亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? almost everything you ever wanted to know about security (but.txt

?? 黑客培訓教程
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
- but really, it's safest not to use setuid scripts at all.Q.12 Why shouldn't I leave "root" permanently logged on the console?Using a 'smart' terminal as console and leaving "/dev/console" worldwritable whilst "root" is logged in is a potential hole.  The terminalmay be vulnerable to remote control via escape sequences, and can beused to 'type' things into the root shell.  The terminal type canusually be obtained via the "ps" command.Various solutions to this can be devised, usually by giving the consoleowner and group-write access only , and then using the setgid mechanismon any program which has need to output to the console (eg: "write").Q.13 Why shouldn't I create Unix accounts with null passwords?Creating an unpassworded account to serve any purpose is potentiallydangerous, not for any direct reason, but because it can give a crackera toehold.For example, on many systems you will find a unpassworded user "sync",which allows the sysman to sync the disks without being logged in.  Thisappears to be both safe and innocuous.The problem with this arises if your system is one of the many whichdoesn't do checks on a user before authorising them for (say) FTP.  Acracker might be able to connect to your machine for one of a variety ofFTP methods, pretending to be user "sync" with no password, and thencopy your password file off for remote cracking.Although there are mechanisms to prevent this sort of thing happening inmost modern vesions of Unix, to be totally secure requires an in-depthknowledge of every package on your system, and how it deals with theverification of users.  If you can't be sure, it's probably better notto leave holes like this around.Another hole that having null-password accounts opens up is thepossibility (on systems with runtime linked libraries) of spoofingsystem software into running your programs as the "sync" user, bychanging the LD_LIBRARY_PATH variable to a library of your own devising,and running "login -p" or "su" to turn into that user.Q.14 What security holes are associated with X-windows (and other WMs)?Lots, some which affect use of X only, and some which impact thesecurity of the entire host system.I would prefer not to go into too much detail here, and would refer anyreader reader looking for detailed information to the other FAQ's inrelevant newsgroups.  (comp.windows.*)One point I will make is that X is one of those packages which oftengenerates "Incompatible Usage" security problems, for instance theability for crackers to run xsessions on hosts under accounts with nopassword (eg: sync), if it is improperly set up.  Read the questionabout unpassworded accounts in this FAQ.Q.15 What security holes are associated with NFS?Lots, mostly to do with who you export your disks to, and how.  Thesecurity of NFS relies heavily upon who is allowed to mount the filesthat a server exports, and whether they are exported read only or not.The exact format for specifying which hosts can mount an exporteddirectory varies between Unix implementations, but generally theinformation is contained within the file "/etc/exports".This file contains a list of directories and for each one, it has aseries of either specific "hosts" or "netgroups" which are allowed toNFS mount that directory.  This list is called the "access list".The "hosts" are individual machines, whilst "netgroups" are combinationsof hosts and usernames specified in "/etc/netgroup".  These are meant toprovide a method of finetuning access.  Read the relevant manual pagefor more information about netgroups.The exports file also contains information about whether the directoryis to be exported as read-only, read-write, and whether super-useraccess is to be allowed from clients which mount that directory.The important point to remember is that if the access list for aparticular directory in /etc/exports contains:1) <nothing>Your directory can be mounted by anyone, anywhere.2) <a specific hostname>Your directory can be mounted by anyone permitted to run the mountcommand at hostname.  This might not be a trustworthy person; forinstance, if the machine is a PC running NFS, it could be anyone.3) <a netgroup name>If the netgroup:a) is empty, anyone can mount your directory, from anywhere.b) contains "(,,)", anyone can mount your directory, from anywhere.c) contains the name of a netgroup which is empty or contains "(,,)",   anyone can mount your directory, from anywhere.d) contains "(hostname,,)", anyone on the named host who is permissioned   to mount files can mount your directory.e) contains "(,username,)", the named user can mount your directory,   from anywhere.4) <a word which is neither a hostname or a netgroup>If you meant to export the directory to the host "athena" but actuallytype "ahtena", the word "ahtena" is taken as a netgroup name, is foundto be an empty netgroup, and thus the directory can be mounted byanyone, anywhere.So, if you aren't careful about what you put into /etc/exports and/etc/netgroup you could find that a user with a PC could  a) mount your mainframe filestore as a network disk  b) edit your /etc/passwd or .rhosts or /etc/hosts.equiv ...  c) log into your mainframe as another user, possibly "root"Disclaimer: The above information may not be true for all platformswhich provide an NFS serving capability, but is true for all of the onesin my experience (AEM).  It should be noted that the SAFE way to createan "empty" netgroup entry is:                           ngname (-,-,-)Which is a netgroup which matches no-one on no-host on no-NIS-domain.[ I am STILL working on PC NFS packages / ethics at the moment - AEM ]Q.16 How can I generate safe passwords?You can't.  The key word here is GENERATE.  Once an algorithm forcreating passwords is specified using upon some systematic method, itmerely becomes a matter of analysing your algorithm in order to findevery password on your system.Unless the algorithm is very subtle, it will probably suffer from a verylow period (ie: it will soon start to repeat itself) so that either:  a) a cracker can try out every possible output of the password  generator on every user of the system, or  b) the cracker can analyse the output of the password program,  determine the algorithm being used, and apply the algorithm to other  users to determine their passwords.A beautiful example of this (where it was disastrously assumed that arandom number generator could generate an infinite number of randompasswords) is detailed in [Morris & Thompson].The only way to get a reasonable amount of variety in your passwords(I'm afraid) is to make them up.  Work out some flexible method of yourown which is NOT based upon:  1) modifying any part of your name or name+initials  2) modifying a dictionary word  3) acronyms  4) any systematic, well-adhered-to algorithm whatsoeverFor instance, NEVER use passwords like:alec7           - it's based on the users name (& it's too short anyway)tteffum         - based on the users name againgillian         - girlfiends name (in a dictionary)naillig         - ditto, backwardsPORSCHE911      - it's in a dictionary12345678        - it's in a dictionary (& people can watch you type it easily)qwertyui        - ...ditto...abcxyz          - ...ditto...0ooooooo        - ...ditto...Computer        - just because it's capitalised doesn't make it safewombat6         - ditto for appending some random character6wombat         - ditto for prepending some random charactermerde3          - even for french words...mr.spock        - it's in a sci-fi dictionaryzeolite         - it's in a geological dictionaryze0lite         - corrupted version of a word in a geological dictionaryze0l1te         - ...ditto...Z30L1T3         - ...ditto...I hope that these examples emphasise that ANY password derived from ANYdictionary word (or personal information), modified in ANY way,constitutes a potentially guessable password.For more detailed information in the same vein, you should read theAPPENDIX files which accompany Crack [Muffett].Q.17 Why are passwords so important?Because they are the first line of defence against interactive attackson your system.  It can be stated simply: if a cracker cannot interactwith your system(s), and he has no access to read or write theinformation contained in the password file, then he has almost noavenues of attack left open to break your system.This is also why, if a cracker can at least read your password file (andif you are on a vanilla modern Unix, you should assume this) it is soimportant that he is not able to break any of the passwords containedtherein.  If he can, then it is also fair to assume that he can (a) logon to your system and can then (b) break into "root" via an operatingsystem hole.Q.18 How many possible passwords are there?Most people ask this at one time or another, worried that programs likeCrack will eventually grow in power until they can do a completelyexhaustive search of all possible passwords, to break into a specificusers' account - usually root.If (to simplify the maths) we make the assumptions that:  1) Valid passwords are created from a set of 62 chars [A-Za-z0-9]  2) Valid passwords are to be between 5 and 8 chars longThen the size of the set of all valid passwords is: (in base 62)                                   100000 +                                  1000000 +                                 10000000 +                                100000000 =                                ---------                                111100000       (base 62)A figure which is far too large to usefully undertake an exhaustivesearch with current technologies.  Don't forget, however, that passwordsCAN be made up with even more characters then this; you can use <space>,all the punctuation characters, and symbols (~<>|\#$%^&*) too.  If youcan use some of all the 95 non-control characters in passwords, thisincreases the search space for a cracker to cover even further. However, it's still MUCH more efficient for a cracker to get a copy of"Crack", break into ANY account on the system (you only need one), logonto the machine, and spoof his way up to root priviledges via operatingsystems holes. Take comfort from these figures.  If you can slam the door in the faceof a potential crackers with a robust password file, you have sealedmost of the major avenues of attack immediately.Q.19 Where can I get more information?Books:[Kochan & Wood]Unix System SecurityA little dated for modern matters, but still a very good book on thebasics of Unix security.[Spafford & Garfinkel]Practical Unix SecurityThis wonderful book is a worthy successor to the above, and covers awide variety of the topics which the Unix (and some non Unix) systemmanager of the 90's will come across.>From: Gene Spafford <spaf@cs.purdue.edu>>Mention appendix E in "Practical Unix Security."Okay: Appendix E contains an extensive bibliography with even morepointers to security books than this FAQ contains.[Stoll]The Cuckoo's EggA real life 1980's thriller detailing the tracing of a cracker fromBerkeley across the USA and over the Atlantic to Germany.  An excellentview from all points: a good read, informative about security, funny,and a good illustration of the cracker psyche.  Contains an excellentrecipie for chocolate chip cookies.A videotape of the "NOVA" (PBS's Science Program on TV) episode thatexplained/reenacted this story is available from PBS Home Video.  Theyhave a toll-free 800 number within North America.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美国产一区视频在线观看| 成人综合在线视频| 亚洲午夜电影网| 亚洲柠檬福利资源导航| 国产精品国产三级国产aⅴ无密码 国产精品国产三级国产aⅴ原创 | 亚洲高清免费观看高清完整版在线观看| 国产精品久久一卡二卡| 久久精品人人爽人人爽| 国产亲近乱来精品视频| 久久精品视频免费观看| 国产欧美日韩精品一区| 欧美激情一区二区三区蜜桃视频| 亚洲国产高清在线观看视频| 欧美激情综合五月色丁香| 中文字幕久久午夜不卡| 亚洲婷婷在线视频| 亚洲九九爱视频| 亚洲不卡av一区二区三区| 肉色丝袜一区二区| 久久精品国产精品亚洲红杏| 国产在线视视频有精品| 国产成人av资源| 一本色道久久加勒比精品| 欧美网站一区二区| 日韩片之四级片| 久久久国产一区二区三区四区小说| 国产精品天干天干在线综合| 尤物在线观看一区| 亚洲成人精品在线观看| 蜜臀a∨国产成人精品| 国模冰冰炮一区二区| av电影在线不卡| 欧美日韩第一区日日骚| 精品久久一区二区| 国产精品人妖ts系列视频| 一区二区三区产品免费精品久久75| 午夜精品久久久久久| 久久综合综合久久综合| av动漫一区二区| 欧美精品久久一区| 国产亚洲欧美色| 亚洲自拍都市欧美小说| 青青草伊人久久| 99久久伊人网影院| 欧美人牲a欧美精品| 久久亚洲二区三区| 亚洲激情图片一区| 久久精品99国产精品| 99久久er热在这里只有精品66| 欧美电影在哪看比较好| 国产色一区二区| 婷婷开心久久网| 成熟亚洲日本毛茸茸凸凹| 欧美日本在线观看| 国产精品免费丝袜| 日本美女一区二区三区| 99视频精品免费视频| 日韩一区二区三区精品视频| 中文字幕一区二区在线播放| 免费日韩伦理电影| 99精品欧美一区二区三区小说| 日韩免费观看高清完整版| 中文字幕亚洲成人| 精品亚洲免费视频| 欧美色图第一页| 国产精品第一页第二页第三页| 裸体一区二区三区| 欧美在线视频全部完| 国产三级欧美三级日产三级99| 亚洲观看高清完整版在线观看| 成人综合婷婷国产精品久久免费| 制服丝袜日韩国产| 亚洲色图19p| 丰满放荡岳乱妇91ww| 日韩欧美激情一区| 亚洲已满18点击进入久久| 成人黄色一级视频| 精品美女在线观看| 日韩精品电影一区亚洲| 91啪亚洲精品| 中文在线一区二区| 精品伊人久久久久7777人| 欧日韩精品视频| 中文字幕字幕中文在线中不卡视频| 国产一区二区不卡在线| 日韩欧美在线观看一区二区三区| 一区二区免费在线播放| 91在线一区二区| 国产精品久久久久久久久搜平片 | 亚洲一区日韩精品中文字幕| 国产精品亚洲人在线观看| 欧美精品色综合| 亚洲国产va精品久久久不卡综合| 色婷婷av一区二区三区gif| 国产欧美一区在线| 国产美女在线精品| 日韩欧美一区二区不卡| 日本强好片久久久久久aaa| 欧美日韩高清影院| 亚洲电影一级片| 欧美日韩一二三区| 一级女性全黄久久生活片免费| 色94色欧美sute亚洲线路一ni| 亚洲天天做日日做天天谢日日欢| 99久久精品99国产精品| 国产精品久久久久影院亚瑟| 成人黄页毛片网站| 中文字幕国产一区二区| 成人免费视频视频| 国产精品福利一区二区| 91麻豆福利精品推荐| 中文字幕在线观看不卡视频| 91污在线观看| 欧美丰满嫩嫩电影| 最好看的中文字幕久久| 成人av集中营| 成人欧美一区二区三区在线播放| 91丨九色丨蝌蚪富婆spa| 一区二区三区免费观看| 欧美日韩大陆在线| 人人爽香蕉精品| 久久综合九色综合欧美亚洲| 国产一区二区三区在线观看免费视频 | 久久精品国内一区二区三区| 26uuu欧美日本| 成人一区二区三区视频在线观看| 中文字幕一区二| 在线一区二区视频| 免费日韩伦理电影| 久久亚区不卡日本| 91在线精品秘密一区二区| 亚洲国产视频a| 欧美大胆一级视频| 国产99精品国产| 亚洲一区二区高清| 日韩小视频在线观看专区| 国产精品18久久久久久vr| 亚洲欧洲国产专区| 一级做a爱片久久| 99re亚洲国产精品| 亚洲午夜在线电影| 日韩亚洲欧美在线观看| 丁香桃色午夜亚洲一区二区三区| 亚洲视频中文字幕| 欧美一区二区三区啪啪| 成人午夜精品一区二区三区| 亚洲大型综合色站| 久久综合成人精品亚洲另类欧美 | 午夜视频在线观看一区| wwww国产精品欧美| 91浏览器打开| 国产在线精品一区在线观看麻豆| 亚洲久草在线视频| 欧美不卡激情三级在线观看| 色综合久久综合| 极品美女销魂一区二区三区免费| 综合色天天鬼久久鬼色| 日韩免费视频一区二区| 色偷偷一区二区三区| 老司机免费视频一区二区| 国产精品国产三级国产普通话99 | 国产精品99久久久久久久女警 | 日韩有码一区二区三区| 久久精品亚洲一区二区三区浴池 | 午夜精品久久久久| 久久精品男人的天堂| 欧美日韩成人在线一区| 东方欧美亚洲色图在线| 日韩精品五月天| 亚洲蜜臀av乱码久久精品蜜桃| 欧美精品一区二区三区蜜臀| 欧美在线视频你懂得| 国产成人免费9x9x人网站视频| 青青草视频一区| 亚洲曰韩产成在线| 中文一区一区三区高中清不卡| 91精品国产入口| 欧美网站大全在线观看| aa级大片欧美| 国v精品久久久网| 精彩视频一区二区| 五月天视频一区| 一区二区三区在线免费播放| 欧美激情中文不卡| 26uuu欧美| 日韩美女主播在线视频一区二区三区| 在线一区二区视频| 99精品欧美一区二区三区小说| 国产99久久久国产精品潘金| 国产呦萝稀缺另类资源| 日韩和欧美的一区| 午夜不卡av免费| 亚洲3atv精品一区二区三区| 一区二区欧美在线观看| 亚洲色图视频免费播放| 中文文精品字幕一区二区| 久久久美女毛片| 精品国产青草久久久久福利| 日韩欧美黄色影院| 91精选在线观看|