473,326 Members | 2,588 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,326 software developers and data experts.

how can a normal user behave as root

I want to know is there any way by which a normal user can temporarily behave as root user..
This privilege should not be given by root...
I was asked this question in an interview.. I could not find out
Jul 16 '07 #1
6 1980
archonmagnus
113 100+
Through the sudo command. If a user tries sudo and isn't on the approved user list (at /etc/sudoers), notifications are sent to the admin.
Jul 16 '07 #2
Chrisjc
375 256MB
\Users set with admin "root" privileges... I don’t fully understand the question... as you stating that someone just logged in and has full root??? just no one set it?

If that was the question I find that hard to believe unless hacked?
Jul 16 '07 #3
skyy
109 100+
Using command - "sudo -u root <command>"

the allowed user and command are set inside /etc/sudoers
Jul 17 '07 #4
drhowarddrfine
7,435 Expert 4TB
But like he said, it was not given by root so we can assume sudo won't work. The only other way would be restarting the computer and getting into single user.
Jul 17 '07 #5
archonmagnus
113 100+
This privilege should not be given by root...
I took that to mean that root didn't give su access to the user or otherwise grant a privilege escalation. Perhaps the OP could resolve some confusion as to the level of interaction with root?
Jul 17 '07 #6
Motoma
3,237 Expert 2GB
I want to know is there any way by which a normal user can temporarily behave as root user..
This privilege should not be given by root...
I was asked this question in an interview.. I could not find out
If a binary or shell script has the setuid bit set, the user which the binary will run as will be the owner of the file.
Jul 18 '07 #7

Sign in to post your reply or Sign up for a free account.

Similar topics

8
by: Eric Veltman | last post by:
Hello everyone, I've posted this question before, but got no answer, so I'll try to reformulate the question, maybe it helps :-) By the way, this is not intended as the start of an ASP.NET...
0
by: PiEmme | last post by:
On a Linux server a MySql db is installed. I was able to run mysql and mysqladmin without entering user and password, at first. Later both user and password have become required. Probably after...
0
by: lance | last post by:
Hi I had a normal KEY INDEX on one VARCHAR field I then added a FULLTEXT KEY to the same field. I wonder if I should now remove the normal KEY INDEX as obsolete or leave it? Can I expect the...
0
by: ./Rob & | last post by:
Hi gang: I'm experiencing a problem with MySQL -- I updated MySQL from version 4.1.0 to 4.1.10 and now when I login as root it doesn't show all the databases I should have access to, nor it...
5
by: MLH | last post by:
I'm supposed to set a password for the MySQL root user. The output of mysql_install_db instructed me to run the following commands... /usr/bin/mysqladmin -u root -h appserver password mynwewpasswd...
2
by: Sibylle Koczian | last post by:
Hello, I've installed Python 2.4 and the win32 extensions, using administrator rights, under Windows XP in "C:\Programme". As this is a directory without spaces I didn't expect any problems. But...
1
by: sunnyhanda | last post by:
Write a program that will generate, but not display, a three-digit "target" number that has three distinct digits. Then, inputs a maximum of eight user guesses and, for each guess, outputs the number...
4
by: Nagarajan | last post by:
Is there a way by which I could obtain normal string form of a raw string. XML CDATA is returned as raw string. But I need the string to actually escape special chars. Any idea?
2
by: ivytony | last post by:
First of all, I'm not sure if I've set up root password for MySQL server or not. I was following this tutorial http://www.howtoforge.com/centos-5.1-server-lamp-email-dns-ftp-ispconfig-p4 to install...
0
by: ryjfgjl | last post by:
ExcelToDatabase: batch import excel into database automatically...
0
isladogs
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 6 Mar 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:15 (7.15PM). In this month's session, we are pleased to welcome back...
1
isladogs
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 6 Mar 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:15 (7.15PM). In this month's session, we are pleased to welcome back...
0
by: jfyes | last post by:
As a hardware engineer, after seeing that CEIWEI recently released a new tool for Modbus RTU Over TCP/UDP filtering and monitoring, I actively went to its official website to take a look. It turned...
0
by: ArrayDB | last post by:
The error message I've encountered is; ERROR:root:Error generating model response: exception: access violation writing 0x0000000000005140, which seems to be indicative of an access violation...
1
by: CloudSolutions | last post by:
Introduction: For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
1
by: Shællîpôpï 09 | last post by:
If u are using a keypad phone, how do u turn on JavaScript, to access features like WhatsApp, Facebook, Instagram....
0
by: af34tf | last post by:
Hi Guys, I have a domain whose name is BytesLimited.com, and I want to sell it. Does anyone know about platforms that allow me to list my domain in auction for free. Thank you
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 3 Apr 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome former...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.