|
Verificar ACL del Dominio
============================ Attach ----------------- addboard -d A -c assign SBX addboard -d A -c connect SBX addboard -d A -c configure SBX Detach ------------------ deleteboard -c unconfigure SBX deleteboard -c disconnect SBX deleteboard -c unassign SBX moveboard -d A -c configure SBX Desde el dominio (como root) ============================ Attach ---------------- cfgadm -x assign SBX cfgadm -c connect SBX cfgadm -c configure SBX Detach ----------------- cfgadm -c unconfigure SBX cfgadm -c disconnect SBX cfgadm -x unassign SBX Desde la System Controller ============================ Attach --------------- rcfgadm -d A -x assign SBX rcfgadm -d A -c connect SBX rcfgadm -d A -c configure SBX Detach ----------------- rcfgadm -d A -c unconfigure SBX rcfgadm -d A -c disconnect SBX rcfgadm -d A -x unassign SBX
Verificar o Configurar parametros de Arranque del Sistema
scmain:sms-svc:24> showboards Retrieving board information. Please wait. ........ Location Pwr Type of Board Board Status Test Status Domain -------- --- ------------- ------------ ----------- ------ SB0 On CPU Active Passed domain-test SB1 On CPU Active Passed domain-test SB7 On CPU Active Passed domain-test Note: Detach a SB in active environment. Boot the domain to Solaris or setkeyswitch to standby or off to unconfigure the board. |
VULNERABILITIES IN UNIX
Information provided by the Sans Institute:
http://www.sans.org
The ten most commonly exploited UNIX vulnerabilities?
Poor system administration practices
Reusable/poor passwords
Flawed SUID programs (e.g., rdist, binmail)
HTTP servers and CGI application vulnerabilities
Default "+" entries in the /etc/hosts.equiv file
NFS/NIS vulverabilities sendmail program bugs
Buffer overruns (e.g., gets(), syslog())
SUID shell scripts