Remember that everything in *nix is essentially exposed to the user as a file. Suppose Alice, Harry, and Bob decide to c
Posted: Sun Jul 03, 2022 12:00 pm
Remember that everything in *nix is essentially exposed to theuser as a file. Suppose Alice, Harry, and Bob decide to changetheir passwords because of the shenanigans above. How would they dothis? The passwd command can be used to modify the /etc/shadowfile, an encrypted file of user passwords. List the permissions onthe /usr/bin/passwd and /etc/shadow files from the user consoleswith this command and record these (screenshot or text). Note theinclusion of a new permission bit, s, on the passwd command file.This stands for SUID, which allows the user who starts a program toobtain the file owner's permission to execute the file. So whilethe user is running the passwd command, they can run it as root. Ifthe SUID bit was removed, the user would not be able to changehis or her password. Change the passwords of Harry, Alice, and Bob.Create a new table with their passwords and insert it into yourreport (screenshot or text). How strong are the requirements forpasswords in this application?