亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? unix computer security checklist.0

?? a collection of mega hacking tools
?? 0
?? 第 1 頁 / 共 4 頁
字號:
            (for example, bounce or blah).     *    REMEMBER that if you are running a frozen configuration file - 	sendmail.fc, you will need to rebuild it and restart sendmail(8) 	before any changes will take effect.  To rebuild the frozen 	configuration file, the	command is:		# /usr/lib/sendmail -bz        To restart sendmail(8) you should kill *all* existing sendmail(8) 	processes by sending them a TERM signal using kill.  Then startup	sendmail(8).  Sample commands are:		# /usr/bin/ps -auxw | /bin/grep sendmail | /bin/grep -v grep	        # /bin/kill <pid>     #pid of every running sendmail process	        # /usr/lib/sendmail -bd -q1h	 2.14  majordomo   *    Check that your version is greater than 1.91.            See AUSCERT Advisory SA-94.03 (see A.1) for more details. 2.15  fingerd	   *    If your version of fingerd is older than than 5 November 1988,	replace it with a newer version. 2.16  UUCP	   *    DO disable the uucp account, including the shell that it executes 	for logging in, if it is not used at your site.            uucp may be shipped in a dangerous state.      *    REMOVE any .rhosts file at the uucp home directory.   *    CHECK that the file L.cmds is owned by root.   *    ENSURE that no uucp owned files are world writable.   *    CHECK that you have assigned a different uucp login for each site        that needs uucp access to your machine.     *    CHECK that you have limited the number of commands that each uucp 	login can execute to a bare minimum. ------------------------------------------------------------------------------3.0  ftpd and Anonymous ftp------------------------------------------------------------------------------ 3.1  Versions   *    ENSURE you are using the most recent version of the ftp daemon 	that you use.   *    DO consider installing the Washington University ftpd if you don't 	already have it.            This can log all events and provide users with a login banner.             Do not install any versions prior to wu-ftp 2.4.  	    (Refer to the CERT advisory CA-94:07 (see C.7)).  	    It is available via anonymous ftp from	      ftp://ftp.auscert.org.au/pub/mirrors/wuarchive.wustl.edu			/packages/wuarchive-ftpd/*            [Warning: versions of wu-ftp prior to 2.4 are extremely insecure	              and in some cases have been trojaned.]   *    For BSDI systems, patch 005 should be applied to version 1.1 of the        BSD/386 software.  It is available via anonymous ftp from:	      ftp://ftp.bsdi.com/bsdi/patches/README	      ftp://ftp.bsdi.com/bsdi/patches/?U110-005                  (? will be B or S for the Binary or Source version) 3.2  SITE EXEC   *    CHECK to make sure your ftp server does not have the SITE EXEC command             Do this by telneting to port 21 and typing SITE EXEC. If your            ftp daemon has SITE EXEC make sure you have the most recent 	    version of the daemon (eg, wu-ftp 2.4).  In older versions of ftpd	    SITE EXEC allows anyone to gain shell via port 21.        *    CHECK that any commands from ~ftp/bin, ~ftp/usr/bin, ~ftp/sbin or        similar directory configurations that can be executed by SITE EXEC        DO NOT contain system commands or include a shell            (eg., ~ftp/bin -> /bin)  If they do contain system commands	    it is possible for local users to gain root access.  	    (See AUSCERT advisory SA-94.01 (see A.1)) 3.3  Configuration of your ftp server   *    CHECK all default configuration options on your ftp server.            Not all versions of ftp are configurable.  If you have a 	    configurable version of ftp (eg. wu-ftp) then make sure that 	    all delete, overwrite, rename, chmod and umask options (there 	    may be others) are NOT allowed for guests and anonymous users.  	    In general, anonymous users should not have any unnecessary 	    privileges.     *    CHECK that you have set up a file /etc/ftpusers which specifies        those users that are NOT allowed to connect to your ftpd.              This should include, as a MINIMUM, the entries: root, bin,            uucp, ingres, daemon, news, nobody and ALL vendor supplied             accounts.   *    CHECK that you use an invalid password and user shell for the ftp        entry in the system passwd file. It should look something like:            ftp:*:400:400:Anonymous FTP:/home/ftp:/bin/rubbish        where /home/ftp is the anonymous ftp area.   *    CHECK that you DO NOT have a copy of your real /etc/passwd file        as ~ftp/etc/passwd.              Create one from scratch with permissions 444, owned by root.  It 	    should not contain the names of any accounts in your real 	    password file.  It should contain only root and ftp.  These 	    should be dummy entries with disabled passwords eg:               root:*:0:0:Ftp maintainer::     	       ftp:*:400:400:Anonymous ftp::   *    Similarly, CHECK that you DO NOT have a copy of your real        /etc/group file as ~ftp/etc/group.             Create one from scratch with permissions 444, owned by root.     *    ENSURE the files ~ftp/.rhosts and ~ftp/.forward are zero        length, have permissions 600 and are owned by root. 3.4  Permissions   *    ENSURE NO files or directories are owned by the ftp account or have	the same group as the ftp account.             If they are, it may be possible for an intruder to replace them 	    with a trojan version.   *    ENSURE that the anonymous ftp user cannot create files or directories	in ANY directory.     *    ENSURE that the ftp user can only read information in public areas.   *    ENSURE that the permissions of the ftp home directory (~ftp/) are set        to 555 (read nowrite execute), owner set to root (NOT ftp).   *    ENSURE that the system subdirectories ~ftp/etc and ~ftp/bin         have the permissions 111 only, owner set to root.   *    ENSURE that the permissions of files in ~ftp/bin/* have the        permissions 111 only, owner set to root.   *    ENSURE that the permissions of files in ~ftp/etc/* are set to        444, owner set to root.   *    ENSURE /usr/spool/mail/ftp is owned by root with permissions 400.            If you need email for the ftp admin (eg. for problem reporting)            use an alias. 3.5  Writable directories   *    CHECK that you don't have any writable directories.    	    It is safest not to have any writable directories. If you do    	    have any, we recommend that you limit the number to one.       *	CHECK that writable directories are not also readable.   	    Directories that are both writable and readable may be used by    	    unauthorised persons to trade pirated software.    *    CHECK that any writable directories are owned by root and have    	permissions 1733.     *	DO put writable directories on a separate partition if possible.    	    This will help to prevent denial of service attacks.    *    DO read the CERT document which addresses the many problems    	associated with writable anonymous ftp  directories.  It can be    	obtained via anonymous ftp from:   	    ftp://ftp.auscert.org.au/pub/cert/tech_tips/anonymous_ftp 3.6  Disk mounting   *    NEVER mount disks from other machines to the ~ftp hierarchy         unless they are read-only.  ------------------------------------------------------------------------------4.0  Password and account security------------------------------------------------------------------------------	This section of the checklist can be incorporated as part of a 	password and account usage policy. 4.1  Policy   *	CHECK that you have a password policy for your site.             See the AUSCERT Advisory SA-93.04 (see A.1).   *    ENSURE you have a User Registration Form for each user on each 	system.  Make sure that this form includes a section that the 	intending applicant signs, stating that they have read your account	usage policy and what the consequences are if they misuse their 	account. 4.2  Proactive Checking   *	DO use npasswd or passwd+ to proactively screen passwords as they are 	entered.            These programs run a series of checks on passwords when they are            set and can help to screen out poor passwords.  They were not	    designed to work with shadow password systems.  	    (Refer to section B.3 for how to obtain these.)   *    DO check passwords periodically with Crack.             (Refer to section B.4 for how to obtain Crack.)   *    DO apply password aging (if possible). 4.3  Root Password   *    DO restrict the number of people who know the root password.            These should be the same users registered with groupid 0	    (eg. wheel group on SunOS).  Typically this is limited to at most	    3 or 4 people.   4.4  NIS and /etc/passwd entries   *    DO NOT run NIS if you don't really need it.   *    CHECK that the only machines that have a '+' entry in the /etc/passwd	files are NIS (YP) clients; i.e. NOT the NIS master server!            There appears to be conflicting documentation and            implementations regarding the '+' entry format and so a            generic solution is not available here.  It would be best to            consult your vendor's documentation.            Some of the available documentation suggests placing a '*' in            the password field, which is NOT consistent across all            implementations of NIS.  We recommend testing your systems on a            case-by-case basis to see if they correctly implement the '*'            in the password field.            To do this, follow the steps below:	    . Try using NIS with the '*' in the password field for example; 		   +:*:0:0:::		      If NIS users cannot log in to that machine, remove the '*' and 	      try the next test.	    . With the '*' removed, try logging in again.  If NIS users can	      log in AND you can also log in unauthenticated as the user '+',	      you have a problem!  Your vendor needs to change their version	      of NIS.  If NIS users can log in AND you cannot log in as the	      user '+', your implementation should not be vulnerable to this 	      problem.   *    CHECK that /etc/rc.local is set up to start ypbind with the -s        option.            This may not be applicable on all systems.  Check your 	    documentation. 4.5  Password shadowing and C2 security   *   DO implement C2 security if possible.	    Consult your vendor documentation for details.   *   DO implement vendor supplied password shadowing or a third party        product if you cannot run full C2 security.            Password shadowing restricts access to users' encrypted passwords.   *   DO periodically audit your password and shadow password files        for unauthorised additions or inconsistencies. 4.6  Administration   *    ENSURE that you regularly audit your system for dormant accounts        and disable any that have not been used for a specified period,        say 3 months.  Send out account renewal notices and delete any        accounts of users that do not reply.   *	CHECK that all accounts have passwords.   *    ENSURE that any user area is adequately backed up and archived.   *    DO regularly monitor logs for successful and unsuccessful su 	attempts.   *    DO regularly check for repeated login failures.   *    DO regularly check for LOGIN REFUSED messages.   *	Consider quotas on user accounts if you do not have them. 4.7  Special accounts   *	CHECK that there are no shared accounts other than root;             i.e. more than one person should not know the password to an            account.   *    Disable guest accounts.              Better yet, do not create guest accounts!   *    DO use special groups (such as the "wheel" group under SunOS) to	restrict which users have access to root.   *    DISABLE ALL default vendor accounts shipped with the Operating System.              This should be checked after each upgrade or installation.   *	Disable accounts that have no password which execute a command, for	example	"sync".  	    Preferably, remove these accounts entirely.  Check that they do	    not own any files before you do so. 4.8  Root account   *	Make sure root does not have a ~/.rhosts file.   *	Make sure "." is not in root's search path.   *    Make sure root's login files do not source any other files not        owned by root or which are group or world writable.   *    Make sure root cron job files do not source any other files not	owned by root or which are group or world writable.   *    DO use absolute path names when root.             i.e. /bin/su, /bin/find, /bin/passwd.  This is to stop the            possibility of root accidentally executing a trojan horse.  To            execute commands in the current directory, root should prefix            the command with "./", eg. ./command.------------------------------------------------------------------------------5.0  File system security------------------------------------------------------------------------------ 5.1  General   *	CHECK that there are no .exrc files on your system that have	no legitimate purpose.            These may inadvertently perform commands that may compromise            the security of your system if you happen to start either vi or            ex in a directory which contains such a file.  To find .exrc files:	           # /bin/find / \( -fstype 4.2 -o -prune \) -name '.exrc' \	              -exec /bin/cat {} \; -print   *	CHECK that any .forward files in user home directories do not 	execute a command or run a program.	    The mailer may be fooled into allowing a normal user privileged 	    access.  The following command will locate and print .forward 	    files:	           # /bin/find / \( -fstype 4.2 -o -prune \) \	              -name '.forward' -exec /bin/cat {} \; -print            (Refer to AUSCERT Advisory SA-93.10 (see A.1)) 

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日韩视频在线你懂得| 久久久亚洲精华液精华液精华液| 国产日韩综合av| 国产精品系列在线观看| 欧美不卡123| 福利电影一区二区三区| 国产天堂亚洲国产碰碰| 极品少妇xxxx精品少妇偷拍| 欧美一区二区三区啪啪| 日韩不卡一二三区| 久久影院午夜片一区| 高清免费成人av| 国产精品拍天天在线| 在线观看区一区二| 天堂成人免费av电影一区| 91看片淫黄大片一级| 亚洲午夜久久久久久久久久久| 欧美三级三级三级| 免费看日韩a级影片| 成人欧美一区二区三区视频网页| 99综合影院在线| 亚洲综合视频网| 精品入口麻豆88视频| 日本国产一区二区| 丝袜美腿成人在线| 久久精品综合网| 日韩一区二区三区三四区视频在线观看| 国产一区二区三区精品视频| 国产精品第13页| 欧美videossexotv100| 欧美性高清videossexo| 激情六月婷婷综合| 亚洲成av人片| 亚洲精品大片www| 欧美岛国在线观看| 91精品国产91综合久久蜜臀| 91丨九色porny丨蝌蚪| 丰满白嫩尤物一区二区| 国产一区视频网站| 午夜欧美大尺度福利影院在线看| 亚洲欧洲精品一区二区精品久久久 | 国产91精品露脸国语对白| 无码av免费一区二区三区试看| 国产精品欧美一级免费| 精品捆绑美女sm三区| 欧美色综合天天久久综合精品| 成人午夜碰碰视频| 成人午夜大片免费观看| 国产精品一区二区不卡| 亚洲精品写真福利| 国产精品入口麻豆九色| 欧美mv和日韩mv国产网站| 911精品国产一区二区在线| 色婷婷综合久久久久中文| 91免费视频观看| 一本久久综合亚洲鲁鲁五月天| 色94色欧美sute亚洲线路二| 色婷婷综合中文久久一本| 欧美三级视频在线| 欧美一卡二卡三卡| 久久久另类综合| 国产精品毛片久久久久久久| 亚洲男同性恋视频| 青青草成人在线观看| 一区二区三区四区蜜桃| 图片区小说区区亚洲影院| 国内国产精品久久| 不卡视频一二三| 欧美日韩在线三级| 中文字幕第一区综合| 国v精品久久久网| 日韩一区二区免费视频| 国产亚洲婷婷免费| 免费成人美女在线观看.| 成人h版在线观看| 日韩美女视频在线| 亚洲综合色成人| 国产一区二区在线看| 欧美性大战xxxxx久久久| 欧美激情一区二区三区全黄| 亚洲电影在线免费观看| 99麻豆久久久国产精品免费优播| 欧美中文字幕一区| 国产精品久久一卡二卡| 国产激情精品久久久第一区二区| 欧美日韩在线亚洲一区蜜芽| 亚洲欧美日韩人成在线播放| 韩国av一区二区| 日韩欧美一区二区免费| 丝袜美腿亚洲一区| 欧美片在线播放| 亚洲电影你懂得| 在线观看国产日韩| 亚洲精品国产高清久久伦理二区| 国产精品一区二区三区99| 欧美mv和日韩mv的网站| 国产精品自拍三区| 国产精品素人视频| 成人av资源在线| 亚洲免费在线电影| 欧美日韩一区三区| 首页国产欧美久久| 在线播放视频一区| 国产一区二区三区美女| 亚洲国产精品av| 欧美疯狂性受xxxxx喷水图片| 美女高潮久久久| 亚洲精品在线三区| 99久久免费精品| 日本欧美一区二区三区| 26uuuu精品一区二区| 91亚洲国产成人精品一区二三| 一区二区三区四区精品在线视频 | 日韩理论电影院| 欧美日高清视频| 国产成人亚洲精品狼色在线| 中文字幕一区二区三区不卡| 欧美日韩免费观看一区二区三区| 久久精品国产亚洲高清剧情介绍| 久久众筹精品私拍模特| 91欧美激情一区二区三区成人| 视频在线观看91| 国产精品久99| 精品福利av导航| 欧美影院一区二区| 国产精品夜夜嗨| 三级欧美在线一区| 亚洲精品伦理在线| 国产精品水嫩水嫩| 日韩精品一区二区三区视频播放 | 久久久蜜桃精品| 欧美成人激情免费网| 91久久精品一区二区| 顶级嫩模精品视频在线看| 久久精品二区亚洲w码| 五月激情综合婷婷| 亚洲成人自拍一区| 午夜精品久久久久久不卡8050| 中文字幕五月欧美| 国产精品黄色在线观看| 国产精品电影院| 综合婷婷亚洲小说| 一区二区三区四区在线播放| 中文字幕一区二区三区蜜月| 中文字幕va一区二区三区| 日本一区二区三区视频视频| 欧美激情一区二区| 亚洲免费观看高清完整| 亚洲三级免费观看| 亚洲一区二区成人在线观看| 亚洲免费观看在线观看| 1024国产精品| 亚洲成年人影院| 一区二区三区精密机械公司| 一本一道久久a久久精品| 国产成人免费av在线| 欧美日韩电影在线播放| 一区二区三区产品免费精品久久75| 精品一区二区在线视频| 丁香一区二区三区| 欧美日韩久久一区二区| 欧美变态tickling挠脚心| 国产精品水嫩水嫩| 婷婷国产在线综合| 国产白丝精品91爽爽久久| 在线免费观看日本一区| 欧美一区二区三区视频免费| 久久免费视频色| 午夜伦欧美伦电影理论片| 国产乱码一区二区三区| 欧美精品久久99| 中文字幕亚洲区| 精品亚洲国内自在自线福利| 91在线播放网址| 国产精品免费网站在线观看| 麻豆91免费观看| 日韩一区二区视频在线观看| 亚洲一区二区三区视频在线 | 日韩写真欧美这视频| 国产精品久久久久久亚洲毛片 | 99久久99久久精品国产片果冻| 精品少妇一区二区三区视频免付费 | 极品少妇xxxx精品少妇偷拍| 精品毛片乱码1区2区3区| 久久狠狠亚洲综合| 欧美在线一二三四区| 日本精品裸体写真集在线观看 | 91麻豆精品国产91久久久资源速度| 久久人人爽人人爽| 亚洲欧美另类小说视频| 91九色02白丝porn| 日本午夜一区二区| 久久精品亚洲精品国产欧美kt∨| 国产精品99久久久久久久vr | 成熟亚洲日本毛茸茸凸凹| 中文字幕国产一区| 丝袜国产日韩另类美女| 91老师片黄在线观看| 综合电影一区二区三区 | 日本成人中文字幕|