亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? almost everything you ever wanted to know about security (but.txt

?? a collection of mega hacking tools
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
- but really, it's safest not to use setuid scripts at all.Q.12 Why shouldn't I leave "root" permanently logged on the console?Using a 'smart' terminal as console and leaving "/dev/console" worldwritable whilst "root" is logged in is a potential hole.  The terminalmay be vulnerable to remote control via escape sequences, and can beused to 'type' things into the root shell.  The terminal type canusually be obtained via the "ps" command.Various solutions to this can be devised, usually by giving the consoleowner and group-write access only , and then using the setgid mechanismon any program which has need to output to the console (eg: "write").Q.13 Why shouldn't I create Unix accounts with null passwords?Creating an unpassworded account to serve any purpose is potentiallydangerous, not for any direct reason, but because it can give a crackera toehold.For example, on many systems you will find a unpassworded user "sync",which allows the sysman to sync the disks without being logged in.  Thisappears to be both safe and innocuous.The problem with this arises if your system is one of the many whichdoesn't do checks on a user before authorising them for (say) FTP.  Acracker might be able to connect to your machine for one of a variety ofFTP methods, pretending to be user "sync" with no password, and thencopy your password file off for remote cracking.Although there are mechanisms to prevent this sort of thing happening inmost modern vesions of Unix, to be totally secure requires an in-depthknowledge of every package on your system, and how it deals with theverification of users.  If you can't be sure, it's probably better notto leave holes like this around.Another hole that having null-password accounts opens up is thepossibility (on systems with runtime linked libraries) of spoofingsystem software into running your programs as the "sync" user, bychanging the LD_LIBRARY_PATH variable to a library of your own devising,and running "login -p" or "su" to turn into that user.Q.14 What security holes are associated with X-windows (and other WMs)?Lots, some which affect use of X only, and some which impact thesecurity of the entire host system.I would prefer not to go into too much detail here, and would refer anyreader reader looking for detailed information to the other FAQ's inrelevant newsgroups.  (comp.windows.*)One point I will make is that X is one of those packages which oftengenerates "Incompatible Usage" security problems, for instance theability for crackers to run xsessions on hosts under accounts with nopassword (eg: sync), if it is improperly set up.  Read the questionabout unpassworded accounts in this FAQ.Q.15 What security holes are associated with NFS?Lots, mostly to do with who you export your disks to, and how.  Thesecurity of NFS relies heavily upon who is allowed to mount the filesthat a server exports, and whether they are exported read only or not.The exact format for specifying which hosts can mount an exporteddirectory varies between Unix implementations, but generally theinformation is contained within the file "/etc/exports".This file contains a list of directories and for each one, it has aseries of either specific "hosts" or "netgroups" which are allowed toNFS mount that directory.  This list is called the "access list".The "hosts" are individual machines, whilst "netgroups" are combinationsof hosts and usernames specified in "/etc/netgroup".  These are meant toprovide a method of finetuning access.  Read the relevant manual pagefor more information about netgroups.The exports file also contains information about whether the directoryis to be exported as read-only, read-write, and whether super-useraccess is to be allowed from clients which mount that directory.The important point to remember is that if the access list for aparticular directory in /etc/exports contains:1) <nothing>Your directory can be mounted by anyone, anywhere.2) <a specific hostname>Your directory can be mounted by anyone permitted to run the mountcommand at hostname.  This might not be a trustworthy person; forinstance, if the machine is a PC running NFS, it could be anyone.3) <a netgroup name>If the netgroup:a) is empty, anyone can mount your directory, from anywhere.b) contains "(,,)", anyone can mount your directory, from anywhere.c) contains the name of a netgroup which is empty or contains "(,,)",   anyone can mount your directory, from anywhere.d) contains "(hostname,,)", anyone on the named host who is permissioned   to mount files can mount your directory.e) contains "(,username,)", the named user can mount your directory,   from anywhere.4) <a word which is neither a hostname or a netgroup>If you meant to export the directory to the host "athena" but actuallytype "ahtena", the word "ahtena" is taken as a netgroup name, is foundto be an empty netgroup, and thus the directory can be mounted byanyone, anywhere.So, if you aren't careful about what you put into /etc/exports and/etc/netgroup you could find that a user with a PC could  a) mount your mainframe filestore as a network disk  b) edit your /etc/passwd or .rhosts or /etc/hosts.equiv ...  c) log into your mainframe as another user, possibly "root"Disclaimer: The above information may not be true for all platformswhich provide an NFS serving capability, but is true for all of the onesin my experience (AEM).  It should be noted that the SAFE way to createan "empty" netgroup entry is:                           ngname (-,-,-)Which is a netgroup which matches no-one on no-host on no-NIS-domain.[ I am STILL working on PC NFS packages / ethics at the moment - AEM ]Q.16 How can I generate safe passwords?You can't.  The key word here is GENERATE.  Once an algorithm forcreating passwords is specified using upon some systematic method, itmerely becomes a matter of analysing your algorithm in order to findevery password on your system.Unless the algorithm is very subtle, it will probably suffer from a verylow period (ie: it will soon start to repeat itself) so that either:  a) a cracker can try out every possible output of the password  generator on every user of the system, or  b) the cracker can analyse the output of the password program,  determine the algorithm being used, and apply the algorithm to other  users to determine their passwords.A beautiful example of this (where it was disastrously assumed that arandom number generator could generate an infinite number of randompasswords) is detailed in [Morris & Thompson].The only way to get a reasonable amount of variety in your passwords(I'm afraid) is to make them up.  Work out some flexible method of yourown which is NOT based upon:  1) modifying any part of your name or name+initials  2) modifying a dictionary word  3) acronyms  4) any systematic, well-adhered-to algorithm whatsoeverFor instance, NEVER use passwords like:alec7           - it's based on the users name (& it's too short anyway)tteffum         - based on the users name againgillian         - girlfiends name (in a dictionary)naillig         - ditto, backwardsPORSCHE911      - it's in a dictionary12345678        - it's in a dictionary (& people can watch you type it easily)qwertyui        - ...ditto...abcxyz          - ...ditto...0ooooooo        - ...ditto...Computer        - just because it's capitalised doesn't make it safewombat6         - ditto for appending some random character6wombat         - ditto for prepending some random charactermerde3          - even for french words...mr.spock        - it's in a sci-fi dictionaryzeolite         - it's in a geological dictionaryze0lite         - corrupted version of a word in a geological dictionaryze0l1te         - ...ditto...Z30L1T3         - ...ditto...I hope that these examples emphasise that ANY password derived from ANYdictionary word (or personal information), modified in ANY way,constitutes a potentially guessable password.For more detailed information in the same vein, you should read theAPPENDIX files which accompany Crack [Muffett].Q.17 Why are passwords so important?Because they are the first line of defence against interactive attackson your system.  It can be stated simply: if a cracker cannot interactwith your system(s), and he has no access to read or write theinformation contained in the password file, then he has almost noavenues of attack left open to break your system.This is also why, if a cracker can at least read your password file (andif you are on a vanilla modern Unix, you should assume this) it is soimportant that he is not able to break any of the passwords containedtherein.  If he can, then it is also fair to assume that he can (a) logon to your system and can then (b) break into "root" via an operatingsystem hole.Q.18 How many possible passwords are there?Most people ask this at one time or another, worried that programs likeCrack will eventually grow in power until they can do a completelyexhaustive search of all possible passwords, to break into a specificusers' account - usually root.If (to simplify the maths) we make the assumptions that:  1) Valid passwords are created from a set of 62 chars [A-Za-z0-9]  2) Valid passwords are to be between 5 and 8 chars longThen the size of the set of all valid passwords is: (in base 62)                                   100000 +                                  1000000 +                                 10000000 +                                100000000 =                                ---------                                111100000       (base 62)A figure which is far too large to usefully undertake an exhaustivesearch with current technologies.  Don't forget, however, that passwordsCAN be made up with even more characters then this; you can use <space>,all the punctuation characters, and symbols (~<>|\#$%^&*) too.  If youcan use some of all the 95 non-control characters in passwords, thisincreases the search space for a cracker to cover even further. However, it's still MUCH more efficient for a cracker to get a copy of"Crack", break into ANY account on the system (you only need one), logonto the machine, and spoof his way up to root priviledges via operatingsystems holes. Take comfort from these figures.  If you can slam the door in the faceof a potential crackers with a robust password file, you have sealedmost of the major avenues of attack immediately.Q.19 Where can I get more information?Books:[Kochan & Wood]Unix System SecurityA little dated for modern matters, but still a very good book on thebasics of Unix security.[Spafford & Garfinkel]Practical Unix SecurityThis wonderful book is a worthy successor to the above, and covers awide variety of the topics which the Unix (and some non Unix) systemmanager of the 90's will come across.>From: Gene Spafford <spaf@cs.purdue.edu>>Mention appendix E in "Practical Unix Security."Okay: Appendix E contains an extensive bibliography with even morepointers to security books than this FAQ contains.[Stoll]The Cuckoo's EggA real life 1980's thriller detailing the tracing of a cracker fromBerkeley across the USA and over the Atlantic to Germany.  An excellentview from all points: a good read, informative about security, funny,and a good illustration of the cracker psyche.  Contains an excellentrecipie for chocolate chip cookies.A videotape of the "NOVA" (PBS's Science Program on TV) episode thatexplained/reenacted this story is available from PBS Home Video.  Theyhave a toll-free 800 number within North America.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲午夜一区二区三区| 久久国产日韩欧美精品| 日韩精品免费视频人成| 成人精品在线视频观看| 在线一区二区三区四区五区| 精品国产凹凸成av人导航| 亚洲免费观看高清完整版在线 | 在线精品视频一区二区三四| 日韩视频免费直播| 亚洲综合一区二区| 成人免费黄色在线| 日韩三级高清在线| 亚洲一区二区成人在线观看| 成人污视频在线观看| 日韩美女视频在线| 婷婷久久综合九色综合伊人色| 不卡一卡二卡三乱码免费网站| 欧美r级在线观看| 天堂成人国产精品一区| 在线精品亚洲一区二区不卡| 亚洲视频中文字幕| 成人激情免费电影网址| 国产精品水嫩水嫩| 国产真实精品久久二三区| 欧美日韩二区三区| 亚洲一区二区视频在线| 在线观看亚洲一区| 免费人成在线不卡| 久久国产剧场电影| 国产精品二三区| 国产福利精品导航| 国产婷婷色一区二区三区四区| 久久精品国产亚洲a| 9191久久久久久久久久久| 亚洲激情综合网| 91国在线观看| 亚洲午夜三级在线| 欧美日韩国产成人在线免费| 日韩国产一二三区| 欧美xxxxxxxxx| 韩国av一区二区| 久久精品亚洲精品国产欧美| 粉嫩av亚洲一区二区图片| 久久亚洲精精品中文字幕早川悠里| 久久精品99国产精品日本| 欧美大片拔萝卜| 国产一区二区三区四| 久久久精品中文字幕麻豆发布| 国产电影一区二区三区| 久久99热这里只有精品| 欧美v日韩v国产v| 极品少妇一区二区| 国产精品情趣视频| 日本韩国欧美在线| 亚洲国产aⅴ成人精品无吗| 4438x亚洲最大成人网| 精品一区二区三区免费| 欧美国产日韩a欧美在线观看| 不卡av免费在线观看| 亚洲综合在线电影| 欧美一区二区二区| 成人免费毛片嘿嘿连载视频| 亚洲影视在线观看| 日韩精品一区二区在线| 国产成人日日夜夜| 天堂久久久久va久久久久| 久久久久久97三级| 欧美亚洲动漫另类| 六月丁香婷婷色狠狠久久| 国产片一区二区| 欧美性大战久久| 国内久久婷婷综合| 国产69精品久久久久777| 91亚洲国产成人精品一区二三| 亚洲影视在线观看| 亚洲精品一区在线观看| 91偷拍与自偷拍精品| 欧美96一区二区免费视频| 中文字幕一区二区三区视频| 欧美日韩高清一区| jlzzjlzz国产精品久久| 久久国产成人午夜av影院| 亚洲精品久久久久久国产精华液| 欧美一区二区三区四区在线观看| 国产99久久久久久免费看农村| 亚洲无线码一区二区三区| 国产喷白浆一区二区三区| 91精品蜜臀在线一区尤物| 91免费看视频| 国产98色在线|日韩| 日日欢夜夜爽一区| 亚洲一线二线三线久久久| 国产区在线观看成人精品| 欧美一区二区三区小说| 色婷婷av一区二区三区软件 | 免费观看在线色综合| 国产精品久久久99| 日韩精品一区二| 欧美日韩国产另类不卡| 色综合天天做天天爱| 国产露脸91国语对白| 美女视频一区在线观看| 日韩精品一区第一页| 亚洲一区二区三区小说| 亚洲欧美日韩国产综合在线 | 欧美精品一区视频| 欧美情侣在线播放| 日本高清无吗v一区| 国产成人免费视频网站高清观看视频 | 欧美日本韩国一区二区三区视频| 日韩精品1区2区3区| 日本一二三不卡| 日韩精品一区二区三区蜜臀| 欧美色图在线观看| 91一区二区三区在线观看| 国产剧情一区二区| 七七婷婷婷婷精品国产| 日韩成人dvd| 日韩中文字幕亚洲一区二区va在线| 亚洲三级电影全部在线观看高清| 日本一区二区三级电影在线观看| 欧美视频一区二| 91精品国产全国免费观看| 91久久线看在观草草青青| 99久久精品国产导航| 国产a级毛片一区| 国产精品99久久不卡二区| 成人综合在线网站| 丁香婷婷综合五月| 午夜免费久久看| 久久精品欧美日韩精品| 欧美美女一区二区| 色婷婷久久久综合中文字幕| 爽好多水快深点欧美视频| 秋霞av亚洲一区二区三| 日韩精品一二三| 麻豆精品一区二区av白丝在线| 亚洲综合激情网| 亚洲自拍与偷拍| 亚洲少妇中出一区| 一区二区成人在线| 亚洲电影一区二区三区| 亚洲一区在线观看免费观看电影高清| 亚洲精品国产无套在线观| 亚洲乱码国产乱码精品精的特点 | 欧美精品一区二区三区很污很色的| 欧美精品1区2区| 日韩一级二级三级精品视频| 亚洲午夜在线观看视频在线| 99久久精品一区| 99麻豆久久久国产精品免费| 国产欧美一区二区精品秋霞影院| 亚洲精品免费视频| 精品亚洲成a人在线观看| 五月激情六月综合| 国产精一区二区三区| 国产精品538一区二区在线| 成人国产精品视频| 欧美性生活久久| 日韩欧美一二三区| 国产精品女主播av| 日本强好片久久久久久aaa| 国产一区二区三区在线观看免费 | 亚洲日本免费电影| 丝袜亚洲另类欧美综合| 麻豆精品新av中文字幕| 一区二区三区中文字幕| 日韩女优av电影| 日韩免费观看2025年上映的电影 | 91麻豆精品国产自产在线| 欧美电影免费观看高清完整版在 | 亚洲欧美自拍偷拍| 无码av免费一区二区三区试看| 日韩精品久久理论片| 日本高清免费不卡视频| 久久一夜天堂av一区二区三区| 亚洲欧美一区二区三区久本道91| 日韩电影免费在线| 波多野结衣91| 日本韩国精品在线| 国产精品卡一卡二| 久久99国产精品久久99果冻传媒| 99国产精品久久久| 欧美日韩免费观看一区二区三区| 久久麻豆一区二区| 天天爽夜夜爽夜夜爽精品视频| 成人午夜看片网址| 日韩美女视频一区二区在线观看| 国产激情视频一区二区在线观看| 日韩欧美亚洲国产另类| 国产精品三级久久久久三级| 美女一区二区久久| 在线观看日韩国产| 国产精品欧美久久久久无广告| 毛片av一区二区| 欧美精品黑人性xxxx| 亚洲最快最全在线视频| 不卡的av在线| 国产免费久久精品| 国产一区免费电影|