This video covers the special modes of setuid, setgid, and the sticky bit.
- [Instructor] Let's take a couple of minutes…to talk about the special modes of setuid, setgid,…and the sticky bit.…When you start a process,…it starts running with your user and group permissions.…We've talked about ways to run programs as others…including using the sudo command and the su command.…However, there is a special permission…you can use called setuid.…It stands for Set User ID…and it forces a process to start as the owner of the file…regardless of who executes that file.…
To tell if a file has the setuid bit set,…you can look at its ls output.…You will see an s in the execute field…of the owner section of the permissions.…The password program is one such file…that has the setuid permission.…Since the owner of the file is root,…when this program gets executed,…it runs as the root user.…The reason the password command uses setuid root…is because it needs root privileges…to modify the etc password and/or the etc shadow files…when a user changes their password.…
The ping command is another example…of setuid root permissions.…
Author
Released
6/11/2018- What makes Linux secure?
- Physical security concepts
- Encrypting new and existing devices
- Account and network security
- Linux firewall fundamentals
- File system security
- File and directory permissions
- ACLs and rootkits
Skill Level Intermediate
Duration
Views
Related Courses
-
Linux: Bash Shell and Scripts
with Kevin Dankwardt2h 46m Intermediate -
Building an Ubuntu Home Server
with Scott Simpson2h 16m Beginner
-
Introduction
-
Welcome1m 25s
-
-
1. General Security
-
General security1m 9s
-
Is Linux secure?2m 26s
-
What makes Linux secure?8m 18s
-
-
2. Physical Security
-
Physical security concepts7m 41s
-
Single user mode security6m 45s
-
Secure the bootloader6m 57s
-
Disk encryption5m 34s
-
Encrypt a new device: Part 18m 38s
-
Encrypt a new device: Part 24m 17s
-
Disable Control-Alt-Delete1m 44s
-
3. Account Security
-
Account security45s
-
Introduction to PAM5m 13s
-
Password security7m 58s
-
Control account access5m 6s
-
Security by account type6m 1s
-
Account security: Demo 22m 44s
-
-
4. Network Security
-
Network security35s
-
Network security: Part 17m 54s
-
Network security: Part 26m 20s
-
Secure SSHD: Part 17m 52s
-
Secure SSHD: Part 23m 15s
-
Linux firewall fundamentals7m 36s
-
Firewall rule specifications4m 43s
-
Example firewall rules3m 59s
-
Linux firewall demo9m 47s
-
TCP Wrappers: Part 17m 2s
-
TCP Wrappers: Part 24m 2s
-
-
5. File System Security
-
File system security1m 2s
-
Special modes: Part 17m 55s
-
Special modes: Part 23m 4s
-
File attributes6m 5s
-
File attributes demo2m 48s
-
ACLs9m 25s
-
ACLs demo6m 13s
-
Rootkits8m 33s
-
Rootkit hunter demo7m 12s
-
-
Conclusion
-
Summary4m 52s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Special modes: Part 1