亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? 160-163.html

?? 入侵檢測的相關教程
?? HTML
?? 第 1 頁 / 共 2 頁
字號:
			<option value="/reference/dir.webmasterskills1.html">Webmaster
			<option value="/reference/dir.y2k1.html">Y2K
			<option value="">-----------
			<option value="/reference/whatsnew.html">New Titles
			<option value="">-----------
			<option value="/reference/dir.archive1.html">Free Archive		
			</SELECT>
			</font></td>
	</tr>
	</table>
	</form>
<!-- LEFT NAV SEARCH END -->

		</td>
		
<!-- PUB PARTNERS END -->
<!-- END LEFT NAV -->

<td rowspan="8" align="right" valign="top"><img src="/images/iswbls.gif" width=1 height=400 alt="" border="0"></td>
<td><img src="/images/white.gif" width="5" height="1" alt="" border="0"></td>
<!-- end of ITK left NAV -->

<!-- begin main content -->
<td width="100%" valign="top" align="left">


<!-- END SUB HEADER -->

<!--Begin Content Column -->

<FONT FACE="Arial,Helvetica" SIZE="-1">
To access the contents, click the chapter and section titles.
</FONT>
<P>
<B>Intrusion Detection: Network Security beyond the Firewall</B>
<FONT SIZE="-1">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Terry Escamilla
<BR>
ISBN: 0471290009
<BR>
Publication Date: 11/01/98
</FONT>
<P>
<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">

<INPUT TYPE="hidden" NAME="Action" VALUE="Search">
<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">
<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">
<INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts">
<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">

<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE="">&nbsp;<input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471290009/">

</form>


<!-- Empty Reference Subhead -->

<!--ISBN=0471290009//-->
<!--TITLE=Intrusion Detection: Network Security Beyond the Firewall//-->
<!--AUTHOR=Terry Escamilla//-->
<!--PUBLISHER=John Wiley & Sons, Inc.//-->
<!--IMPRINT=Wiley Computer Publishing//-->
<!--CHAPTER=5//-->
<!--PAGES=160-163//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->

<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="155-160.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="163-167.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P>Most Web servers are populated with additional programs implemented using the <I>Common Gateway Interface</I> (CGI) or some other extensible environment, such as the Lotus Notes API. Two well-known Web hacks are the <I>test.cgi</I> hack and the <I>phf</I> hack. The details of these attacks are similar to those found during the early days of UNIX. Briefly, a programmer forgets to check for delimiter characters when accepting input from a user keying values or from another program. The input data values are to be used as parameters to another program. The programmer&#146;s code takes this input, concatenates the values with the command to be run, and passes this combination to the operating system for execution. Abstractly, this attack is shown in Figure 5.2.</P>
<P><A NAME="Fig2"></A><A HREF="javascript:displayWindow('images/05-02.jpg',500,359 )"><IMG SRC="images/05-02t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/05-02.jpg',500,359)"><FONT COLOR="#000077"><B>Figure 5.2</B></FONT></A>&nbsp;&nbsp;Command-driven attack enabled when delimiters are not filtered out.</P>
<P>In UNIX the semicolon can be used to separate multiple commands entered on a single line such as the following:
</P>
<!-- CODE SNIP //-->
<PRE>
command-1 parameter-1; command-2 parameter-2;...;command-n parameter-n
</PRE>
<!-- END CODE SNIP //-->
<P>NT relies on the &#38; character for a similar capability. What happens if embedded in parameter-1 is the semicolon itself? For example, if parameter-1 is composed of the string &#147;112 222 332; rm *,&#148; then the UNIX operating system will run the following:
</P>
<!-- CODE SNIP //-->
<PRE>
command-1 112 222 332
rm *
command-2 parameter-2
</PRE>
<!-- END CODE SNIP //-->
<P>This attack remains one of the most common attacks against Web servers, <I>even though the general problem has been known in the UNIX community for more than a decade.</I></P>
<P>Both the <I>test.cgi</I> and <I>phf</I> hacks resulted from the way input data from HTML forms was processed by a CGI program. The user was asked to enter a name or some other text string. When the CGI script processed the data, it did not check for special delimiters. By appending a substring such as &#147;;rm *&#148; to the input field in the HTML form, the hacker could trick the CGI into removing all the files in the current working directory of the Web server.</P>
<P>Your Web server might be configured as securely as possible with all unnecessary network protocols disabled. There also could be a screening router in front of it blocking denial of service attacks as in the preceding figures. Yet, these defenses will not eliminate the <I>weak CGI threat</I>. If you have installed CGI scripts or other programs that have latent bugs, your site will get hacked. The amount of damage done depends on several factors.</P>
<P>If the Web server is running as root when this happens, all bets are off. For starters, the attacker can continue to execute one program at a time until the desired outcome is achieved. For example, the shadow password file can be changed so that a root password is not needed to log in. If the Web server daemon is running with some other credentials, the hacker will be able to access any resources that the Web server can access. In other words, the UID and GIDs identifying the Web server determine the consequences of the command executed with the CGI attack. Because the Web server&#146;s UID can access the Web site content, trashing is possible unless the entire Web site has been configured as read only for <I>all</I> users.</P>
<P>Programming errors are not limited to operating systems. Often vendor applications that you add to your systems introduce weaknesses, too. In UNIX these applications probably contain SUID or SGID programs. Even vendors who have a history of delivering quality software can make mistakes. In early 1998, a notice was posted in BUGTRAQ showing how a popular game, when played across a network, allowed remote users to penetrate participating nodes.</P>
<P>The list of potential configuration errors is extensive. UNIX and NT operating systems are delivered out-of-the-box with fairly open configurations today. The reasons for this are historical. Customers preferred easy to run, or load-and-go configurations. Security was not as important as ease of use to the marketplace. Now that more people are security conscious, this situation probably will change. At least there might be an option that allows someone to order the <I>locked down</I> version of a UNIX or NT system.</P>
<P>Like software errors, operating system configurations are not the sole source of problems. Configuration defaults in applications have been exploited to gain access to systems. The test.cgi bug affected a number of sites because it shipped as a default CGI for testing a popular Web server. By now almost everyone knows that Internet browsers also have endured their share of public humiliation for containing security bugs.</P>
<H3><A NAME="Heading3"></A><FONT COLOR="#000077">The Role of Intrusion Detection</FONT></H3>
<P>You should know that almost every day there is a new attack that shows up in a newsgroup or somewhere else on the Internet. Checking some of the links given in the Appendix will help you to stay abreast of the latest developments. Investing in an intrusion detection product, or perhaps a few products, will narrow the window of opportunity for someone trying to blast your systems. By now you should have a good idea of the relative value of traditional security products and how they are complemented by IDSs. The next few sections spell out the advantages in detail.
</P>
<H4 ALIGN="LEFT"><A NAME="Heading4"></A><FONT COLOR="#000077">Beyond I&#38;A</FONT></H4>
<P>What role does I&#38;A play in your environment? I&#38;A is needed in local and distributed systems because:
</P>
<DL>
<DD><B>&#149;</B>&nbsp;&nbsp;I&#38;A establishes your identity for subsequent activities on the system. Various reference monitors that decide what to do with your access requests need to know <I>who</I> you are to enforce access control.
<DD><B>&#149;</B>&nbsp;&nbsp;I&#38;A blocks initial access to the computer until the requester has passed the authentication test. In addition to proving identity, this step is <I>preventative</I> because you cannot log in if you do not authenticate properly.
<DD><B>&#149;</B>&nbsp;&nbsp;I&#38;A verifies the identity of noninteractive entities such as background processes, daemons, and devices in order to regulate access control for these entities.
<DD><B>&#149;</B>&nbsp;&nbsp;I&#38;A assigns <I>accountability</I> for activities that occur in the environment. This is not important to everyone, but when accountability has consequences, knowing who did what is only possible with appropriate I&#38;A.
</DL>
<P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="155-160.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="163-167.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>


<!-- all of the reference materials (books) have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- BEGIN SUB FOOTER -->
		<br><br>
		</TD>
    </TR>
	</TABLE>

		
	<table width="640" border=0 cellpadding=0 cellspacing=0>
		<tr>
		<td align="left" width=135><img src="/images/white.gif" width=100 height="1" alt="" border="0"></td>
		
		
<!-- END SUB FOOTER -->

<!-- all of the books have the footer and subfoot reveresed -->
<!-- reference_subfoot = footer -->
<!-- reference_footer = subfoot -->

<!-- FOOTER -->
			
		<td width="515" align="left" bgcolor="#FFFFFF">
<font face="arial, helvetica" size="1"><b><a href="/products.html"><font color="#006666">Products</font></a>&nbsp;|&nbsp; <a href="/contactus.html"><font color="#006666">Contact Us</font></a>&nbsp;|&nbsp; <a href="/aboutus.html"><font color="#006666">About Us</font></a>&nbsp;|&nbsp; <a href="http://www.earthweb.com/corporate/privacy.html" target="_blank"><font color="#006666">Privacy</font></a> &nbsp;|&nbsp; <a href="http://www.itmarketer.com/" target="_blank"><font color="#006666">Ad Info</font></a> &nbsp;|&nbsp; <a href="/"><font color="#006666">Home</font></a></b>
		<br><br>
		
		Use of this site is subject to certain <a href="/agreement.html">Terms &amp; Conditions</a>, <a href="/copyright.html">Copyright &copy; 1996-1999 EarthWeb Inc.</a><br> 
All rights reserved.  Reproduction whole or in part in any form or medium without express written permision of EarthWeb is prohibited.</font><p>
</td>
		</tr>
</table>
</BODY>
</HTML>

<!-- END FOOTER -->

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
色拍拍在线精品视频8848| 中文字幕一区免费在线观看| 亚洲国产日韩精品| 欧美综合在线视频| 午夜视频一区在线观看| 欧美一区二区三区免费视频| 免费在线看成人av| 久久免费美女视频| aaa国产一区| 一区二区三区精品在线观看| 欧美日韩1区2区| 老司机精品视频一区二区三区| 久久综合久久综合久久| av在线不卡电影| 亚洲福利视频三区| 久久综合久久综合久久| 91久久香蕉国产日韩欧美9色| 亚洲精品中文字幕在线观看| 欧美妇女性影城| 国产福利一区二区三区视频在线| 国产精品色哟哟| 欧美在线影院一区二区| 久久99蜜桃精品| 国产精品久久久久久久久免费桃花 | 欧美国产国产综合| 激情六月婷婷综合| 日本一区二区三区dvd视频在线 | 97精品电影院| 日韩经典中文字幕一区| 国产亚洲欧美日韩俺去了| 色婷婷激情综合| 国产一区在线看| 亚洲专区一二三| 久久综合色一综合色88| 欧美性受xxxx| 国产精品99久久久久久有的能看| 中文字幕一区三区| 精品乱码亚洲一区二区不卡| 91丨九色丨蝌蚪丨老版| 麻豆国产精品一区二区三区| 亚洲欧美日韩在线| 在线电影一区二区三区| 国产福利一区在线| 亚洲3atv精品一区二区三区| 国产精品免费久久| 日韩欧美国产麻豆| 在线观看91视频| 成人午夜激情片| 久久国产精品第一页| 亚洲一二三四在线| 亚洲欧洲一区二区三区| 精品国产伦理网| 欧美精品在线观看一区二区| 91色在线porny| 福利一区二区在线| 久久99精品国产.久久久久| 亚洲一区二区在线免费看| 欧美国产综合一区二区| 精品福利在线导航| 日韩一区二区精品葵司在线| 欧美在线一区二区三区| 欧美精品tushy高清| 91福利社在线观看| 99精品国产视频| av电影在线观看完整版一区二区| 国产综合色视频| 国产一区二区在线观看免费| 国产馆精品极品| 日韩专区欧美专区| 亚洲成人综合网站| 亚洲综合一区二区三区| 国产精品国产精品国产专区不片| 久久亚洲精品国产精品紫薇| 日韩一级完整毛片| 欧美一区二区精美| 这里只有精品免费| 91麻豆精品国产91久久久更新时间 | 日韩一二在线观看| 91麻豆精品国产自产在线观看一区 | 欧美日韩国产影片| 欧美日韩一级大片网址| 欧美美女一区二区三区| 亚洲电影在线免费观看| 亚洲女性喷水在线观看一区| 欧美激情在线观看视频免费| 久久久夜色精品亚洲| 久久久美女毛片| 久久久久久久一区| 国产视频一区不卡| 欧美高清在线一区二区| 国产精品嫩草久久久久| 中文字幕亚洲一区二区av在线 | 国产午夜精品一区二区| 国产婷婷色一区二区三区| 国产欧美一二三区| 椎名由奈av一区二区三区| 最新成人av在线| 亚洲国产日韩一区二区| 麻豆久久久久久久| 国产成人免费9x9x人网站视频| 成人视屏免费看| 欧美吻胸吃奶大尺度电影| 欧美一区二区播放| 久久久久久日产精品| 538在线一区二区精品国产| 99视频精品在线| 欧美性一二三区| 国产精品麻豆一区二区| 亚洲最大色网站| 日本不卡免费在线视频| 国产成人av电影在线播放| 欧美中文一区二区三区| 精品成人一区二区三区四区| 亚洲日本护士毛茸茸| 亚洲丰满少妇videoshd| 国产成人鲁色资源国产91色综| 91啪亚洲精品| 欧美xxxx在线观看| 亚洲日本在线视频观看| 日本亚洲视频在线| 不卡视频免费播放| 91精品国产综合久久福利| 国产精品麻豆99久久久久久| 日韩成人一区二区| 色综合天天综合网天天狠天天 | 亚洲自拍偷拍av| 国产高清无密码一区二区三区| 欧美亚洲禁片免费| 欧美激情中文字幕| 麻豆国产欧美一区二区三区| 色综合久久综合网97色综合| 精品国产精品网麻豆系列| 亚洲一区二区欧美日韩 | 国产午夜亚洲精品羞羞网站| 亚洲高清视频中文字幕| 成人性生交大片免费看视频在线| 宅男噜噜噜66一区二区66| 亚洲欧美韩国综合色| 国产精品99久久久| 7777精品伊人久久久大香线蕉的 | 成人禁用看黄a在线| 欧美mv日韩mv| 日韩成人一级片| 欧美三级中文字幕| 色婷婷狠狠综合| 中文字幕亚洲欧美在线不卡| 日本人妖一区二区| 欧美在线|欧美| 国产精品久久久久久妇女6080| 久久国产精品区| 欧美一区二区精品久久911| 亚洲成人免费av| 欧美亚一区二区| 一区二区三区四区五区视频在线观看| 国产精品123| xvideos.蜜桃一区二区| 奇米色一区二区三区四区| 欧美色综合网站| 亚洲综合视频在线| 91久久精品一区二区三| 亚洲精品菠萝久久久久久久| 99国产精品久久久久久久久久久 | 国产激情视频一区二区三区欧美| 久久美女高清视频| 麻豆91在线观看| 日韩视频在线观看一区二区| 日韩精品一二三区| 欧美美女直播网站| 首页亚洲欧美制服丝腿| 欧美理论片在线| 国产69精品久久久久毛片| 国产成人精品免费视频网站| 日韩欧美色综合网站| 日韩av一级电影| 日韩精品一区二区三区中文精品 | 亚洲欧美自拍偷拍| 99国产精品久| 亚洲精品一二三四区| 欧美三级日韩在线| 亚洲成年人影院| 欧美va亚洲va国产综合| 国产激情一区二区三区桃花岛亚洲| 欧美激情一区不卡| 91老师片黄在线观看| 亚洲电影在线免费观看| 日韩亚洲国产中文字幕欧美| 精品一区二区精品| 日本一区二区电影| 91福利在线导航| 麻豆国产精品一区二区三区| 国产三级精品在线| 99精品热视频| 日韩精品视频网| 久久综合九色综合久久久精品综合| 国产另类ts人妖一区二区| 亚洲人xxxx| 91天堂素人约啪| 亚洲高清免费一级二级三级| 91黄色免费版| 免费观看成人鲁鲁鲁鲁鲁视频|