PrepAway - Latest Free Exam Questions & Answers

Which two describe attack methods that can cause a user to unexpectedly execute a Trojan horse instead of an i

Which two describe attack methods that can cause a user to unexpectedly execute a Trojan horse instead of an intended setuid program? (Assume only that the user’s shell initialization file is writable to the attacker.)

PrepAway - Latest Free Exam Questions & Answers

A.
changing the user’s PATH environment variable

B.
changing the user’s LD_ORIGIN environment variable

C.
changing the user’s LD_LIBRARY_PATH environment variable

D.
executing the pathconf(2) command to reset the user’s PATH

E.
creating a shell alias of the same name pointing to the Trojan horse


Leave a Reply