亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? cops and robbers-unix system security.txt

?? 黑客培訓(xùn)教程
?? TXT
?? 第 1 頁 / 共 3 頁
字號:
                      COPS and Robbers                    UN*X System Security     In the last few years, computer security has received agreat  deal  more attention than it has in the past.  Compu-terized break-ins and criminal  activity,  once  merely  theproduct  of  the imagination of science fiction writers, hasbecame a fairly common  occurence  in  both  commercial  andacademic  circles.   In this paper, I will go over the prob-lems that face any multiuser computing system, then  discusshow  these  problems  apply  to  UNIX[1]  specifically,  andfinally  present  in  detail  a  suite of programs that weredeveloped in an attempt to address some of the main problemsthat  could  be  solved  via  software.  UNIX, although con-sidered to be a fairly secure operating system  ([Wood  88],[Duff  89], etc), has the advantage of having many publishedworks ([Grampp and Morris 84],  [Bishop  83],  etc)  on  theproblems  that  a computing site can have with security, andin addition, on how a UNIX system administrator  might  makehis/her  system more secure by monitoring various aspects ofhis/her UNIX site.  This, combined with  UNIX's  popularity,make  it  an  ideal target for a software security system tooperate on.     In this report I am not going to discuss specific  waysof  breaking  into a given UNIX machine (for a more detaileddescription on how to compromise UNIX security,  see  either[Baldwin88],  [Bishop83],  [Wood & Kochran 86], or [Grampp &Morris 84]) -- instead, I will concentrate on how to improveand  strengthen  the  potentially good security of a genericUNIX system by means of a software toolkit that examines theweaker  areas  of UNIX that are either traditionally ignored(due to the time constraints  or  ignorance  of  the  systemadministrators) or are simply reoccurring problems that needto be watched over.  In addition, this report is  not  meantfor  UNIX  neophytes -- although a great deal of proficiencyis not needed to read  this  report  and  use  the  programsdescribed  herein, a familiarity with basic UNIX features --the file system and file permission modes for example -- andcommands  such  as awk,grep,sed  as  well  as a workingknowledge of  shell  and  C  programming  are  necessary  to_________________________9  [1] Although originally designed and developed by KenThompson and Dennis Ritchie of AT&T, UNIX has grown farbeyond its' original design and now numerous  companiesmarket their own "flavor" of UNIX.  When I use the termUNIX in this paper, I don't mean merely AT&T's version,but  instead  I  mean  the majority of the most popularvarieties, made by developers at Berkely,  Sun,  and  ahost of other manufacturers.  I believe UNIX is still atrademark of Bell Laboratories.9                     February 19, 1991                           - 2 -understand the internal  workings  of  the  security  systemdescribed in this paper.     Although there is no reasonable way that  all  securityproblems  can  be solved (at least not with a software solu-tion) on any arbitrary UNIX system, administrators and  sys-tem  programs  can  be assisted by a software security tool.The Computer Oracle Password and Security system (COPS) thatwill  be described in this paper is just such a device.  TheCOPS system is a collection of programs  and  shell  scriptsthat  attempt to address as many of these problems as possi-ble in an efficient, portable, and above all in  a  reliableand  safe  way.  The main goal of COPS is one of prevention;it tries to anticipate and eliminate  security  problems  bymaking sure people don't get a chance to compromise securityin the first place.  Alerting the administrators of a poten-tial  intruder  or  that  a virus has infected the system isbeyond the scope of the present system, although  with  workwith  such  capabilities could be added ([Bauer and Koblentz88] and [Duff 89].)     To understand the reason COPS might check any  specificproblem,  a look at computer security problems in general isin order.  The problems listed below are  not  meant  to  beinclusive,  but  they  are indicative of the myriad types ofdilemmas  a  typical   computer   multiuser   system   mightencounter:     1)  Administrators, system  programmers,  and  computeroperators.   The  very  people  that (should) worry the mostabout security are sometimes the ones  that  are  the  leastconcerned.  Carelessness is one of the main culprits; a mis-take by a user might cause little or no  problem,  but  whensomeone  with no restrictions (or almost none) on their com-puter activity makes a mistake, a security hole can  result."I  can  trust  my users" is a fine statement to make -- butcan you trust your users' friends?  How about the  users  ofcomputers  that  are networked to yours?  New software, sys-tems, or procedures can facilitate extra problems; a comput-ing  staff  is  often  ill  or completely non-trained on newtechniques and software.   Too  often  "RTFM"  is  the  onlytraining  that  they  will  ever receive.  Programs that arecreated for in-house use are often  ill-documented  and  notdebugged  thoroughly,  and  when users other than the authorstart to use/abuse the program, problems can result.   Espe-cially  misunderstood,  even by experienced UNIX system pro-grammers, is the SUID program or, worse yet, the SUID  shellscript ([Bishop 83].) When a user says that his/her passwordwas forgotten (or any other account/security  related  prob-lem),  what  checks  are  made  to verify that the person isreally the owner of that account?  Are users that are  secu-rity  problems kept track of, so that repeated abuses of thesystem will result in punitive action?  Does your site  evenhave  a  security  policy?  And of course, the last straw is                     February 19, 1991                           - 3 -that most system administrators simply have too  much  otherwork to do than to constantly check the system for potentialsecurity flaws -- let alone to double-check  that  any  workdone  by  other  system programmers has been done correctly.These are the actions that often get left unsaid and undone.     A UNIX environment has no special defenses against thiskind  of "attack".  Fortunately, a number of these potentialproblems  (unless  catastrophic  in  scope)  are  not   onlycorrectable,  but are easy to detect with a software toolkitsuch as COPS.  Even the most careful UNIX guru will periodi-cally  make  a  mistake;  COPS  has  been designed to aid inher/his never ending battle against the forces of darkness.     2)  Physical security.  This is perhaps the most  frus-trating of all possible problems because it effects all com-puter systems and is often the hardest to safeguard against.Even  if the software is secure, even if the system adminis-trators are alert to potential problems, what happens  if  auser  walks  up to the root console and starts typing?  Doesthe night janitorial staff let anyone into the machine  roomwithout  proper  identification?  Who  has access to the keythat opens up the computing center?  Are terminals that  arelogged on left unguarded or unlocked?  Are passwords writtenon or near a users terminal or desk?   No  software  in  theworld   can  help  against  human  nature  or  carelessness.Reiterating to your staff and users  that  terminals  shouldnot  be  left  alone  or unguarded and that passwords (espe-cially root) should not be typed in front of unfriendly (andin this case, _everyone_ is your enemy) eyes would be a goodstart.  A simple analogy: since you  would  never  give  thekeys  to  the  company car away, why on earth would you giveaway the keys to your computer, which is certainly  worth  ahell  of  a lot more time and money (although it may not getas good mileage on the interstate.)   Common  sense  goes  along ways to help prevent this kind of risk.     3)   Authentication.   What  is  authentication?    Allmodern computing systems that have capabilities for multipleusers have a means of identifying who is using the  computerat  any  given time.  A common means of identification is byusing a password; and since the inception of this idea, poorpasswords have been a perennial problem.  People have a ten-dency to use  their  own  name,  or  their  social  securitynumber,  or  some  other  common word, name, or phrase for apassword.  The problem then arises when an unauthorized userwants to access clandestine information, he/she simply triesone of these simple passwords until a  successful  match  isfound.     Other  problems  with  authentication?   What  computerhosts  are  "trusted"  and  allow users to log in from othermachines without any further authentication?  Are  incorrectlogin   attempts  kept  and/or  monitored  so  as  to  allow                     February 19, 1991                           - 4 -administrators to keep track of any unusual activity?   Whatabout  "Trojan  horses" -- programs that can steal passwordsand the privileges that a user owns -- is there a program ora administrative method that detects a potential 'horse?     Fortunately UNIX systems again have  some  fairly  goodtools  to  aid in this fight.  Although finding simple pass-words is indeed a trivial task, forcing the users on a  sys-tem  to  use  passwords  that  are  harder  to guess is alsotrivial, by either modifying the mechanism  that  gets/givesthe  password  to  the  user,  and/or  by  having the systemadministrators run a simple password detector  periodically,and notifying users if their password is deemed too obvious.The crypt command, although proven  to  be  insecure  for  aknowledgeable and resourceful attacker ([Reed and Weinberger84], [Baldwin 86]), does offer an added shield against  mostunauthorized  users.   Logs  can  be kept of incorrect loginattempts, but as with most security measures, to  be  effec-tive  someone (usually the site administrator) must take thetime to examine the evidence.     4)  Bugs/Features.  Massive software designs  (such  asan  operating system) are usually the result of a team or ofteams of developers working together.   It  only  takes  oneprogrammer to make a mistake, and it will almost always hap-pen.  "Back doors" that  allow  unauthorized  entrances  aresometimes  purposefully  coded  in -- for debugging, mainte-nance, or other reasons.  And there  are  always  unexpectedside effects when thousands of people using the system startdoing strange (stupid?) things.  The best  kind  of  defenseagainst  this  is to report the problems to the developer asthey are discovered, and if possible, to also report  a  wayto fix the problem.  Unfortunately, in many cases the sourcecode is needed to make a bug fix,  and  especially  in  non-academic  areas,  this  is  simply  not available due to theprohibitive costs involved.  Combining this with the  reluc-tance of a (usually) commercial developer to admit any prob-lems with their product, and the end result  is  a  securityhole  that  will not be mended unless some kind of financialloss or gain is at stake -- for the developer  of  the  pro-duct, not yours!     5)  Ignorance.  Users who don't know or care can  be  aproblem  as  well.  Even if someone doesn't care about theirown security, they can  unwittingly  compromise  the  entiresystem   --   especially  if  they  are  a  user  with  highprivileges.  Administrators and  system  operators  are  notimmune to this either, but hopefully are better informed, orat least have access to a means of combating  this  dysfunc-tion.   It  may  also  be due to apathy, an unwillingness tolearn a new system, a lack of time to  explore  all  of  thefeatures  of  a  large system, or simply not enough computersavvy to learn more about a very complex system, and no  onewilling  to teach it to the user.  This problem is much like                     February 19, 1991                           - 5 -illiteracy; it is a never-ending battle that will  never  gocompletely  away.  And while a software toolkit such as COPScan  help  combat  this  problem  by  calling  attention  toneglected  or  misunderstood critical areas, by far and awaythe best weapon against this is education.  An educated userwill simply not make as many mistakes; and while it may seemimpractical to teach _all_ users about (even) the  fundamen-tals  of  computer  security,  think  of  all  the  time andresources wasted tracking down the mistakes that keep recur-ring time and time again.     6)  Unauthorized permissions or privileges.  Are  usersgiven _too much_ freedom?  Do new computer accounts have anydefault security at all, or are the new  users  expected  toknow  what  to do to protect their programs, data, and otherfiles.  System  files,  programs,  and  data  are  sometimesshipped  with  minimal or no protection when gotten straightfrom the manufacturer; someone at the installation site musthave  enough  knowledge to "tune" the system to be effectiveand safe.  Password, memory, and log files especially shouldall be carefully monitored, but unfortunately an experienceduser can often still find out any information they want withperseverance and a little luck.  This is where a system suchas COPS can really shine.  After a new system is configured,some  basic  flaws can be uncovered with just a small amountof effort.  New system problems that  somehow  slip  throughthe cracks of the site installers can be caught and modifiedbefore any serious problems result.   The  key  here  is  toprevent  your system users from getting a denial of computerservice that they need and deserve.  Service could mean any-thing from CPU time, response time, file space, or any othercommodity that a computer has to offer.     7)  Crackers/Hackers/Evil twin brothers.  Not  much  isneeded  on this subject, save to say that they are often notthe main problem.  Professional  evil-users  are  a  rarity;often harmful acts are done by users who "just wanted to seewhat would happen" or had no idea of  the  ramifications  oftheir acts.  Someone who is truly experienced is very diffi-cult to stop, and is certainly  outside  the  realm  of  anysoftware  security  tool  as  discussed in this paper.  For-tunately,  most  evil-doers  are  fairly  inexperienced  andignorant,  and when they make a mistake, a watchful adminis-trator can deal with a problem before it gets out  of  hand.Sometimes  they  can even reveal security problems that werepreviously undiscovered.   COPS  can  help  here  mostly  byreducing  an  attacker's options; the less holes to exploit,the better.     The COPS system attempts to help protect as many of theabove  items  as possible for a generic UNIX system.  In theproper UNIX spirit, instead of having a large  program  thatattempts  to solve every possible problem, it is composed ofseveral small programs that each check one or more potential

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
激情小说欧美图片| 亚洲永久精品国产| 国产精品一区二区x88av| 精品国产凹凸成av人导航| 国产激情一区二区三区| 国产免费久久精品| 色欧美日韩亚洲| 午夜伊人狠狠久久| 久久天堂av综合合色蜜桃网| 福利一区二区在线| 亚洲欧美另类在线| 欧美一区二区三区四区五区| 国产一区二区影院| 亚洲丝袜另类动漫二区| 4hu四虎永久在线影院成人| 精品在线播放免费| 中文字幕欧美一| 777午夜精品视频在线播放| 国产一区二区日韩精品| 亚洲视频一二区| 日韩一区二区不卡| 成人av电影在线播放| 天天爽夜夜爽夜夜爽精品视频| 日韩免费一区二区三区在线播放| 国产激情一区二区三区四区| 一区二区三区不卡视频| 欧美成人a视频| 波多野结衣中文一区| 日韩高清不卡一区二区| 中文一区在线播放| 欧美一卡2卡3卡4卡| 成人爱爱电影网址| 九一久久久久久| 亚洲香肠在线观看| 国产香蕉久久精品综合网| 欧美综合一区二区三区| 高清不卡一区二区| 日韩avvvv在线播放| 中文字幕亚洲不卡| 久久日韩粉嫩一区二区三区| 日本久久一区二区三区| 国产乱码精品一区二区三| 无吗不卡中文字幕| 综合亚洲深深色噜噜狠狠网站| 欧美一二三在线| 欧美午夜精品一区| 99久久精品久久久久久清纯| 久久超碰97人人做人人爱| 亚洲午夜影视影院在线观看| 国产精品毛片大码女人| 精品久久一二三区| 精品视频一区三区九区| 9人人澡人人爽人人精品| 精品一区二区免费在线观看| 亚洲福利视频一区二区| 亚洲精品久久嫩草网站秘色| 国产亚洲一区字幕| 精品国产伦一区二区三区观看方式 | 成人av免费在线播放| 韩国在线一区二区| 美女视频黄 久久| 三级精品在线观看| 天天色 色综合| 亚洲第一av色| 亚洲一二三四区| 一区二区三区中文免费| 国产精品大尺度| 亚洲欧洲av色图| **欧美大码日韩| 成人免费一区二区三区视频| 国产精品女同一区二区三区| 国产亚洲午夜高清国产拍精品| 欧美sm极限捆绑bd| 精品噜噜噜噜久久久久久久久试看 | 日韩成人免费在线| 秋霞电影网一区二区| 日本亚洲天堂网| 麻豆精品久久精品色综合| 青青草国产成人av片免费| 日韩中文字幕区一区有砖一区| 香蕉av福利精品导航| 日韩精品91亚洲二区在线观看| 日日摸夜夜添夜夜添亚洲女人| 天堂在线一区二区| 久久国产精品露脸对白| 国产一区在线视频| 成人午夜碰碰视频| 91在线porny国产在线看| 99久久婷婷国产精品综合| 91免费版在线| 欧美猛男男办公室激情| 日韩午夜在线播放| 国产欧美一区二区精品忘忧草| 亚洲国产精品v| 亚洲激情网站免费观看| 午夜激情一区二区| 久久99精品视频| 不卡影院免费观看| 欧美色视频在线| 日韩免费看的电影| 2014亚洲片线观看视频免费| 国产精品亲子乱子伦xxxx裸| 中文字幕电影一区| 亚洲成人激情综合网| 久久精品久久久精品美女| 懂色av中文一区二区三区| 94色蜜桃网一区二区三区| 欧美日韩精品电影| 久久久久国产精品厨房| 亚洲欧美日韩国产中文在线| 日本亚洲免费观看| 99在线精品一区二区三区| 欧美日韩不卡一区| 久久精品一区蜜桃臀影院| 伊人开心综合网| 精品亚洲porn| 色综合天天天天做夜夜夜夜做| 欧美一区二区三区在线观看| 国产日韩欧美精品一区| 丝瓜av网站精品一区二区| 春色校园综合激情亚洲| 欧美久久一二三四区| 欧美国产日韩一二三区| 亚洲成人激情综合网| 成人av免费观看| 精品国产乱子伦一区| 亚洲香蕉伊在人在线观| 成人一区二区三区| 日韩一区二区三区四区五区六区| 亚洲欧美综合在线精品| 经典三级视频一区| 欧美天天综合网| 亚洲欧洲精品成人久久奇米网| 卡一卡二国产精品| 欧美人xxxx| 自拍偷拍亚洲欧美日韩| 国产大片一区二区| 日韩一区二区中文字幕| 亚洲一区二区三区国产| 成人av在线网站| 久久奇米777| 裸体歌舞表演一区二区| 欧美日韩一区二区在线视频| 亚洲欧洲国产日本综合| 国产91丝袜在线播放九色| 日韩一级免费观看| 亚洲曰韩产成在线| 91九色最新地址| 亚洲色图丝袜美腿| www.亚洲色图.com| 欧美激情一区二区三区蜜桃视频| 韩国精品久久久| 日韩欧美中文字幕公布| 天天影视网天天综合色在线播放| 在线一区二区三区四区五区| 亚洲人成网站影音先锋播放| 国产·精品毛片| 欧美激情一区三区| 成人涩涩免费视频| 中文成人av在线| av电影天堂一区二区在线观看| 久久久五月婷婷| 国产在线精品一区二区夜色| 日韩欧美国产精品| 久久 天天综合| 久久久久久久网| 大白屁股一区二区视频| 日本一区二区免费在线观看视频 | 中文字幕 久热精品 视频在线 | 亚洲图片激情小说| 日本福利一区二区| 亚洲亚洲人成综合网络| 欧美在线视频日韩| 午夜精品福利久久久| 51午夜精品国产| 麻豆精品在线视频| 国产三级欧美三级日产三级99 | 亚洲欧洲综合另类| 日本韩国欧美国产| 日本欧美一区二区在线观看| 日韩精品一区在线观看| 懂色av中文字幕一区二区三区| 国产精品毛片久久久久久久| 色婷婷av一区二区三区gif| 亚洲成人www| 久久在线观看免费| eeuss鲁片一区二区三区在线观看| 亚洲欧美激情插| 欧美情侣在线播放| 国产精品一线二线三线精华| 中文字幕亚洲成人| 91超碰这里只有精品国产| 国产一区二区三区观看| 亚洲欧洲99久久| 这里只有精品99re| 国产91综合一区在线观看| 亚洲乱码日产精品bd| 欧美一区二区三区免费| 国产91综合一区在线观看| 亚洲一区在线播放|