- Mastering Linux Security and Hardening
- Donald A. Tevault
- 79字
- 2021-07-02 19:19:22
Preventing users from having root shell access
Let's say that you want to set up a user with limited sudo privileges, but you did so by adding a line like this:
maggie ALL=(ALL) /bin/bash, /bin/zsh
I'm sorry to say that you haven't limited Maggie's access at all. You effectively gave her full sudo privileges with both the Bash shell and the Zsh shell. So, don't add lines like this to your sudoers because it will get you into trouble.
推薦閱讀
- Metasploit Penetration Testing Cookbook(Third Edition)
- 網絡空間安全:管理者讀物
- 網絡安全技術及應用(第3版)
- Python Penetration Testing Cookbook
- 隱私計算
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 從實踐中學習密碼安全與防護
- Learning Pentesting for Android Devices
- 黑客攻防從入門到精通:命令版
- Web代碼安全漏洞深度剖析
- Real-World SRE
- 商用密碼應用與安全性評估
- 0day安全
- 業務安全關鍵技術與應用實踐
- 從實踐中學習Fiddler Web應用分析