亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? introduction to denail of service.txt

?? 黑客培訓教程
?? TXT
?? 第 1 頁 / 共 3 頁
字號:
          ===================================                    =INTRODUCTION TO DENIAL OF SERVICE====================================Hans Husmant95hhu@student.tdb.uu.seLast updated: Mon Oct 28 14:56:31 MET 1996.0. FOREWORD.A. INTRODUCTION	.A.1. WHAT IS A DENIAL OF SERVICE ATTACK?	.A.2. WHY WOULD SOMEONE CRASH A SYSTEM?		.A.2.1. INTRODUCTION		.A.2.2. SUB-CULTURAL STATUS		.A.2.3. TO GAIN ACCESS		.A.2.4. REVENGE		.A.2.5. POLITICAL REASONS		.A.2.6. ECONOMICAL REASONS		.A.2.7. NASTINESS	.A.3. ARE SOME OPERATING SYSTEMS MORE SECURE?.B. SOME BASIC TARGETS FOR AN ATTACK	.B.1. SWAP SPACE	.B.2. BANDWIDTH	.B.3. KERNEL TABLES	.B.4. RAM	.B.5. DISKS	.B.6. CACHES	.B.7. INETD.C. ATTACKING FROM THE OUTSIDE	.C.1. TAKING ADVANTAGE OF FINGER	.C.2. UDP AND SUNOS 4.1.3.	.C.3. FREEZING UP X-WINDOWS	.C.4. MALICIOUS USE OF UDP SERVICES    	.C.5. ATTACKING WITH LYNX CLIENTS	.C.6. MALICIOUS USE OF telnet	.C.7. MALICIOUS USE OF telnet UNDER SOLARIS 2.4	.C.8. HOW TO DISABLE ACCOUNTS	.C.9. LINUX AND TCP TIME, DAYTIME	.C.10. HOW TO DISABLE SERVICES	.C.11. PARAGON OS BETA R1.4	.C.12. NOVELLS NETWARE FTP	.C.13. ICMP REDIRECT ATTACKS	.C.14. BROADCAST STORMS	.C.15. EMAIL BOMBING AND SPAMMING	.C.16. TIME AND KERBEROS	.C.17. THE DOT DOT BUG	.C.18. SUNOS KERNEL PANIC	.C.19. HOSTILE APPLETS	.C.20. VIRUS	.C.21. ANONYMOUS FTP ABUSE	.C.22. SYN FLOODING	.C.23. PING FLOODING	.C.24. CRASHING SYSTEMS WITH PING FROM WINDOWS 95 MACHINES	.C.25. MALICIOUS USE OF SUBNET MASK REPLY MESSAGE	.C.26. FLEXlm	.C.27. BOOTING WITH TRIVIAL FTP.D. ATTACKING FROM THE INSIDE	.D.1. KERNEL PANIC UNDER SOLARIS 2.3	.D.2. CRASHING THE X-SERVER	.D.3. FILLING UP THE HARD DISK	.D.4. MALICIOUS USE OF eval	.D.5. MALICIOUS USE OF fork()	.D.6. CREATING FILES THAT IS HARD TO REMOVE	.D.7. DIRECTORY NAME LOOKUPCACHE	.D.8. CSH ATTACK	.D.9. CREATING FILES IN /tmp	.D.10. USING RESOLV_HOST_CONF	.D.11. SUN 4.X AND BACKGROUND JOBS		.D.12. CRASHING DG/UX WITH ULIMIT 	.D.13. NETTUNE AND HP-UX	.D.14. SOLARIS 2.X AND NFS	.D.15. SYSTEM STABILITY COMPROMISE VIA MOUNT_UNION	.D.16. trap_mon CAUSES KERNEL PANIC UNDER SUNOS 4.1.X.E. DUMPING CORE	.E.1. SHORT COMMENT	.E.2. MALICIOUS USE OF NETSCAPE	.E.3. CORE DUMPED UNDER WUFTPD	.E.4. ld UNDER SOLARIS/X86.F. HOW DO I PROTECT A SYSTEM AGAINST DENIAL OF SERVICE ATTACKS?	.F.1. BASIC SECURITY PROTECTION		.F.1.1. INTRODUCTION		.F.1.2. PORT SCANNING		.F.1.3. CHECK THE OUTSIDE ATTACKS DESCRIBED IN THIS PAPER		.F.1.4. CHECK THE INSIDE ATTACKS DESCRIBED IN THIS PAPER		.F.1.5. EXTRA SECURITY SYSTEMS		.F.1.6. MONITORING SECURITY		.F.1.7. KEEPING UP TO DATE		.F.1.8. READ SOMETHING BETTER	.F.2. MONITORING PERFORMANCE		.F.2.1. INTRODUCTION		.F.2.2. COMMANDS AND SERVICES                      		.F.2.3. PROGRAMS		.F.2.4. ACCOUNTING.G. SUGGESTED READING	.G.1. INFORMATION FOR DEEPER KNOWLEDGE	.G.2. KEEPING UP TO DATE INFORMATION	.G.3. BASIC INFORMATION.H. COPYRIGHT.I. DISCLAIMER.0. FOREWORD------------In this paper I have tried to answer the following questions:	- What is a denial of service attack?	- Why would someone crash a system?	- How can someone crash a system.	- How do I protect a system against denial of service attacks?	I also have a section called SUGGESTED READING were you can findinformation about good free information that can give you a deeperunderstanding about something.Note that I have a very limited experience with Macintosh, OS/2 andWindows and most of the material are therefore for Unix use. You can always find the latest version at the following address:http://www.student.tdb.uu.se/~t95hhu/secure/denial/DENIAL.TXTFeel free to send comments, tips and so on to address:t95hhu@student.tdb.uu.se.A. INTRODUCTION~~~~~~~~~~~~~~~~.A.1. WHAT IS A DENIAL OF SERVICE ATTACK?-----------------------------------------Denial of service is about without permission knocking offservices, for example through crashing the whole system. Thiskind of attacks are easy to launch and it is hard to protecta system against them. The basic problem is that Unixassumes that users on the system or on other systems will bewell behaved. .A.2. WHY WOULD SOMEONE CRASH A SYSTEM?--------------------------------------- .A.2.1. INTRODUCTION--------------------Why would someone crash a system? I can think of several reasonsthat I have presentated more precisely in a section for each reason,but for short:	.1. Sub-cultural status.	.2. To gain access.	.3. Revenge.	.4. Political reasons.	.5. Economical reasons.	.6. Nastiness.I think that number one and six are the more common today, but thatnumber four and five will be the more common ones in the future..A.2.2. SUB-CULTURAL STATUS---------------------------After all information about syn flooding a bunch of such attackswere launched around Sweden. The very most of these attacks werenot a part of a IP-spoof attack, it was "only" a denial of serviceattack. Why? I think that hackers attack systems as a sub-cultural pseudo careerand I think that many denial of service attacks, and here in theexample syn flooding, were performed for these reasons. I also thinkthat many hackers begin their carrer with denial of service attacks..A.2.3. TO GAIN ACCESS----------------------Sometimes could a denial of service attack be a part of an attack togain access at a system. At the moment I can think of these reasonsand specific holes:	.1. Some older X-lock versions could be crashed with a 	method from the denial of service family leaving the system	open. Physical access was needed to use the work space after.	.2. Syn flooding could be a part of a IP-spoof attack method.	.3. Some program systems could have holes under the startup, 	that could be used to gain root, for example SSH (secure shell).	.4. Under an attack it could be usable to crash other machines	in the network or to deny certain persons the ability to access 	the system.  		.5. Also could a system being booted sometimes be subverted,	especially rarp-boots. If we know which port the machine listen	to (69 could be a good guess) under the boot we can send false	packets to it and almost totally control the boot..A.2.4. REVENGE---------------A denial of service attack could be a part of a revenge against a useror an administrator..A.2.5. POLITICAL REASONS-------------------------Sooner or later will new or old organizations understand the potentialof destroying computer systems and find tools to do it.For example imaginate the Bank A loaning company B money to build afactory threating the environment. The organization C therefor crash A:scomputer system, maybe with help from an employee. The attack could costA a great deal of money if the timing is right..A.2.6. ECONOMICAL REASONS--------------------------Imaginate the small company A moving into a business totally dominated bycompany B. A and B customers make the orders by computers and dependsheavily on that the order is done in a specific time (A and B could bestock trading companies). If A and B can't perform the order the customerslose money and change company.As a part of a business strategy A pays a computer expert a sum of money toget him to crash B:s computer systems a number of times. A year later Ais the dominating company..A.2.7. NASTINESS-----------------I know a person that found a workstation where the user had forgotten tologout. He sat down and wrote a program that made a kill -9 -1 at arandom time at least 30 minutes after the login time and placed a call tothe program from the profile file. That is nastiness..A.3. ARE SOME OPERATING SYSTEMS MORE SECURE?---------------------------------------------This is a hard question to answer and I don't think that it willgive anything to compare different Unix platforms. You can't say thatone Unix is more secure against denial of service, it is all up to theadministrator.A comparison between Windows 95 and NT on one side and Unix on theother could however be interesting.Unix systems are much more complex and have hundreds of built in programs,services... This always open up many ways to crash the system fromthe inside.In the normal Windows NT and 95 network were is few ways to crashthe system. Although were is methods that always will work.That gives us that no big different between Microsoft and Unix canbe seen regardning the inside attacks. But there is a couple ofpoints left:	- Unix have much more tools and programs to discover an	attack and monitoring the users. To watch what another user	is up to under windows is very hard.	- The average Unix administrator probably also have much more	experience than the average Microsoft administrator.The two last points gives that Unix is more secure against insidedenial of service attacks.A comparison between Microsoft and Unix regarding outside attacksare much more difficult. However I would like to say that the averageMicrosoft system on the Internet are more secure against outsideattacks, because they normally have much less services..B. SOME BASIC TARGETS FOR AN ATTACK~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~.B.1. SWAP SPACE----------------Most systems have several hundred Mbytes of swap space to service client requests. The swap space is typical usedfor forked child processes which have a short life time.The swap space will therefore almost never in a normalcause be used heavily. A denial of service could be based on a method that tries to fill up the swap space..B.2. BANDWIDTH---------------If the bandwidth is to high the network will be useless. Mostdenial of service attack influence the bandwidth in some way..B.3. KERNEL TABLES-------------------It is trivial to overflow the kernel tables which will causeserious problems on the system. Systems with write throughcaches and small write buffers is especially sensitive.Kernel memory allocation is also a target that is sensitive.The kernel have a kernelmap limit, if the system reach thislimit it can not allocate more kernel memory and must be rebooted.The kernel memory is not only used for RAM, CPU:s, screens and soon, it it also used for ordinaries processes. Meaning that any systemcan be crashed and with a mean (or in some sense good) algorithm prettyfast.For Solaris 2.X it is measured and reported with the sar commandhow much kernel memory the system is using, but for SunOS 4.X thereis no such command. Meaning that under SunOS 4.X you don't even canget a warning. If you do use Solaris you should write sar -k 1 toget the information. netstat -k can also be used and shows how muchmemory the kernel have allocated in the subpaging. .B.4. RAM---------A denial of service attack that allocates a large amount of RAMcan make a great deal of problems. NFS and mail servers are actually extremely sensitive because they do not need muchRAM and therefore often don't have much RAM. An attack at a NFS server is trivial. The normal NFS client will do a great deal of caching, but a NFS client can be anything including the program you wrote yourself....B.5. DISKS-----------A classic attack is to fill up the hard disk, but an attack atthe disks can be so much more. For example can an overloaded diskbe misused in many ways..B.6. CACHES-------------A denial of service attack involving caches can be based on a methodto block the cache or to avoid the cache.These caches are found on Solaris 2.X:Directory name lookup cache: Associates the name of a file with a vnode.Inode cache: Cache information read from disk in case it is neededagain.Rnode cache: Holds information about the NFS filesystem.Buffer cache: Cache inode indirect blocks and cylinders to realed diskI/O..B.7. INETD-----------Well once inetd crashed all other services running through inetd nolonger will work..C. ATTACKING FROM THE OUTSIDE~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~.C.1. TAKING ADVANTAGE OF FINGER--------------------------------Most fingerd installations support redirections to an other host.Ex:	$finger @system.two.com@system.one.comfinger will in the example go through system.one.com and on tosystem.two.com. As far as system.two.com knows it is system.one.comwho is fingering. So this method can be used for hiding, but alsofor a very dirty denial of service attack. Lock at this:	$ finger @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@host.we.attackAll those @ signs will get finger to finger host.we.attack again andagain and again... The effect on host.we.attack is powerful andthe result is high bandwidth, short free memory and a hard disk withless free space, due to all child processes (compare with .D.5.).The solution is to install a fingerd which don't support redirections,for example GNU finger. You could also turn the finger service off,but I think that is just a bit to much..C.2. UDP AND SUNOS 4.1.3.--------------------------SunOS 4.1.3. is known to boot if a packet with incorrect informationin the header is sent to it. This is the cause if the ip_optionsindicate a wrong size of the packet.The solution is to install the proper patch..C.3. FREEZING UP X-WINDOWS---------------------------If a host accepts a telnet session to the X-Windows port (generallysomewhere between 6000 and 6025. In most cases 6000) could thatbe used to freeze up the X-Windows system. This can be made withmultiple telnet connections to the port or with a program whichsends multiple XOpenDisplay() to the port.The same thing can happen to Motif or Open Windows.The solution is to deny connections to the X-Windows port..C.4. MALICIOUS USE OF UDP SERVICES-----------------------------------It is simple to get UDP services (echo, time, daytime, chargen) to loop, due to trivial IP-spoofing. The effect can be high bandwidth that causes the network to become useless. In the example the header claim that the packet came from 127.0.0.1 (loopback) and the target is the echo port at system.we.attack. As far as system.we.attack knows is 127.0.0.1 system.we.attack and the loop has been establish. Ex:	from-IP=127.0.0.1	to-IP=system.we.attack	Packet type:UDP	from UDP port 7	to UDP port 7Note that the name system.we.attack looks like a DNS-name, but thetarget should always be represented by the IP-number.Quoted from proberts@clark.net (Paul D. Robertson) comment oncomp.security.firewalls on matter of "Introduction to denial of service" 	" A great deal of systems don't put loopback on the wire, and simply	emulate it.  Therefore, this attack will only effect that machine 	in some cases.  It's much better to use the address of a different 	machine on the same network.  Again, the default services should 	be disabled in inetd.conf.  Other than some hacks for mainframe IP 	stacks that don't support ICMP, the echo service isn't used by many 	legitimate programs, and TCP echo should be used instead of UDP 	where it is necessary. ".C.5. ATTACKING WITH LYNX CLIENTS---------------------------------A World Wide Web server will fork an httpd process as a respondto a request from a client, typical Netscape or Mosaic. The processlasts for less than one second and the load will therefore nevershow up if someone uses ps. In most causes it is therefore verysafe to launch a denial of service attack that makes use of multiple W3 clients, typical lynx clients. But note that the netstatcommand could be used to detect the attack (thanks to Paul D. Robertson).Some httpd:s (for example http-gw) will have problems besides the normalhigh bandwidth, low memory... And the attack can in those causes getthe server to loop (compare with .C.6.).C.6. MALICIOUS USE OF telnet-----------------------------Study this little script:Ex:	while : ; do	telnet system.we.attack &	done

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
91久久精品一区二区| 成人网页在线观看| 亚洲精品午夜久久久| 欧美激情综合五月色丁香小说| 精品福利av导航| 精品美女一区二区| 国产亚洲人成网站| 久久久www免费人成精品| 中文字幕av一区二区三区免费看 | 亚洲一卡二卡三卡四卡| 日韩美女久久久| 亚洲一二三四在线| 日本成人在线看| 久久99日本精品| 国产成人小视频| 色中色一区二区| 56国语精品自产拍在线观看| 日韩一区二区三| 国产欧美综合在线| 亚洲影院理伦片| 久久国产精品99久久人人澡| 国产精品自在欧美一区| 99国内精品久久| 欧美性生活一区| 欧美大片拔萝卜| 国产女人aaa级久久久级| 亚洲免费av高清| 国内精品国产成人国产三级粉色 | 国产精品久久久久久户外露出 | 欧美精品乱人伦久久久久久| 日韩一级二级三级精品视频| 国产日韩av一区二区| 亚洲视频香蕉人妖| 日本中文一区二区三区| 久久国产精品99精品国产| 国产福利不卡视频| 欧美日韩国产欧美日美国产精品| 日韩西西人体444www| 中文字幕一区二区三区在线播放 | 欧美日韩国产乱码电影| 精品成人免费观看| 亚洲资源中文字幕| 国产成人亚洲精品狼色在线 | 成人午夜伦理影院| 欧美日韩国产综合一区二区| 国产女人aaa级久久久级| 日韩av在线播放中文字幕| 成人毛片在线观看| 久久网站最新地址| 午夜欧美在线一二页| 不卡大黄网站免费看| 久久影音资源网| 五月婷婷另类国产| 在线观看亚洲专区| 国产精品天美传媒沈樵| 麻豆精品国产传媒mv男同| 91影视在线播放| 欧美国产精品一区二区| 免费在线观看不卡| 欧美视频日韩视频| 国产精品二三区| 高清不卡一二三区| 久久先锋影音av| 久久超级碰视频| 欧美变态tickling挠脚心| 偷拍与自拍一区| 欧美撒尿777hd撒尿| 亚洲精品国产成人久久av盗摄 | 蜜桃av一区二区在线观看| 91成人免费在线| 亚洲免费观看高清| 一本一道波多野结衣一区二区| 国产欧美日韩不卡| av电影天堂一区二区在线 | 色老汉av一区二区三区| 国产精品第五页| 99精品国产99久久久久久白柏| 97久久超碰国产精品| 欧美激情中文字幕| 成人a级免费电影| 中文字幕二三区不卡| 成人午夜视频在线| 亚洲欧洲精品一区二区精品久久久 | 欧美艳星brazzers| 五月天精品一区二区三区| 91精品国产综合久久精品麻豆 | 看电影不卡的网站| 欧美精品一区二区在线播放 | 一本一道波多野结衣一区二区| 中文字幕在线不卡国产视频| 99久免费精品视频在线观看 | 91精品国产91综合久久蜜臀| 亚洲18女电影在线观看| 欧美一区日韩一区| 国产一区 二区 三区一级| 久久美女高清视频| 99麻豆久久久国产精品免费| 一区二区三区不卡视频| 欧美一区二区国产| 狠狠色狠狠色综合系列| 中文字幕av一区二区三区免费看| 91一区二区三区在线播放| 亚洲成人自拍偷拍| 欧美成人aa大片| 色综合天天综合狠狠| 日韩av电影一区| 国产精品色哟哟网站| 欧美精品自拍偷拍动漫精品| 国产精品99久久久久久似苏梦涵| 一区二区三区中文字幕电影| 日韩三级精品电影久久久| 99精品欧美一区二区三区小说| 亚洲电影一级黄| 欧美国产一区二区在线观看 | 久久久久久久电影| 色哟哟精品一区| 国产又黄又大久久| 亚洲图片自拍偷拍| 国产精品三级av| 日韩西西人体444www| 一本一道波多野结衣一区二区| 麻豆成人免费电影| 亚洲一区二区三区激情| 国产午夜精品一区二区三区嫩草 | 精品日韩一区二区三区 | 精品中文字幕一区二区小辣椒| 国产精品久99| 精品国产一二三| 欧美日韩精品二区第二页| 高清av一区二区| 国产伦理精品不卡| 裸体在线国模精品偷拍| 亚洲国产成人高清精品| 亚洲天堂中文字幕| 亚洲国产精品v| 国产视频一区二区在线| 日韩一区二区三免费高清| 欧美三级蜜桃2在线观看| 色综合久久综合网97色综合| 粉嫩av亚洲一区二区图片| 国产伦理精品不卡| 国产真实乱对白精彩久久| 麻豆久久久久久| 美女mm1313爽爽久久久蜜臀| 舔着乳尖日韩一区| 亚洲18色成人| 奇米影视7777精品一区二区| 亚洲午夜久久久久久久久久久| 国产精品乱码人人做人人爱| 精品动漫一区二区三区在线观看| 日韩精品一区二区三区视频播放| 欧美日本精品一区二区三区| 欧美日韩一区二区三区免费看| 在线观看av一区二区| 色婷婷综合久久久久中文一区二区 | 91国产成人在线| 一本大道久久精品懂色aⅴ| 色婷婷久久久综合中文字幕| 91久久线看在观草草青青| 色哟哟精品一区| 欧美日韩精品一二三区| 精品视频在线视频| 欧美精品v日韩精品v韩国精品v| 91麻豆精品国产91久久久| 日韩欧美电影一二三| 精品国产电影一区二区| 久久久久久亚洲综合影院红桃| www国产亚洲精品久久麻豆| 久久日韩精品一区二区五区| 亚洲精品一区二区三区精华液 | 亚洲观看高清完整版在线观看 | 亚洲国产激情av| 日韩毛片精品高清免费| 亚洲va韩国va欧美va精品| 九九视频精品免费| 国产99久久久精品| 色综合久久久久综合体| 色哟哟国产精品免费观看| 欧美精品丝袜久久久中文字幕| 日韩免费看网站| 亚洲婷婷国产精品电影人久久| 一区二区激情视频| 久久疯狂做爰流白浆xx| 99麻豆久久久国产精品免费| 欧美日韩国产成人在线91| 国产亚洲人成网站| 一区二区三区波多野结衣在线观看| 水蜜桃久久夜色精品一区的特点| 国产一区二区按摩在线观看| 一本色道**综合亚洲精品蜜桃冫| 欧美日韩国产精品自在自线| 久久久久久久久久久久久夜| 亚洲一区二区三区爽爽爽爽爽| 久久精品99国产精品| 91看片淫黄大片一级在线观看| 日韩一区二区视频| 一区二区三区在线视频免费 | 日韩毛片一二三区| 久久99热这里只有精品| 91浏览器打开|