亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? introduction to denial of service.txt

?? 1000 HOWTOs for various needs [WINDOWS]
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
          
===================================                    
=INTRODUCTION TO DENIAL OF SERVICE=
===================================

Hans Husman
t95hhu@student.tdb.uu.se
Last updated: Mon Oct 28 14:56:31 MET 1996

.0. FOREWORD

.A. INTRODUCTION
	.A.1. WHAT IS A DENIAL OF SERVICE ATTACK?
	.A.2. WHY WOULD SOMEONE CRASH A SYSTEM?
		.A.2.1. INTRODUCTION
		.A.2.2. SUB-CULTURAL STATUS
		.A.2.3. TO GAIN ACCESS
		.A.2.4. REVENGE
		.A.2.5. POLITICAL REASONS
		.A.2.6. ECONOMICAL REASONS
		.A.2.7. NASTINESS
	.A.3. ARE SOME OPERATING SYSTEMS MORE SECURE?

.B. SOME BASIC TARGETS FOR AN ATTACK
	.B.1. SWAP SPACE
	.B.2. BANDWIDTH
	.B.3. KERNEL TABLES
	.B.4. RAM
	.B.5. DISKS
	.B.6. CACHES
	.B.7. INETD

.C. ATTACKING FROM THE OUTSIDE
	.C.1. TAKING ADVANTAGE OF FINGER
	.C.2. UDP AND SUNOS 4.1.3.
	.C.3. FREEZING UP X-WINDOWS
	.C.4. MALICIOUS USE OF UDP SERVICES
    	.C.5. ATTACKING WITH LYNX CLIENTS
	.C.6. MALICIOUS USE OF telnet
	.C.7. MALICIOUS USE OF telnet UNDER SOLARIS 2.4
	.C.8. HOW TO DISABLE ACCOUNTS
	.C.9. LINUX AND TCP TIME, DAYTIME
	.C.10. HOW TO DISABLE SERVICES
	.C.11. PARAGON OS BETA R1.4
	.C.12. NOVELLS NETWARE FTP
	.C.13. ICMP REDIRECT ATTACKS
	.C.14. BROADCAST STORMS
	.C.15. EMAIL BOMBING AND SPAMMING
	.C.16. TIME AND KERBEROS
	.C.17. THE DOT DOT BUG
	.C.18. SUNOS KERNEL PANIC
	.C.19. HOSTILE APPLETS
	.C.20. VIRUS
	.C.21. ANONYMOUS FTP ABUSE
	.C.22. SYN FLOODING
	.C.23. PING FLOODING
	.C.24. CRASHING SYSTEMS WITH PING FROM WINDOWS 95 MACHINES
	.C.25. MALICIOUS USE OF SUBNET MASK REPLY MESSAGE
	.C.26. FLEXlm
	.C.27. BOOTING WITH TRIVIAL FTP

.D. ATTACKING FROM THE INSIDE
	.D.1. KERNEL PANIC UNDER SOLARIS 2.3
	.D.2. CRASHING THE X-SERVER
	.D.3. FILLING UP THE HARD DISK
	.D.4. MALICIOUS USE OF eval
	.D.5. MALICIOUS USE OF fork()
	.D.6. CREATING FILES THAT IS HARD TO REMOVE
	.D.7. DIRECTORY NAME LOOKUPCACHE
	.D.8. CSH ATTACK
	.D.9. CREATING FILES IN /tmp
	.D.10. USING RESOLV_HOST_CONF
	.D.11. SUN 4.X AND BACKGROUND JOBS	
	.D.12. CRASHING DG/UX WITH ULIMIT 
	.D.13. NETTUNE AND HP-UX
	.D.14. SOLARIS 2.X AND NFS
	.D.15. SYSTEM STABILITY COMPROMISE VIA MOUNT_UNION
	.D.16. trap_mon CAUSES KERNEL PANIC UNDER SUNOS 4.1.X

.E. DUMPING CORE
	.E.1. SHORT COMMENT
	.E.2. MALICIOUS USE OF NETSCAPE
	.E.3. CORE DUMPED UNDER WUFTPD
	.E.4. ld UNDER SOLARIS/X86

.F. HOW DO I PROTECT A SYSTEM AGAINST DENIAL OF SERVICE ATTACKS?
	.F.1. BASIC SECURITY PROTECTION
		.F.1.1. INTRODUCTION
		.F.1.2. PORT SCANNING
		.F.1.3. CHECK THE OUTSIDE ATTACKS DESCRIBED IN THIS PAPER
		.F.1.4. CHECK THE INSIDE ATTACKS DESCRIBED IN THIS PAPER
		.F.1.5. EXTRA SECURITY SYSTEMS
		.F.1.6. MONITORING SECURITY
		.F.1.7. KEEPING UP TO DATE
		.F.1.8. READ SOMETHING BETTER
	.F.2. MONITORING PERFORMANCE
		.F.2.1. INTRODUCTION
		.F.2.2. COMMANDS AND SERVICES                      
		.F.2.3. PROGRAMS
		.F.2.4. ACCOUNTING

.G. SUGGESTED READING
	.G.1. INFORMATION FOR DEEPER KNOWLEDGE
	.G.2. KEEPING UP TO DATE INFORMATION
	.G.3. BASIC INFORMATION

.H. COPYRIGHT

.I. DISCLAIMER

.0. FOREWORD
------------

In this paper I have tried to answer the following questions:

	- What is a denial of service attack?
	- Why would someone crash a system?
	- How can someone crash a system.
	- How do I protect a system against denial of service attacks?
	
I also have a section called SUGGESTED READING were you can find
information about good free information that can give you a deeper
understanding about something.

Note that I have a very limited experience with Macintosh, OS/2 and
Windows and most of the material are therefore for Unix use. 

You can always find the latest version at the following address:
http://www.student.tdb.uu.se/~t95hhu/secure/denial/DENIAL.TXT

Feel free to send comments, tips and so on to address:
t95hhu@student.tdb.uu.se

.A. INTRODUCTION
~~~~~~~~~~~~~~~~

.A.1. WHAT IS A DENIAL OF SERVICE ATTACK?
-----------------------------------------

Denial of service is about without permission knocking off
services, for example through crashing the whole system. This
kind of attacks are easy to launch and it is hard to protect
a system against them. The basic problem is that Unix
assumes that users on the system or on other systems will be
well behaved. 

.A.2. WHY WOULD SOMEONE CRASH A SYSTEM?
---------------------------------------
 
.A.2.1. INTRODUCTION
--------------------

Why would someone crash a system? I can think of several reasons
that I have presentated more precisely in a section for each reason,
but for short:

	.1. Sub-cultural status.
	.2. To gain access.
	.3. Revenge.
	.4. Political reasons.
	.5. Economical reasons.
	.6. Nastiness.

I think that number one and six are the more common today, but that
number four and five will be the more common ones in the future.

.A.2.2. SUB-CULTURAL STATUS
---------------------------

After all information about syn flooding a bunch of such attacks
were launched around Sweden. The very most of these attacks were
not a part of a IP-spoof attack, it was "only" a denial of service
attack. Why? 

I think that hackers attack systems as a sub-cultural pseudo career
and I think that many denial of service attacks, and here in the
example syn flooding, were performed for these reasons. I also think
that many hackers begin their carrer with denial of service attacks.

.A.2.3. TO GAIN ACCESS
----------------------

Sometimes could a denial of service attack be a part of an attack to
gain access at a system. At the moment I can think of these reasons
and specific holes:

	.1. Some older X-lock versions could be crashed with a 
	method from the denial of service family leaving the system
	open. Physical access was needed to use the work space after.

	.2. Syn flooding could be a part of a IP-spoof attack method.

	.3. Some program systems could have holes under the startup, 
	that could be used to gain root, for example SSH (secure shell).

	.4. Under an attack it could be usable to crash other machines
	in the network or to deny certain persons the ability to access 
	the system.  	

	.5. Also could a system being booted sometimes be subverted,
	especially rarp-boots. If we know which port the machine listen
	to (69 could be a good guess) under the boot we can send false
	packets to it and almost totally control the boot.

.A.2.4. REVENGE
---------------

A denial of service attack could be a part of a revenge against a user
or an administrator.

.A.2.5. POLITICAL REASONS
-------------------------

Sooner or later will new or old organizations understand the potential
of destroying computer systems and find tools to do it.

For example imaginate the Bank A loaning company B money to build a
factory threating the environment. The organization C therefor crash A:s
computer system, maybe with help from an employee. The attack could cost
A a great deal of money if the timing is right.

.A.2.6. ECONOMICAL REASONS
--------------------------

Imaginate the small company A moving into a business totally dominated by
company B. A and B customers make the orders by computers and depends
heavily on that the order is done in a specific time (A and B could be
stock trading companies). If A and B can't perform the order the customers
lose money and change company.

As a part of a business strategy A pays a computer expert a sum of money to
get him to crash B:s computer systems a number of times. A year later A
is the dominating company.

.A.2.7. NASTINESS
-----------------

I know a person that found a workstation where the user had forgotten to
logout. He sat down and wrote a program that made a kill -9 -1 at a
random time at least 30 minutes after the login time and placed a call to
the program from the profile file. That is nastiness.

.A.3. ARE SOME OPERATING SYSTEMS MORE SECURE?
---------------------------------------------

This is a hard question to answer and I don't think that it will
give anything to compare different Unix platforms. You can't say that
one Unix is more secure against denial of service, it is all up to the
administrator.

A comparison between Windows 95 and NT on one side and Unix on the
other could however be interesting.

Unix systems are much more complex and have hundreds of built in programs,
services... This always open up many ways to crash the system from
the inside.

In the normal Windows NT and 95 network were is few ways to crash
the system. Although were is methods that always will work.

That gives us that no big different between Microsoft and Unix can
be seen regardning the inside attacks. But there is a couple of
points left:

	- Unix have much more tools and programs to discover an
	attack and monitoring the users. To watch what another user
	is up to under windows is very hard.

	- The average Unix administrator probably also have much more
	experience than the average Microsoft administrator.

The two last points gives that Unix is more secure against inside
denial of service attacks.

A comparison between Microsoft and Unix regarding outside attacks
are much more difficult. However I would like to say that the average
Microsoft system on the Internet are more secure against outside
attacks, because they normally have much less services.

.B. SOME BASIC TARGETS FOR AN ATTACK
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

.B.1. SWAP SPACE
----------------

Most systems have several hundred Mbytes of swap space to 
service client requests. The swap space is typical used
for forked child processes which have a short life time.
The swap space will therefore almost never in a normal
cause be used heavily. A denial of service could be based 
on a method that tries to fill up the swap space.

.B.2. BANDWIDTH
---------------

If the bandwidth is to high the network will be useless. Most
denial of service attack influence the bandwidth in some way.

.B.3. KERNEL TABLES
-------------------

It is trivial to overflow the kernel tables which will cause
serious problems on the system. Systems with write through
caches and small write buffers is especially sensitive.

Kernel memory allocation is also a target that is sensitive.
The kernel have a kernelmap limit, if the system reach this
limit it can not allocate more kernel memory and must be rebooted.
The kernel memory is not only used for RAM, CPU:s, screens and so
on, it it also used for ordinaries processes. Meaning that any system
can be crashed and with a mean (or in some sense good) algorithm pretty
fast.

For Solaris 2.X it is measured and reported with the sar command
how much kernel memory the system is using, but for SunOS 4.X there
is no such command. Meaning that under SunOS 4.X you don't even can
get a warning. If you do use Solaris you should write sar -k 1 to
get the information. netstat -k can also be used and shows how much
memory the kernel have allocated in the subpaging.
 
.B.4. RAM
---------

A denial of service attack that allocates a large amount of RAM
can make a great deal of problems. NFS and mail servers are 
actually extremely sensitive because they do not need much
RAM and therefore often don't have much RAM. An attack at 
a NFS server is trivial. The normal NFS client will do a 
great deal of caching, but a NFS client can be anything 
including the program you wrote yourself...

.B.5. DISKS
-----------

A classic attack is to fill up the hard disk, but an attack at
the disks can be so much more. For example can an overloaded disk
be misused in many ways.

.B.6. CACHES
-------------

A denial of service attack involving caches can be based on a method
to block the cache or to avoid the cache.

These caches are found on Solaris 2.X:

Directory name lookup cache: Associates the name of a file with a vnode.

Inode cache: Cache information read from disk in case it is needed
again.

Rnode cache: Holds information about the NFS filesystem.

Buffer cache: Cache inode indirect blocks and cylinders to realed disk
I/O.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
91在线porny国产在线看| 国产日韩欧美a| 亚洲国产岛国毛片在线| 亚洲第一激情av| 国产二区国产一区在线观看| 在线观看日韩一区| 欧美国产精品久久| 久久99国产精品麻豆| 欧美日韩高清不卡| 樱花草国产18久久久久| www.66久久| 国产调教视频一区| 国产乱色国产精品免费视频| 欧美一区二区免费观在线| 一区二区三区 在线观看视频| 成人一级黄色片| 日韩欧美的一区| 麻豆freexxxx性91精品| 欧美日韩在线播放一区| 伊人色综合久久天天| 97久久精品人人做人人爽50路| 国产日韩精品久久久| 国产精品一二三| 26uuu国产日韩综合| 麻豆91在线播放| 最新国产成人在线观看| 成人动漫视频在线| 国产精品国产自产拍在线| 成人动漫精品一区二区| 亚洲欧洲韩国日本视频| 99久久精品情趣| 亚洲色大成网站www久久九九| 99精品久久99久久久久| 自拍偷拍国产亚洲| 在线国产亚洲欧美| 午夜久久久久久久久| 欧美日韩国产不卡| 麻豆精品在线观看| 国产亚洲美州欧州综合国| 高清beeg欧美| 亚洲欧美日韩一区二区三区在线观看| 99麻豆久久久国产精品免费| 一区二区三区在线免费观看 | 国产精品电影一区二区三区| 成人精品视频一区二区三区| 综合久久久久久久| 欧美挠脚心视频网站| 日本免费新一区视频| 精品嫩草影院久久| 成人激情午夜影院| 亚洲国产精品一区二区久久| 欧美高清视频一二三区 | 欧美精品一区二区三区蜜臀 | 欧美韩日一区二区三区| 91在线丨porny丨国产| 亚洲综合色自拍一区| 欧美精品色一区二区三区| 久久精品久久综合| 国产精品视频你懂的| 在线免费观看日本欧美| 久久成人综合网| 国产精品久久久久久久久免费樱桃| 色屁屁一区二区| 免费不卡在线视频| 国产精品国产三级国产a| 欧美视频一区二区在线观看| 狠狠色狠狠色合久久伊人| 综合久久久久久| 精品嫩草影院久久| 色域天天综合网| 国产一区福利在线| 亚洲视频免费在线观看| 日韩欧美一级二级三级 | 丁香婷婷综合五月| 性久久久久久久久久久久| 国产午夜精品福利| 91精品综合久久久久久| 成人精品鲁一区一区二区| 三级成人在线视频| 国产精品久久久久精k8 | 日韩一级大片在线| 99re这里只有精品首页| 久久国产精品免费| 五月婷婷久久综合| 亚洲日本电影在线| 久久一日本道色综合| 在线成人小视频| 日本精品视频一区二区| 国产91精品在线观看| 美女视频网站久久| 亚洲电影在线播放| 亚洲人亚洲人成电影网站色| 久久久激情视频| 精品国产百合女同互慰| 欧美精品三级日韩久久| 在线观看国产一区二区| 成人高清视频在线观看| 国产精品一品视频| 国产一二三精品| 另类小说一区二区三区| 日产欧产美韩系列久久99| 亚洲一区二区三区四区的| 1区2区3区精品视频| 国产免费久久精品| 国产欧美一区二区精品秋霞影院| 精品三级在线观看| 日韩欧美专区在线| 日韩一区二区三区在线| 日韩欧美久久一区| 91精品婷婷国产综合久久| 欧美日韩免费一区二区三区| 在线看国产一区| 欧美四级电影在线观看| 欧美亚洲国产怡红院影院| 色天使久久综合网天天| 在线一区二区三区四区五区 | 91国产免费观看| 欧美在线小视频| 欧美午夜精品久久久久久孕妇| 91国偷自产一区二区开放时间 | 91在线观看地址| 在线观看视频一区二区| 欧美日韩中字一区| 欧美一级黄色大片| 久久精品人人做| 国产精品久久午夜| 一区二区三区中文在线观看| 一区二区三区免费在线观看| 亚洲第一激情av| 久久国产精品色| 成人h精品动漫一区二区三区| av电影天堂一区二区在线| 91国模大尺度私拍在线视频| 欧美另类高清zo欧美| 欧美精品一区二区精品网| 国产日韩亚洲欧美综合| 一区二区三区小说| 日本亚洲视频在线| 国产成人在线视频免费播放| 日本高清不卡在线观看| 欧美一区二区三区啪啪| 国产亚洲美州欧州综合国| 一区二区三区av电影| 韩国三级中文字幕hd久久精品| 成人v精品蜜桃久久一区| 欧美日韩国产精品自在自线| 精品日韩成人av| 一区二区三区小说| 狠狠色狠狠色综合系列| 欧洲色大大久久| 亚洲精品在线观| 亚洲午夜精品在线| 国产精品主播直播| 精品视频全国免费看| 久久综合999| 同产精品九九九| 成人综合婷婷国产精品久久| 欧美日韩高清一区二区| 国产精品久久福利| 蜜臀a∨国产成人精品| 91福利精品第一导航| 久久久国产精品麻豆| 日韩成人一区二区三区在线观看| 处破女av一区二区| 精品少妇一区二区三区在线视频 | 秋霞午夜av一区二区三区| 99国产精品99久久久久久| 久久蜜桃香蕉精品一区二区三区| 亚洲精品高清在线观看| 国产精品18久久久久久久网站| 欧美日产国产精品| 自拍偷拍欧美激情| 国产成人福利片| 日韩欧美国产1| 日韩av网站免费在线| 91网上在线视频| 国产精品免费丝袜| 国产麻豆成人精品| 欧美一级生活片| 亚洲一二三专区| 色综合天天性综合| 国产精品色婷婷久久58| 久久超碰97人人做人人爱| 欧美高清视频不卡网| 一级女性全黄久久生活片免费| 99久久精品免费看国产| 国产精品美女久久福利网站| 国产一区在线观看麻豆| 精品人在线二区三区| 免播放器亚洲一区| 欧美一区二区成人| 青青草国产精品亚洲专区无| 欧美熟乱第一页| 亚洲高清免费在线| 欧美日韩中文另类| 性做久久久久久久免费看| 欧美日韩一区二区电影| 亚洲h动漫在线| 欧美浪妇xxxx高跟鞋交| 日韩av一区二区三区四区|