亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? introduction to denial of service.txt

?? 黑客培訓教程
?? TXT
?? 第 1 頁 / 共 4 頁
字號:

.B.7. INETD
-----------

Well once inetd crashed all other services running through inetd no
longer will work.


.C. ATTACKING FROM THE OUTSIDE
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


.C.1. TAKING ADVANTAGE OF FINGER
--------------------------------

Most fingerd installations support redirections to an other host.

Ex:

	$finger @system.two.com@system.one.com

finger will in the example go through system.one.com and on to
system.two.com. As far as system.two.com knows it is system.one.com
who is fingering. So this method can be used for hiding, but also
for a very dirty denial of service attack. Lock at this:

	$ finger @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@host.we.attack

All those @ signs will get finger to finger host.we.attack again and
again and again... The effect on host.we.attack is powerful and
the result is high bandwidth, short free memory and a hard disk with
less free space, due to all child processes (compare with .D.5.).

The solution is to install a fingerd which don't support redirections,
for example GNU finger. You could also turn the finger service off,
but I think that is just a bit to much.

.C.2. UDP AND SUNOS 4.1.3.
--------------------------

SunOS 4.1.3. is known to boot if a packet with incorrect information
in the header is sent to it. This is the cause if the ip_options
indicate a wrong size of the packet.

The solution is to install the proper patch.

.C.3. FREEZING UP X-WINDOWS
---------------------------

If a host accepts a telnet session to the X-Windows port (generally
somewhere between 6000 and 6025. In most cases 6000) could that
be used to freeze up the X-Windows system. This can be made with
multiple telnet connections to the port or with a program which
sends multiple XOpenDisplay() to the port.

The same thing can happen to Motif or Open Windows.

The solution is to deny connections to the X-Windows port.

.C.4. MALICIOUS USE OF UDP SERVICES
-----------------------------------

It is simple to get UDP services (echo, time, daytime, chargen) to 
loop, due to trivial IP-spoofing. The effect can be high bandwidth 
that causes the network to become useless. In the example the header 
claim that the packet came from 127.0.0.1 (loopback) and the target 
is the echo port at system.we.attack. As far as system.we.attack knows 
is 127.0.0.1 system.we.attack and the loop has been establish. 

Ex:

	from-IP=127.0.0.1
	to-IP=system.we.attack
	Packet type:UDP
	from UDP port 7
	to UDP port 7

Note that the name system.we.attack looks like a DNS-name, but the
target should always be represented by the IP-number.

Quoted from proberts@clark.net (Paul D. Robertson) comment on
comp.security.firewalls on matter of "Introduction to denial of service"
 
	" A great deal of systems don't put loopback on the wire, and simply
	emulate it.  Therefore, this attack will only effect that machine 
	in some cases.  It's much better to use the address of a different 
	machine on the same network.  Again, the default services should 
	be disabled in inetd.conf.  Other than some hacks for mainframe IP 
	stacks that don't support ICMP, the echo service isn't used by many 
	legitimate programs, and TCP echo should be used instead of UDP 
	where it is necessary. "

.C.5. ATTACKING WITH LYNX CLIENTS
---------------------------------

A World Wide Web server will fork an httpd process as a respond
to a request from a client, typical Netscape or Mosaic. The process
lasts for less than one second and the load will therefore never
show up if someone uses ps. In most causes it is therefore very
safe to launch a denial of service attack that makes use of 
multiple W3 clients, typical lynx clients. But note that the netstat
command could be used to detect the attack (thanks to Paul D. Robertson).

Some httpd:s (for example http-gw) will have problems besides the normal
high bandwidth, low memory... And the attack can in those causes get
the server to loop (compare with .C.6.)

.C.6. MALICIOUS USE OF telnet
-----------------------------

Study this little script:

Ex:

	while : ; do
	telnet system.we.attack &
	done

An attack using this script might eat some bandwidth, but it is
nothing compared to the finger method or most other methods. Well
the point is that some pretty common firewalls and httpd:s thinks
that the attack is a loop and turn them self down, until the
administrator sends kill -HUP. 

This is a simple high risk vulnerability that should be checked
and if present fixed.

.C.7. MALICIOUS USE OF telnet UNDER SOLARIS 2.4
-----------------------------------------------

If the attacker makes a telnet connections to the Solaris 2.4 host and
quits using:

Ex:

	Control-}
	quit

then will inetd keep going "forever". Well a couple of hundred...

The solution is to install the proper patch.

.C.8. HOW TO DISABLE ACCOUNTS
-----------------------------

Some systems disable an account after N number of bad logins, or waits
N seconds. You can use this feature to lock out specific users from
the system.

.C.9. LINUX AND TCP TIME, DAYTIME
----------------------------------

Inetd under Linux is known to crash if to many SYN packets sends to
daytime (port 13) and/or time (port 37).

The solution is to install the proper patch.

.C.10. HOW TO DISABLE SERVICES
------------------------------

Most Unix systems disable a service after N sessions have been
open in a given time. Well most systems have a reasonable default
(lets say 800 - 1000), but not some SunOS systems that have the
default set to 48...

The solutions is to set the number to something reasonable.

.C.11. PARAGON OS BETA R1.4
---------------------------

If someone redirects an ICMP (Internet Control Message Protocol) packet
to a paragon OS beta R1.4 will the machine freeze up and must be
rebooted. An ICMP redirect tells the system to override routing
tables. Routers use this to tell the host that it is sending
to the wrong router. 

The solution is to install the proper patch.

.C.12. NOVELLS NETWARE FTP
--------------------------

Novells Netware FTP server is known to get short of memory if multiple
ftp sessions connects to it.

.C.13. ICMP REDIRECT ATTACKS
----------------------------

Gateways uses ICMP redirect to tell the system to override routing
tables, that is telling the system to take a better way. To be able
to misuse ICMP redirection we must know an existing connection
(well we could make one for ourself, but there is not much use for that). 
If we have found a connection we can send a route that
loses it connectivity or we could send false messages to the host
if the connection we have found don't use cryptation.  

Ex: (false messages to send)

	DESTINATION UNREACHABLE 
	TIME TO LIVE EXCEEDED
	PARAMETER PROBLEM
	PACKET TOO BIG

The effect of such messages is a reset of the connection.

The solution could be to turn ICMP redirects off, not much proper use
of the service.

.C.14. BROADCAST STORMS
-----------------------

This is a very popular method in networks there all of the hosts are
acting as gateways. 

There are many versions of the attack, but the basic method is to 
send a lot of packets to all hosts in the network with a destination 
that don't exist. Each host will try to forward each packet so 
the packets will bounce around for a long time. And if new packets 
keep coming the network will soon be in trouble.

Services that can be misused as tools in this kind of attack is for
example ping, finger and sendmail. But most services can be misused
in some way or another.

.C.15. EMAIL BOMBING AND SPAMMING
---------------------------------

In a email bombing attack the attacker will repeatedly send identical
email messages to an address. The effect on the target is high bandwidth,
a hard disk with less space and so on... Email spamming is about sending
mail to all (or rather many) of the users of a system. The point of
using spamming instead of bombing is that some users will try to
send a replay and if the address is false will the mail bounce back. In
that cause have one mail transformed to three mails. The effect on the
bandwidth is obvious.

There is no way to prevent email bombing or spamming. However have
a look at CERT:s paper "Email bombing and spamming".

.C.16. TIME AND KERBEROS
------------------------

If not the the source and target machine is closely aligned will the
ticket be rejected, that means that if not the protocol that set the 
time is protected it will be possible to set a kerberos server of
function.

.C.17. THE DOT DOT BUG
----------------------

Windows NT file sharing system is vulnerable to the under Windows 95
famous dot dot bug (dot dot like ..). Meaning that anyone can crash
the system. If someone sends a "DIR ..\" to the workstation will a
STOP messages appear on the screen on the Windows NT computer. Note that
it applies to version 3.50 and 3.51 for both workstation and server
version.

The solution is to install the proper patch.

.C.18. SUNOS KERNEL PANIC
-------------------------

Some SunOS systems (running TIS?) will get a kernel panic if a
getsockopt() is done after that a connection has been reset.

The solution could be to install Sun patch 100804.

.C.19. HOSTILE APPLETS
----------------------

A hostile applet is any applet that attempts to use your system
in an inappropriate manner. The problems in the java language
could be sorted in two main groups:

	1) Problems due to bugs.
	2) Problems due to features in the language.

In group one we have for example the java bytecode verifier bug, which
makes is possible for an applet to execute any command that the user
can execute. Meaning that all the attack methods described in .D.X. 
could be executed through an applet. The java bytecode verifier bug
was discovered in late March 1996 and no patch have yet been available
(correct me if I'am wrong!!!).

Note that two other bugs could be found in group one, but they
are both fixed in Netscape 2.01 and JDK 1.0.1.

Group two are more interesting and one large problem found is the
fact that java can connect to the ports. Meaning that all the methods
described in .C.X. can be performed by an applet. More information
and examples could be found at address:
	
	http://www.math.gatech.edu/~mladue/HostileArticle.html

If you need a high level of security you should use some sort of
firewall for protection against java. As a user you could have
java disable. 

.C.20. VIRUS
------------

Computer virus is written for the purpose of spreading and
destroying systems. Virus is still the most common and famous
denial of service attack method.

It is a misunderstanding that virus writing is hard. If you know
assembly language and have source code for a couple of virus it
is easy. Several automatic toolkits for virus construction could
also be found, for example:
	
	* Genvir.
	* VCS (Virus Construction Set).
	* VCL (Virus Construction Laboratory).
	* PS-MPC (Phalcon/Skism - Mass Produced Code Generator).
	* IVP (Instant Virus Production Kit).
	* G2 (G Squared).

PS-MPC and VCL is known to be the best and can help the novice programmer
to learn how to write virus.

An automatic tool called MtE could also be found. MtE will transform
virus to a polymorphic virus. The polymorphic engine of MtE is well
known and should easily be catch by any scanner.

.C.21. ANONYMOUS FTP ABUSE
--------------------------

If an anonymous FTP archive have a writable area it could be misused
for a denial of service attack similar with with .D.3. That is we can
fill up the hard disk.

Also can a host get temporarily unusable by massive numbers of
FTP requests.

For more information on how to protect an anonymous FTP site could
CERT:s "Anonymous FTP Abuses" be a good start.

.C.22. SYN FLOODING
-------------------

Both 2600 and Phrack have posted information about the syn flooding attack.
2600 have also posted exploit code for the attack. 

As we know the syn packet is used in the 3-way handshake. The syn flooding
attack is based on an incomplete handshake. That is the attacker host
will send a flood of syn packet but will not respond with an ACK packet.
The TCP/IP stack will wait a certain amount of time before dropping
the connection, a syn flooding attack will therefore keep the syn_received 
connection queue of the target machine filled.

The syn flooding attack is very hot and it is easy to find more information
about it, for example:

	[.1.] http://www.eecs.nwu.edu/~jmyers/bugtraq/1354.html
	Article by Christopher Klaus, including a "solution". 
	

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
美女任你摸久久| 日韩一区二区在线观看视频| 欧美日韩成人综合| 中文字幕精品—区二区四季| 视频一区视频二区中文| 91视视频在线直接观看在线看网页在线看| 在线电影国产精品| 亚洲美女区一区| 国产成人综合自拍| 欧美精品第1页| 亚洲视频一二三区| 岛国精品在线观看| 精品免费国产一区二区三区四区| 亚洲一区二区三区中文字幕在线| 国产91精品一区二区| www激情久久| 久久精品国产99| 在线观看亚洲成人| 亚洲欧美二区三区| 99久久综合国产精品| 久久先锋资源网| 美女视频第一区二区三区免费观看网站| 在线免费不卡电影| 亚洲裸体xxx| 一本色道久久综合亚洲精品按摩| 国产精品久久久久久久久搜平片 | jiyouzz国产精品久久| 精品久久久久久无| 久久99久久精品欧美| 欧美va亚洲va| 激情成人午夜视频| 亚洲精品一区二区在线观看| 韩国精品久久久| 欧美精品一区二区久久婷婷| 久久www免费人成看片高清| 日韩三级免费观看| 国产在线视频一区二区| 精品国精品国产| 国产精品一区二区三区乱码| 国产精品美女久久久久久久久久久 | 欧美一二三区在线| 美女www一区二区| 久久久亚洲国产美女国产盗摄 | 色94色欧美sute亚洲13| 亚洲一区二区综合| 这里只有精品电影| 韩国精品在线观看| 国产精品高潮久久久久无| 91尤物视频在线观看| 亚洲资源中文字幕| 日韩欧美aaaaaa| 国产麻豆成人精品| 亚洲伦理在线精品| 欧美一级在线免费| 成人毛片视频在线观看| 一区二区三区四区乱视频| 欧美一区二区二区| 成人精品一区二区三区中文字幕| 一区二区三区在线视频观看| 91麻豆精品国产91久久久资源速度 | 午夜成人在线视频| 精品嫩草影院久久| 色综合中文综合网| 91久久香蕉国产日韩欧美9色| 偷拍自拍另类欧美| 久久综合九色综合97婷婷女人| 99精品欧美一区二区蜜桃免费| 亚洲成人高清在线| 久久久久久久久久久黄色| 在线免费精品视频| 国产成人精品影院| 亚洲午夜久久久久久久久久久| 日韩亚洲欧美成人一区| 懂色av一区二区在线播放| 亚洲国产wwwccc36天堂| 中文av一区二区| 日韩精品一区二区三区在线 | 国产成人av影院| 亚洲成av人片在线观看无码| 国产欧美日韩在线视频| 欧美日韩免费观看一区二区三区| 国产成人精品网址| 日本怡春院一区二区| 亚洲美女屁股眼交| 中文字幕欧美日韩一区| 欧美成人精品福利| 欧美疯狂做受xxxx富婆| 94-欧美-setu| 国产91对白在线观看九色| 欧美va天堂va视频va在线| 国产欧美一区二区在线观看| 在线视频国内一区二区| 成人性视频免费网站| 日韩精品成人一区二区三区| 国产精品美女www爽爽爽| 欧美大胆人体bbbb| 欧美日韩国产不卡| 91视视频在线直接观看在线看网页在线看 | 国产精品视频观看| 国产亚洲综合在线| 337p粉嫩大胆噜噜噜噜噜91av| 69堂成人精品免费视频| 在线免费观看日本一区| 欧美亚洲综合色| 99视频在线精品| 丰满岳乱妇一区二区三区| 美女视频免费一区| 美女尤物国产一区| 免费观看30秒视频久久| 日韩成人免费在线| 婷婷久久综合九色国产成人| 午夜精品123| 午夜精品影院在线观看| 亚洲成av人片一区二区梦乃| 午夜精品福利一区二区三区av| 亚洲狠狠爱一区二区三区| 亚洲一区在线看| 亚洲成人中文在线| 日本午夜精品视频在线观看| 日韩精品免费视频人成| 免费不卡在线观看| 精品一区二区三区免费观看| 麻豆国产一区二区| 国产高清精品网站| 成人午夜av电影| 色综合天天在线| 欧美日韩国产一级片| 4438x成人网最大色成网站| 精品少妇一区二区三区在线视频| 欧美一级xxx| 国产日产欧产精品推荐色| 中文字幕在线不卡一区二区三区| 亚洲欧美综合色| 午夜视频在线观看一区二区| 男人的j进女人的j一区| 国产一区二区伦理| 97se亚洲国产综合自在线不卡| 色爱区综合激月婷婷| 欧美一区二区三区免费观看视频| 精品国产99国产精品| 欧美韩国一区二区| 亚洲自拍偷拍av| 久久国产精品无码网站| av在线播放不卡| 欧美高清精品3d| 日本一区二区视频在线| 午夜影院在线观看欧美| 国产精品一二二区| 欧美日韩国产综合久久| 精品卡一卡二卡三卡四在线| 最新成人av在线| 蜜臀久久99精品久久久画质超高清| 国产精品77777| 欧美在线看片a免费观看| 国产精品久久久久久妇女6080| 一区二区三区**美女毛片| 理论片日本一区| 99视频超级精品| 精品免费视频.| 亚洲图片欧美综合| 国产aⅴ综合色| 欧美大片一区二区| 亚洲色欲色欲www| 国产一区二区精品久久99| 欧美日韩精品一区二区三区| 中文字幕国产一区| 激情综合网最新| 欧美系列在线观看| 中文字幕一区免费在线观看| 久久精品国产精品亚洲精品| 色中色一区二区| 国产日本一区二区| 久久精品99国产精品日本| 欧美最新大片在线看| 欧美国产97人人爽人人喊| 久久99精品国产.久久久久久 | 99精品国产视频| 久久―日本道色综合久久| 日韩av午夜在线观看| 欧洲一区二区av| 综合电影一区二区三区 | 日韩激情av在线| 欧美性做爰猛烈叫床潮| 亚洲欧洲精品天堂一级| 国产成人精品午夜视频免费| 精品久久免费看| 麻豆freexxxx性91精品| 欧美成人精品1314www| 香蕉成人啪国产精品视频综合网| 国产精品18久久久久久久久久久久| 欧美午夜宅男影院| 一区二区三区鲁丝不卡| 白白色亚洲国产精品| 久久免费美女视频| 美女视频免费一区| 日韩三级高清在线| 蜜臀av一级做a爰片久久| 欧美久久一二三四区| 奇米影视一区二区三区| 欧美福利一区二区|