Results 1 to 4 of 4

Thread: chroot() - ? for the unix guys

  1. #1
    slim150's Avatar Poster
    Join Date
    Aug 2003
    Age
    40
    Posts
    449
    Hey guys you don't have to do any research (and i've been googling for answers) but if any of you know off the top of your head about how can chroot() be misused (on purpose or by accident) and what are the consequences i would love it.


    its pretty interesting stuff. i know how its vulnerable but i don't know how the command itself can be misused
    "Their most trivial action may mean volumes, or their most extraordinary conduct may depend upon a hairpin or a pair of curling-tongs" - Holmes


  2. Software & Hardware   -   #2
    4play's Avatar knob jockey
    Join Date
    Jan 2003
    Location
    London
    Age
    41
    Posts
    3,824
    unless you are root it pretty hard to exploit. why exactly are you interested?

  3. Software & Hardware   -   #3
    slim150's Avatar Poster
    Join Date
    Aug 2003
    Age
    40
    Posts
    449
    i'm taking a course at my college and we have a series of questions to answer about chroot(). i dont really need to know 'how' as a step by step thing but more of a general explanation
    "Their most trivial action may mean volumes, or their most extraordinary conduct may depend upon a hairpin or a pair of curling-tongs" - Holmes


  4. Software & Hardware   -   #4
    4play's Avatar knob jockey
    Join Date
    Jan 2003
    Location
    London
    Age
    41
    Posts
    3,824
    google explains how to break a chroot prison

    http://www.google.co.uk/search?hl=en...G=Search&meta=

    i would also look on bugtraq for chroot related exploits.

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •