亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? cops and robbers-unix system security.txt

?? 黑客培訓教程
?? TXT
?? 第 1 頁 / 共 3 頁
字號:
                     February 19, 1991                           - 6 -UNIX  security  holes.   The  COPS  system uses a variety ofthese problems to see if there are any  cracks  in  a  givenUNIX security wall.  These methods correspond to some of theproblems discussed above;  specifically  to  administrators,system  programmers, and computer operators; authentication;ignorance;  unauthorized  permissions  or  privileges;   andfinally  crackers/hackers/evil twin brothers (numbers 1,3,5,and 6.)  It is very difficult, almost a  practical  impossi-bility  to  give software assistance to problems in physicalsecurity, and finally bugs or features that are present in agiven  UNIX  system  are  possible  to  detect,  but are notcovered in this system (yet).  The design of most of the theprograms  were  at  least described if not outlined from thefollowing sources:Aho, Kernighan, and Weinberger 88Baldwin 87Fiedler and Hunter 86Grampp and Morris 84Wood and Kochran 86     Of course with all of the problems listed below,  look-ing  at  the  actual  source  code  of  the  program is veryinstructive -- each numbered section lists the correspondingprogram that is used to perform the check:     1)  COPS Checks "vital" system directories  to  see  ifthey are world-writable.  Directories listed as critical arein a configuration file and are initially:/ /etc /usr/bin /Mail /usr/spool/usr/adm /usr/etc /usr/lib/usr/bin /usr/etc /usr/spool/mail/usr/spool/uucp /usr/spool/at     The method COPS uses to detect problems -- read througha  configuration  file  (dir.chklst)  containing  all of thepotential danger  spots,  and  then  simply  comparing  eachdirectory  modes with a bit mask to see if it is world writ-able.  The program that performs this task is dir.chk     2)  Check "vital" system  files  to  see  if  they  areworld-writable.   Files  listed  as critical are in a confi-guration file (file.chklst) and are initially:                     February 19, 1991                           - 7 -/.*/etc/*/bin/*/usr/etc/yp*/usr/lib/crontab /usr/lib/aliases /usr/lib/sendmailThe wildcards are used like in UNIX, so these would  include(some of the more important files):/.login /.profile /.cshrc /.crontab /.rhost/etc/passwd /etc/group /etc/inittab /etc/rc/etc/rc.local /etc/rc.boot /etc/hosts.equiv /etc/profile/etc/syslog.conf /etc/exportAs well as the executable command files (among others):sh,csh, and ls.     Method -- again read through a configuration file list-ing  all  of the files to be checked, comparing each in turnwith a write mask.  The program that performs this  task  isfile.chk     3)  Check "vital" system  files  to  see  if  they  areworld-readable,  plus  check  for  a NFS file system with norestriction.  These critical files are:/dev/kmem /dev/memAll file systems found in /etc/fstabPlus a small number of user selectable  files  --  initiallyset to include /.netrc, /usr/adm/sulog, and /etc/btmp.Method -- checking each in turn  against  a  read  mask  fortheir  read  status.   The  file  system names are read from/etc/fstab, the selectable files are  kept  in  a  variable.The program that performs this task is dev.chk     4)  Check all files in system for SUID status,  notify-ing the COPS user of any changes in SUID status.Method -- Use the "find" command on the root directory (thismust  be  done by root to avoid missing any files unreadablebut still dangerous.) The previous run will  create  a  file                     February 19, 1991                           - 8 -that can be checked against the current run to keep track ofchanges in SUID status and any new SUID files.  The  programthat performs this task is suid.chk and was written by Pren-tiss Riddle.     5)  Check the /etc/passwd file (and  the  yellow  pagespassword   database,  if  applicable)  for  null  passwords,improper #  of  fields,  non-unique  user-id's,  non-numericgroup id's, blank lines, and non-alphanumeric user-id's.Method -- Read through password file, flag  any  differenceswith  normal password file, as documented in "man 5 passwd".Fortunately, the syntax of the password file  is  relativelysimple  and  rigid.  The  program that performs this task ispasswd.chk     6)  Check the /etc/group file  (and  the  yellow  pagesdatabase, if applicable) for groups with passwords, improper# of fields, duplicate users in  groups,  blank  lines,  andnon-unique group-id's.Method -- Read through group file, flag any differences withnormal  group  file  as documented in "man 5 group".  Again,the syntax of this file is fairly simple.  The program  thatperforms this task is group.chk     7)  Check passwords of users on system.Method -- using  the  stock  "crypt"  command,  compare  theencrypted password found in the /etc/passwd file against thefollowing (encrypted) guesses:The login id (uid), information in the gecos field, and  allsingle letter passwords.The program that performs this  task  is  pass.chk  and  waswritten  by  Craig  Leres  and  was modified by Seth Alford,Roger Southwick, Steve Dum, and Rick Lindsley.     8)  Check the root path,  umask,  and  if  root  is  in/etc/ftpuser.Method -- look inside the /.profile  and  /.cshrc  files  toensure  that  all  of  the  directories listed are not worldwritable, that "." isn't anywhere in the path, and that  theumask  is  not set to create world writable files.  The pro-gram that performs this task is root.chk     9)  Examine the commands in  /etc/rc*  to  ensure  thatnone of the files or paths used are world-writable.Method -- grep through the files  and  examine  any  stringsthat  start  with  "/"  for  writability.   The program that                     February 19, 1991                           - 9 -performs this task is rc.chk     10)  Examine the commands in /usr/lib/crontab to ensurethat none of the files or paths used are world-writable.Method -- grep through the  crontab  file  and  examine  anystrings  after field five (first five are not files, but howcrontab is to be run) that start with "/"  for  writability.The  program  that performs this task is cron.chk 11)  Checkall of the user home directories  to  ensure  they  are  notworld writable.Method -- get all of the home directories using  the  systemcall  getpwent()  and  then  for every home directory found,check the write permissions of of the home directory againsta bit mask.  The program that performs this task is home.chkand it was written by John Owens.     12) Check important user files in  user's  home  direc-tories  to  ensure  they  are not world writable.  The fileschecked (all in the individual users'  home  directory,  allwith the prefix "."):rhost profile login cshrc kshrc tcshr crhostnetrc forward dbxinit distfile exrc emacsrcMethod -- using the same system call as #10, determine  userhome  directory.   Then  simply check all of the above filesagainst a bit mask.  The program that performs this task  isuser.chk     13) Given a goal to compromise, such as user root,  anda list of user and group id's that can be used in an attemptto achieve the goal, this security tool will search  throughthe  system until it verifies that the goal is compromisibleor not.  The program that performs this tricky task is  partof the U-Kuang (rhymes with "twang") system.  Robert Baldwinwas kind enough to allow me to include this security checker(a fine security machine in it's own right) within this dis-tribution.  For more information on this  fascinating  secu-rity  checker,  see  kuang.man.ms  and [Baldwin 87].  I haverewritten it in Bourne shell (it was in C-Shell) for furtherportability.     None of programs listed above certain cover all of  thepossible  areas  that can harm a system, but if run togetherthey can aid an overworked administrator to locate  some  ofthe  potential  trouble spots.  The COPS system is not meantto be a panacea against  all  UNIX  security  woes,  but  anadministrator who examines the security toolbox programs andthis research paper might reduce the danger  of  their  UNIXsystem being compromised -- and that's all any security toolcan ever hope to do.  The COPS system could never replace  a                     February 19, 1991                           - 10 -vigilant  administration  staffed with knowledgeable people,but hopefully, as administrators look into the package, morecomprehensive  programs  will come into being, covering moreof the problems that will continue as the latest versions ofUNIX continue to grow.     Design Notes:     The programs that are described here were  designed  toaddress the problems discussed above, but still be usable onas many UNIX "flavors" as possible.   Speed  was  sacrificedfor  simplicity/portability;  hopefully  the tools here willeither be replaced or modified, as by no means are they  thefinal  word  or solution to _any_ of these problems; indeed,it is my hope that  after  other  programmers/administratorssee  this  report,  they will create newer, better, and moregeneral tools that can be re-distributed periodically.  Noneof the programs need to be run by root to be effective, withthe exception of the SUID checker (to ensure that all  filesare  checked.) Some of the tools were written by myself, theothers were written by other programmers on the network  and(with their permission) presented here.  All of the programsin this report are in the public domain, with the  exceptionof Robert Baldwin's U-Kuang system; they all exist solely tobe used and modified to fit your needs.   If  they  are  re-distributed,  please keep them in their original form unlessit is clearly stated that they were modified.  Any  improve-ments (that might not be too hard :-), suggestions, or othersecurity programs that you would like  to  see  get  furtherdistribution can be sent to:     df@medusa.cs.purdue.edu     (That's me)     or     spaf@uther.cs.purdue.edu     (Dr. Eugene Spafford)     Note that the COPS system is still in an infancy  stage--  although it has been tested on a variety of computers atPurdue, it has not undergone any serious trials.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
色婷婷狠狠综合| 国产午夜精品在线观看| 久久男人中文字幕资源站| 一区在线播放视频| 美女视频黄免费的久久| 99久久国产免费看| 精品sm在线观看| 亚洲一二三区视频在线观看| 加勒比av一区二区| 欧美一区永久视频免费观看| 亚洲卡通欧美制服中文| 国内成人自拍视频| 欧美精品少妇一区二区三区| 日韩毛片在线免费观看| 国产剧情一区二区三区| 欧美一区二区三区视频免费 | 欧美日韩国产免费一区二区| 欧美国产激情二区三区| 久久99精品久久久久婷婷| 欧美视频一区二区三区四区 | 首页综合国产亚洲丝袜| 欧美专区在线观看一区| 玉米视频成人免费看| 这里只有精品视频在线观看| 国产精品久久三区| 国产不卡在线播放| 久久久精品国产99久久精品芒果| 婷婷亚洲久悠悠色悠在线播放 | 欧美顶级少妇做爰| 亚洲国产精品一区二区久久 | 99精品视频免费在线观看| 精品国产精品一区二区夜夜嗨| 蜜桃视频在线观看一区| 日韩三级中文字幕| 久久av中文字幕片| 精品精品欲导航| 国内精品自线一区二区三区视频| 欧美日本韩国一区二区三区视频| 亚洲综合色在线| 欧美日本韩国一区| 久久精品国产77777蜜臀| 欧美一级爆毛片| 国产一区高清在线| 欧美国产一区二区在线观看 | 欧美日韩精品三区| 国产伦理精品不卡| 国产欧美一区二区精品婷婷| 国产69精品一区二区亚洲孕妇| 日本一区二区三区电影| 91在线观看美女| 亚洲综合色成人| 91.xcao| 久久成人免费电影| 久久精品一二三| 99视频精品在线| 亚洲国产精品麻豆| 日韩欧美在线一区二区三区| 精品一二三四区| 中文字幕亚洲区| 777久久久精品| 国产盗摄女厕一区二区三区| 国产精品精品国产色婷婷| 91福利在线免费观看| 丝袜美腿一区二区三区| 久久久久久久综合狠狠综合| 成人精品视频.| 亚洲国产精品欧美一二99| 久久婷婷久久一区二区三区| 成人av免费在线观看| 日韩电影在线观看网站| 国产亚洲欧美日韩在线一区| 在线观看日产精品| 国内成人精品2018免费看| 中文字幕欧美一| 欧美一区午夜精品| 91香蕉视频污在线| 久久精品二区亚洲w码| 亚洲欧美日韩中文播放| 亚洲精品在线观看网站| 色www精品视频在线观看| 久久精品噜噜噜成人88aⅴ | 欧美电视剧在线看免费| av激情亚洲男人天堂| 久久国产精品一区二区| 一区二区三区影院| 久久久久久久精| 欧美二区在线观看| 色婷婷久久久久swag精品| 国产一区二区在线视频| 婷婷中文字幕一区三区| 亚洲色图.com| 久久综合久久综合久久综合| 欧美日本乱大交xxxxx| 成人免费视频一区二区| 毛片不卡一区二区| 亚洲妇女屁股眼交7| 国产精品乱码一区二三区小蝌蚪| 91精品国产综合久久蜜臀| 91成人在线观看喷潮| www.日本不卡| 国产成人精品影院| 国产呦精品一区二区三区网站| 韩国在线一区二区| 美女高潮久久久| 偷窥少妇高潮呻吟av久久免费| 亚洲三级电影全部在线观看高清| 久久精品亚洲麻豆av一区二区 | 喷水一区二区三区| 亚洲一区二区三区在线看| 亚洲图片另类小说| 欧美国产日韩精品免费观看| 久久伊人蜜桃av一区二区| 精品免费日韩av| 日韩精品中午字幕| 日韩欧美国产综合一区| 日韩三级伦理片妻子的秘密按摩| 欧美精品在线视频| 欧美日韩www| 91精品国产综合久久久久久久久久| 欧美视频一区二| 欧美福利电影网| 91麻豆精品国产91久久久久| 欧美日韩在线观看一区二区| 欧美日韩一区国产| 91精品国产色综合久久| 日韩免费一区二区三区在线播放| 欧美电影精品一区二区| 久久婷婷成人综合色| 国产精品久久三区| 亚洲欧美激情视频在线观看一区二区三区 | 日韩国产欧美一区二区三区| 免费一级欧美片在线观看| 久久精品国产久精国产爱| 国产乱码精品一品二品| 成人美女视频在线看| 一本到一区二区三区| 欧美日韩一区国产| 久久综合色8888| 1024成人网| 亚洲成av人影院| 久久99热国产| 成人av中文字幕| 精品污污网站免费看| 日韩美女一区二区三区四区| 国产午夜亚洲精品午夜鲁丝片 | 在线观看成人免费视频| 制服丝袜一区二区三区| 久久精品一区二区| 亚洲一区二区三区在线看| 久久丁香综合五月国产三级网站| 国产91对白在线观看九色| 欧美色国产精品| 久久亚洲综合av| 一区二区三区91| 国产成人综合在线| 欧美日韩一区二区三区四区 | 欧美精品1区2区| 国产亚洲人成网站| 亚洲一区在线视频观看| 国产精品一区免费在线观看| 91高清在线观看| 精品国产制服丝袜高跟| 一区二区视频免费在线观看| 久久成人免费日本黄色| 色欧美片视频在线观看 | 国产传媒欧美日韩成人| 欧美日韩中文字幕一区二区| 丝袜美腿亚洲一区二区图片| 成人综合在线观看| 91麻豆精品国产91久久久| 最新国产成人在线观看| 久久精品国产一区二区| 日本黄色一区二区| 国产欧美日韩在线观看| 日韩成人伦理电影在线观看| 色婷婷久久99综合精品jk白丝| 久久精品亚洲精品国产欧美| 日本亚洲免费观看| 欧美在线观看18| 亚洲婷婷在线视频| 国产盗摄一区二区三区| 欧美大片在线观看一区二区| 亚洲欧洲综合另类在线| 成人自拍视频在线| 26uuu国产在线精品一区二区| 亚洲成人免费在线观看| 一本久久a久久精品亚洲| 国产精品久久久久久久裸模| 国产麻豆一精品一av一免费| 欧美一级一区二区| 三级不卡在线观看| 欧美日韩一区二区三区高清| 一区二区三区在线不卡| 91蝌蚪porny| 国产精品电影一区二区三区| 丰满亚洲少妇av| 国产精品伦一区二区三级视频| 国产v综合v亚洲欧| 国产日韩成人精品| 国产不卡在线播放|