Ãëàâíàÿ    Ex Libris    Êíèãè    Æóðíàëû    Ñòàòüè    Ñåðèè    Êàòàëîã    Wanted    Çàãðóçêà    ÕóäËèò    Ñïðàâêà    Ïîèñê ïî èíäåêñàì    Ïîèñê    Ôîðóì   
blank
Àâòîðèçàöèÿ

       
blank
Ïîèñê ïî óêàçàòåëÿì

blank
blank
blank
Êðàñîòà
blank
Hatch B., Lee J., Kurtz G. — Hacking linux exposed: linux security secrets & solutions
Hatch B., Lee J., Kurtz G. — Hacking linux exposed: linux security secrets & solutions



Îáñóäèòå êíèãó íà íàó÷íîì ôîðóìå



Íàøëè îïå÷àòêó?
Âûäåëèòå åå ìûøêîé è íàæìèòå Ctrl+Enter


Íàçâàíèå: Hacking linux exposed: linux security secrets & solutions

Àâòîðû: Hatch B., Lee J., Kurtz G.

Àííîòàöèÿ:

If you have a vulnerable computer attached to the BIG BAD INTERNET, sooner or later your box will be compromised. Notice I prefer the term compromised to hacked. Hacking is a benign activity. You hack out of curiosity and [hopefully] with prior permission. Can this be done? Can I get into this box? How is he trying to keep me out? What stone has he left unturned? Woops: He has a bulletproof firewall but he left this one vulnerable cgi script in his httpd directory: HA! I'M IN! At that point the correct thing to do is to stop and notify the hackee. But once a hacker gets in, (especially if he is there without permission) the temptation to quietly mess around and cover his guilty tracks is usually overwhelming. Then it has gone from hacking to compromising someone else's box.


ßçûê: en

Ðóáðèêà: Òåõíîëîãèÿ/

Ñòàòóñ ïðåäìåòíîãî óêàçàòåëÿ: Ãîòîâ óêàçàòåëü ñ íîìåðàìè ñòðàíèö

ed2k: ed2k stats

Ãîä èçäàíèÿ: 2001

Êîëè÷åñòâî ñòðàíèö: 566

Äîáàâëåíà â êàòàëîã: 02.12.2005

Îïåðàöèè: Ïîëîæèòü íà ïîëêó | Ñêîïèðîâàòü ññûëêó äëÿ ôîðóìà | Ñêîïèðîâàòü ID
blank
Ïðåäìåòíûé óêàçàòåëü
ISPs (Internet Service Providers), break-ins      519—528
ISPs (Internet Service Providers), traceroutes      89
ISPs (Internet Service Providers), vulnerabilities      455—456
ISPs (Internet Service Providers), web hosting and      455—456
ISS (Internet Security Scanner)      117—118
JavaScript      451—452
Jigsaw server      456
John the Ripper program      295—297
K files      503
Karpski program      196
Kerberos authentication      114
Kernel log      355
Kernel modules      352—358
Kernel, code for      359
Kernel, compiling      100
Kernel, countermeasures      362
Kernel, described      358—359
Kernel, hacking      352—358
Kernel, memory and      259
Kernel, patches      34—35 267 279
Kernel, superuser and      361
Kernel, upgrading      237 238
Kernel, version number      478
Kernel, weakening      357—358
Key argument      287
keystroke logging      189
killall command      20—21
killing processes      20—21
Klaxon scan detector      29
Korn Shell      8
KPOP authentication      391
ksh (Korn shell)      8
laptop computers      162—163 174
lchown() system call      278
LIDS (Linux Intrusion Detection System)      34—36 259
LILO (LInux LOader)      167—173
Links, /tmp directory      34
Links, files      55
links, symbolic      427—428
Linux dictionary      299
Linux Intrusion Detection System (LIDS)      34—36 259
Linux kernel, code for      359
Linux kernel, compiling      100
Linux kernel, countermeasures      362
Linux kernel, described      358—359
Linux kernel, hacking      352—358
Linux kernel, memory and      259
Linux kernel, patches      34—35 267 279
Linux kernel, superuser and      361
Linux kernel, upgrading      237 238
Linux kernel, version number      478
Linux kernel, weakening      357—358
Linux Loader (LILO)      167—173
Linux Root Kit (LRK)      363—364
Linux Router project      486
Linux systems, default configuration problems      436—438
Linux systems, distributions of      510
Linux systems, passwords in      284—289
Linux systems, patches to      34
Linux systems, physical access to      163—173
Linux systems, reinstalling      63
Linux systems, shells      7—8
Linux-sniff program      195
list command      398—399 408
Loadable kernel modules      352—358
Local access      193 194 250
Log files, analyzing      36—46 63
Log files, brute force attacks and      289
Log files, constantly running checkers      39—40
Log files, Crack program and      292
Log files, cronjob      39
Log files, kernel log      355
Log files, log checking programs      39—46
Log files, monitoring      526
Log files, mountd service and      114
Log files, permissions for      40 48
Log files, process-managed      36
Log files, scanning      39—40
Log files, syslog messages      36—39
Log files, system logs      22 376—377
Log files, truncated      60
Log files, UNIX platform      36—39
Log files, wiped      60
logcheck utility      41
Logging, facility for      22
Logging, hiding      339—340
logging, levels      37
Logging, system logging      22
Logins, hiding      338—339
Logins, passwordless      323—329
Logins, reporting      338—339
Logsurfer utility      44—46 518
logtail utility      41
Lookups, arin IP block      77
Lookups, DNS      82 469
Lookups, network      76—77
lookups, reverse      86—87
lp user      9
LRK (Linux Root Kit)      363—364
ls command      10 251 393
lsattr command      16—17
lsmod command      352—353
lstat() system call      276 279
MAC addresses, ARP spoofing and      221—223 225
MAC addresses, flooding network with      226
MAC addresses, obtaining      116
MAC addresses, sniffers and      192—193
Macof program      226 227
Magic Cookies      See "Cookies"
Magic passwords      344—345
Magic strings      347—349
Mail      See "Email"
Mail Abuse Prevention System (MAPS)      383
Mail delivery agent (MDA)      370
mail servers      414—415
Mail servers, banners      374—376
Mail servers, file permissions      379—381
Mail servers, insecurities      373—391
Mail servers, running as separate userid      374
Mail Transfer Agents (MTAs)      370—373
Mailbombing      384—386
maildrop program      387
Mailing lists, Bugtraq      71 510
Mailing lists, Linux distributions      510
Mailing lists, posting to      71—73
Mailing lists, precautions      73
Mailing lists, security      510
Mailing lists, vendors      510
Mailsnarf program      227
man pages      113 266
Management Information Base (MIB)      115—117
Manuals, online      436—437
MAPS (Mail Abuse Prevention System)      383
Matt's Traceroute (MTR)      89—90
MD5 algorithm      288—289
MD5 algorithm, Apache password file      303 304
MD5 algorithm, passwords      307 313
MD5 algorithm, validating hidden fields      445—446
MD5 checksums      47 56 141 143
md5sum program      47 141
MDA (mail delivery agent)      370
Melissa virus      146
Memory, BIOS      166
Memory, C-MOS      166
Memory, clearing      166
Memory, consumption of      21
Memory, kernel      259
Memory, leaks      21
Memory, managing      21—22
Memory, security and      21—22
Memory, virtual      21—22
metacharacters      280—281 453—454
MIB (management information base)      115—117
mkdir command      273—274
mkstemp function      273—274
mktemp utility      278
Modems, authentication and      185
Modems, connections      184—186
Modems, public phone networks      184—186
Modems, wardialing and      185—186
Monitors, unattended      160—161
Morris Internet worm      149 371
motherboards      166
mount command      186—187 264 269—270
mountd service      114
MRTG tool      236
Msgsnarf program      227
MTAs (Mail Transfer Agents)      370—373
MTR (Mart's Traceroute)      89—90
Nabou program      26—27
name service      212
NASL (Nessus Attack Scripting Language)      121
NC      See "netcat"
Nemesis utility      234 235
Nessus Attack Scripting Language (NASL)      121
Nessus security scanner      121—125
Net-SNMP      115—117
Netcat (nc) utility, arguments      91
Netcat (nc) utility, clients      537—538
Netcat (nc) utility, connections      536—537
Netcat (nc) utility, creating inbound root shells      332—335
Netcat (nc) utility, PORT FTP hijacking      405—406
Netcat (nc) utility, port scanning      91—92
Netfilter      479
Netmask      77
Netmask pair      467
Netscape browser, attacks to      187—188
Netscape browser, default configurations      187—188
Netscape browser, open source and      5
Netscape browser, passwords      187
netstat command      203—206
Network banners      102—103
Network broadcast packets      221
Network daemons      347—348
Network devices, default passwords      191—192
Network devices, labels and      160
Network devices, listed      191—192
Network Information System (NIS)      240—241 292
Network interface card (NIC)      192—193
Network lookups      76—77
network scanners      27—32 117—125
Network scanners, countermeasures      124—125
Network scanners, described      24 117
Network scanners, ISS      117—118
Network scanners, Nessus      121—125 125
Network scanners, SAINT      118—119
Network scanners, SARA      120
Network scanners, SATAN      118—119
Network scanning, ipconfig command      27—28
Network scanning, performing      27—32
Network services, back doors      344
Network services, hidden      344 351
Network services, scanning for      539—540
network sniffers      161
Network switches      525—526
networks      177—243
Networks, abusing trust relationships      239—241
Networks, access restrictions      344
Networks, accessible root shells      329—338
Networks, activity      60
Networks, attacking      211—243
Networks, attacks over      177—209
Networks, basic concepts      178—190
Networks, blocking access to      480—483
Networks, default configurations and      186—190
Networks, default passwords and      190—192
Networks, denial of service      See "Denial-of-service (DoS) attacks"
Networks, DNS exploits      212—217
Networks, egress filtering      242—243
Networks, hiding information on      343
networks, interfaces      27—28 62
Networks, IP networks      178
Networks, password guessing      196—199
Networks, performance      183
Networks, physical attacks to      159—160
Networks, ping sweeps      77—80
Networks, public phone      184—186
Networks, reporting tools      343
Networks, route additions      219—220
Networks, routing issues      217—220
Networks, scan detectors      29—32
Networks, scanners      See "Scanning"
Networks, services in      202—209
Networks, session hijacking      220—232
Networks, sniffers      See "Sniffers"
Networks, switched      193—194 221—223
networks, TCP/IP      178—184
Networks, turning off services      207—208
Networks, unnecessary services in      202—209
Networks, vulnerabilities      199—202
Newsgroups      71—73 512
NFS (network file service), blocking at firewall      187
NFS (network file service), countermeasures      240
NFS (network file service), file sharing with      111—114
NFS (network file service), insecure NFS exports      318—319
NFS (network file service), IP addresses and      240
NFS (network file service), Novell NetWare and      270—271
NFS (network file service), setuserid binaries      270
NFS (network file service), turning off      187
NFS files      226
NFS mounts      186—187
NFS servers      111—114 270—271
NIC (network interface card)      192—193
NIS (Network Information System)      240—241 292
NIS netgroups      467
Nmap (network mapper) utility, bounce scans      398—401
Nmap (network mapper) utility, configuration options      96—97
Nmap (network mapper) utility, identifying services with      206—207
Nmap (network mapper) utility, listing RPC services      109—110
Nmap (network mapper) utility, OS identification      104—106
Nmap (network mapper) utility, ping sweeping      79—80
Nmap (network mapper) utility, port scanning      94—100 110—111
Nmap (network mapper) utility, web servers      528—529
Nmap front end (nmapfe)      99
Nmapfe (nmap front end)      99
No-setuseridbatch patch      322 323
nobody user      9 263 427
Noexec flag      271
Nonatomic functions      272
Nonuser accounts      320
Nosuid flag      271
Novell Netware      270—271
Novell NFS servers      270—271
npasswd program      310—311
nph-finger CGI program      440—441
nslookup utility      82
Null characters      450—451
NULL scans      95 96 100
number sign (#)      208 465
Office      See "Workplace"
One Time Passwords in Everything (OPIE) tool      312
one-time passwords (OTPs)      312
Online manuals      436—437
Online searches      70—73
Open Relay Behavior-Modification System (ORBS)      383
Open Shortest Path First (OSPF)      217 219
open source software      5—6
open() function      450 455
open() system call      278
OpenSSH      226 326
1 2 3 4 5 6 7 8
blank
Ðåêëàìà
blank
blank
HR
@Mail.ru
       © Ýëåêòðîííàÿ áèáëèîòåêà ïîïå÷èòåëüñêîãî ñîâåòà ìåõìàòà ÌÃÓ, 2004-2024
Ýëåêòðîííàÿ áèáëèîòåêà ìåõìàòà ÌÃÓ | Valid HTML 4.01! | Valid CSS! Î ïðîåêòå