Next | Classic Unix Security Problems | 19 |
Alternatively you can attack a running process
For example, the super user might occasionally run commands as root
If we can trick the super user into running our program, we win
Next | Copyright © 2005 M. J. Dominus |