Previous Page
Next Page

List of Exercises

Chapter 7: Denial of Service Attacks

Exercise 7-1: Find Files with setuid Permissions
Exercise 7-2: Disable Executable Stacks and Enable Stack Message Logging
Exercise 7-3: Disable the Post Office and Internet Mail Access Protocols

Chapter 10: Fundamentals of Access Control

Exercise 10-1: Find Files with setuid Permissions
Exercise 10-2: Disable Executable Stacks and Enable Stack Message Logging

Previous Page
Next Page