What a picture-perfect example of how "hardened" Linux systems are different ... and of why.
Under normal conditions, an intruder could easily have prepared a new directory, and with two commands could have moved it into place, where it would have been accepted. But security contexts thwarted it. It's no longer simply a matter of where the stuff is, nor what it is named; now, there must be more.
|