<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://dikapediav2.com/wiki/index.php?action=history&amp;feed=atom&amp;title=Shell</id>
	<title>Shell - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://dikapediav2.com/wiki/index.php?action=history&amp;feed=atom&amp;title=Shell"/>
	<link rel="alternate" type="text/html" href="https://dikapediav2.com/wiki/index.php?title=Shell&amp;action=history"/>
	<updated>2026-05-15T09:06:34Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.41.0</generator>
	<entry>
		<id>https://dikapediav2.com/wiki/index.php?title=Shell&amp;diff=260&amp;oldid=prev</id>
		<title>Ardika Sulistija: Created page with &quot;====Disable ability to log into the system using a Shell====  Setting a user&#039;s shell to &lt;b&gt;/bin/false&lt;/b&gt; effectively disables their ability to log into the system using a shell. It restricts certain user accounts (like system or service accounts) from gaining shell access, reducing the attack surface.  You can set a user&#039;s shell to &lt;b&gt;/bin/false&lt;/b&gt; by modifying the &lt;b&gt;/etc/passwd&lt;/b&gt; file directly or using a command like &lt;b&gt;chsh&lt;/b&gt;. For example: &lt;b&gt;sudo chsh -s /bin/f...&quot;</title>
		<link rel="alternate" type="text/html" href="https://dikapediav2.com/wiki/index.php?title=Shell&amp;diff=260&amp;oldid=prev"/>
		<updated>2024-11-14T22:53:28Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;====Disable ability to log into the system using a Shell====  Setting a user&amp;#039;s shell to &amp;lt;b&amp;gt;/bin/false&amp;lt;/b&amp;gt; effectively disables their ability to log into the system using a shell. It restricts certain user accounts (like system or service accounts) from gaining shell access, reducing the attack surface.  You can set a user&amp;#039;s shell to &amp;lt;b&amp;gt;/bin/false&amp;lt;/b&amp;gt; by modifying the &amp;lt;b&amp;gt;/etc/passwd&amp;lt;/b&amp;gt; file directly or using a command like &amp;lt;b&amp;gt;chsh&amp;lt;/b&amp;gt;. For example: &amp;lt;b&amp;gt;sudo chsh -s /bin/f...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;====Disable ability to log into the system using a Shell====&lt;br /&gt;
&lt;br /&gt;
Setting a user&amp;#039;s shell to &amp;lt;b&amp;gt;/bin/false&amp;lt;/b&amp;gt; effectively disables their ability to log into the system using a shell. It restricts certain user accounts (like system or service accounts) from gaining shell access, reducing the attack surface.&lt;br /&gt;
&lt;br /&gt;
You can set a user&amp;#039;s shell to &amp;lt;b&amp;gt;/bin/false&amp;lt;/b&amp;gt; by modifying the &amp;lt;b&amp;gt;/etc/passwd&amp;lt;/b&amp;gt; file directly or using a command like &amp;lt;b&amp;gt;chsh&amp;lt;/b&amp;gt;. For example: &amp;lt;b&amp;gt;sudo chsh -s /bin/false username&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 [bob@bob-computer ~]$ dzdo chsh -s /bin/false jerry&lt;br /&gt;
 hanging shell for jerry.&lt;br /&gt;
 chsh: Warning: &amp;quot;/bin/false&amp;quot; is not listed in /etc/shells.&lt;br /&gt;
 Shell changed.&lt;br /&gt;
 &lt;br /&gt;
 [bob@bob-computer ~]$ cat /etc/passwd | grep jerry&lt;br /&gt;
 jerry:x:1000:1000::/home/jerry:/bin/false&lt;br /&gt;
&lt;br /&gt;
Confirmed that I couldn&amp;#039;t even get into the jerry shell with root, if /bin/false is set for jerry:&lt;br /&gt;
 [root@bob-computer bob]# sudo -i -u jerry&lt;br /&gt;
 [root@bob-computer bob]# echo $?&lt;br /&gt;
 1&lt;/div&gt;</summary>
		<author><name>Ardika Sulistija</name></author>
	</entry>
</feed>