Reply to post:

College PRIMOS prankster wreaks havoc with sysadmin manuals

mikeapmap

Many years ago, when working at a site that had Unix source, I informed the contactor sysadmin, there was a security breach with who could run the "su" command - such a notice was ignored. I promptly instigated a series of steps relying on using the PATH env variable with a discovered open login script to direct the poor sysadmin to run my version of su. No damage was performed, apart from showing the sysadmin that relying on the PATH variable to run su was not wise.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

SUBSCRIBE TO OUR WEEKLY TECH NEWSLETTER

Biting the hand that feeds IT © 1998–2019