Submit two resources with descriptions:
1. Lessard, P. (2003). Linux Process Containment – A practical look at chroot and User Mode. SANS Institute InfoSec Reading Room
2. Information Assurance Directorate. (2013). Reducing the Effectiveness of Pass-the-Hash. National Security Agency/Central Security Service
This material may consist of step-by-step explanations on how to solve a problem or examples of proper writing, including the use of citations, references, bibliographies, and formatting. This material is made available for the sole purpose of studying and learning - misuse is strictly forbidden.This article provides a detailed introduction to the concept and practice of “jailing” processes – isolating them in such a way that they are effectively removed from other system processes so that any occurrence inside the process container—the “jail”—will not affect the overall system. Jailing is thus a security measure taken when an untrusted process needs to be run and examined. Lessard’s paper takes a close look at how this...