亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? kiddies.txt

?? a collection of mega hacking tools
?? TXT
?? 第 1 頁 / 共 2 頁
字號:
[*] Most exploited daemons



Here is a short list of a few daemons which are widely exploited by scriptkiddies:



>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

. name     - service             .

. ============================== .

.                                .

. wu-ftpd  - ftp                 .

. proftpd  - ftp                 .

. sendmail - smtp                .

. Qpop     - pop3                .

. Lpd      - Line Printer Daemon .

<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<



These are just the ones which come to my mind, but there are lots of more vulnerable daemons. So you should check if the daemons you run are vulnerable, and if they are up to date (it isn't very smart to run an old version).



[*] CGI-scripts



If you install a webserver (e.g. apache), it usually comes standard with some cgi-scripts. These cgi's are usually not needed, and they're a security-risk. Delete them if they aren't in need for you, otherwise check if they are vulnerable. www.cgisecurity.com is a good site with more information about security related to cgi-scripts. By the way, php scripts are also very common holes in webservers.



[*] Telnet vs. SSH vs. Console



A lot of administrators use telnet to config/access their box(es) remotely, but telnet sends data (containing usernames and passwords) in plain text. In many papers, advisories and (security)guides they are advised to use SSH instead. SSH stands for Secure SHell, and sends data in encrypted form over the wire. If you really need to config/access your box(es) remotely it's advisable to use SSH, but while there was a few months ago a vulnerability in OpenSSH, I suggest you only access your box(es) on the console. If this isn't possible, install the most recent version of OpenSSH (www.openssh.org). Note that it's recommended to use blowfish encryption instead of DES, Triple-DES or MD5.



[*] Nessus



Nessus is a very good security scanner. It probes your network/host for vulnerabilities. If the system is vulnerable, nessus displays information about the vulnerability and also the URL where a patch is available. To use nessus, first you'll have to setup a nessusd (only available for linux), and with a nessus-client (available for windows too) you can connect to the nessusd and scan your box(es) for vulnerabilities. A very good feature of nessus is that is supports plug-ins, so you can download plug-ins to let nessus check for new vulnerabilities. Refer to www.nessus.org for a download of nessus and more information.



0x04 Local security

===================



Securing your box(es) locally is especially important if you provide shell accounts, but even if you don't it's essential. Why? Because someone might exploit a (unknown) vulnerability in a daemon you're running, and gains a shell with at least normal user privileges. Then he would try to exploit your local security to gain higher (root) privileges.



[*] Buffer overflows



Lots of local-exploits just use a classic buffer overflow to gain a root-shell. Well, there are a lot of papers on the internet describing buffer overflows exactly. But let me give you a short summary of how a buffer overflow exploit actually works:



When a program let's the user input data (e.g. a name or address), it usually stores the input in a buffer. Lots of programmers forget to check the bounds, which causes an overflow if the user inputs for example 80 bytes of data, while the buffer can hold only 75 bytes. Using this overflow the return address can be overwritten, to change the execution flow of the program. When the program is executed it returns to the return address, which points to an address on the stack with evil-code (this code usually spawns a shell).



These buffer overflows can be exploited locally, as well remotely (in a daemon). To protect yourself from attackers exploiting (unknown) buffer overflow vulnerabilities, you should always remove the SUID-bit from applications/daemons so an attacker won't gain a rootshell but a non-privileged-user shell.



[*] Tripwire



Tripwire is a powerfull tool, used to detect modifications in files/binaries. Tripwire makes a "fingerprint" of your system. Each time something is changed on the system Tripwire gives you a warning. This could be very annoying: each time you add a new account or create a new file, you'll get a warning. But if you run tripwire on a dedicated webserver, you can easily detect if someone tampered with critical files or placed backdoors. For more information about tripwire refer to www.tripwire.org.



[*] Kernel Patch



For extra security, it is possible to re-compile the kernel with a special patch. This patch gives you the possibility to set some security-options. Check www.openwall.com/linux for a download of a linux kernel patch.



0x05 Common backdoors

=====================



[*] /etc/passwd -> This one is classic, you should check your /etc/passwd file for (root)accounts which you didn't create.       Note: attackers usually put these accounts in the middle of your /etc/passwd, and give them names like Sym, sadmin,          comp, pass, command, shell or something similar to make it look normal and only noticeable by an experienced system-         administrator. Note: you can filter root-accounts from large passwd files with "cat /etc/passwd | grep :0:".



[*] suid root-shell(s) -> This one is very popular, but only used if the attacker has local access to the system. He just        makes a copy of /bin/sh and makes it suid-root. To fool the system-administrator he gives it a name like "fping" or          "nettrace" or something similar. To find such suid-root files type this command:

    find / -perm -4000 -print > $home/suid.files, then check suid.files in your home-directory.



[*] cronjobs -> Crond is a very powerfull daemon for administrating the system. It allows the administrator to execute           commands (which are called cronjobs) on a hourly, daily, weekly or monthly base (e.g. each Sunday at 23:00 there's made a     backup of all home-directories). An attacker could for example make crond create a root-account each day at 01:00 AM and     delete it at 02:00 AM so the attacker has for 1 hour root-access to the box.



[*] trojaned binnaries -> This one is used if the attacker has local access to the system. He replaces for example               /bin/ls with a trojaned version which operates exactly like the normal /bin/ls, but gives a root-shell if the                attacker uses a special parameter (for example ls -e).



[*] login-trojan -> This one is old, but I think it's still used. When the attacker connects to your machine via telnet and       gives a special password he'll be dropped in a root-shell. This is caused due a trojaned version of "/bin/login".



[*] /etc/services and /etc/inetd.conf -> An attacker could use these files to add a new service (or use an existing one)

    and use it to spawn a shell. It's very easy to discover such a backdoor.



[*] bindshell.c -> This is C source-code used to bind a (root)shell to a port, usually attackers use a very high port so it      won't show up on portscans (wich aren't always from 0 to 65535). It's easy to check for this backdoor, just do a             "netstat -an", and check suspicious open ports. Or even better: do a full portscan (Because the attacker could have          replaced netstat with a trojaned version).



[*] lkm's -> Loadable Kernel Modules are (like the name says) pieces of code (modules) which could be loaded in the kernel,      usually they're very advanced and sometimes (allmost) completely stealth, so they're hard to detect. I suggest you read      Pragmatic's excellent paper on Loadable Kernel Modules, available at www.thehackerschoice.com.



[*] rootkits -> These are complete packages with usually trojans, sniffers, lkm's, log-cleaners, etc. etc.



Note: there are much more backdooring-techniques. To cover them all it would take me to write a whole new paper, so I just discussed the most commonly used.



0x06 Windows

============



More than 80% of the defacements are due the lack of security on windows-systems. In the past there was the RDS-vulnerability which caused lots of compromises. Now the Unicode-bug is one of the favourites of scriptkiddies. Also an overflow in the ISAPI-extensions on win2k/IIS 5.0, is widely being exploited (the exploit-code is called jill.c). Another VERY good example:  the 'code red' worm which was spreading around the internet via the .ida overflow (For more information refer to http://neworder.box.sk/ and http://www.securityfocus.com/). These vulnerabilities caused a lot of damage and defacements :-(. I suggest you subscribe to NTBugTraq, which is a very good mailinglist with discussions, vulnerabilities (including exploit-code, if released), papers, etc. etc. related to windows-security.



Please read the next section VERY carefull. The magic word to secure your windows-box(es) is: PATCHING.



0x07 Patches

============



It's really really important you patch your systems, the trouble the 'code red' worm caused is due (lazy) system-administrators who didn't patched their systems and this way didn't only brought theirselves in trouble, but they also made it possible for the worm to spread itself and infect other systems. Now, is it really so hard to check on sites like securityfocus.com, neworder.box.sk, and on (NT)BugTraq or another security-related mailinglist, if your system is (possibly) affected for a new vulnerability and download a patch?! If a website under your responsibility gets defaced, you'll need to take more time to restore everything, than patching the system and don't give those damn scriptkiddies a chance to screw up your website!



linux:

If there's a vulnerability found in a daemon, application, driver, cgi-script, etc. etc. usually the vendor releases a patch as soon as possible. Just check the (ftp)site of the product-vendor or your linux-distribution for information and a patch/fix. It's also common that an exploit comes with a solution/work-a-round.



Note: In SuSE linux you can easily update packages with YaST (Yet another Setup Tool). YaST compares the installed version of a package with the version on the ftp-server and if they don't match it downloads the newest version [Thanks to DataWizard for pointing this out].



0x08 Conclusion

===============



I know this paper doesn't covers everything to stop attackers. But I think that a System-administrator who read this paper won't be "hacked" by clueless scriptkiddies scanning the internet for vulnerable boxes. It isn't very hard to stop scriptkiddies, just take the time to secure and patch(!!) your system(s). Subscribe yourself to (NT)BugTraq, and always be up to date (install the newest versions of daemons, aplications etc.). I'm satisfied when this paper makes system-administrators prevent scriptkiddies from intruding their systems and defacing their websites. Don't see securing a system as a pain in the ass, it's realy interesting and fun!



0x09 Final words

================



I hope you enjoyed this paper, if not, delete it :-)

For further questions, comments or critism please send me a mail: systm@exploder.nl (or shaolin123@hotmail.com), or catch me on IRC:

#p00rt @ nederwiet.wox.org/iznogood.wox.org.



Some security-related sites:



http://neworder.box.sk/                [News, Exploits, papers and tools archive]

http://blacksun.box.sk/                [Tutorials related to hacking/security/programming]

http://www.securityfocus.com/          [BugTraq mailinglist, great exploits and papers archive]

http://www.packetstormsecurity.org/    [Exploits, papers and tools archive]

http://www.thehackerschoice.com/       [Good (papers) archive]

http://www.nessus.org/                 [Nessus security scanner]

http://www.tripwire.org/               [Tripwire]

http://www.microsoft.com/security/     [Search for Patches, Security Bulletins and more info related to Microsoft products]



Greets to: DataWizard, NederWiet, KD, Reflex, DarkWhite, IzNoGood, Vetjuh, ssuzeJJ, div3rt3r, BBM, Syndr0me and all the others (you know who you are). I also want to greet the box.sk staff and all the members of the Blacksun Research Facility Team. ;-)



Special thanks to DataWizard, Reflex and Syndr0me for checking and correcting mistakes in the BETA versions.



Finally I want to say #wasrek sucks, those guys are too lame to understand the difference between a computer and a chair..



--"The net is my playground"



0x10 Copyright

==============



You may distribute this paper as much as you like, but please DO NOT change, add or remove anything without my permission. Feel free to mail me about this subject.



And Remember: KNOWLEDGE IS POWER!!



================================================================================================================

Stopping the Scriptkiddies v1.00 - Release date: 29.08.2001 - (C)opyright by POOL 2001 - systm@exploder.nl







?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
26uuu另类欧美亚洲曰本| 91性感美女视频| 欧美α欧美αv大片| 免费成人在线网站| 精品国产乱码久久久久久久| 国产一区二区91| 国产精品美女久久久久aⅴ国产馆| 国产成人在线视频网址| 亚洲三级免费电影| 欧美日韩亚洲综合一区二区三区| 亚洲18影院在线观看| 欧美一区二区三区系列电影| 久久99蜜桃精品| 欧美国产欧美综合| 在线精品视频免费播放| 日本麻豆一区二区三区视频| 久久蜜桃一区二区| 91美女片黄在线| 日韩精品一卡二卡三卡四卡无卡| 欧美成人a视频| av中文字幕不卡| 日韩电影一二三区| 国产精品麻豆99久久久久久| 欧美三级韩国三级日本一级| 国产一区二区在线电影| 中文字幕在线不卡视频| 欧美午夜精品一区二区蜜桃| 久久69国产一区二区蜜臀| 国产精品久久久久久久浪潮网站 | 91精品久久久久久久91蜜桃| 国内精品久久久久影院色| 综合久久久久综合| 日韩视频不卡中文| 91视频一区二区| 狠狠色综合色综合网络| 一区二区三区波多野结衣在线观看| 6080午夜不卡| 色婷婷综合五月| 国产综合色精品一区二区三区| 亚洲精品写真福利| 国产丝袜欧美中文另类| 欧美精选一区二区| 成人av电影在线观看| 久久精品99国产国产精| 亚洲一区在线播放| 国产精品欧美精品| 777色狠狠一区二区三区| 91视频你懂的| 成人综合在线观看| 麻豆一区二区99久久久久| 亚洲美女少妇撒尿| 国产欧美日韩另类视频免费观看| 欧美妇女性影城| 色综合久久久久综合| 国产成人在线免费| 免费成人在线观看视频| 午夜国产精品一区| 日韩美女视频一区| 国产精品午夜在线观看| 精品久久久久久综合日本欧美 | 欧美日韩在线直播| 91蜜桃免费观看视频| 成人中文字幕在线| 国产精品一色哟哟哟| 精品亚洲porn| 美女尤物国产一区| 日本视频一区二区三区| 亚洲午夜在线观看视频在线| 亚洲精品免费播放| 亚洲欧洲av色图| 中文字幕亚洲一区二区av在线| 久久久青草青青国产亚洲免观| 精品久久免费看| 欧美成人福利视频| 欧美xxxx在线观看| 精品福利视频一区二区三区| 日韩女优电影在线观看| 日韩一级欧美一级| 日韩免费观看2025年上映的电影| 3d成人动漫网站| 欧美一级黄色录像| 日韩精品专区在线影院重磅| 日韩欧美中文字幕制服| 日韩欧美一二三| 精品国产乱码久久久久久久| 精品理论电影在线| 国产日韩精品一区| 国产精品久久久一本精品| 国产精品久久久久9999吃药| 国产精品卡一卡二卡三| 亚洲乱码国产乱码精品精可以看| 亚洲欧美国产77777| 亚洲一区欧美一区| 日韩不卡一区二区| 黑人巨大精品欧美一区| 国产91色综合久久免费分享| av在线不卡观看免费观看| av午夜精品一区二区三区| 一本大道久久a久久综合婷婷| 91捆绑美女网站| 欧美日韩一区二区不卡| 精品免费视频.| 国产精品麻豆网站| 亚洲成人午夜影院| 国产一区二区0| 91网站黄www| 欧美一级欧美三级在线观看| 精品福利视频一区二区三区| 中文字幕一区二区三区av| 一区二区三区日韩欧美| 久久国产日韩欧美精品| av不卡一区二区三区| 欧美电影一区二区三区| 久久久久久9999| 亚洲在线观看免费视频| 狠狠v欧美v日韩v亚洲ⅴ| 99精品国产视频| 日韩一区二区三区电影在线观看| 国产三级精品在线| 亚洲午夜精品网| 国产剧情一区二区三区| 欧美三级视频在线播放| 久久综合丝袜日本网| 亚洲精品高清在线| 国产精品一区2区| 欧美高清视频一二三区| 中文字幕 久热精品 视频在线| 亚洲成人免费在线观看| 成人高清免费在线播放| 欧美一级理论性理论a| 成人欧美一区二区三区黑人麻豆| 秋霞影院一区二区| 91女神在线视频| 久久综合九色综合97婷婷女人| 亚洲主播在线观看| jlzzjlzz国产精品久久| 精品欧美黑人一区二区三区| 性久久久久久久久久久久| eeuss鲁片一区二区三区| 精品国产91亚洲一区二区三区婷婷 | 欧美日韩美少妇| 中文字幕一区二区不卡| 国产精品66部| 日韩精品一区二区三区老鸭窝| 亚洲伦理在线精品| 国产不卡高清在线观看视频| 欧美一区二区精品久久911| 亚洲一区二区三区美女| 99re在线精品| 日本一区二区免费在线 | 亚洲综合在线五月| 成人性色生活片| 国产日韩欧美不卡在线| 韩国三级电影一区二区| 91精品国产日韩91久久久久久| 亚洲精品视频在线看| 成人三级伦理片| 国产欧美日韩一区二区三区在线观看| 麻豆精品国产91久久久久久| 欧美电影一区二区| 偷偷要91色婷婷| 欧美日韩国产乱码电影| 亚洲影视资源网| 欧美性受极品xxxx喷水| 亚洲精品成人悠悠色影视| 99re这里只有精品首页| 中文字幕在线一区二区三区| 成人小视频在线观看| 中文字幕一区二区三区视频| av激情成人网| 中文字幕一区二区三区av| av不卡在线观看| 一个色综合网站| 欧美吞精做爰啪啪高潮| 视频一区欧美精品| 91精品国产一区二区人妖| 日本不卡视频在线| 欧美大片一区二区三区| 国产一区二区福利视频| 久久亚洲二区三区| 国产91色综合久久免费分享| 中文字幕一区av| 在线观看国产91| 日日摸夜夜添夜夜添精品视频 | 欧美日韩精品福利| 丝袜国产日韩另类美女| 日韩视频永久免费| 国产精品亚洲第一区在线暖暖韩国 | 99久久综合国产精品| 亚洲老司机在线| 91精品国产美女浴室洗澡无遮挡| 蜜臂av日日欢夜夜爽一区| 久久久午夜精品| 色婷婷一区二区三区四区| 丝袜国产日韩另类美女| 久久久久久久综合| 91亚洲国产成人精品一区二三 | 久久精品国产久精国产爱| 久久精品男人的天堂| 一本大道久久a久久精二百|