- Posted In
- Red Hat Enterprise Linux
let`s say that an application that listen on a port has a network socket.
the socket listen on interfaces for i/o traffic -not the application listen on port for traffic.right?
the port is bind to the socket.
if the socket is owned by root -a socket is a file-then if a hacker will have access to that socket then the hacker will receive the root privilege?