亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? introduction to denial of service.txt

?? 1000 HOWTOs for various needs [WINDOWS]
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
          
===================================                    
=INTRODUCTION TO DENIAL OF SERVICE=
===================================

Hans Husman
t95hhu@student.tdb.uu.se
Last updated: Mon Oct 28 14:56:31 MET 1996

.0. FOREWORD

.A. INTRODUCTION
	.A.1. WHAT IS A DENIAL OF SERVICE ATTACK?
	.A.2. WHY WOULD SOMEONE CRASH A SYSTEM?
		.A.2.1. INTRODUCTION
		.A.2.2. SUB-CULTURAL STATUS
		.A.2.3. TO GAIN ACCESS
		.A.2.4. REVENGE
		.A.2.5. POLITICAL REASONS
		.A.2.6. ECONOMICAL REASONS
		.A.2.7. NASTINESS
	.A.3. ARE SOME OPERATING SYSTEMS MORE SECURE?

.B. SOME BASIC TARGETS FOR AN ATTACK
	.B.1. SWAP SPACE
	.B.2. BANDWIDTH
	.B.3. KERNEL TABLES
	.B.4. RAM
	.B.5. DISKS
	.B.6. CACHES
	.B.7. INETD

.C. ATTACKING FROM THE OUTSIDE
	.C.1. TAKING ADVANTAGE OF FINGER
	.C.2. UDP AND SUNOS 4.1.3.
	.C.3. FREEZING UP X-WINDOWS
	.C.4. MALICIOUS USE OF UDP SERVICES
    	.C.5. ATTACKING WITH LYNX CLIENTS
	.C.6. MALICIOUS USE OF telnet
	.C.7. MALICIOUS USE OF telnet UNDER SOLARIS 2.4
	.C.8. HOW TO DISABLE ACCOUNTS
	.C.9. LINUX AND TCP TIME, DAYTIME
	.C.10. HOW TO DISABLE SERVICES
	.C.11. PARAGON OS BETA R1.4
	.C.12. NOVELLS NETWARE FTP
	.C.13. ICMP REDIRECT ATTACKS
	.C.14. BROADCAST STORMS
	.C.15. EMAIL BOMBING AND SPAMMING
	.C.16. TIME AND KERBEROS
	.C.17. THE DOT DOT BUG
	.C.18. SUNOS KERNEL PANIC
	.C.19. HOSTILE APPLETS
	.C.20. VIRUS
	.C.21. ANONYMOUS FTP ABUSE
	.C.22. SYN FLOODING
	.C.23. PING FLOODING
	.C.24. CRASHING SYSTEMS WITH PING FROM WINDOWS 95 MACHINES
	.C.25. MALICIOUS USE OF SUBNET MASK REPLY MESSAGE
	.C.26. FLEXlm
	.C.27. BOOTING WITH TRIVIAL FTP

.D. ATTACKING FROM THE INSIDE
	.D.1. KERNEL PANIC UNDER SOLARIS 2.3
	.D.2. CRASHING THE X-SERVER
	.D.3. FILLING UP THE HARD DISK
	.D.4. MALICIOUS USE OF eval
	.D.5. MALICIOUS USE OF fork()
	.D.6. CREATING FILES THAT IS HARD TO REMOVE
	.D.7. DIRECTORY NAME LOOKUPCACHE
	.D.8. CSH ATTACK
	.D.9. CREATING FILES IN /tmp
	.D.10. USING RESOLV_HOST_CONF
	.D.11. SUN 4.X AND BACKGROUND JOBS	
	.D.12. CRASHING DG/UX WITH ULIMIT 
	.D.13. NETTUNE AND HP-UX
	.D.14. SOLARIS 2.X AND NFS
	.D.15. SYSTEM STABILITY COMPROMISE VIA MOUNT_UNION
	.D.16. trap_mon CAUSES KERNEL PANIC UNDER SUNOS 4.1.X

.E. DUMPING CORE
	.E.1. SHORT COMMENT
	.E.2. MALICIOUS USE OF NETSCAPE
	.E.3. CORE DUMPED UNDER WUFTPD
	.E.4. ld UNDER SOLARIS/X86

.F. HOW DO I PROTECT A SYSTEM AGAINST DENIAL OF SERVICE ATTACKS?
	.F.1. BASIC SECURITY PROTECTION
		.F.1.1. INTRODUCTION
		.F.1.2. PORT SCANNING
		.F.1.3. CHECK THE OUTSIDE ATTACKS DESCRIBED IN THIS PAPER
		.F.1.4. CHECK THE INSIDE ATTACKS DESCRIBED IN THIS PAPER
		.F.1.5. EXTRA SECURITY SYSTEMS
		.F.1.6. MONITORING SECURITY
		.F.1.7. KEEPING UP TO DATE
		.F.1.8. READ SOMETHING BETTER
	.F.2. MONITORING PERFORMANCE
		.F.2.1. INTRODUCTION
		.F.2.2. COMMANDS AND SERVICES                      
		.F.2.3. PROGRAMS
		.F.2.4. ACCOUNTING

.G. SUGGESTED READING
	.G.1. INFORMATION FOR DEEPER KNOWLEDGE
	.G.2. KEEPING UP TO DATE INFORMATION
	.G.3. BASIC INFORMATION

.H. COPYRIGHT

.I. DISCLAIMER

.0. FOREWORD
------------

In this paper I have tried to answer the following questions:

	- What is a denial of service attack?
	- Why would someone crash a system?
	- How can someone crash a system.
	- How do I protect a system against denial of service attacks?
	
I also have a section called SUGGESTED READING were you can find
information about good free information that can give you a deeper
understanding about something.

Note that I have a very limited experience with Macintosh, OS/2 and
Windows and most of the material are therefore for Unix use. 

You can always find the latest version at the following address:
http://www.student.tdb.uu.se/~t95hhu/secure/denial/DENIAL.TXT

Feel free to send comments, tips and so on to address:
t95hhu@student.tdb.uu.se

.A. INTRODUCTION
~~~~~~~~~~~~~~~~

.A.1. WHAT IS A DENIAL OF SERVICE ATTACK?
-----------------------------------------

Denial of service is about without permission knocking off
services, for example through crashing the whole system. This
kind of attacks are easy to launch and it is hard to protect
a system against them. The basic problem is that Unix
assumes that users on the system or on other systems will be
well behaved. 

.A.2. WHY WOULD SOMEONE CRASH A SYSTEM?
---------------------------------------
 
.A.2.1. INTRODUCTION
--------------------

Why would someone crash a system? I can think of several reasons
that I have presentated more precisely in a section for each reason,
but for short:

	.1. Sub-cultural status.
	.2. To gain access.
	.3. Revenge.
	.4. Political reasons.
	.5. Economical reasons.
	.6. Nastiness.

I think that number one and six are the more common today, but that
number four and five will be the more common ones in the future.

.A.2.2. SUB-CULTURAL STATUS
---------------------------

After all information about syn flooding a bunch of such attacks
were launched around Sweden. The very most of these attacks were
not a part of a IP-spoof attack, it was "only" a denial of service
attack. Why? 

I think that hackers attack systems as a sub-cultural pseudo career
and I think that many denial of service attacks, and here in the
example syn flooding, were performed for these reasons. I also think
that many hackers begin their carrer with denial of service attacks.

.A.2.3. TO GAIN ACCESS
----------------------

Sometimes could a denial of service attack be a part of an attack to
gain access at a system. At the moment I can think of these reasons
and specific holes:

	.1. Some older X-lock versions could be crashed with a 
	method from the denial of service family leaving the system
	open. Physical access was needed to use the work space after.

	.2. Syn flooding could be a part of a IP-spoof attack method.

	.3. Some program systems could have holes under the startup, 
	that could be used to gain root, for example SSH (secure shell).

	.4. Under an attack it could be usable to crash other machines
	in the network or to deny certain persons the ability to access 
	the system.  	

	.5. Also could a system being booted sometimes be subverted,
	especially rarp-boots. If we know which port the machine listen
	to (69 could be a good guess) under the boot we can send false
	packets to it and almost totally control the boot.

.A.2.4. REVENGE
---------------

A denial of service attack could be a part of a revenge against a user
or an administrator.

.A.2.5. POLITICAL REASONS
-------------------------

Sooner or later will new or old organizations understand the potential
of destroying computer systems and find tools to do it.

For example imaginate the Bank A loaning company B money to build a
factory threating the environment. The organization C therefor crash A:s
computer system, maybe with help from an employee. The attack could cost
A a great deal of money if the timing is right.

.A.2.6. ECONOMICAL REASONS
--------------------------

Imaginate the small company A moving into a business totally dominated by
company B. A and B customers make the orders by computers and depends
heavily on that the order is done in a specific time (A and B could be
stock trading companies). If A and B can't perform the order the customers
lose money and change company.

As a part of a business strategy A pays a computer expert a sum of money to
get him to crash B:s computer systems a number of times. A year later A
is the dominating company.

.A.2.7. NASTINESS
-----------------

I know a person that found a workstation where the user had forgotten to
logout. He sat down and wrote a program that made a kill -9 -1 at a
random time at least 30 minutes after the login time and placed a call to
the program from the profile file. That is nastiness.

.A.3. ARE SOME OPERATING SYSTEMS MORE SECURE?
---------------------------------------------

This is a hard question to answer and I don't think that it will
give anything to compare different Unix platforms. You can't say that
one Unix is more secure against denial of service, it is all up to the
administrator.

A comparison between Windows 95 and NT on one side and Unix on the
other could however be interesting.

Unix systems are much more complex and have hundreds of built in programs,
services... This always open up many ways to crash the system from
the inside.

In the normal Windows NT and 95 network were is few ways to crash
the system. Although were is methods that always will work.

That gives us that no big different between Microsoft and Unix can
be seen regardning the inside attacks. But there is a couple of
points left:

	- Unix have much more tools and programs to discover an
	attack and monitoring the users. To watch what another user
	is up to under windows is very hard.

	- The average Unix administrator probably also have much more
	experience than the average Microsoft administrator.

The two last points gives that Unix is more secure against inside
denial of service attacks.

A comparison between Microsoft and Unix regarding outside attacks
are much more difficult. However I would like to say that the average
Microsoft system on the Internet are more secure against outside
attacks, because they normally have much less services.

.B. SOME BASIC TARGETS FOR AN ATTACK
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

.B.1. SWAP SPACE
----------------

Most systems have several hundred Mbytes of swap space to 
service client requests. The swap space is typical used
for forked child processes which have a short life time.
The swap space will therefore almost never in a normal
cause be used heavily. A denial of service could be based 
on a method that tries to fill up the swap space.

.B.2. BANDWIDTH
---------------

If the bandwidth is to high the network will be useless. Most
denial of service attack influence the bandwidth in some way.

.B.3. KERNEL TABLES
-------------------

It is trivial to overflow the kernel tables which will cause
serious problems on the system. Systems with write through
caches and small write buffers is especially sensitive.

Kernel memory allocation is also a target that is sensitive.
The kernel have a kernelmap limit, if the system reach this
limit it can not allocate more kernel memory and must be rebooted.
The kernel memory is not only used for RAM, CPU:s, screens and so
on, it it also used for ordinaries processes. Meaning that any system
can be crashed and with a mean (or in some sense good) algorithm pretty
fast.

For Solaris 2.X it is measured and reported with the sar command
how much kernel memory the system is using, but for SunOS 4.X there
is no such command. Meaning that under SunOS 4.X you don't even can
get a warning. If you do use Solaris you should write sar -k 1 to
get the information. netstat -k can also be used and shows how much
memory the kernel have allocated in the subpaging.
 
.B.4. RAM
---------

A denial of service attack that allocates a large amount of RAM
can make a great deal of problems. NFS and mail servers are 
actually extremely sensitive because they do not need much
RAM and therefore often don't have much RAM. An attack at 
a NFS server is trivial. The normal NFS client will do a 
great deal of caching, but a NFS client can be anything 
including the program you wrote yourself...

.B.5. DISKS
-----------

A classic attack is to fill up the hard disk, but an attack at
the disks can be so much more. For example can an overloaded disk
be misused in many ways.

.B.6. CACHES
-------------

A denial of service attack involving caches can be based on a method
to block the cache or to avoid the cache.

These caches are found on Solaris 2.X:

Directory name lookup cache: Associates the name of a file with a vnode.

Inode cache: Cache information read from disk in case it is needed
again.

Rnode cache: Holds information about the NFS filesystem.

Buffer cache: Cache inode indirect blocks and cylinders to realed disk
I/O.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
三级一区在线视频先锋 | 欧美三级三级三级| 免费亚洲电影在线| 亚洲综合精品自拍| 亚洲人成亚洲人成在线观看图片| 精品欧美一区二区在线观看 | 国产欧美一区二区精品性| 日韩一区二区三区高清免费看看| 欧美系列在线观看| 欧美三级资源在线| 成人欧美一区二区三区在线播放| 欧美精品一区二区三| 久久一区二区三区四区| 国产三级精品三级| 蜜桃视频一区二区三区在线观看| 韩国理伦片一区二区三区在线播放 | 欧美肥大bbwbbw高潮| 在线观看一区不卡| 欧美日韩精品一区二区| 欧美一二三在线| 亚洲成人免费电影| 久久99久久精品欧美| 亚洲综合小说图片| aaa国产一区| 欧美自拍偷拍午夜视频| 综合分类小说区另类春色亚洲小说欧美 | 亚洲激情图片qvod| 日韩高清一区二区| 国产91富婆露脸刺激对白| av日韩在线网站| 欧美国产97人人爽人人喊| 亚洲美女免费在线| 一本色道亚洲精品aⅴ| 欧美日韩的一区二区| 亚洲bdsm女犯bdsm网站| 8x8x8国产精品| 国产午夜精品一区二区三区四区| 一区二区三区免费看视频| 美女视频免费一区| 亚洲精品一区二区三区精华液 | eeuss鲁片一区二区三区在线观看| 欧美精品一区二| 国产精品一区二区在线看| 91偷拍与自偷拍精品| 91精品国产入口| 亚洲精品免费视频| 欧美性色综合网| 日韩avvvv在线播放| 欧美岛国在线观看| 亚洲小说欧美激情另类| 成人国产视频在线观看| 日韩精品一区二区三区四区视频| 久久精品国产在热久久| 日本一区二区三区久久久久久久久不 | 91精品国产综合久久蜜臀| 奇米777欧美一区二区| 欧美精品一区二| 色综合久久99| 全国精品久久少妇| 国产欧美va欧美不卡在线| 91天堂素人约啪| 日本特黄久久久高潮| 26uuu欧美| 99re66热这里只有精品3直播| 日韩欧美一二三四区| 成人性生交大片免费看视频在线| 在线视频综合导航| 韩国女主播一区二区三区| 亚洲日本在线a| 欧美一区二区成人6969| 成人激情免费视频| 麻豆91在线看| 一区二区三区中文在线观看| 日韩女优制服丝袜电影| 99国产精品久| 国产麻豆日韩欧美久久| 久久色.com| 欧美日韩免费视频| 成人自拍视频在线| 蜜臀精品久久久久久蜜臀| 国产精品久久三区| 成人av网在线| 麻豆精品久久精品色综合| 亚洲欧美日韩国产中文在线| 久久综合网色—综合色88| 欧美优质美女网站| 成人精品一区二区三区中文字幕 | 日韩免费电影一区| 色欧美乱欧美15图片| 国产成人在线视频网址| 中文乱码免费一区二区| 99久久伊人久久99| 国产精品综合视频| 六月丁香婷婷色狠狠久久| 亚洲一卡二卡三卡四卡无卡久久 | 久久夜色精品国产噜噜av| 欧美日韩欧美一区二区| 99r国产精品| 福利电影一区二区| 国产一区二区不卡| 精品一区精品二区高清| 免费观看在线综合| 五月激情综合网| 欧美精品一区二区三区蜜桃| 欧美一区二区三区性视频| 91高清视频在线| 久久不见久久见免费视频7| 亚洲成人在线网站| 日韩精品欧美精品| 亚洲国产视频网站| 亚洲午夜日本在线观看| 亚洲一区二区视频在线观看| 亚洲女子a中天字幕| **网站欧美大片在线观看| 中文字幕免费观看一区| 日本一区二区成人| 中文字幕中文字幕一区| 国产精品久久久久毛片软件| 国产精品色在线观看| 中文幕一区二区三区久久蜜桃| 欧美激情在线看| 国产精品久99| 亚洲免费成人av| 亚洲大片在线观看| 美国毛片一区二区| 国产精品一区二区三区四区| 国产精品99久| 91伊人久久大香线蕉| 色狠狠色噜噜噜综合网| 欧美日韩另类一区| 日韩欧美激情在线| 国产亚洲一本大道中文在线| 欧美激情一区二区三区不卡| 亚洲女与黑人做爰| 免费观看成人av| 国产不卡免费视频| 日本韩国欧美在线| 欧美一区二视频| 久久蜜臀中文字幕| 欧美一级欧美三级在线观看 | 欧美剧情片在线观看| 欧美电影免费观看高清完整版在线观看 | 亚洲一区二区欧美| 韩国欧美国产一区| 91美女福利视频| 91精品免费在线| 中文字幕不卡三区| 日韩和欧美一区二区三区| 激情偷乱视频一区二区三区| aaa亚洲精品一二三区| 制服丝袜亚洲色图| 欧美国产精品中文字幕| 午夜视频在线观看一区| 成熟亚洲日本毛茸茸凸凹| 欧美亚洲国产怡红院影院| 精品国产91洋老外米糕| 一区二区国产视频| 国产剧情一区在线| 欧美日韩专区在线| 欧美激情艳妇裸体舞| 日韩极品在线观看| 99久久精品国产网站| 欧美一级精品大片| 一区二区三区国产精华| 国产精品亚洲一区二区三区妖精| 在线观看一区二区精品视频| 亚洲国产精品激情在线观看| 日韩精品欧美精品| 色婷婷狠狠综合| 国产喷白浆一区二区三区| 日韩精品乱码免费| 在线观看亚洲精品视频| 中文字幕色av一区二区三区| 久久www免费人成看片高清| 欧美伦理电影网| 自拍偷拍亚洲激情| 国产·精品毛片| 2020国产精品自拍| 日韩精品国产欧美| 欧美日韩视频专区在线播放| 亚洲三级在线观看| 成人h动漫精品一区二区| 精品成a人在线观看| 日本va欧美va瓶| 欧美日韩精品欧美日韩精品| 亚洲青青青在线视频| 波多野结衣视频一区| 久久久99免费| 国产精品白丝jk白祙喷水网站| 日韩一二三区不卡| 日本美女一区二区| 91精品国产综合久久国产大片 | 亚洲精品视频一区二区| 从欧美一区二区三区| 国产欧美日韩在线| 成人午夜精品在线| 国产精品欧美一区喷水| 成人小视频在线观看| 国产精品久久久久久福利一牛影视| 国产成人自拍在线|