Traditional Unix security model Root is god Certain actions require root privileges Binding low ports (<1024) Configuring network interfaces Mounting/unmounting filesystems Changing kernel parameters Loading kernel modules Accessing raw devices Suid/Sgid bits created to allow normal users to access privileged resources.
Copyright 2003, Bri Hatch of Onsight, Inc.
Presented at ISSA Puget Sound, 2003.
Presentation created using vim and MagicPoint.