亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? kiddies.txt

?? a collection of mega hacking tools
?? TXT
?? 第 1 頁 / 共 2 頁
字號:


                                  ++++++++++++++++++++++++++++++

                                  + Stopping the Scriptkiddies +

                                  ++++++++++++++++++++++++++++++

                                           + by POOL +

                                           +++++++++++





                                        --"My terminal is

                                             My soul"









Version 1.00 (Wed Aug 29 20:17:58 CEST 2001)

===================================================================================================



Contents

========



0x00 Disclaimer

0x01 Introduction

0x02 First things first

0x03 Remote security

0x04 Local security

0x05 Common backdoors

0x06 Windows

0x07 Patches

0x08 Conclusion

0x09 Final words

0x10 Copyright







0x00 Disclaimer

===============



I am NOT responsible for actions or damage caused by this document, if you get into trouble: blame yourself, not me.



0x01 Introduction

=================



In the past few months I noticed there were a lot of defacements (actually, too many), and a lot of hosts/networks were the target of DoS-attacks. I don't understand why so many network-administrators don't take the time to have a look at their security, it isn't very hard to install at least a few patches and stop running services they don't need. Yes, I know this won't stop attackers which are dedicated trying to hack you, but stupid scriptkiddies (like the most of them are) will give up and try another box. I will focus on linux security, but most topics in this paper will also apply to other UNIX-variants. You'll find some words about windows too. This paper won't make you a security-expert, a good system-administrator neither, it only provides basic knowledge needed to stop Scriptkiddies defacing sites and shutting down complete networks. Oh, and please don't mind my sloppy English (I'm Dutch)..



Have fun 8)



--POOL [systm@exploder.nl]



0x02 First things first

=======================



I recommend you to start securing your box(es) after a clean install, because it could be possible someone allready compromised you and placed one or more backdoors. So I suggest you backup all important data and reinstall the Operating System (if this is possible). Keep in mind your system will be more secure with the least comprehensive installation, for example: don't install a web-browser if you don't need it. Just install all the standard stuff, and only install software which you're sure about that you'll use it. Always check if the software is vulnerable or contains bugs. Only upgrade the installed software for security reasons.



0x03 Remote security

====================



Most compromises occur due to vulnerable daemons (like wu-ftpd or lpd). In this section I will show you how to close daemons which aren't directly in need, and how to build a firewall rule-set.



First, portscan yourself: nmap -sT -sU -e eth0 -p 1-65535 localhost

(in this example I use nmap (network mapper), which you can grab from www.insecure.org/nmap)



     -sT = TCP connect() scan

     -sU = UDP scan

     -p  = specify portrange

     -e  = specify interface



It's important to note that you should scan each interface.



[*] Closing unneeded daemons



Have a look at your /etc/inetd.conf file, in this config-file you can specify which daemons are started by inetd (type "man 8 inetd" (without the quotes) for more information). To close a daemon just comment the line (put a "#" (without the quotes) at the beginning of the line). Oh, and don't comment telnet out if you're connected to the box via telnet (could be very frustrating).. ;-)



Here's an example:



>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

change



ftp	stream	tcp	nowait	root	/usr/sbin/tcpd	wu.ftpd -a



to



#ftp    stream	tcp	nowait	root	/usr/sbin/tcpd	wu.ftpd -a

<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<



Apply this to all daemons you don't need. To let the changes have effect restart inetd:



/sbin/init.d/inetd restart [I use linux SuSE 7.0 and SuSE 7.1, in other distro's inetd may be located in /etc/init.d]



or by hand:



kill -HUP <pid>



To obtain the pid (Process ID) of inetd just do as root a "ps -aux" (wihout the quotes) and look at the inetd-line.

Portscan yourself again (or simply do a "netstat -an"), and check if it's OK :-)

Note: Some daemons should be closed in another config-file. To find these config files just type this command:



locate *.conf



and



locate *.cf



If you want to keep a daemon running and for some reason you don't want people from the internet be able to connect to it (For example, you have a ftpd on your gateway, and you want only boxes from your network to use this ftpd, but not people from the internet), read the next section very carefully.



[*] Ipfwadm, ipchains and iptables



Linux comes with a firewall (read: packetfilter) called ipfwadm in the 2.0 kernel series. The 2.2 kernel series comes with ipchains, and 2.4 with iptables. Since most systems are running 2.2.x I will shortly discuss ipchains (please refer to the manpages for more information), just type "man ipfwadm" or "man iptables" (without the quotes) to view the manpages for ipfwadm or iptables.



I will demonstrate step for step how to build a firewall-rule with ipchains.



First flush all rules:



/sbin/ipchains -F



You'll have to choose a so called "chain" (input or output) with the -A option.



/sbin/ipchains -A input



With the -s option you can specify the source address (to block any address use 0.0.0.0/0) and with the -d option you can specify the destination address (your box). After this you place the port.



/sbin/ipchains -A input -s 0.0.0.0/0 -d x.x.x.x/24 21



Next, specify with the -p option the transport protocol (e.g. TCP, UDP or ICMP), and with -j the action (e.g. ACCEPT, DENY, REJECT, MASQ). You may be wondering what the difference between DENY and REJECT is. Well, REJECT sends an ICMP packet back with the message "Destination unreachable", and DENY just discards it without sending an ICMP packet back. MASQ is used for masquerading, maybe I will explain this in some networking related paper later.



/sbin/ipchains -A input -s 0.0.0.0/0 -d x.x.x.x/24 21 -p TCP -j DENY



Replace x.x.x.x with your IP, and you have created a rule which DENY's traffic from anywhere with destination address your box and destination port 21/tcp (ftp). Let's do the same for a tftpd (tftp = trivial file transfer protocol), which runs at 69/udp. But now we block this IP: 195.195.195.195



/sbin/ipchains -A input -s 195.195.195.195 -d x.x.x.x/24 69 -p UDP -j DENY



Well, very easy.. Just replace the port number, and the transport-protocol. This way you should be able to create yourself a rule-set.



Note: NEVER EVER think like: "oh, I don't have to close these daemons, I just filter all the trafic going to these daemons with a packetfilter/firewall"..! Always close all daemons, except those which are in need for users (on the internet, or on your LAN/WAN)!



You can put these commands in a file, e.g. /sbin/nfw (nfw = Network FireWall), and do a "chmod +x" on it. Then put "/sbin/nfw" in the "rc" files (if your system crashes, or needs a reboot for some reason, /sbin/nfw will be executed on system-boot and you don't have to worry about it).



?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
成人性生交大片免费看视频在线 | jlzzjlzz国产精品久久| 免费看日韩a级影片| 日本少妇一区二区| 久久精品国产亚洲高清剧情介绍| 香蕉影视欧美成人| 看国产成人h片视频| 久久国产精品99精品国产| 精品一区二区在线播放| 国产精品 欧美精品| 丁香五精品蜜臀久久久久99网站| 成人性生交大片免费看视频在线| 99麻豆久久久国产精品免费| 色菇凉天天综合网| 在线成人av网站| 久久久一区二区三区捆绑**| 国产精品国产三级国产aⅴ原创 | 一本久道久久综合中文字幕| 色国产综合视频| 欧美一区二区三区视频在线| 精品国产91乱码一区二区三区| 国产日韩欧美一区二区三区综合| 中文字幕日韩精品一区| 香蕉久久夜色精品国产使用方法| 精品一区二区影视| av电影天堂一区二区在线| 欧美日韩在线一区二区| 欧美xxxxxxxxx| 亚洲欧美另类图片小说| 人人精品人人爱| 成人黄色电影在线| 在线不卡欧美精品一区二区三区| 久久网站热最新地址| 国产精品久久一卡二卡| 亚洲一区二区综合| 国产在线精品一区二区不卡了 | 欧美一区二区播放| 国产精品毛片大码女人 | xnxx国产精品| 亚洲在线观看免费| 不卡在线观看av| 欧美成人r级一区二区三区| 亚洲麻豆国产自偷在线| 久久精品99久久久| 欧美日韩国产一二三| 国产精品色噜噜| 国内精品国产成人| 91精品国产色综合久久不卡蜜臀| 国产精品女同一区二区三区| 免费不卡在线视频| 欧美午夜理伦三级在线观看| 国产精品乱子久久久久| 国产激情视频一区二区三区欧美| 欧美日韩夫妻久久| 伊人一区二区三区| 99国产欧美久久久精品| 久久久精品影视| 麻豆精品精品国产自在97香蕉 | 久久66热偷产精品| 在线观看网站黄不卡| 中文字幕亚洲一区二区av在线 | 粉嫩久久99精品久久久久久夜| 欧美日韩一本到| 亚洲蜜臀av乱码久久精品蜜桃| 国产夫妻精品视频| 精品99999| 久色婷婷小香蕉久久| 日韩欧美色电影| 久久99久久久欧美国产| 欧美tk丨vk视频| 美女视频一区二区三区| 日韩视频在线一区二区| 美国三级日本三级久久99| 日韩视频123| 国产原创一区二区| 久久蜜桃av一区精品变态类天堂 | 在线视频综合导航| 亚洲国产视频网站| 欧美女孩性生活视频| 日韩av电影天堂| 欧美电影精品一区二区| 国产精品亚洲一区二区三区妖精 | 婷婷成人激情在线网| 欧美美女bb生活片| 狂野欧美性猛交blacked| xnxx国产精品| 91污片在线观看| 亚洲国产你懂的| 欧美一区二区视频网站| 国产一区二区剧情av在线| 亚洲国产高清aⅴ视频| 色综合天天综合色综合av | 国产成人精品免费网站| 成人免费在线播放视频| 欧美午夜影院一区| 久久精品免费看| 国产精品嫩草99a| 欧美四级电影在线观看| 美国十次了思思久久精品导航| 国产欧美精品一区二区三区四区| 色综合久久中文综合久久97| 天堂蜜桃91精品| 国产视频一区二区三区在线观看 | 亚洲444eee在线观看| 日韩精品专区在线影院重磅| 成人免费高清视频| 午夜影视日本亚洲欧洲精品| 精品国内二区三区| 91蝌蚪porny| 久久99久久99| 一区二区三区四区在线| 精品黑人一区二区三区久久| 日本精品一区二区三区四区的功能| 日本网站在线观看一区二区三区| 中文子幕无线码一区tr| 88在线观看91蜜桃国自产| 粉嫩一区二区三区性色av| 热久久国产精品| 亚洲免费看黄网站| 中文字幕精品在线不卡| 欧美tk丨vk视频| 欧美美女激情18p| 色天天综合久久久久综合片| 韩国三级在线一区| 日本欧美一区二区在线观看| 自拍av一区二区三区| 国产欧美va欧美不卡在线| 91精品国产色综合久久不卡蜜臀| 色综合久久中文字幕综合网| 国产成人亚洲综合a∨猫咪| 天堂久久久久va久久久久| 亚洲免费在线看| 国产精品国产精品国产专区不蜜| 久久亚洲精品国产精品紫薇| 欧美军同video69gay| 色婷婷av一区二区三区gif| 成人动漫在线一区| 高清视频一区二区| 国产精品资源网| 久久爱www久久做| 久久福利资源站| 开心九九激情九九欧美日韩精美视频电影 | 日韩片之四级片| 欧美亚洲国产怡红院影院| 91麻豆福利精品推荐| 97精品视频在线观看自产线路二| 国产成人精品1024| 国产夫妻精品视频| 粉嫩一区二区三区性色av| 国产99久久精品| 成人av动漫在线| 91麻豆免费视频| 91亚洲资源网| 在线精品视频免费观看| 欧美三级一区二区| 欧美日韩国产精品成人| 欧美一区二区视频在线观看2022| 在线成人av影院| 久久中文字幕电影| 亚洲欧洲成人自拍| 综合色中文字幕| 亚洲一区二区3| 青青草97国产精品免费观看 | 成人黄色综合网站| 色综合久久久久久久| 欧美无乱码久久久免费午夜一区| 欧美日韩在线播放三区四区| 日韩视频免费观看高清完整版 | 欧美在线观看视频一区二区| 91麻豆精品国产91久久久使用方法| 欧美精品一二三区| 久久精品欧美日韩| 亚洲精选视频在线| 青青草精品视频| 丁香婷婷综合激情五月色| 日本乱人伦一区| 精品少妇一区二区| 中文字幕一区二区三区乱码在线| 亚洲一区二区视频在线观看| 日韩精品视频网站| 国产丶欧美丶日本不卡视频| 91久久香蕉国产日韩欧美9色| 在线播放91灌醉迷j高跟美女 | 中文字幕亚洲一区二区va在线| 亚洲国产一区视频| 国产精品一级黄| 欧美浪妇xxxx高跟鞋交| 国产精品麻豆网站| 久久国产精品露脸对白| 一本久久a久久免费精品不卡| 日韩精品一区二区三区在线观看 | 成人午夜电影小说| 欧美色老头old∨ideo| 国产日韩一级二级三级| 午夜一区二区三区视频| 高清beeg欧美| 日韩你懂的在线播放| 亚洲午夜影视影院在线观看| 国产激情视频一区二区在线观看| 777色狠狠一区二区三区|