Podcast
Questions and Answers
What is the primary vulnerability associated with the 'pass the hash' attack?
What is the primary vulnerability associated with the 'pass the hash' attack?
The primary vulnerability is that an attacker only needs to obtain the password hash, rendering the security of hashing ineffective.
Why is Kerberos preferred over NTLM in larger Windows networks?
Why is Kerberos preferred over NTLM in larger Windows networks?
Kerberos is preferred because it provides a more secure authentication mechanism compared to NTLM, which is older and has known vulnerabilities.
How did the development of PAM in 1995 change user authentication management?
How did the development of PAM in 1995 change user authentication management?
PAM centralized user authentication management, allowing various programs to utilize a common authentication library instead of handling it independently.
List one significant function of the 'auth' activity in PAM.
List one significant function of the 'auth' activity in PAM.
Signup and view all the answers
What role does the 'account' activity play in PAM, following user authentication?
What role does the 'account' activity play in PAM, following user authentication?
Signup and view all the answers
What is the primary function of PAM control flags in authentication?
What is the primary function of PAM control flags in authentication?
Signup and view all the answers
Explain the concept of protection rings in operating systems.
Explain the concept of protection rings in operating systems.
Signup and view all the answers
How does a user process execute a system call in a protected operating environment?
How does a user process execute a system call in a protected operating environment?
Signup and view all the answers
What happens when a process attempts to execute a ring 0 instruction from ring 3?
What happens when a process attempts to execute a ring 0 instruction from ring 3?
Signup and view all the answers
What would be the result of a PAM requisite module failing during authentication?
What would be the result of a PAM requisite module failing during authentication?
Signup and view all the answers
Define the role of system calls in the context of process management.
Define the role of system calls in the context of process management.
Signup and view all the answers
What is the difference between sufficient and optional PAM control flags?
What is the difference between sufficient and optional PAM control flags?
Signup and view all the answers
In the context of the operating system, what does user authentication involve?
In the context of the operating system, what does user authentication involve?
Signup and view all the answers
What two fundamental concepts are essential for access control in an operating system?
What two fundamental concepts are essential for access control in an operating system?
Signup and view all the answers
How does a system implement Mandatory Access Control (MAC)?
How does a system implement Mandatory Access Control (MAC)?
Signup and view all the answers
What characterizes a system that uses Discretionary Access Control (DAC)?
What characterizes a system that uses Discretionary Access Control (DAC)?
Signup and view all the answers
What does an access control matrix represent?
What does an access control matrix represent?
Signup and view all the answers
What flexibility do Access Control Lists (ACLs) provide over traditional user/group models?
What flexibility do Access Control Lists (ACLs) provide over traditional user/group models?
Signup and view all the answers
What information is stored for each user in an operating system regarding groups?
What information is stored for each user in an operating system regarding groups?
Signup and view all the answers
What are the three user IDs associated with each process?
What are the three user IDs associated with each process?
Signup and view all the answers
What three types of permissions can be assigned to a file?
What three types of permissions can be assigned to a file?
Signup and view all the answers
What is required to traverse a directory in a Linux file system?
What is required to traverse a directory in a Linux file system?
Signup and view all the answers
When a process wants to access a file, what is the first check that occurs?
When a process wants to access a file, what is the first check that occurs?
Signup and view all the answers
What is the purpose of the setuid bit in Linux?
What is the purpose of the setuid bit in Linux?
Signup and view all the answers
What distinguishes horizontal privilege escalation from vertical privilege escalation?
What distinguishes horizontal privilege escalation from vertical privilege escalation?
Signup and view all the answers
How does the fork() function affect UID inheritance in a new process?
How does the fork() function affect UID inheritance in a new process?
Signup and view all the answers
What is virtual memory and how does it enhance memory management?
What is virtual memory and how does it enhance memory management?
Signup and view all the answers
What role does the Memory Management Unit (MMU) play in virtual memory?
What role does the Memory Management Unit (MMU) play in virtual memory?
Signup and view all the answers
What is a local root exploit?
What is a local root exploit?
Signup and view all the answers
Explain how setuid programs like 'su' and 'ping' use the setuid bit.
Explain how setuid programs like 'su' and 'ping' use the setuid bit.
Signup and view all the answers
Why is memory access control important in an operating system?
Why is memory access control important in an operating system?
Signup and view all the answers
Describe the impact of context switches on the Translation Lookaside Buffer (TLB).
Describe the impact of context switches on the Translation Lookaside Buffer (TLB).
Signup and view all the answers
What is the significance of PAM in user authentication for setuid programs?
What is the significance of PAM in user authentication for setuid programs?
Signup and view all the answers
What is the primary goal of a Trusted Computing Base (TCB) in Linux?
What is the primary goal of a Trusted Computing Base (TCB) in Linux?
Signup and view all the answers
How do loadable kernel modules benefit the Linux operating system?
How do loadable kernel modules benefit the Linux operating system?
Signup and view all the answers
Explain the significance of file descriptors in Unix systems.
Explain the significance of file descriptors in Unix systems.
Signup and view all the answers
What is the consequence of a child process inheriting open file descriptors?
What is the consequence of a child process inheriting open file descriptors?
Signup and view all the answers
Describe the 'everything is a file' abstraction in Unix.
Describe the 'everything is a file' abstraction in Unix.
Signup and view all the answers
What is a major advantage of a microkernel over a monolithic kernel regarding TCB size?
What is a major advantage of a microkernel over a monolithic kernel regarding TCB size?
Signup and view all the answers
How does access control (AC) function in a Unix system?
How does access control (AC) function in a Unix system?
Signup and view all the answers
Name the system call used to close a file handle in Unix.
Name the system call used to close a file handle in Unix.
Signup and view all the answers
What does the access() syscall check in Unix systems?
What does the access() syscall check in Unix systems?
Signup and view all the answers
What is the role of udev in the context of loadable kernel modules?
What is the role of udev in the context of loadable kernel modules?
Signup and view all the answers
Explain the tree hierarchy of directories in the Unix file system.
Explain the tree hierarchy of directories in the Unix file system.
Signup and view all the answers
What type of support do kernel modules not have in Linux?
What type of support do kernel modules not have in Linux?
Signup and view all the answers
What is the purpose of the syscalls like open(), read(), and write() in Unix?
What is the purpose of the syscalls like open(), read(), and write() in Unix?
Signup and view all the answers
What action is typically needed after modifying the OS kernel in traditional scenarios?
What action is typically needed after modifying the OS kernel in traditional scenarios?
Signup and view all the answers
Define the purpose of the init process in Linux.
Define the purpose of the init process in Linux.
Signup and view all the answers
What is the main purpose of the No Write-Down policy in security levels?
What is the main purpose of the No Write-Down policy in security levels?
Signup and view all the answers
Explain the difference between strong tranquility and weak tranquility in security levels.
Explain the difference between strong tranquility and weak tranquility in security levels.
Signup and view all the answers
What is the significance of the Biba model in information integrity?
What is the significance of the Biba model in information integrity?
Signup and view all the answers
Describe how Linux Security Modules (LSMs) handle access control.
Describe how Linux Security Modules (LSMs) handle access control.
Signup and view all the answers
What is the primary function of a chroot jail?
What is the primary function of a chroot jail?
Signup and view all the answers
How does OS-level virtualization differ from traditional virtualization?
How does OS-level virtualization differ from traditional virtualization?
Signup and view all the answers
What role do namespaces play in containerization?
What role do namespaces play in containerization?
Signup and view all the answers
Define control groups (cgroups) in the context of Linux containers.
Define control groups (cgroups) in the context of Linux containers.
Signup and view all the answers
What are the key components within the Android application layer?
What are the key components within the Android application layer?
Signup and view all the answers
Explain application isolation in the Android security framework.
Explain application isolation in the Android security framework.
Signup and view all the answers
What does paravirtualization require compared to full virtualization?
What does paravirtualization require compared to full virtualization?
Signup and view all the answers
What are the potential security implications of using the setuid()
function improperly?
What are the potential security implications of using the setuid()
function improperly?
Signup and view all the answers
How does the concept of hardware full virtualization address the limitations of software full virtualization?
How does the concept of hardware full virtualization address the limitations of software full virtualization?
Signup and view all the answers
Study Notes
Authentication
- Authentication is the process of verifying the identity of an entity.
- The operating system (OS) manages access to resources by needing to know who someone is.
- Typical user authentication involves login procedures.
- A shell is created mapped to the logged-in user.
- All programs run through the shell and are tied to the logged-in user.
- Authentication failure scenarios include impersonation.
Authentication Methods
- Authentication can be achieved through:
- What you know: Passwords, challenge-response.
- What you are: Biometrics (fingerprints, retina scans, voice recognition).
- What you have: Tokens, smart cards.
- Multi-factor authentication combines multiple methods (knowledge, possession, inherence) for enhanced security.
- Typically, these issues are addressed with strong passwords, anti-counterfeiting techniques, and tamper proof hardware.
- The text mentions potential issues with weak passwords.
Unix Users
- Unix systems have three primary account types:
- Root account: The superuser account, with user ID 0 (root), manages system boot, user authentication, administration, and network services, and has full access.
- User accounts: Provide interactive access to the system.
- Account permissions can be manipulated with tools such as (etc/passwd), (etc/shadow), and (etc/group).
Authentication Over The Network
- Large corporate networks typically store user information centrally.
- User access to any machine within a network using one central directory.
- various ways for providing a protocol based log in across multiple machines
- Disadvantages of a centralized server can be single point of failure.
PAM (Pluggable Authentication Modules)
- PAM allows programs to use a central authentication mechanism.
- An example is SSH, GDM, LightDM, screen locks, su, sudo etc..
- PAM is a library used by many Unix applications for authentication.
- PAM authentication is decentralized allowing control over logging attempts and authorized actions.
- PAM is typically used to control events like user login attempts, or password changes. A PAM module controls each of those events.
Authorization
- Authorization is the process of determining if an entity (X) is allowed to access a resource (Y).
- The OS manages access to resources based on authorization rules.
- Authorization typically occurs without highly-privileged code, instead non-privileged code asks the OS for the necessary operations.
- Resources are protected using separate code in protection rings.
- Ring-0 is the highest level of privilege having direct access to hardware. Lower rings have less access.
- Attackers may use rings above 0 to obtain privileges from lower (protected) zones.
File Systems
- The file system organizes persistent data on storage devices.
- Files are logical units with names and associated information.
- Directories organize files in a hierarchical tree structure.
- System calls are the primary interface for interacting with the file system.
Access Control
- Access control (AC) manages access to resources.
- Access Control Lists (ACLs) are used to grant access permissions to users and groups.
- Access control matrices are used to represent access control policies, by listing process versus files with access rights specified
- Security properties include, but not limited to, mandatory access control (MAC) and discretionary access control (DAC).
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on Pluggable Authentication Modules (PAM) and key operating system concepts. This quiz covers topics such as authentication management, system calls, and protection rings. Challenge yourself with questions that explore the intricacies of user authentication in modern operating systems.