亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? 251-254.html

?? 入侵檢測(cè)的相關(guān)教程
?? HTML
?? 第 1 頁 / 共 2 頁
字號(hào):
			</font></td>
	</tr>
	</table>
	</form>
<!-- LEFT NAV SEARCH END -->

		</td>
		
<!-- PUB PARTNERS END -->
<!-- END LEFT NAV -->

<td rowspan="8" align="right" valign="top"><img src="/images/iswbls.gif" width=1 height=400 alt="" border="0"></td>
<td><img src="/images/white.gif" width="5" height="1" alt="" border="0"></td>
<!-- end of ITK left NAV -->

<!-- begin main content -->
<td width="100%" valign="top" align="left">


<!-- END SUB HEADER -->

<!--Begin Content Column -->

<FONT FACE="Arial,Helvetica" SIZE="-1">
To access the contents, click the chapter and section titles.
</FONT>
<P>
<B>Intrusion Detection: Network Security beyond the Firewall</B>
<FONT SIZE="-1">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Terry Escamilla
<BR>
ISBN: 0471290009
<BR>
Publication Date: 11/01/98
</FONT>
<P>
<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">

<INPUT TYPE="hidden" NAME="Action" VALUE="Search">
<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">
<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">
<INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts">
<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">

<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE="">&nbsp;<input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471290009/">

</form>


<!-- Empty Reference Subhead -->

<!--ISBN=0471290009//-->
<!--TITLE=Intrusion Detection: Network Security Beyond the Firewall//-->
<!--AUTHOR=Terry Escamilla//-->
<!--PUBLISHER=John Wiley & Sons, Inc.//-->
<!--IMPRINT=Wiley Computer Publishing//-->
<!--CHAPTER=8//-->
<!--PAGES=251-254//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="249-251.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="254-257.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P><FONT SIZE="+1"><B>Tricking Other Users</B></FONT></P>
<P>A hacker prefers to gain additional access to resources on the system rather than launch DoS attacks. To get beyond the system&#146;s defined ACLs, a local user needs to trick another user into either granting this access or into operating on behalf of that user. Obviously, if you can determine someone else&#146;s password, you can impersonate them. Another approach is to trick the victim into doing something without knowing the operation is happening. The old PATH hack against inexperienced administrators is the favorite example of the latter technique. In either case, you can use this attack to gain read or write access to a resource for which you do not normally have privilege. In the end, as the &#147;Introduction&#148; described, all activities on a system can be reduced to read and write operations for an object.
</P>
<P>One of the oldest tricks is to ask an unwary user to run a Trojan Horse that you have set up. The classic example is to tell the administrator that you cannot see a file that should be in your directory. To set up the attack, you create a program in your directory that has the same file name as a system utility such as ls.</P>
<!-- CODE SNIP //-->
<PRE>
cat &gt;&gt; ls
** hack code goes here, such as copying /bin/sh into one of your
   subdirectories **
/bin/ls $*
exit 0
/bin/chmod &#43;x ls
</PRE>
<!-- END CODE SNIP //-->
<P>Next you set your PATH environment variable so that your trick directory (perhaps your home directory) is the first directory in the search path:
</P>
<!-- CODE SNIP //-->
<PRE>
export PATH=.:$PATH
</PRE>
<!-- END CODE SNIP //-->
<P>You then call your friendly administrator to your desk for help. If you&#146;re smart, you will have carried out some social engineering to build up trust so that this person trusts you. The novice administrator would type the following:
</P>
<!-- CODE SNIP //-->
<PRE>
su root
</PRE>
<!-- END CODE SNIP //-->
<P>This command logs him in as the superuser; he then lists the files in your directory using your ls command and proceeds to show you the file in the directory listing. If the preceding script is run, you can write the hack code to create a SUID root shell in the directory of your choice.
</P>
<P>Of course, the administrator should have typed the following:</P>
<!-- CODE SNIP //-->
<PRE>
su - root
</PRE>
<!-- END CODE SNIP //-->
<P>This command loads the login profile of the root user and resets the environment. This hack is so well known that it&#146;s unlikely an administrator today would fall for it but this depends on how much training the person has received. Someone who has just been appointed lab moderator and given superuser privileges may be a total security novice and could fall victim to this attack. Even if you have trained administrators, you want to watch for this type of behavior.
</P>
<P>To detect the path attack, you look for evidence of someone creating a Trojan Horse. In this specific case, the Trojan Horse is any well-known system command: ls, rm, who, or cat. Hopefully, the IDS you purchased already will have the list of potential Trojan Horse filenames or directory names in a configurable list that you can augment. Otherwise, you would need to compile a rather long list yourself. The monitoring program would look for the file name in the list of system directories, and if the same file name is found in one of these directories, someone is planting a Trojan Horse. In the audit trail, you will look for several events. First, you need to detect that the Trojan Horse was created by looking for audit records with the following:</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;AUID, RUID != 0 (not the root user)
<DD><B>&#149;</B>&nbsp;&nbsp;FILE_Create or FILE_Rename
<DD><B>&#149;</B>&nbsp;&nbsp;Filename appears in one of the protected system or application directories specified in the configurable list
</DL>
<P>You need to consider rename operations because someone can create the file <I>foo</I> and then rename it to avoid detection by a monitor that looks for only file creations. Also, this particular monitor is looking for more than a normal login user trying to do this from a shell. Many SUID and SGID programs create files. If you want to consider whether someone is making the Trojan Horse via indirection, by using a SUID or SGID program, you want to look at the AUID and RUID because these do not change as a result of running SUID or SGID programs. For the moment, this audit event is labeled E1.</P>
<P>Next, you want to look for the event that turns this file into an executable. In AIX this would be a FILE_Mode event. For this example, the audit event for this activity will be labeled E2. The sequence of interest is E1, followed by any number of other events, followed by E2. E1 alone is probably not sufficient to warrant an alarm because the file is not really a threat until its executable bit is set. Because the sequence of events, E1 and E2, are important, you can now see the need for tracking the sequence of activity with some type of graph or state transition model. In order to avoid false positives, an alarm should be signaled if E1 and E2 have the same data values in some of their fields:</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;Same subject (AUID and RUID)
<DD><B>&#149;</B>&nbsp;&nbsp;Same filename
</DL>
<P>This means that the IDS not only needs to track sequences of events, but it also must be capable of matching related data across events. This capability is a fundamental requirement implemented by pattern-matching IDSs.
</P>
<P>When you must have the same value in fields across events and when values can vary are two conditions that greatly complicate the process of attack signature development. The core problem in signature development is to make the signature flexible enough to catch a number of problems, yet not so broad that it generates false alarms.</P>
<P>In the preceding example, the system should not generate an alarm if someone sets the executable bit for a <I>different</I> file from the one that was created in the first event. Also, if two different users appear in the audit records, this does not constitute an attack (at least not this attack). If two different users did appear in the audit records, you would have an attack in which two users participated&#151;one created the file, and the other set the executable bit. Notice that these two events can be separated by any number of intervening events, so the scope problem still exists. The attacker could first create the file and then run chmod on a subsequent day, particularly if this person knew that the system was being monitored.</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="249-251.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="254-257.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>


<!-- all of the reference materials (books) have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- BEGIN SUB FOOTER -->
		<br><br>
		</TD>
    </TR>
	</TABLE>

		
	<table width="640" border=0 cellpadding=0 cellspacing=0>
		<tr>
		<td align="left" width=135><img src="/images/white.gif" width=100 height="1" alt="" border="0"></td>
		
		
<!-- END SUB FOOTER -->

<!-- all of the books have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- FOOTER -->
			
		<td width="515" align="left" bgcolor="#FFFFFF">
<font face="arial, helvetica" size="1"><b><a href="/products.html"><font color="#006666">Products</font></a>&nbsp;|&nbsp; <a href="/contactus.html"><font color="#006666">Contact Us</font></a>&nbsp;|&nbsp; <a href="/aboutus.html"><font color="#006666">About Us</font></a>&nbsp;|&nbsp; <a href="http://www.earthweb.com/corporate/privacy.html" target="_blank"><font color="#006666">Privacy</font></a> &nbsp;|&nbsp; <a href="http://www.itmarketer.com/" target="_blank"><font color="#006666">Ad Info</font></a> &nbsp;|&nbsp; <a href="/"><font color="#006666">Home</font></a></b>
		<br><br>
		
		Use of this site is subject to certain <a href="/agreement.html">Terms &amp; Conditions</a>, <a href="/copyright.html">Copyright &copy; 1996-1999 EarthWeb Inc.</a><br> 
All rights reserved.  Reproduction whole or in part in any form or medium without express written permision of EarthWeb is prohibited.</font><p>
</td>
		</tr>
</table>
</BODY>
</HTML>

<!-- END FOOTER -->

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
中文字幕在线不卡| 亚洲va天堂va国产va久| 成人中文字幕电影| 精品久久久久久亚洲综合网| 美女脱光内衣内裤视频久久影院| 3d动漫精品啪啪1区2区免费| 五月天中文字幕一区二区| 欧美日韩一级大片网址| 亚洲第一在线综合网站| 欧美唯美清纯偷拍| 五月婷婷激情综合| 欧美一区二区三区免费观看视频| 青青草原综合久久大伊人精品| 制服丝袜亚洲播放| 免费成人在线视频观看| 精品日韩欧美一区二区| 国产一区二区剧情av在线| 2024国产精品| 高清在线成人网| 国产精品不卡在线观看| 一本一本久久a久久精品综合麻豆 一本一道波多野结衣一区二区 | 国产综合久久久久影院| 欧美精品一区二| 国产精品456| 国产精品国模大尺度视频| 91丨porny丨在线| 亚洲国产成人91porn| 制服丝袜国产精品| 国产主播一区二区三区| 国产精品素人一区二区| 91久久精品一区二区三| 日韩中文字幕亚洲一区二区va在线| 日韩视频免费观看高清完整版| 黑人精品欧美一区二区蜜桃| 国产精品天天摸av网| 99久久国产综合精品女不卡| 亚洲国产日韩a在线播放| 日韩欧美中文一区二区| 国产成人鲁色资源国产91色综 | 日本成人在线电影网| 久久无码av三级| 91麻豆精品秘密| 青青草原综合久久大伊人精品 | 欧美久久久一区| 国产一区二区三区黄视频 | 国产午夜亚洲精品不卡| 91视频国产资源| 日韩专区欧美专区| 国产偷国产偷亚洲高清人白洁| 92精品国产成人观看免费| 日韩精品五月天| 欧美精彩视频一区二区三区| 色婷婷亚洲婷婷| 日本不卡一二三区黄网| 国产日韩影视精品| 欧美性欧美巨大黑白大战| 国内精品自线一区二区三区视频| 最新日韩av在线| 日韩一区二区精品葵司在线 | 色哟哟一区二区| 美国精品在线观看| 亚洲色图在线看| 日韩女优电影在线观看| 97久久人人超碰| 蜜臀国产一区二区三区在线播放| 国产精品青草久久| 日韩一区二区三区在线| 99精品欧美一区二区蜜桃免费| 日本一区中文字幕| 中文字幕一区二区三区视频| 欧美一区二区三区白人| 91天堂素人约啪| 激情综合网最新| 亚洲国产精品综合小说图片区| 久久亚洲捆绑美女| 欧美午夜一区二区| 国产69精品久久久久777| 日韩av电影免费观看高清完整版 | 国产激情一区二区三区桃花岛亚洲| 99久免费精品视频在线观看| 亚洲视频在线观看一区| 欧美一级一区二区| 成人a区在线观看| 免费观看30秒视频久久| 亚洲精品视频自拍| 久久久国产精品不卡| 欧美精品123区| 91福利在线看| av在线不卡电影| 国产精品一二一区| 午夜精品久久久久久久久久| 中文字幕一区二区三区视频| 久久这里只有精品首页| 91精选在线观看| 在线观看av不卡| 91丝袜美女网| 成人av集中营| 国产99久久久久| 国产一区二区在线观看视频| 首页国产欧美日韩丝袜| 一区二区三区免费网站| 国产精品短视频| 中文字幕av一区二区三区高| 精品国产一区久久| 欧美老女人第四色| 在线观看免费亚洲| 91麻豆免费观看| 91在线精品一区二区三区| 粉嫩高潮美女一区二区三区 | 久久精品国产澳门| www成人在线观看| 日韩一级高清毛片| 欧美日韩三级在线| 欧洲亚洲精品在线| 91久久国产最好的精华液| 成人av在线一区二区三区| 国产精品538一区二区在线| 老司机免费视频一区二区| 日本在线不卡视频| 日韩成人精品在线观看| 天天操天天干天天综合网| 亚洲综合另类小说| 亚洲精品乱码久久久久久久久| 亚洲欧洲精品一区二区三区| 国产精品免费aⅴ片在线观看| 久久精品欧美一区二区三区麻豆| 日韩精品一区二区三区中文精品| 日韩视频在线观看一区二区| 日韩一卡二卡三卡四卡| 日韩一区二区麻豆国产| 日韩欧美在线一区二区三区| 日韩精品在线一区| 337p日本欧洲亚洲大胆精品| 久久久精品中文字幕麻豆发布| 久久久久久电影| 欧美激情综合五月色丁香小说| 中日韩av电影| 中文字幕亚洲欧美在线不卡| 亚洲人成7777| 亚洲一区影音先锋| 午夜免费欧美电影| 日韩av不卡在线观看| 九色|91porny| 国产精品99久| 99久久亚洲一区二区三区青草| 99精品视频在线免费观看| 色偷偷成人一区二区三区91| 欧美亚洲一区二区在线观看| 欧美肥妇bbw| 精品国产一区二区三区久久久蜜月| 精品成人一区二区三区四区| 欧美国产成人在线| 亚洲人午夜精品天堂一二香蕉| 有坂深雪av一区二区精品| 亚洲成人精品一区| 免费在线观看视频一区| 国产一区二区91| 91在线观看地址| 精品视频一区三区九区| 日韩欧美国产精品| 国产女主播视频一区二区| 最好看的中文字幕久久| 五月婷婷欧美视频| 国产主播一区二区三区| 99久久久国产精品免费蜜臀| 欧美日韩卡一卡二| 精品国产欧美一区二区| 国产精品久久毛片av大全日韩| 亚洲一区二区偷拍精品| 老汉av免费一区二区三区| 国产成人精品www牛牛影视| 91一区二区在线| 4438成人网| 中文字幕第一区综合| 亚洲一区在线视频| 韩国视频一区二区| 色综合久久88色综合天天6| 日韩亚洲电影在线| 中文字幕日韩一区二区| 日韩va欧美va亚洲va久久| 国产亚洲美州欧州综合国| 亚洲精品精品亚洲| 久久99蜜桃精品| 91日韩在线专区| 日韩欧美激情四射| 日韩久久一区二区| 蜜桃视频在线一区| 91在线播放网址| 精品日韩一区二区| 一区二区三区丝袜| 久久电影网站中文字幕| 91蝌蚪porny九色| 日韩美女视频在线| 亚洲精品视频观看| 老司机一区二区| 欧美色倩网站大全免费| 日本一区二区综合亚洲| 天天影视网天天综合色在线播放| 国产成人aaa| 日韩欧美中文一区二区|