亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? introduction to denial of service.txt

?? a collection of mega hacking tools
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
          
===================================                    
=INTRODUCTION TO DENIAL OF SERVICE=
===================================

Hans Husman
t95hhu@student.tdb.uu.se
Last updated: Mon Oct 28 14:56:31 MET 1996

.0. FOREWORD

.A. INTRODUCTION
	.A.1. WHAT IS A DENIAL OF SERVICE ATTACK?
	.A.2. WHY WOULD SOMEONE CRASH A SYSTEM?
		.A.2.1. INTRODUCTION
		.A.2.2. SUB-CULTURAL STATUS
		.A.2.3. TO GAIN ACCESS
		.A.2.4. REVENGE
		.A.2.5. POLITICAL REASONS
		.A.2.6. ECONOMICAL REASONS
		.A.2.7. NASTINESS
	.A.3. ARE SOME OPERATING SYSTEMS MORE SECURE?

.B. SOME BASIC TARGETS FOR AN ATTACK
	.B.1. SWAP SPACE
	.B.2. BANDWIDTH
	.B.3. KERNEL TABLES
	.B.4. RAM
	.B.5. DISKS
	.B.6. CACHES
	.B.7. INETD

.C. ATTACKING FROM THE OUTSIDE
	.C.1. TAKING ADVANTAGE OF FINGER
	.C.2. UDP AND SUNOS 4.1.3.
	.C.3. FREEZING UP X-WINDOWS
	.C.4. MALICIOUS USE OF UDP SERVICES
    	.C.5. ATTACKING WITH LYNX CLIENTS
	.C.6. MALICIOUS USE OF telnet
	.C.7. MALICIOUS USE OF telnet UNDER SOLARIS 2.4
	.C.8. HOW TO DISABLE ACCOUNTS
	.C.9. LINUX AND TCP TIME, DAYTIME
	.C.10. HOW TO DISABLE SERVICES
	.C.11. PARAGON OS BETA R1.4
	.C.12. NOVELLS NETWARE FTP
	.C.13. ICMP REDIRECT ATTACKS
	.C.14. BROADCAST STORMS
	.C.15. EMAIL BOMBING AND SPAMMING
	.C.16. TIME AND KERBEROS
	.C.17. THE DOT DOT BUG
	.C.18. SUNOS KERNEL PANIC
	.C.19. HOSTILE APPLETS
	.C.20. VIRUS
	.C.21. ANONYMOUS FTP ABUSE
	.C.22. SYN FLOODING
	.C.23. PING FLOODING
	.C.24. CRASHING SYSTEMS WITH PING FROM WINDOWS 95 MACHINES
	.C.25. MALICIOUS USE OF SUBNET MASK REPLY MESSAGE
	.C.26. FLEXlm
	.C.27. BOOTING WITH TRIVIAL FTP

.D. ATTACKING FROM THE INSIDE
	.D.1. KERNEL PANIC UNDER SOLARIS 2.3
	.D.2. CRASHING THE X-SERVER
	.D.3. FILLING UP THE HARD DISK
	.D.4. MALICIOUS USE OF eval
	.D.5. MALICIOUS USE OF fork()
	.D.6. CREATING FILES THAT IS HARD TO REMOVE
	.D.7. DIRECTORY NAME LOOKUPCACHE
	.D.8. CSH ATTACK
	.D.9. CREATING FILES IN /tmp
	.D.10. USING RESOLV_HOST_CONF
	.D.11. SUN 4.X AND BACKGROUND JOBS	
	.D.12. CRASHING DG/UX WITH ULIMIT 
	.D.13. NETTUNE AND HP-UX
	.D.14. SOLARIS 2.X AND NFS
	.D.15. SYSTEM STABILITY COMPROMISE VIA MOUNT_UNION
	.D.16. trap_mon CAUSES KERNEL PANIC UNDER SUNOS 4.1.X

.E. DUMPING CORE
	.E.1. SHORT COMMENT
	.E.2. MALICIOUS USE OF NETSCAPE
	.E.3. CORE DUMPED UNDER WUFTPD
	.E.4. ld UNDER SOLARIS/X86

.F. HOW DO I PROTECT A SYSTEM AGAINST DENIAL OF SERVICE ATTACKS?
	.F.1. BASIC SECURITY PROTECTION
		.F.1.1. INTRODUCTION
		.F.1.2. PORT SCANNING
		.F.1.3. CHECK THE OUTSIDE ATTACKS DESCRIBED IN THIS PAPER
		.F.1.4. CHECK THE INSIDE ATTACKS DESCRIBED IN THIS PAPER
		.F.1.5. EXTRA SECURITY SYSTEMS
		.F.1.6. MONITORING SECURITY
		.F.1.7. KEEPING UP TO DATE
		.F.1.8. READ SOMETHING BETTER
	.F.2. MONITORING PERFORMANCE
		.F.2.1. INTRODUCTION
		.F.2.2. COMMANDS AND SERVICES                      
		.F.2.3. PROGRAMS
		.F.2.4. ACCOUNTING

.G. SUGGESTED READING
	.G.1. INFORMATION FOR DEEPER KNOWLEDGE
	.G.2. KEEPING UP TO DATE INFORMATION
	.G.3. BASIC INFORMATION

.H. COPYRIGHT

.I. DISCLAIMER

.0. FOREWORD
------------

In this paper I have tried to answer the following questions:

	- What is a denial of service attack?
	- Why would someone crash a system?
	- How can someone crash a system.
	- How do I protect a system against denial of service attacks?
	
I also have a section called SUGGESTED READING were you can find
information about good free information that can give you a deeper
understanding about something.

Note that I have a very limited experience with Macintosh, OS/2 and
Windows and most of the material are therefore for Unix use. 

You can always find the latest version at the following address:
http://www.student.tdb.uu.se/~t95hhu/secure/denial/DENIAL.TXT

Feel free to send comments, tips and so on to address:
t95hhu@student.tdb.uu.se

.A. INTRODUCTION
~~~~~~~~~~~~~~~~

.A.1. WHAT IS A DENIAL OF SERVICE ATTACK?
-----------------------------------------

Denial of service is about without permission knocking off
services, for example through crashing the whole system. This
kind of attacks are easy to launch and it is hard to protect
a system against them. The basic problem is that Unix
assumes that users on the system or on other systems will be
well behaved. 

.A.2. WHY WOULD SOMEONE CRASH A SYSTEM?
---------------------------------------
 
.A.2.1. INTRODUCTION
--------------------

Why would someone crash a system? I can think of several reasons
that I have presentated more precisely in a section for each reason,
but for short:

	.1. Sub-cultural status.
	.2. To gain access.
	.3. Revenge.
	.4. Political reasons.
	.5. Economical reasons.
	.6. Nastiness.

I think that number one and six are the more common today, but that
number four and five will be the more common ones in the future.

.A.2.2. SUB-CULTURAL STATUS
---------------------------

After all information about syn flooding a bunch of such attacks
were launched around Sweden. The very most of these attacks were
not a part of a IP-spoof attack, it was "only" a denial of service
attack. Why? 

I think that hackers attack systems as a sub-cultural pseudo career
and I think that many denial of service attacks, and here in the
example syn flooding, were performed for these reasons. I also think
that many hackers begin their carrer with denial of service attacks.

.A.2.3. TO GAIN ACCESS
----------------------

Sometimes could a denial of service attack be a part of an attack to
gain access at a system. At the moment I can think of these reasons
and specific holes:

	.1. Some older X-lock versions could be crashed with a 
	method from the denial of service family leaving the system
	open. Physical access was needed to use the work space after.

	.2. Syn flooding could be a part of a IP-spoof attack method.

	.3. Some program systems could have holes under the startup, 
	that could be used to gain root, for example SSH (secure shell).

	.4. Under an attack it could be usable to crash other machines
	in the network or to deny certain persons the ability to access 
	the system.  	

	.5. Also could a system being booted sometimes be subverted,
	especially rarp-boots. If we know which port the machine listen
	to (69 could be a good guess) under the boot we can send false
	packets to it and almost totally control the boot.

.A.2.4. REVENGE
---------------

A denial of service attack could be a part of a revenge against a user
or an administrator.

.A.2.5. POLITICAL REASONS
-------------------------

Sooner or later will new or old organizations understand the potential
of destroying computer systems and find tools to do it.

For example imaginate the Bank A loaning company B money to build a
factory threating the environment. The organization C therefor crash A:s
computer system, maybe with help from an employee. The attack could cost
A a great deal of money if the timing is right.

.A.2.6. ECONOMICAL REASONS
--------------------------

Imaginate the small company A moving into a business totally dominated by
company B. A and B customers make the orders by computers and depends
heavily on that the order is done in a specific time (A and B could be
stock trading companies). If A and B can't perform the order the customers
lose money and change company.

As a part of a business strategy A pays a computer expert a sum of money to
get him to crash B:s computer systems a number of times. A year later A
is the dominating company.

.A.2.7. NASTINESS
-----------------

I know a person that found a workstation where the user had forgotten to
logout. He sat down and wrote a program that made a kill -9 -1 at a
random time at least 30 minutes after the login time and placed a call to
the program from the profile file. That is nastiness.

.A.3. ARE SOME OPERATING SYSTEMS MORE SECURE?
---------------------------------------------

This is a hard question to answer and I don't think that it will
give anything to compare different Unix platforms. You can't say that
one Unix is more secure against denial of service, it is all up to the
administrator.

A comparison between Windows 95 and NT on one side and Unix on the
other could however be interesting.

Unix systems are much more complex and have hundreds of built in programs,
services... This always open up many ways to crash the system from
the inside.

In the normal Windows NT and 95 network were is few ways to crash
the system. Although were is methods that always will work.

That gives us that no big different between Microsoft and Unix can
be seen regardning the inside attacks. But there is a couple of
points left:

	- Unix have much more tools and programs to discover an
	attack and monitoring the users. To watch what another user
	is up to under windows is very hard.

	- The average Unix administrator probably also have much more
	experience than the average Microsoft administrator.

The two last points gives that Unix is more secure against inside
denial of service attacks.

A comparison between Microsoft and Unix regarding outside attacks
are much more difficult. However I would like to say that the average
Microsoft system on the Internet are more secure against outside
attacks, because they normally have much less services.

.B. SOME BASIC TARGETS FOR AN ATTACK
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

.B.1. SWAP SPACE
----------------

Most systems have several hundred Mbytes of swap space to 
service client requests. The swap space is typical used
for forked child processes which have a short life time.
The swap space will therefore almost never in a normal
cause be used heavily. A denial of service could be based 
on a method that tries to fill up the swap space.

.B.2. BANDWIDTH
---------------

If the bandwidth is to high the network will be useless. Most
denial of service attack influence the bandwidth in some way.

.B.3. KERNEL TABLES
-------------------

It is trivial to overflow the kernel tables which will cause
serious problems on the system. Systems with write through
caches and small write buffers is especially sensitive.

Kernel memory allocation is also a target that is sensitive.
The kernel have a kernelmap limit, if the system reach this
limit it can not allocate more kernel memory and must be rebooted.
The kernel memory is not only used for RAM, CPU:s, screens and so
on, it it also used for ordinaries processes. Meaning that any system
can be crashed and with a mean (or in some sense good) algorithm pretty
fast.

For Solaris 2.X it is measured and reported with the sar command
how much kernel memory the system is using, but for SunOS 4.X there
is no such command. Meaning that under SunOS 4.X you don't even can
get a warning. If you do use Solaris you should write sar -k 1 to
get the information. netstat -k can also be used and shows how much
memory the kernel have allocated in the subpaging.
 
.B.4. RAM
---------

A denial of service attack that allocates a large amount of RAM
can make a great deal of problems. NFS and mail servers are 
actually extremely sensitive because they do not need much
RAM and therefore often don't have much RAM. An attack at 
a NFS server is trivial. The normal NFS client will do a 
great deal of caching, but a NFS client can be anything 
including the program you wrote yourself...

.B.5. DISKS
-----------

A classic attack is to fill up the hard disk, but an attack at
the disks can be so much more. For example can an overloaded disk
be misused in many ways.

.B.6. CACHES
-------------

A denial of service attack involving caches can be based on a method
to block the cache or to avoid the cache.

These caches are found on Solaris 2.X:

Directory name lookup cache: Associates the name of a file with a vnode.

Inode cache: Cache information read from disk in case it is needed
again.

Rnode cache: Holds information about the NFS filesystem.

Buffer cache: Cache inode indirect blocks and cylinders to realed disk
I/O.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
94-欧美-setu| 久久日韩粉嫩一区二区三区| 欧美一区二区三区思思人| 久久精品人人做| 天天影视涩香欲综合网| av在线播放不卡| 国产欧美一区二区三区鸳鸯浴| 天天综合色天天综合色h| 97se亚洲国产综合自在线观| 精品国产乱码久久久久久蜜臀| 亚洲一区二区精品3399| 成人av网站在线观看| 欧美大胆人体bbbb| 视频一区免费在线观看| 91视频国产资源| 国产精品乱人伦| 国产一区999| 日韩午夜激情av| 天涯成人国产亚洲精品一区av| 色偷偷一区二区三区| 国产精品亲子乱子伦xxxx裸| 精品一区精品二区高清| 91精品欧美久久久久久动漫| 一区二区三区四区国产精品| av一区二区三区四区| 中文字幕在线一区二区三区| 国产成人亚洲精品青草天美| 久久蜜桃av一区二区天堂| 麻豆精品视频在线| 91精品国产色综合久久不卡蜜臀 | 日韩激情中文字幕| av电影天堂一区二区在线观看| 国产蜜臀97一区二区三区| 国产精品 欧美精品| 久久精品视频在线看| 国产91色综合久久免费分享| 国产日本欧洲亚洲| av激情亚洲男人天堂| 自拍偷自拍亚洲精品播放| 成人91在线观看| 亚洲素人一区二区| 欧美在线播放高清精品| 亚洲电影欧美电影有声小说| 91.成人天堂一区| 六月丁香婷婷色狠狠久久| 日韩美一区二区三区| 麻豆成人av在线| 久久―日本道色综合久久 | 亚洲二区视频在线| 欧美日韩国产欧美日美国产精品| 亚洲高清免费观看| 欧美成人猛片aaaaaaa| 国产精品18久久久久久久网站| 久久久99精品免费观看| 91蜜桃视频在线| 亚洲国产精品综合小说图片区| 欧美日韩国产一级二级| 精品亚洲成a人在线观看| 中文av字幕一区| 欧美午夜在线观看| 国产一区高清在线| 亚洲免费视频中文字幕| 日韩写真欧美这视频| 成人精品一区二区三区中文字幕| 亚洲黄色小说网站| 久久综合久久99| 一本大道久久a久久综合| 午夜久久久久久电影| 国产欧美日韩激情| 欧美日本视频在线| 成人综合在线网站| 男女男精品网站| 国产精品色在线| 日韩欧美一卡二卡| 欧洲亚洲精品在线| 国产精品一二三区| 首页欧美精品中文字幕| 国产精品初高中害羞小美女文 | 99久久精品免费精品国产| 亚洲成人av电影在线| 中文字幕二三区不卡| 欧美久久久久久蜜桃| 不卡的av网站| 久久99日本精品| 亚洲美女淫视频| 久久综合99re88久久爱| 欧美日韩一区不卡| 99久久er热在这里只有精品66| 蜜臀精品一区二区三区在线观看| 亚洲日本护士毛茸茸| 久久久久久夜精品精品免费| 欧美精品一卡两卡| 色婷婷av一区二区| 91免费在线播放| 国产成+人+日韩+欧美+亚洲| 久久aⅴ国产欧美74aaa| 日本成人超碰在线观看| 亚洲综合在线五月| 综合欧美亚洲日本| 国产日韩精品一区二区浪潮av| 91麻豆精品国产91久久久久久久久 | 亚洲在线观看免费| 中文字幕亚洲精品在线观看| 国产校园另类小说区| 精品国产精品网麻豆系列 | 欧美不卡一区二区| 欧美精品在线观看一区二区| 在线中文字幕不卡| 91亚洲精华国产精华精华液| 国产不卡在线播放| 粉嫩嫩av羞羞动漫久久久| 国内精品伊人久久久久av一坑| 人人爽香蕉精品| 久久精品理论片| 久热成人在线视频| 精油按摩中文字幕久久| 琪琪一区二区三区| 久久99国产精品麻豆| 国产又黄又大久久| 国产一区二区电影| 国产精品综合在线视频| 丰满放荡岳乱妇91ww| av一本久道久久综合久久鬼色| 99riav一区二区三区| 在线中文字幕一区| 欧美三片在线视频观看| 91精品免费在线| 欧美xxxx在线观看| 中文字幕欧美国产| 自拍偷拍亚洲激情| 亚洲国产欧美在线| 免费在线欧美视频| 国产成人精品亚洲777人妖 | 欧美日韩黄色影视| 日韩一区二区三区免费看 | 国产精品久久福利| 亚洲欧美激情视频在线观看一区二区三区| 国产精品电影院| 亚洲一区二区三区影院| 人人精品人人爱| 东方欧美亚洲色图在线| 一本高清dvd不卡在线观看| 欧美精品粉嫩高潮一区二区| 久久综合久久综合亚洲| 亚洲视频图片小说| 美女视频一区二区| 99亚偷拍自图区亚洲| 欧美三级日本三级少妇99| 久久久亚洲欧洲日产国码αv| 亚洲欧美色综合| 美脚の诱脚舐め脚责91| www.综合网.com| 91精品在线观看入口| 国产精品久久久久久妇女6080| 亚洲va中文字幕| 国产精品 日产精品 欧美精品| 欧美中文字幕亚洲一区二区va在线| 日韩免费观看高清完整版在线观看| 国产精品亲子伦对白| 人人超碰91尤物精品国产| 成人网在线免费视频| 91精品国产91久久久久久最新毛片| 国产亚洲精品超碰| 日韩二区在线观看| 91免费观看在线| 国产午夜精品一区二区三区嫩草| 亚洲国产婷婷综合在线精品| 国产成人无遮挡在线视频| 欧美性大战久久久久久久蜜臀| 国产三级欧美三级日产三级99 | 国产一区二区三区免费观看| 欧美中文字幕不卡| 国产精品区一区二区三区| 精品亚洲国产成人av制服丝袜 | 色综合天天综合网天天狠天天| 日韩欧美国产三级| 亚洲一区二区三区四区在线观看 | 日韩视频一区在线观看| 亚洲国产精品久久艾草纯爱 | 国产一区二区久久| 69久久夜色精品国产69蝌蚪网| 亚洲天堂精品在线观看| 成人手机在线视频| 久久奇米777| 国产伦精一区二区三区| 精品不卡在线视频| 精品一区二区在线播放| 日韩女优av电影在线观看| 日韩激情视频在线观看| 欧美日韩一级二级| 亚洲午夜电影在线| 91久久线看在观草草青青| 国产精品超碰97尤物18| aaa欧美日韩| 中文字幕制服丝袜一区二区三区| 国产91精品在线观看| 久久久久久久综合狠狠综合| 国产一本一道久久香蕉| 久久综合九色综合97婷婷女人| 韩国精品一区二区|