From owner-freebsd-questions@FreeBSD.ORG Tue Jan 9 15:14:11 2007 Return-Path: X-Original-To: freebsd-questions@freebsd.org Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id C6D8616A4D2 for ; Tue, 9 Jan 2007 15:14:11 +0000 (UTC) (envelope-from maanjee@gmail.com) Received: from an-out-0708.google.com (an-out-0708.google.com [209.85.132.249]) by mx1.freebsd.org (Postfix) with ESMTP id 8B7CF13C44C for ; Tue, 9 Jan 2007 15:14:11 +0000 (UTC) (envelope-from maanjee@gmail.com) Received: by an-out-0708.google.com with SMTP id c24so2288892ana for ; Tue, 09 Jan 2007 07:14:10 -0800 (PST) DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:to:subject:mime-version:content-type; b=AWWAx/zMB24LT+bX/j6yAB96j3jvuoOJUkP5qsQRVr302OgiR66ZfSR8CV1BTqTi8E0EW87Ct74Tgd7/U1VYxOB8jcdJVUkfucBXP4TPI7DIVFnjmnqiL0n+85mu9xbVyYwgsRqMT3uKi2lVdlzT1LPE4OiDWRkHMOgn3t2A7GE= Received: by 10.100.122.8 with SMTP id u8mr10783950anc.1168355650139; Tue, 09 Jan 2007 07:14:10 -0800 (PST) Received: by 10.100.33.13 with HTTP; Tue, 9 Jan 2007 07:14:10 -0800 (PST) Message-ID: <2cd0a0da0701090714q45032eb0q7160d77ba9807628@mail.gmail.com> Date: Tue, 9 Jan 2007 16:14:10 +0100 From: VeeJay To: maanjee@gmail.com, FreeBSD-Questions MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Content-Disposition: inline X-Content-Filtered-By: Mailman/MimeDel 2.1.5 Cc: Subject: User Security Question? X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 09 Jan 2007 15:14:11 -0000 Hello Friends Just had a debate with a collegue at office, but still lack knowledge on FreeBSD security :( I have few questions..... 1. What previligies a "standard" user (NOT member of Wheel Group) has on a FreeBSD Box? 2. How can he/she damages the systems or make a breach? 3. If that particular user is willing to damage the FreeBSD box, so which "locations" OR "files" are more likely to be damaged or affected? 4. How dangerous a Standard User could be to a FreeBSD box? 5. What sort of possible methods he/she can apply to hack the system and create a breach into the system? 6. How can we check that if a system is affected by a Bad User? I would really appreciate your comments in this regard.... Cheers!!! -- Thanks! BR / vj