亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲(chóng)蟲(chóng)下載站! | ?? 資源下載 ?? 資源專(zhuān)輯 ?? 關(guān)于我們
? 蟲(chóng)蟲(chóng)下載站

?? cops and robbers-unix system security.txt

?? 黑客培訓(xùn)教程
?? TXT
?? 第 1 頁(yè) / 共 3 頁(yè)
字號(hào):
                      COPS and Robbers                    UN*X System Security     In the last few years, computer security has received agreat  deal  more attention than it has in the past.  Compu-terized break-ins and criminal  activity,  once  merely  theproduct  of  the imagination of science fiction writers, hasbecame a fairly common  occurence  in  both  commercial  andacademic  circles.   In this paper, I will go over the prob-lems that face any multiuser computing system, then  discusshow  these  problems  apply  to  UNIX[1]  specifically,  andfinally  present  in  detail  a  suite of programs that weredeveloped in an attempt to address some of the main problemsthat  could  be  solved  via  software.  UNIX, although con-sidered to be a fairly secure operating system  ([Wood  88],[Duff  89], etc), has the advantage of having many publishedworks ([Grampp and Morris 84],  [Bishop  83],  etc)  on  theproblems  that  a computing site can have with security, andin addition, on how a UNIX system administrator  might  makehis/her  system more secure by monitoring various aspects ofhis/her UNIX site.  This, combined with  UNIX's  popularity,make  it  an  ideal target for a software security system tooperate on.     In this report I am not going to discuss specific  waysof  breaking  into a given UNIX machine (for a more detaileddescription on how to compromise UNIX security,  see  either[Baldwin88],  [Bishop83],  [Wood & Kochran 86], or [Grampp &Morris 84]) -- instead, I will concentrate on how to improveand  strengthen  the  potentially good security of a genericUNIX system by means of a software toolkit that examines theweaker  areas  of UNIX that are either traditionally ignored(due to the time constraints  or  ignorance  of  the  systemadministrators) or are simply reoccurring problems that needto be watched over.  In addition, this report is  not  meantfor  UNIX  neophytes -- although a great deal of proficiencyis not needed to read  this  report  and  use  the  programsdescribed  herein, a familiarity with basic UNIX features --the file system and file permission modes for example -- andcommands  such  as awk,grep,sed  as  well  as a workingknowledge of  shell  and  C  programming  are  necessary  to_________________________9  [1] Although originally designed and developed by KenThompson and Dennis Ritchie of AT&T, UNIX has grown farbeyond its' original design and now numerous  companiesmarket their own "flavor" of UNIX.  When I use the termUNIX in this paper, I don't mean merely AT&T's version,but  instead  I  mean  the majority of the most popularvarieties, made by developers at Berkely,  Sun,  and  ahost of other manufacturers.  I believe UNIX is still atrademark of Bell Laboratories.9                     February 19, 1991                           - 2 -understand the internal  workings  of  the  security  systemdescribed in this paper.     Although there is no reasonable way that  all  securityproblems  can  be solved (at least not with a software solu-tion) on any arbitrary UNIX system, administrators and  sys-tem  programs  can  be assisted by a software security tool.The Computer Oracle Password and Security system (COPS) thatwill  be described in this paper is just such a device.  TheCOPS system is a collection of programs  and  shell  scriptsthat  attempt to address as many of these problems as possi-ble in an efficient, portable, and above all in  a  reliableand  safe  way.  The main goal of COPS is one of prevention;it tries to anticipate and eliminate  security  problems  bymaking sure people don't get a chance to compromise securityin the first place.  Alerting the administrators of a poten-tial  intruder  or  that  a virus has infected the system isbeyond the scope of the present system, although  with  workwith  such  capabilities could be added ([Bauer and Koblentz88] and [Duff 89].)     To understand the reason COPS might check any  specificproblem,  a look at computer security problems in general isin order.  The problems listed below are  not  meant  to  beinclusive,  but  they  are indicative of the myriad types ofdilemmas  a  typical   computer   multiuser   system   mightencounter:     1)  Administrators, system  programmers,  and  computeroperators.   The  very  people  that (should) worry the mostabout security are sometimes the ones  that  are  the  leastconcerned.  Carelessness is one of the main culprits; a mis-take by a user might cause little or no  problem,  but  whensomeone  with no restrictions (or almost none) on their com-puter activity makes a mistake, a security hole can  result."I  can  trust  my users" is a fine statement to make -- butcan you trust your users' friends?  How about the  users  ofcomputers  that  are networked to yours?  New software, sys-tems, or procedures can facilitate extra problems; a comput-ing  staff  is  often  ill  or completely non-trained on newtechniques and software.   Too  often  "RTFM"  is  the  onlytraining  that  they  will  ever receive.  Programs that arecreated for in-house use are often  ill-documented  and  notdebugged  thoroughly,  and  when users other than the authorstart to use/abuse the program, problems can result.   Espe-cially  misunderstood,  even by experienced UNIX system pro-grammers, is the SUID program or, worse yet, the SUID  shellscript ([Bishop 83].) When a user says that his/her passwordwas forgotten (or any other account/security  related  prob-lem),  what  checks  are  made  to verify that the person isreally the owner of that account?  Are users that are  secu-rity  problems kept track of, so that repeated abuses of thesystem will result in punitive action?  Does your site  evenhave  a  security  policy?  And of course, the last straw is                     February 19, 1991                           - 3 -that most system administrators simply have too  much  otherwork to do than to constantly check the system for potentialsecurity flaws -- let alone to double-check  that  any  workdone  by  other  system programmers has been done correctly.These are the actions that often get left unsaid and undone.     A UNIX environment has no special defenses against thiskind  of "attack".  Fortunately, a number of these potentialproblems  (unless  catastrophic  in  scope)  are  not   onlycorrectable,  but are easy to detect with a software toolkitsuch as COPS.  Even the most careful UNIX guru will periodi-cally  make  a  mistake;  COPS  has  been designed to aid inher/his never ending battle against the forces of darkness.     2)  Physical security.  This is perhaps the most  frus-trating of all possible problems because it effects all com-puter systems and is often the hardest to safeguard against.Even  if the software is secure, even if the system adminis-trators are alert to potential problems, what happens  if  auser  walks  up to the root console and starts typing?  Doesthe night janitorial staff let anyone into the machine  roomwithout  proper  identification?  Who  has access to the keythat opens up the computing center?  Are terminals that  arelogged on left unguarded or unlocked?  Are passwords writtenon or near a users terminal or desk?   No  software  in  theworld   can  help  against  human  nature  or  carelessness.Reiterating to your staff and users  that  terminals  shouldnot  be  left  alone  or unguarded and that passwords (espe-cially root) should not be typed in front of unfriendly (andin this case, _everyone_ is your enemy) eyes would be a goodstart.  A simple analogy: since you  would  never  give  thekeys  to  the  company car away, why on earth would you giveaway the keys to your computer, which is certainly  worth  ahell  of  a lot more time and money (although it may not getas good mileage on the interstate.)   Common  sense  goes  along ways to help prevent this kind of risk.     3)   Authentication.   What  is  authentication?    Allmodern computing systems that have capabilities for multipleusers have a means of identifying who is using the  computerat  any  given time.  A common means of identification is byusing a password; and since the inception of this idea, poorpasswords have been a perennial problem.  People have a ten-dency to use  their  own  name,  or  their  social  securitynumber,  or  some  other  common word, name, or phrase for apassword.  The problem then arises when an unauthorized userwants to access clandestine information, he/she simply triesone of these simple passwords until a  successful  match  isfound.     Other  problems  with  authentication?   What  computerhosts  are  "trusted"  and  allow users to log in from othermachines without any further authentication?  Are  incorrectlogin   attempts  kept  and/or  monitored  so  as  to  allow                     February 19, 1991                           - 4 -administrators to keep track of any unusual activity?   Whatabout  "Trojan  horses" -- programs that can steal passwordsand the privileges that a user owns -- is there a program ora administrative method that detects a potential 'horse?     Fortunately UNIX systems again have  some  fairly  goodtools  to  aid in this fight.  Although finding simple pass-words is indeed a trivial task, forcing the users on a  sys-tem  to  use  passwords  that  are  harder  to guess is alsotrivial, by either modifying the mechanism  that  gets/givesthe  password  to  the  user,  and/or  by  having the systemadministrators run a simple password detector  periodically,and notifying users if their password is deemed too obvious.The crypt command, although proven  to  be  insecure  for  aknowledgeable and resourceful attacker ([Reed and Weinberger84], [Baldwin 86]), does offer an added shield against  mostunauthorized  users.   Logs  can  be kept of incorrect loginattempts, but as with most security measures, to  be  effec-tive  someone (usually the site administrator) must take thetime to examine the evidence.     4)  Bugs/Features.  Massive software designs  (such  asan  operating system) are usually the result of a team or ofteams of developers working together.   It  only  takes  oneprogrammer to make a mistake, and it will almost always hap-pen.  "Back doors" that  allow  unauthorized  entrances  aresometimes  purposefully  coded  in -- for debugging, mainte-nance, or other reasons.  And there  are  always  unexpectedside effects when thousands of people using the system startdoing strange (stupid?) things.  The best  kind  of  defenseagainst  this  is to report the problems to the developer asthey are discovered, and if possible, to also report  a  wayto fix the problem.  Unfortunately, in many cases the sourcecode is needed to make a bug fix,  and  especially  in  non-academic  areas,  this  is  simply  not available due to theprohibitive costs involved.  Combining this with the  reluc-tance of a (usually) commercial developer to admit any prob-lems with their product, and the end result  is  a  securityhole  that  will not be mended unless some kind of financialloss or gain is at stake -- for the developer  of  the  pro-duct, not yours!     5)  Ignorance.  Users who don't know or care can  be  aproblem  as  well.  Even if someone doesn't care about theirown security, they can  unwittingly  compromise  the  entiresystem   --   especially  if  they  are  a  user  with  highprivileges.  Administrators and  system  operators  are  notimmune to this either, but hopefully are better informed, orat least have access to a means of combating  this  dysfunc-tion.   It  may  also  be due to apathy, an unwillingness tolearn a new system, a lack of time to  explore  all  of  thefeatures  of  a  large system, or simply not enough computersavvy to learn more about a very complex system, and no  onewilling  to teach it to the user.  This problem is much like                     February 19, 1991                           - 5 -illiteracy; it is a never-ending battle that will  never  gocompletely  away.  And while a software toolkit such as COPScan  help  combat  this  problem  by  calling  attention  toneglected  or  misunderstood critical areas, by far and awaythe best weapon against this is education.  An educated userwill simply not make as many mistakes; and while it may seemimpractical to teach _all_ users about (even) the  fundamen-tals  of  computer  security,  think  of  all  the  time andresources wasted tracking down the mistakes that keep recur-ring time and time again.     6)  Unauthorized permissions or privileges.  Are  usersgiven _too much_ freedom?  Do new computer accounts have anydefault security at all, or are the new  users  expected  toknow  what  to do to protect their programs, data, and otherfiles.  System  files,  programs,  and  data  are  sometimesshipped  with  minimal or no protection when gotten straightfrom the manufacturer; someone at the installation site musthave  enough  knowledge to "tune" the system to be effectiveand safe.  Password, memory, and log files especially shouldall be carefully monitored, but unfortunately an experienceduser can often still find out any information they want withperseverance and a little luck.  This is where a system suchas COPS can really shine.  After a new system is configured,some  basic  flaws can be uncovered with just a small amountof effort.  New system problems that  somehow  slip  throughthe cracks of the site installers can be caught and modifiedbefore any serious problems result.   The  key  here  is  toprevent  your system users from getting a denial of computerservice that they need and deserve.  Service could mean any-thing from CPU time, response time, file space, or any othercommodity that a computer has to offer.     7)  Crackers/Hackers/Evil twin brothers.  Not  much  isneeded  on this subject, save to say that they are often notthe main problem.  Professional  evil-users  are  a  rarity;often harmful acts are done by users who "just wanted to seewhat would happen" or had no idea of  the  ramifications  oftheir acts.  Someone who is truly experienced is very diffi-cult to stop, and is certainly  outside  the  realm  of  anysoftware  security  tool  as  discussed in this paper.  For-tunately,  most  evil-doers  are  fairly  inexperienced  andignorant,  and when they make a mistake, a watchful adminis-trator can deal with a problem before it gets out  of  hand.Sometimes  they  can even reveal security problems that werepreviously undiscovered.   COPS  can  help  here  mostly  byreducing  an  attacker's options; the less holes to exploit,the better.     The COPS system attempts to help protect as many of theabove  items  as possible for a generic UNIX system.  In theproper UNIX spirit, instead of having a large  program  thatattempts  to solve every possible problem, it is composed ofseveral small programs that each check one or more potential

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
激情综合亚洲精品| 7777精品伊人久久久大香线蕉| 免费人成黄页网站在线一区二区| 亚洲美女免费视频| 亚洲欧洲无码一区二区三区| 国产亚洲精品超碰| 国产欧美日韩另类视频免费观看| 2023国产精品视频| 国产三级精品三级在线专区| 久久日韩粉嫩一区二区三区 | 不卡视频在线看| 日韩一区欧美二区| 青青草原综合久久大伊人精品| 亚洲第一二三四区| 日韩av一区二区三区四区| 日本特黄久久久高潮| 久久国产麻豆精品| 国产成人精品综合在线观看 | www激情久久| 国产午夜精品福利| 中文字幕一区av| 亚洲欧洲中文日韩久久av乱码| 亚洲精品水蜜桃| 午夜激情一区二区| 蜜臂av日日欢夜夜爽一区| 国内精品不卡在线| 国产成人精品三级| 一本一道综合狠狠老| 欧美色老头old∨ideo| 777奇米四色成人影色区| 日韩欧美一级精品久久| 国产午夜亚洲精品理论片色戒| 国产欧美一区二区精品忘忧草| 中文字幕一区视频| 午夜视频在线观看一区二区| 奇米777欧美一区二区| 国产永久精品大片wwwapp| 成人毛片视频在线观看| 欧美色图片你懂的| 欧美岛国在线观看| √…a在线天堂一区| 亚洲成av人片一区二区梦乃| 精品一区二区三区影院在线午夜| 粗大黑人巨茎大战欧美成人| 在线亚洲一区观看| 久久久.com| 亚洲自拍都市欧美小说| 黑人精品欧美一区二区蜜桃| 91蜜桃免费观看视频| 91精品国产色综合久久不卡蜜臀| 国产午夜久久久久| 亚洲网友自拍偷拍| 丁香六月综合激情| 88在线观看91蜜桃国自产| 国产欧美一区二区精品婷婷| 午夜精品久久久久久久久| 国产91丝袜在线观看| 欧美日韩免费视频| 国产精品每日更新| 美国十次了思思久久精品导航| 99久久国产综合精品女不卡| 日韩女优电影在线观看| 夜色激情一区二区| 国产成人综合自拍| 欧美美女一区二区在线观看| 中文字幕中文字幕在线一区 | 一区二区高清视频在线观看| 久久精品久久久精品美女| 99久久精品国产网站| 精品人在线二区三区| 亚洲一区二区欧美日韩| 成人国产电影网| 精品av综合导航| 亚洲精品国产无套在线观| 国产91精品一区二区麻豆网站| 777久久久精品| 亚洲在线视频一区| 99精品视频中文字幕| 亚洲精品一区二区三区精华液 | 亚洲欧美国产高清| 国产成人免费在线视频| 日韩精品资源二区在线| 亚洲国产精品一区二区尤物区| gogogo免费视频观看亚洲一| 久久久精品综合| 精品亚洲免费视频| 欧美乱妇15p| 一区二区三区不卡在线观看| 成人精品免费看| 国产欧美一区二区精品婷婷| 国产综合色视频| 日韩欧美在线影院| 奇米精品一区二区三区在线观看| 欧美日免费三级在线| 一区二区三区在线播放| jizzjizzjizz欧美| 国产精品沙发午睡系列990531| 国产主播一区二区三区| 精品久久久三级丝袜| 狠狠色伊人亚洲综合成人| 欧美成人乱码一区二区三区| 伦理电影国产精品| 日韩视频在线观看一区二区| 中文字幕一区在线| 91女厕偷拍女厕偷拍高清| 国产精品久久久久久久岛一牛影视 | 日韩—二三区免费观看av| 欧美日韩黄视频| 日韩精品一二三区| 精品久久久久久久久久久久久久久| 免费av网站大全久久| 日韩欧美成人午夜| 精品亚洲国内自在自线福利| 久久久久久久久久美女| 国产精品影音先锋| 国产精品视频观看| 色悠久久久久综合欧美99| 夜夜亚洲天天久久| 69堂精品视频| 精品一区二区三区视频| 久久在线观看免费| av在线播放一区二区三区| 欧美—级在线免费片| 色综合久久天天综合网| 午夜精品久久久久久久蜜桃app| 538在线一区二区精品国产| 另类成人小视频在线| 亚洲精品一区二区三区精华液| 国产精品996| 亚洲黄色免费电影| 91精品国产欧美日韩| 国产原创一区二区| 最新不卡av在线| 欧美精品一二三四| 狠狠网亚洲精品| 亚洲视频在线观看一区| 欧美精品1区2区3区| 国产在线麻豆精品观看| 国产精品久久久久久久久免费丝袜| 一本色道综合亚洲| 日本特黄久久久高潮| 国产欧美精品一区| 欧美日韩精品一区二区在线播放| 久久99九九99精品| 国产精品伦理一区二区| 欧美日韩中字一区| 精品午夜一区二区三区在线观看 | 国产一区三区三区| 亚洲伦理在线免费看| 日韩欧美国产一区二区三区| 国产成人超碰人人澡人人澡| 樱桃国产成人精品视频| 日韩欧美中文一区二区| 91香蕉视频mp4| 久久99精品国产麻豆不卡| 亚洲欧美色图小说| 久久久久久久久久看片| 欧美系列日韩一区| 福利一区二区在线| 日韩成人一级片| 亚洲私人黄色宅男| 精品国产免费人成在线观看| 色吊一区二区三区| 久久爱www久久做| 一级日本不卡的影视| 国产日韩欧美不卡在线| 51精品久久久久久久蜜臀| 国产91精品久久久久久久网曝门 | 色婷婷综合在线| 久久精品国产99久久6| 亚洲免费观看高清在线观看| 久久久www成人免费毛片麻豆| 在线电影国产精品| 色综合色狠狠天天综合色| 国产精品一区二区视频| 日本aⅴ精品一区二区三区| 一区二区三区不卡视频| 国产精品久久影院| 欧美精品一区二区久久久| 欧美色涩在线第一页| 色婷婷久久一区二区三区麻豆| 国产成a人无v码亚洲福利| 久久精品国产免费| 男人的天堂久久精品| 午夜伊人狠狠久久| 亚洲大片在线观看| 亚洲综合在线第一页| 亚洲人快播电影网| 国产精品沙发午睡系列990531| 久久久久久久国产精品影院| 精品国产电影一区二区| 欧美一区三区四区| 91精品国产高清一区二区三区蜜臀| 精品污污网站免费看| 欧美在线观看18| 欧美做爰猛烈大尺度电影无法无天| 色域天天综合网| 色婷婷综合久久久久中文| 色噜噜久久综合| 色视频欧美一区二区三区|