Ãëàâíàÿ    Ex Libris    Êíèãè    Æóðíàëû    Ñòàòüè    Ñåðèè    Êàòàëîã    Wanted    Çàãðóçêà    ÕóäËèò    Ñïðàâêà    Ïîèñê ïî èíäåêñàì    Ïîèñê    Ôîðóì   
blank
Àâòîðèçàöèÿ

       
blank
Ïîèñê ïî óêàçàòåëÿì

blank
blank
blank
Êðàñîòà
blank
Hatch B., Lee J., Kurtz G. — Hacking linux exposed: linux security secrets & solutions
Hatch B., Lee J., Kurtz G. — Hacking linux exposed: linux security secrets & solutions



Îáñóäèòå êíèãó íà íàó÷íîì ôîðóìå



Íàøëè îïå÷àòêó?
Âûäåëèòå åå ìûøêîé è íàæìèòå Ctrl+Enter


Íàçâàíèå: Hacking linux exposed: linux security secrets & solutions

Àâòîðû: Hatch B., Lee J., Kurtz G.

Àííîòàöèÿ:

If you have a vulnerable computer attached to the BIG BAD INTERNET, sooner or later your box will be compromised. Notice I prefer the term compromised to hacked. Hacking is a benign activity. You hack out of curiosity and [hopefully] with prior permission. Can this be done? Can I get into this box? How is he trying to keep me out? What stone has he left unturned? Woops: He has a bulletproof firewall but he left this one vulnerable cgi script in his httpd directory: HA! I'M IN! At that point the correct thing to do is to stop and notify the hackee. But once a hacker gets in, (especially if he is there without permission) the temptation to quietly mess around and cover his guilty tracks is usually overwhelming. Then it has gone from hacking to compromising someone else's box.


ßçûê: en

Ðóáðèêà: Òåõíîëîãèÿ/

Ñòàòóñ ïðåäìåòíîãî óêàçàòåëÿ: Ãîòîâ óêàçàòåëü ñ íîìåðàìè ñòðàíèö

ed2k: ed2k stats

Ãîä èçäàíèÿ: 2001

Êîëè÷åñòâî ñòðàíèö: 566

Äîáàâëåíà â êàòàëîã: 02.12.2005

Îïåðàöèè: Ïîëîæèòü íà ïîëêó | Ñêîïèðîâàòü ññûëêó äëÿ ôîðóìà | Ñêîïèðîâàòü ID
blank
Ïðåäìåòíûé óêàçàòåëü
filesystems, mounting      164 173
Filesystems, NFS and      186—187
Filesystems, PPDD      174
Filesystems, setuserid programs and      269—271
Filesystems, StegFS      174
Filesystems, TCFS      173
filesystems, unmounting      164 173
Filters, Cisco Pix packet filter      486
Filters, described      477
Filters, egress      242—243
Filters, packets      476—480
FIN flag      182
FIN I ACK flag      182
FIN scans      95 96 100
find command      25 410
Fingerprinting, active stack      103—106
Fingerprinting, passive stack      106—108
FireWall Tool Kit (FWTK)      486
Firewalls      476—487
Firewalls, blocking network access      480—483
Firewalls, blocking NFS      113 187
Firewalls, commercial      486—487
Firewalls, creating with ipchains      478 484—485
Firewalls, creating with iptables      478 485—486
Firewalls, described      476
Firewalls, DoS threats and      203
Firewalls, FTP and      399 410—413
Firewalls, IP packet fragments and      180
Firewalls, Linux packet filtering      477—480
Firewalls, netcat clients and      537—538
Firewalls, network changes      351
Firewalls, open-source      486
Firewalls, OS detection      106
Firewalls, packet-filtering      476—480
Firewalls, products for      486—487
Firewalls, proxy      476 477
Firewalls, resources      476
Firewalls, RPC ports and      108
Firewalls, scripts      480
Firewalls, stateful      477 479—480
Firewalls, strategy for      483—486
Firewalls, types of      476—477
Flag bits      181
Flooding attacks      232—236
Floppy disks, boot disks      164—165 171—172
Floppy disks, LILO and      171—172
Floppy disks, removing drives      165 166
Floppy disks, system tools on      351
Floppy disks, worms and      147
Floppyfw router      486
fork() function      454—455
Format string attacks      267—268
FormatGuard product      268
Fping utility      79
Fragment scan packets      97
Fragmentation handling      97
Fragmentation scans      100
Fragmented packets      100 179—180
Freshen option, upgrades      494
FTP (File Transfer Protocol), active mode      393—394 405
FTP (File Transfer Protocol), anonymous FTP      254 395 413—414
FTP (File Transfer Protocol), banners      396—398
FTP (File Transfer Protocol), channels and      391—392
FTP (File Transfer Protocol), cleartext passwords      394—395
FTP (File Transfer Protocol), command channel      391 395
FTP (File Transfer Protocol), data channel      391
FTP (File Transfer Protocol), described      391
FTP (File Transfer Protocol), firewalls and      410—413
FTP (File Transfer Protocol), passive mode      394 402—404 415
FTP (File Transfer Protocol), passwords      394—395
FTP (File Transfer Protocol), sample session      392—393
FTP (File Transfer Protocol), security of      391—414
FTP (File Transfer Protocol), third-party      406—410
FTP bounce attacks      408—410
FTP bounce scanning      398—401
FTP clients      412—413
FTP servers      391—415
FTP servers, attacking      540
FTP servers, firewalls and      410—413
FTP servers, passwords      394—395
FTP servers, port scanning and      398—406
FTP servers, security and      391 392
FTP servers, SSH program      395
ftp sites      139—140
Ftp-ozone program      412—413
Ftpd-ozone program      412—413
FWTK (FireWall Tool Kit)      486
Gate daemon (gated)      220
Gauntlet firewall      486
get method      443
Gnome RPM      492 494
Gnu Privacy Guard (GnuPG)      158 388
Gnusniff program      196
Gost checksum      56
gpasswd command      303
Group IDs      7
groupadd command      303
groupdel command      303
Groupid programs      62
groupmod command      303
groups      9—10
Groups, /etc/group file      9—10
Groups, access and      257—260
Groups, devices      258—260
Groups, httpd processes and      427
Groups, limits on      19
groups, permissions      257—260
Groups, privileges      257—260
Groups, vulnerabilities      257—260
Groups, wheel group      259—260
Hacking Exposed Web site      512
Hacking from local account      538—539
Hacking, assessing breaches      62—63
Hacking, data      5
Hacking, detection of      59—62
Hacking, getting back online      64—65
Hacking, hiding trails      338—343
Hacking, information gathering      69—125 519—520
Hacking, legal ramifications of      65
Hacking, Linux kernel      352—358
Hacking, maintaining access      315—363
Hacking, purging hacker from system      64—65
Hacking, reasons for      4—5
Hacking, recovering from      59—66
Hacking, root account      4—5
Hacking, sniffers and      194
Hacking, underestimating hackers      363 365
Hacking, web sites for      511—512
Halloween Document      6
hard disks      See "Also disks"
Hard disks, descrease in disk space      60
Hard disks, high usage of      61
Hardening, system      32—36
Hardlink attacks      279—280
Hardlinks      274—275
Haval checksum      56
headers, packet      477
Helper application attacks      268
Hijacking items, PASV FTP data      401—404
Hijacking items, PORT FTP data      404—406 415
Hijacking items, sessions      220—232
Hijacking items, TCP connections      220
History files      257
home directory      7
home pages      137
honeypot      363
host command      82—86
Host key      228—229
host-based authentication      316—323
Host-key checking      229
Hostnames, filesystems and      111 112
Hostnames, obtaining from IP addresses      86—87
Hostnames, obtaining from net-snmp MIB      116
Hostnames, obtaining from showmount command      112
Hostnames, reverse lookups      86—87
Hostnames, zone transfers      84—86
Hosts, access control      467—469 475
Hosts, automatic rejection of      31
Hosts, decoy      97
Hosts, locking out      470—471
hosts, trusted      111
HTML files      437
html.pm file      350
htpasswd command      304
HTTP authentication      421—423
HTTP authentication, .htaccess files      434—435
HTTP authentication, Apache web server and      303—304
HTTP authentication, attacks on      434—436
HTTP authentication, example of      434—435
HTTP authentication, httpd.conf file      435—436
HTTP authentication, insecure configurations      434—436
HTTP authentication, passwords      421—422 435
HTTP daemon (httpd)      330 426
HTTP password      435
HTTP ports      418 427 479—480
HTTP protocol      456 479—480
HTTP proxies      438—439
HTTP requests      418—425
HTTP sniffing      229
httpd (HTTP daemon)      330 426
httpd processes      427
httpd.conf file      427 435—436
HTTPS connections      229
HTTPS tool      194 226
hubs      193
Hunt program      195 221—226
HUP signal      21
IBM Secure Mailer      See "Postfix"
ICMP (Internet Control Messaging Protocol)      183
ICMP ECHO REPLY packets      78 80
ICMP ECHO REQUEST packets      78 80 89—90
ICMP packets, fragmented      237
ICMP packets, limiting number of      233
ICMP packets, restricting      183
ICMP ping floods      232—233
ICMP pings      78 90 96 480—482
ICMP type codes      183
Ident service      32
Ident/auth port      32
Identd      100
Identity files      328—329
Identity logins      328—329
Identity passwords      328—329
IDS (Intrusion Detection System)      29
ifconfig command      27—28
IgnoreRhosts variable      328
IIS (Internet Information Server)      425
IMAP protocol      389—390
Imapd service      200—201
Immunix tools      201 268
Immutable bit      351
Immutable databases      51
immutable flag      173
Impersonation      132
Inbound access      332—338
Indirect inbound access      336—338
Inetd (inet daemon)      464—469
Inetd (inet daemon), configuration      460—461
Inetd (inet daemon), host access control with      464—467
Inetd (inet daemon), Klaxon and      29
Inetd (inet daemon), locking out domain hosts      470—471
Inetd (inet daemon), overview      460—461
Inetd (inet daemon), running additional      331—332
inetd server      332
Inetd services      475—476 508
Ingreslock port      330
Inode number      55
Inode tables      275
inodes      274—275
Input validation attacks      280—282
insmod program      353
Installed packages      63
Internet      See also "Web sites"
Internet Control Messaging Protocol      See "ICMP"
Internet protocol (IP)      179—180 217 239—240
Internet Relay Chat      See "IRC"
Internet Security Scanner (ISS)      117—118
Internet Service Providers (ISPs), arin IP block lookup      77
Internet Service Providers (ISPs), break-ins      519—528
Internet Service Providers (ISPs), traceroutes      89
Internet Service Providers (ISPs), vulnerabilities      455—456
Internet Service Providers (ISPs), web hosting and      455—456
Internet, confidential data on      420—424
Internet, denial-of-service attacks      232—239
Internet, domain names      73—75
Internet, firewalls      See "Firewalls"
Internet, mailing lists      71—73
Internet, newsgroups      71—73
Internet, online searches      70—73
Internet, packets      See "Packets"
Internet, protecting data      421
Internet, Telnet      See "Telnet connections"
Intrusion case studies      514—519
Intrusion detection system (IDS)      29
IP (Internet Protocol)      179—180 217 239—240
IP addresses, ARP spoofing and      221—223 225
IP addresses, blocking      381 398
IP addresses, denying packets from      66
IP addresses, determining      514—515
IP addresses, hiding      339—340
IP addresses, network ownership      76—77
IP addresses, NFS and      240
IP addresses, obtaining hostnames from      86—87
IP addresses, obtaining with net-snmp      116
IP addresses, ping sweeps      77—80
IP addresses, PORT commands and      400
IP addresses, restricting access with      421
IP addresses, reverse lookups      86—87
IP addresses, spoofing      327
IP addresses, trusted      241
IP addresses, UDP and      182
IP forwarding      218—219
IP networks      178
IP packets, active stacks and      103
IP packets, fragmented      100 179—180
IP packets, headers      179
IP protocol scans      95
ipchains vs. iptables      479—480
Ipchains, blocking NFS server      113
Ipchains, blocking pings with      481—482
Ipchains, blocking portmapper      110
Ipchains, blocking telnet connections with      483
Ipchains, blocking traceroutes with      481—482
Ipchains, creating firewall with      478 484—485
Ipchains, denying packets      66
Ipchains, X Windows system and      189
IPPersonality      106
IPTables Firewall script      486
Iptables vs. ipchains      479—480
Iptables, blocking connections      482
Iptables, blocking NFS server      113
Iptables, blocking portmapper      110
Iptables, creating firewall with      478 485—486
Iptables, denying packets      66
IRC (Internet Relay Chat)      152—153
IRC channels      152
IRC clients      152
IRC scripts      152—153
Isof tool      205—206
ISPs (Internet Service Providers), arin IP block lookup      77
1 2 3 4 5 6 7 8
blank
Ðåêëàìà
blank
blank
HR
@Mail.ru
       © Ýëåêòðîííàÿ áèáëèîòåêà ïîïå÷èòåëüñêîãî ñîâåòà ìåõìàòà ÌÃÓ, 2004-2024
Ýëåêòðîííàÿ áèáëèîòåêà ìåõìàòà ÌÃÓ | Valid HTML 4.01! | Valid CSS! Î ïðîåêòå