Subject: | |
From: | |
Reply To: | Emerson, Tom |
Date: | Fri, 16 Jul 2004 11:17:16 -0700 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
> -----Original Message-----
> From: Barry Lake
> 4) Use MPEX. I don't know offhand the magic incantation, but I can
> guarantee you there's a way to find all PM programs using MPEX.
%LISTF @[log in to unmask]@(PMCAP),<whatever>
where "<whatever>" is a regular or enhanced MPEX listf format. Usefull modes are ,SEC or ,5. If you want to "do something" with the files found, a better mode might be ,6 (fully qualified filenames) with output directed to a file.
solution 4b) run VEAUDIT -- "PM" capability is deemed potentially dangerous as "normal O/S checks are circumvented" [or words to that effect from the GETPRIVMODE description], and can be further compromised to perform an "elevated capability" security intrusion/attack. [wow, such big words for me today... ;) ] Long story short, VEaudit has a specific report of all PM programs, particularly those not in PM-capable groups [consider them as "trojan horses lying in wait...]
* To join/leave the list, search archives, change list settings, *
* etc., please visit http://raven.utc.edu/archives/hp3000-l.html *
|
|
|