亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? security holes.txt

?? a collection of mega hacking tools
?? TXT
字號:
From: ManifestationSubject: Security holes manifest themselves in (broadly) four ways...Date: 11.10.93( Please contribute by sending E-Mail to <scott@santafe.edu> ... )[quoting from the comp.security.unix FAQ]Security holes manifest themselves in (broadly) four ways:1) Physical Security Holes.- Where the potential problem is caused by giving unauthorised personsphysical access to the machine, where this might allow them to performthings that they shouldn't be able to do.A good example of this would be a public workstation room where it wouldbe trivial for a user to reboot a machine into single-user mode and muckaround with the workstation filestore, if precautions are not taken.Another example of this is the need to restrict access to confidentialbackup tapes, which may (otherwise) be read by any user with access tothe tapes and a tape drive, whether they are meant to have permission ornot.2) Software Security Holes- Where the problem is caused by badly written items of "privledged"software (daemons, cronjobs) which can be compromised into doing thingswhich they shouldn't oughta.The most famous example of this is the "sendmail debug" hole (seebibliography) which would enable a cracker to bootstrap a "root" shell.This could be used to delete your filestore, create a new account, copyyour password file, anything.(Contrary to popular opinion, crack attacks via sendmail were not justrestricted to the infamous "Internet Worm" - any cracker could do thisby using "telnet" to port 25 on the target machine.  The story behind asimilar hole (this time in the EMACS "move-mail" software) is describedin [Stoll].)New holes like this appear all the time, and your best hopes are to:  a: try to structure your system so that as little software as possible  runs with root/daemon/bin privileges, and that which does is known to  be robust.  b: subscribe to a mailing list which can get details of problems  and/or fixes out to you as quickly as possible, and then ACT when you  receive information.>From: Wes Morgan <morgan@edu.uky.ms>>> c: When installing/upgrading a given system, try to install/enable only> those software packages for which you have an immediate or foreseeable> need.  Many packages include daemons or utilities which can reveal> information to outsiders.  For instance, AT&T System V Unix' accounting> package includes acctcom(1), which will (by default) allow any user to> review the daily accounting data for any other user.  Many TCP/IP packa-> ges automatically install/run programs such as rwhod, fingerd, and> <occasionally> tftpd, all of which can present security problems.>> Careful system administration is the solution.  Most of these programs> are initialized/started at boot time; you may wish to modify your boot> scripts (usually in the /etc, /etc/rc, /etc/rcX.d directories) to pre-> vent their execution.  You may wish to remove some utilities completely.> For some utilities, a simple chmod(1) can prevent access from unauthorized> users.>> In summary, DON'T TRUST INSTALLATION SCRIPTS/PROGRAMS!  Such facilities> tend to install/run everything in the package without asking you.  Most> installation documentation includes lists of "the programs included in> this package"; be sure to review it.3) Incompatible Usage Security Holes- Where, through lack of experience, or no fault of his/her own, theSystem Manager assembles a combination of hardware and software whichwhen used as a system is seriously flawed from a security point of view.It is the incompatibility of trying to do two unconnected but usefulthings which creates the security hole.Problems like this are a pain to find once a system is set up andrunning, so it is better to build your system with them in mind.  It'snever too late to have a rethink, though.Some examples are detailed below; let's not go into them here, it wouldonly spoil the surprise.4) Choosing a suitable security philosophy and maintaining it.>From: Gene Spafford <spaf@cs.purdue.edu>>The fourth kind of security problem is one of perception and>understanding.  Perfect software, protected hardware, and compatible>components don't work unless you have selected an appropriate security>policy and turned on the parts of your system that enforce it.  Having>the best password mechanism in the world is worthless if your users>think that their login name backwards is a good password! Security is>relative to a policy (or set of policies) and the operation of a system>in conformance with that policy.---From: HackingSubject: Hacking IdeasDate: 11/10/93( Please contribute by sending E-Mail to <scott@santafe.edu> ... )[ Many ideas taken from: HaxNet - APG V1.3 : Guide to finding new holes]NOTE: I think this should be divided into general categories:1) General principles2) Looking for holes in src (most items here)3) Looking in binary distributions4) Looking in site specific configurations  The following general classifications suggest themselves:1) SUID/SGID2) Return codes/error conditions3) unexpected input4) race conditions5) authentication6) implicit trust7) parameters8) permissions9) interrupts10) I/O11) symbolic links12) Daemons, particularly those taking user input.13) Kernel race conditions14) what else? - please add categories(Suggested splitting of above into main and sub-catagories)I:   Suid binaries and scripts     unexpected user interactions     flawed liberary calls     implicit assumptions of external conditions (sym links, loc. paths)     race conditionsII:  daemons running with priviliged uid's     race conditions     poor file protectons     implicit file protections     trust     authenticationIII: Kernel problems     Kernel race conditions     device driver codeThe following four step method was created by System DevelopmentCorporation, who report a 65% success rate on the flaw hypothesesgenerated.  Doing a comprehensive search for operating system flawsrequires four steps:Step 1) Knowledge of system control structure.===============================================  To find security holes, and identifying design weaknesses it isnecessary to understand the system control structure, and layers.  One should be able to list the:A) security objects: items to be protected. ie: a users file.B) control objects: items that protect security objects. ie: a i-nodeC) mutual objects  : objects in both classes. ie: the password file  With such a list, it is possible to graphically represent a controlhierarchy and identify potential points of attack. Making flow chartsto give a visual breakdown of relationships definitely helps.  Reading the various users, operators, and administrators manuals shouldprovide this information.(following para's should probably be moved to a "legal" section)  Reading and greping source code should also prove valuable. For thosewithout a source licence, I would suggest we use LINUX, NET2, and BSD386distributions in order to stay legal. At some future time we may be ableto form a working contract between someone or a company with legal accessto other distributions and members actively participating in this project.  It appears that extracts of proprietary code may be used for academicstudy, so long as they are not reused in a commercial product - morechecking is necessary though.Step 2) Generate an inventory of suspected flaws. (i.e. flaw hypotheses)========================================================================In particular we want:  Code history:    What UNIX src does a particular flavor derive from? This is importantfor cross references (very often only one vendor patches certain code,which may get reused, in it's unpatched reincarnation by others)  A solid cross reference:    Who checked which bug in what OS and what version prevents us fromduplicating work.  A good start would be listing all the suid binaries on the various OSflavors/versions. Then try to work out why each program is suid. i.e.:    rcp is suid root because it must use a privilaged port to do user    name authentication.  Often code that was never designed to be suid, is made suid, durringporting to solve file access problems.  We need to develope a data base that will be able to look at pairs andtriplets of data, specificly: program name, suid, sgid, object accessed(why prog is suid/sgid), OS flavor/version, and flav/vers geniology.  Any sugestions on how to implement such a DB?Step 3) Confirm hypotheses. (test and exploit flaws)====================================================Step 4) Make generalizations of the underlying system weaknesses, for        which the flaw represents a specific instance.=====================================================================Tool Box:=========AGREP: I suggest everyone obtain, and install agrep from:    ftp cs.arizona.edu /agrep/agrep.tar.Z  Agrep supports "windowing" so it can look for routines, and subroutines.It also supports logical operators and is thus ideally suited to automatingthe search for many of the following flaws. i.e. <psudocode>      agrep WINDOW {suid() NOT taintperl()} /usr/local/*.plor    agrep WINDOW {[suid() OR sgid()] AND [system() OR popen() OR execlp()            OR execvp()]} /usr/local/src/*.cPERMUTATION PROGRAM: Another tool worth producing is a program to generateall possible permutations of command line flags/arguments in order to uncoverundocumented features, and try to produce errors.TCOV:CRASH: Posted to USENET (what FTP archive?) (descrip?)PAPERS: There are several papers that discuss methods of finding flaws, and  present test suites.  1) An Emphirical Study of the reliability of UNIX Utilities, by Barton P.    Miller, Lars Fredriksen, and Bryan So, Comm ACM, v33 n12, pp32-44,    Dec '90. Describes a test suite for testing random input strings.    Results indicated that 25% of the programs hung, crashed, or misbehaved.    In one case the OS crashed. An understanding of buffer and register    layout on the environment in question, and the expected input is likely    to produce the desired results.  2) The Mothra tools set, in Proceedings of the 22nd Hawaii International    Conference on Systems and Software, pages 275-284, Kona, HI, January '89  3) Extending Mutation Testing to Find Environmental Bugs, by Eugene H.    Spafford, Software Practice and Experience, 20(2):181-189, Feb '90  4) A paper by IBM was mentioned that was submitted to USENIX a few years    ago. (Anyone have a citation?).Specific Flaws to Check For:============================1) Look for routines that don't do boundary checking, or verify input.   ie: the gets() family of routines, where it is possible to overwrite   buffer boundaries. ( sprintf()?, gets(), etc. )   also: strcpy() which is why most src has:     #define SCYPYN((a)(b)) strcpy(a, b, sizeof(a))2) SUID/SGID routines written in one of the shells, instead of C or   PERL.3) SUID/SGID routines written in PERL that don't use the "taintperl"   program.)4) SUID/SGID routines that use the system(), popen(), execlp(), or   execvp() calls to run something else.5) Any program that uses relative path names inside the program.6) The use of relative path names to specify dynamically linked libraries.   (look in Makefile).7) Routines that don't check error return codes from system calls. (ie:   fork(2), suid(2), etc), setuid() rather, as in the famous rcp bug8) Holes can often be found in code that:  A) is ported to a new environment.  B) receives unexpected input.  C) interacts with other local software.  D) accesses system files like passwd, L.sys, etc.  E) reads input from a publicly writable file/directory.  F) diagnostic programs which are typically not user-proofed.9) Test code for unexpected input. Coverage, data flow, and mutation   testing tools are available.10) Look in man pages, and users guides for warnings against doing X, and   

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲男人的天堂一区二区| 精品日韩在线一区| 一区二区三区在线不卡| 99精品国产视频| 一区二区三区中文字幕精品精品| 色综合久久久久综合体桃花网| 亚洲精品国产a久久久久久| 色老综合老女人久久久| 亚洲不卡一区二区三区| 欧美va亚洲va在线观看蝴蝶网| 国产精品亚洲第一区在线暖暖韩国| 国产欧美日韩在线视频| 91麻豆视频网站| 免费日韩伦理电影| 国产精品日日摸夜夜摸av| 色av成人天堂桃色av| 三级久久三级久久久| 国产亚洲精久久久久久| 99久久国产综合精品麻豆| 性欧美大战久久久久久久久| 精品国产123| 在线欧美一区二区| 九色porny丨国产精品| 中文字幕中文字幕一区二区| 欧美军同video69gay| 国产精品一线二线三线| 亚洲精品欧美激情| 欧美电影免费观看高清完整版在线 | 精油按摩中文字幕久久| 中文字幕精品—区二区四季| 欧美色综合天天久久综合精品| 久久99精品国产麻豆婷婷洗澡| **网站欧美大片在线观看| 欧美一二三四在线| 色婷婷综合久色| 国产一区二区剧情av在线| 亚洲成在人线免费| 中文字幕制服丝袜成人av| 日韩欧美国产三级电影视频| 91免费观看视频| 国产伦精品一区二区三区视频青涩 | 最新国产成人在线观看| 日韩一区二区精品在线观看| 日本韩国一区二区三区视频| 国产成人av电影在线播放| 爽好久久久欧美精品| 椎名由奈av一区二区三区| 久久久www成人免费无遮挡大片| 欧美亚洲综合一区| 99精品国产视频| 丰满放荡岳乱妇91ww| 另类成人小视频在线| 亚洲成精国产精品女| 亚洲日本在线看| 欧美激情一区二区三区| 日韩欧美你懂的| 91麻豆精品91久久久久同性| 99re8在线精品视频免费播放| 狠狠色丁香婷婷综合| 日本不卡一区二区三区高清视频| 夜夜嗨av一区二区三区四季av| 国产精品成人在线观看| 久久九九全国免费| 日韩精品一区二区三区中文精品 | 日韩欧美一级二级三级| 欧美亚洲高清一区| 色94色欧美sute亚洲线路一ni| 成人av午夜影院| 成人精品国产福利| 成人自拍视频在线观看| 成人小视频在线观看| 国产精品中文字幕欧美| 国产精品456露脸| 国产精品一区二区果冻传媒| 久久机这里只有精品| 久久精品国产亚洲a| 精品一区二区精品| 国产精品自拍毛片| 国产99久久久久久免费看农村| 国产精品一二二区| 成人综合婷婷国产精品久久| 成人av网站在线| 91网上在线视频| 色999日韩国产欧美一区二区| 欧美亚洲日本国产| 欧美日韩黄色影视| 日韩精品一区二区三区视频| 久久综合九色综合97婷婷| 久久久久88色偷偷免费| 日本一区二区三区免费乱视频| 国产欧美一区二区三区网站| 一区视频在线播放| 亚洲一区在线播放| 看片的网站亚洲| 国产成人夜色高潮福利影视| av高清久久久| 欧美三级资源在线| 51精品视频一区二区三区| 欧美成人三级电影在线| 国产精品视频你懂的| 亚洲女人小视频在线观看| 亚洲.国产.中文慕字在线| 久久国内精品自在自线400部| 国产成人99久久亚洲综合精品| jlzzjlzz亚洲女人18| 欧美午夜在线一二页| 精品国产乱码久久久久久久久 | 99精品热视频| 欧美日韩国产乱码电影| 亚洲精品在线电影| 亚洲人成精品久久久久久| 日韩国产高清影视| 国产精品456露脸| 欧美日韩三级在线| 日本一区二区综合亚洲| 亚洲.国产.中文慕字在线| 精品一区二区三区欧美| 91天堂素人约啪| 欧美成人精品1314www| 亚洲视频资源在线| 久久国产视频网| 91看片淫黄大片一级在线观看| 日韩午夜激情av| 一区二区在线免费| 国产精品99久久久久久似苏梦涵| 色综合久久天天| 国产亲近乱来精品视频| 免费不卡在线视频| 91美女在线观看| 久久久久久久久久久久电影| 亚洲二区在线视频| 91免费观看视频| 欧美激情综合在线| 久久国产视频网| 4438成人网| 亚洲一级二级三级| 91小视频在线| 国产女主播一区| 狠狠色丁香久久婷婷综| 在线电影院国产精品| 一区二区三区产品免费精品久久75| 国产一区三区三区| 欧美一区二区三区色| 洋洋成人永久网站入口| 95精品视频在线| 中文字幕乱码久久午夜不卡| 精品系列免费在线观看| 欧美乱妇23p| 亚洲成人av福利| 欧美色图一区二区三区| 亚洲欧美日韩国产成人精品影院| 成人黄色免费短视频| 久久综合久久综合亚洲| 久久97超碰色| 日韩一区二区免费视频| 日韩av电影免费观看高清完整版| 欧美日韩在线综合| 亚洲一区二区不卡免费| 欧美天堂亚洲电影院在线播放| 亚洲精品成人少妇| 一本到三区不卡视频| 亚洲久草在线视频| 日本精品一区二区三区高清 | 精品视频1区2区| 亚洲成av人影院| 这里是久久伊人| 丝袜美腿亚洲色图| 制服.丝袜.亚洲.中文.综合| 午夜伊人狠狠久久| 欧美一区二区三区免费视频| 日本午夜一本久久久综合| 91精品国产免费| 乱中年女人伦av一区二区| 欧美成人精品二区三区99精品| 狠狠网亚洲精品| 欧美激情在线免费观看| 99久久99久久免费精品蜜臀| 亚洲欧美aⅴ...| 欧美日本韩国一区二区三区视频| 婷婷成人激情在线网| 欧美大片一区二区| 国产美女娇喘av呻吟久久| 亚洲国产成人私人影院tom| 99re成人精品视频| 香蕉久久一区二区不卡无毒影院| 日韩一区二区三区视频在线观看| 激情综合五月婷婷| 中文字幕一区视频| 欧美日韩国产首页| 国产一区日韩二区欧美三区| 中文字幕一区av| 欧美美女一区二区在线观看| 久久成人麻豆午夜电影| 欧美国产日韩精品免费观看| 在线免费观看日韩欧美| 麻豆成人综合网| 国产精品国产馆在线真实露脸| 欧美日产国产精品| 国产99久久久国产精品潘金| 亚洲在线视频一区|