Hi everyone, I'm looking for some information concerning Unix permissions. I am new to Unix and am doing research for a graduate class. Given the permissions below, can anyone give me five unique exploits that would be available to a hacker/cracker given this configuaration?
-rw-rw-rw- 1 root root 948 Feb 04 08:32 shadow
-rwxrwxrwx 1 root root 1823 Feb 04 08:32 passwd
I have been trying to do Google searches and have not been having much luck wading through all of the hits. Any help will be greatly appreciated. Thanks and have a great day.