亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 088-092.html

?? 入侵檢測的相關教程
?? HTML
?? 第 1 頁 / 共 2 頁
字號:
<!-- LEFT NAV SEARCH END -->

		</td>
		
<!-- PUB PARTNERS END -->
<!-- END LEFT NAV -->

<td rowspan="8" align="right" valign="top"><img src="/images/iswbls.gif" width=1 height=400 alt="" border="0"></td>
<td><img src="/images/white.gif" width="5" height="1" alt="" border="0"></td>
<!-- end of ITK left NAV -->

<!-- begin main content -->
<td width="100%" valign="top" align="left">


<!-- END SUB HEADER -->

<!--Begin Content Column -->

<FONT FACE="Arial,Helvetica" SIZE="-1">
To access the contents, click the chapter and section titles.
</FONT>
<P>
<B>Intrusion Detection: Network Security beyond the Firewall</B>
<FONT SIZE="-1">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Terry Escamilla
<BR>
ISBN: 0471290009
<BR>
Publication Date: 11/01/98
</FONT>
<P>
<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">

<INPUT TYPE="hidden" NAME="Action" VALUE="Search">
<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">
<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">
<INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts">
<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">

<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE="">&nbsp;<input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471290009/">

</form>


<!-- Empty Reference Subhead -->

<!--ISBN=0471290009//-->
<!--TITLE=Intrusion Detection: Network Security Beyond the Firewall//-->
<!--AUTHOR=Terry Escamilla//-->
<!--PUBLISHER=John Wiley & Sons, Inc.//-->
<!--IMPRINT=Wiley Computer Publishing//-->
<!--CHAPTER=3//-->
<!--PAGES=088-092//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="086-088.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="092-093.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>IDs associated with a process can change during the course of program execution. The importance of this capability in UNIX and similar security models cannot be overemphasized. The ability to increase your security privileges by changing your EUID, EGID, RUID, or RGID is one of the basic notions in the UNIX security model. This privilege escalation mechanism is at the root (pun intended) of many UNIX hacks. The chief goal of most hacking attempts is to gain root privileges to exercise total control over the system. If you do not know or cannot guess the root password, the quickest path to becoming root is to log in as another user and find a way to change one of the UIDs to zero&#151;the UID of the root user. Related hacks involve changing one of the IDs to <I>any</I> user or group on the system other than the current user. Even incrementally increasing your privileges to those of nonroot users might lead to eventually compromising the root account.</P>
<P>You can change <I>who</I> a UNIX system thinks you are in two ways:</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;You can explicitly change the IDs associated with a process by invoking library or kernel routines.
<DD><B>&#149;</B>&nbsp;&nbsp;You also can let the system automatically change your identity based on access permissions that are set for program files on the system.
</DL>
<P>This latter technique is the one you will explore first as you investigate access control rules for UNIX files and directories.
</P>
<H4 ALIGN="LEFT"><A NAME="Heading10"></A><FONT COLOR="#000077">UNIX File and Directory Permissions</FONT></H4>
<P>The UNIX operating system provides a hierarchical virtual file system that might consist of multiple physical storage devices. Each entry in the file system represents a file or directory. The file abstraction is used in the normal sense as a container for data, but in UNIX, the file abstraction also encompasses other concepts such as sockets, character and block devices, and even system memory. Many major UNIX entities are implemented in the file system in one way or another.
</P>
<P>The basic storage identifier is an <I>inode</I> that contains information about a file-system object. Each inode is associated with an owner UID and GID. These values are assigned when the file is created but can be changed later using the chown or chgrp command or with a corresponding library routine if invoked from a program. An inode can have only a single owner and a single group ID associated with it.</P>
<P>Traditional UNIX systems support DAC through the use of permission bits. Stored with each inode is a 16-bit mode word that controls access to the files represented by the inode. The least significant nine bits are the most important. Access control in UNIX can be specified for either the file&#146;s owner, the file&#146;s group, or all others. The three primary access modes are <I>read</I> (R), <I>write</I> (W), and <I>execute</I> (X). The interpretation for these modes varies for files and directories as shown in Table 3.1.</P>
<TABLE WIDTH="100%"><CAPTION ALIGN=LEFT><B>Table 3.1</B> Standard UNIX File Permissions
<TR>
<TH COLSPAN="3"><HR>
<TR>
<TH WIDTH="20%" ALIGN=LEFT VALIGN="BOTTOM">Permission
<TH WIDTH="30%" ALIGN=LEFT>Allowed Action If Object Is a File
<TH WIDTH="50%" ALIGN=LEFT VALIGN="BOTTOM">Allowed Action If Object Is a Directory
<TR>
<TH COLSPAN="3"><HR>
<TR>
<TD>R (read)
<TD>Read contents of file
<TD>List contents of the directory
<TR>
<TD>X (execute)
<TD>Execute file as a program
<TD>Search the directory
<TR>
<TD>W (write)
<TD>Change file contents
<TD>Add, rename, create files and subdirectories
<TR>
<TH COLSPAN="3"><HR>
</TABLE>
<P>Notice that these interpretations lead to some interesting conditions. If you have execute permission for a directory but not read permission, you can run programs but only if you know the name of the program. You cannot search the directory or list its contents to find the name of the program. In addition, if the file or program you want to access is nested deep within several subdirectories, you must have execute permissions to traverse the directory path.
</P>
<P>The ls command displays the permission bit settings for a file or directory. Additional arguments for ls cause it to reveal other inode attributes including file create date, last access time, and last change of any value in the inode (such as the file&#146;s length). See Figure 3.1 for an example of a directory listing.</P>
<P><A NAME="Fig1"></A><A HREF="javascript:displayWindow('images/03-01.jpg',500,110 )"><IMG SRC="images/03-01t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/03-01.jpg',500,110)"><FONT COLOR="#000077"><B>Figure 3.1</B></FONT></A>&nbsp;&nbsp;Sample UNIX directory listing.</P>
<P>In this example, the file entry for the file gunzip divulges important security information, such as the following:
</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;The user who owns the file, the one whose name is &#147;bin.&#148;
<DD><B>&#149;</B>&nbsp;&nbsp;The group owner of the file is also group &#147;bin&#148; (although it could have been a different group).
<DD><B>&#149;</B>&nbsp;&nbsp;The file is composed of 110 512K blocks.
<DD><B>&#149;</B>&nbsp;&nbsp;The last modification time of the file was Mar 09 at 17:28.
<DD><B>&#149;</B>&nbsp;&nbsp;The file&#146;s inode has a <I>link count</I> of 1, meaning that no other files on the system reference this inode (such as through a hard link).
<DD><B>&#149;</B>&nbsp;&nbsp;The permissions are read, write, and execute for the owner; read and write for anyone in group bin; and only execute for any other user.
</DL>
<P>Another value that can be set in the inode&#146;s 16-bit mode field is the <I>sticky bit</I>. The original design of UNIX required that some directories be writeable by all users on the system. In general, this feature is not desirable in a software product. Nonetheless, the /tmp directory has always been writeable by anyone. To prevent users from deleting files that they do not own, the directory&#146;s sticky bit can be set. A command for setting the typical permissions for the /tmp directory would be as follows:</P>
<!-- CODE SNIP //-->
<PRE>
chmod 7777 /tmp
</PRE>
<!-- END CODE SNIP //-->
<P>The first 7 sets the sticky bit and the remaining 7s respectively enabled read, write, and execute permissions for owner, group, and world (or user, group, and other). World-writeable directories are not recommended. If you must use them, at least set the sticky bit to prevent the malicious deleting of files.
</P>
<P>Other mode bits that can be set include the set user ID and set group ID bits, SUID and SGID respectively. When a file&#146;s SUID bit is enabled, program execution can result in increased privileges for the requesting user. Recall that as a normal user on the system, you do not have sufficient privileges to perform all tasks on a system. For example, normal users are not allowed to write a new password directly into the shadow password file. Instead, to change your password, you must execute a privileged program that changes the password on your behalf. Hopefully, the program is well behaved. If not, the flaw can be exploited by you or any interested hacker.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="086-088.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="092-093.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>


<!-- all of the reference materials (books) have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- BEGIN SUB FOOTER -->
		<br><br>
		</TD>
    </TR>
	</TABLE>

		
	<table width="640" border=0 cellpadding=0 cellspacing=0>
		<tr>
		<td align="left" width=135><img src="/images/white.gif" width=100 height="1" alt="" border="0"></td>
		
		
<!-- END SUB FOOTER -->

<!-- all of the books have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- FOOTER -->
			
		<td width="515" align="left" bgcolor="#FFFFFF">
<font face="arial, helvetica" size="1"><b><a href="/products.html"><font color="#006666">Products</font></a>&nbsp;|&nbsp; <a href="/contactus.html"><font color="#006666">Contact Us</font></a>&nbsp;|&nbsp; <a href="/aboutus.html"><font color="#006666">About Us</font></a>&nbsp;|&nbsp; <a href="http://www.earthweb.com/corporate/privacy.html" target="_blank"><font color="#006666">Privacy</font></a> &nbsp;|&nbsp; <a href="http://www.itmarketer.com/" target="_blank"><font color="#006666">Ad Info</font></a> &nbsp;|&nbsp; <a href="/"><font color="#006666">Home</font></a></b>
		<br><br>
		
		Use of this site is subject to certain <a href="/agreement.html">Terms &amp; Conditions</a>, <a href="/copyright.html">Copyright &copy; 1996-1999 EarthWeb Inc.</a><br> 
All rights reserved.  Reproduction whole or in part in any form or medium without express written permision of EarthWeb is prohibited.</font><p>
</td>
		</tr>
</table>
</BODY>
</HTML>

<!-- END FOOTER -->

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
高清久久久久久| 精品伦理精品一区| 日韩三级视频在线看| 国产精品美女久久久久久久 | 天天操天天干天天综合网| 国产成人自拍在线| 日韩欧美一级片| 亚洲狠狠爱一区二区三区| 成人精品视频一区二区三区尤物| 欧美一区二区视频网站| 亚洲综合精品自拍| eeuss国产一区二区三区| 久久综合九色综合欧美就去吻| 精品国产在天天线2019| 成人丝袜高跟foot| 欧美精品一级二级三级| 国产精品三级av在线播放| 免费不卡在线视频| 在线成人午夜影院| 亚洲chinese男男1069| 97精品超碰一区二区三区| 欧美激情一区二区三区蜜桃视频| 美女国产一区二区| 日韩一区二区三区视频在线 | 性久久久久久久久| 欧美性大战久久久久久久蜜臀| 日韩理论片网站| 99re在线视频这里只有精品| 国产精品美女久久久久久久| 成熟亚洲日本毛茸茸凸凹| 中文字幕第一区综合| 国产成人啪午夜精品网站男同| 欧美精品一区二区精品网| 久久99深爱久久99精品| 2020国产精品自拍| 国产成人免费av在线| 久久久久久久久伊人| 粉嫩aⅴ一区二区三区四区五区 | 久久综合九色综合97_久久久| 日本视频免费一区| 精品国产乱码久久久久久久| 国产精品18久久久| 中文天堂在线一区| 91传媒视频在线播放| 午夜激情综合网| 欧美不卡123| 国产高清精品网站| 亚洲黄网站在线观看| 欧美军同video69gay| 久久99精品国产.久久久久| 26uuuu精品一区二区| 成人国产精品免费观看动漫| 亚洲视频精选在线| 欧美日本一区二区三区四区| 欧美aaa在线| 久久精品视频免费| 99国产精品久| 国产精品综合一区二区三区| 成人一级片在线观看| 麻豆一区二区在线| 欧美在线|欧美| 国产精品久久久一本精品| 91精品国产乱码久久蜜臀| 丝袜亚洲另类欧美| 久久久久国产精品人| 91日韩在线专区| 久久电影网站中文字幕| 国产日产亚洲精品系列| 日本乱人伦一区| 九九在线精品视频| 国产精品久久久久精k8| 7777精品伊人久久久大香线蕉超级流畅 | 亚洲制服丝袜在线| 日韩欧美久久久| 在线观看一区不卡| 激情小说欧美图片| 香蕉影视欧美成人| 在线观看视频一区二区| 麻豆91在线播放| 日韩一二在线观看| 婷婷开心久久网| 在线不卡的av| 午夜电影久久久| av成人老司机| 久久精子c满五个校花| 麻豆精品视频在线观看视频| 在线观看日韩电影| 蜜桃久久av一区| 色噜噜狠狠色综合欧洲selulu| 日本vs亚洲vs韩国一区三区二区| 国产免费久久精品| 精品国精品自拍自在线| 欧美精品vⅰdeose4hd| 91在线视频免费91| 成人福利视频网站| 极品尤物av久久免费看| 偷拍一区二区三区四区| 亚洲综合丝袜美腿| 亚洲人成在线播放网站岛国| 国产欧美日韩另类视频免费观看| 555www色欧美视频| 欧美日韩一区不卡| 欧洲色大大久久| 日本高清不卡在线观看| 成人av网址在线| 成人免费高清在线| 国产一区二区三区久久久| 久久精品国产在热久久| 麻豆高清免费国产一区| 麻豆久久久久久久| 免费观看91视频大全| 麻豆成人av在线| 中文字幕欧美日韩一区| 亚洲情趣在线观看| 日本国产一区二区| 欧美一区二区免费视频| 欧美日韩日日摸| 国产精品午夜免费| 91精品国产手机| 91网上在线视频| 日本丶国产丶欧美色综合| 亚洲一区在线视频| 亚洲高清在线精品| 日韩制服丝袜先锋影音| 蜜臀av国产精品久久久久| 日本不卡一区二区| 久久国产精品色| 成人激情免费视频| 欧美综合天天夜夜久久| 欧美日本一道本| 欧美xxxxx裸体时装秀| 精品在线播放午夜| 国产精品中文欧美| 日本黄色一区二区| 在线观看视频91| 欧美日韩夫妻久久| 精品国精品国产尤物美女| 日韩欧美卡一卡二| 国产欧美一区二区精品忘忧草| 欧美一区二区私人影院日本| 欧美一区二区三区四区高清| 91精品国产aⅴ一区二区| 国产女人18水真多18精品一级做| 国产成人日日夜夜| 精油按摩中文字幕久久| 高清视频一区二区| 欧美日韩亚洲丝袜制服| 国产亚洲精品福利| 亚洲一区二区欧美日韩| 国产伦精品一区二区三区视频青涩 | 成人免费福利片| 91福利在线看| 精品久久国产字幕高潮| 亚洲欧美日韩在线播放| 精品一区二区国语对白| 一本大道久久a久久精二百| 欧美电影免费提供在线观看| 亚洲欧美色一区| 激情久久五月天| 欧美三级蜜桃2在线观看| 国产欧美精品区一区二区三区| 亚洲一区免费观看| 国产不卡视频在线观看| 这里是久久伊人| 一区二区三区日韩在线观看| 国产一区二区视频在线| 欧美日韩亚洲丝袜制服| 国产精品久久久久精k8 | 日韩精品每日更新| 色综合久久中文综合久久97| ww久久中文字幕| 奇米影视一区二区三区小说| 欧美午夜在线一二页| 国产精品久久免费看| 激情亚洲综合在线| 日韩欧美一区二区久久婷婷| 亚洲一区二区精品视频| 91在线视频免费观看| 国产欧美日韩另类一区| 国产一区 二区| 日韩欧美另类在线| 日韩成人免费电影| 欧美三级三级三级| 一区二区成人在线视频| 97国产一区二区| ...av二区三区久久精品| 国产成a人亚洲| 国产午夜精品在线观看| 国产盗摄女厕一区二区三区| 欧美成人精品高清在线播放| 青青草97国产精品免费观看 | 亚洲综合色婷婷| 91在线你懂得| 亚洲天堂成人网| 99精品一区二区| 亚洲青青青在线视频| 在线观看三级视频欧美| 亚洲电影你懂得| 欧美日韩极品在线观看一区| 亚洲一区二区成人在线观看|