-04-01T07:09:11Z</dc:date>
    </item>
    <item>
      <title>Re: manipulating login process</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/manipulating-login-process/m-p/2694275#M56228</link>
      <description>To answer your question, a hacker (if he/she gets root permissions) can modify or delete EVERY FILE in your system. &lt;BR /&gt;If the security of an ordinary user (non-root) is compromised, all files owned by that user / group and all files on which that user has write permissions are vulnerable.</description>
      <pubDate>Mon, 01 Apr 2002 07:14:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/manipulating-login-process/m-p/2694275#M56228</guid>
      <dc:creator>Deepak Extross</dc:creator>
      <dc:date>2002-04-01T07:14:55Z</dc:date>
    </item>
    <item>
      <title>Re: manipulating login process</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/manipulating-login-process/m-p/2694276#M56229</link>
      <description>HI&lt;BR /&gt;&lt;BR /&gt;YES every single file on the system and sometimes other systems when drives are mounted across networks subject to the login the hacker has entered. If he has root then the last file I would have any concern about is motd "message Of The Day" this is just a notice board.&lt;BR /&gt;&lt;BR /&gt;cheers&lt;BR /&gt;John.</description>
      <pubDate>Mon, 01 Apr 2002 08:25:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/manipulating-login-process/m-p/2694276#M56229</guid>
      <dc:creator>John Carr_2</dc:creator>
      <dc:date>2002-04-01T08:25:53Z</dc:date>
    </item>
    <item>
      <title>Re: manipulating login process</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/manipulating-login-process/m-p/2694277#M56230</link>
      <description>The first place to start with system security is the permissions of all files and most important: directories.  If you have not modified /etc/profile and /etc/csh.login to include the statement: umask 022 (or perhaps the more secure: umask 077) then every file and directory created since the system was first booted is no longer trustworthy.&lt;BR /&gt;&lt;BR /&gt;To see how bad is is on your system, run this command:&lt;BR /&gt;&lt;BR /&gt;find /sbin /etc /dev /usr /opt -xdev -type d -o -type f perm -002 -exec /usr/bin/ll {} \;&lt;BR /&gt;&lt;BR /&gt;All the files and directories listed are wide open to anyone on the system (root access is not necessary). Permissions that are 666 or 777 are big RED flags! This is especially true in /dev (for disks and tapes) as well as /etc and the rest of the operating system directories.</description>
      <pubDate>Mon, 01 Apr 2002 15:14:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/manipulating-login-process/m-p/2694277#M56230</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2002-04-01T15:14:24Z</dc:date>
    </item>
    <item>
      <title>Re: manipulating login process</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/manipulating-login-process/m-p/2694278#M56231</link>
      <description>&amp;gt;To see how bad is is on your system, run this command: &lt;BR /&gt;&amp;gt;&lt;BR /&gt;&amp;gt;find /sbin /etc /dev /usr /opt -xdev -type d -o -type f perm -002 -exec /usr/bin/ll {} \; &lt;BR /&gt;&lt;BR /&gt;Bill,&lt;BR /&gt;&lt;BR /&gt;Thanks for posting the above, very helpful stuff. For anyone getting the error message:&lt;BR /&gt;&lt;BR /&gt;find: missing conjunction&lt;BR /&gt;&lt;BR /&gt;just add a dash (-) in front of perm&lt;BR /&gt;&lt;BR /&gt;mark&lt;BR /&gt;</description>
      <pubDate>Mon, 01 Apr 2002 15:37:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/manipulating-login-process/m-p/2694278#M56231</guid>
      <dc:creator>Mark Greene_1</dc:creator>
      <dc:date>2002-04-01T15:37:07Z</dc:date>
    </item>
  </channel>
</rss>

