Assignment title: Information
In a new Linux virtual machine within VMPlayer:
1. To obtain process information for the UNIX or Linux system, use the command ps -ael.
2. Construct a process tree similar to Figure 1. Look up the Linux command pstree –p and
Use the command man ps to get more information about the ps command. Describe
what this command does.
describe what it does. Then type in the command the capture the output.
3. Create a process in the background ( such as (date;sleep 10; date) >date.out & ), and
4. Verify the job is running by typing the command jobs. Describe what this command does.
5. Type the following program in a textfile called three_forks.c. Compile it using gcc and
run ps –ael and identify the added processes running now.
then run it in the background.
a) Describe what the fork() call does.
b) Including the initial parent process, how many processes are created by the
program shown? Verify your answer by running ps –ael.
c) Kill the processes created in this part one by one and terminate them by the kill
command. Show each is killed by running ps –ael.
NEW YORK INSTITUTE OF TECHNOLOGY
School of Engineering and Technology
Department of Computer Science
Project 2 - Part 2
Hacking Linux Privilege Escalation
CSCI-620 – Operating Systems Security
Dr. Beheshti
Project 7 Hacking Linux: Privilege Escalation
Tasks
1. Create a user called "victim" with sudo privileges and create a directory called "public" for
2. Create a user called "attacker" with no sudo privileges. Log in as this user and create a
3. Run a scenario in a Linux bash shell to demonstrate and verify that after the scenario is
him with rwx access for all.
malware file called "date" to mascaraed the date Linux command. This malware file should
give sudo privileges to attacker.
executed, attacker is given sudo rights by victim. Test actually that attacker has sudo
privileges now.
Capture all the key screens using a screen capture tool (such as Windows 8) snipping tool. Put all
captures in you MS Word project report file with some explanation of what each major step is.
Answer the following questions:
1. If after giving himself sudo privileges, attacker wanted to change victim's password, what
2. Look up what bashrc file is and in one paragraph describe it.
commands should type in Linux?