Ãëàâíàÿ    Ex Libris    Êíèãè    Æóðíàëû    Ñòàòüè    Ñåðèè    Êàòàëîã    Wanted    Çàãðóçêà    ÕóäËèò    Ñïðàâêà    Ïîèñê ïî èíäåêñàì    Ïîèñê    Ôîðóì   
blank
Àâòîðèçàöèÿ

       
blank
Ïîèñê ïî óêàçàòåëÿì

blank
blank
blank
Êðàñîòà
blank
Hatch B., Lee J., Kurtz G. — Hacking linux exposed: linux security secrets & solutions
Hatch B., Lee J., Kurtz G. — Hacking linux exposed: linux security secrets & solutions



Îáñóäèòå êíèãó íà íàó÷íîì ôîðóìå



Íàøëè îïå÷àòêó?
Âûäåëèòå åå ìûøêîé è íàæìèòå Ctrl+Enter


Íàçâàíèå: Hacking linux exposed: linux security secrets & solutions

Àâòîðû: Hatch B., Lee J., Kurtz G.

Àííîòàöèÿ:

If you have a vulnerable computer attached to the BIG BAD INTERNET, sooner or later your box will be compromised. Notice I prefer the term compromised to hacked. Hacking is a benign activity. You hack out of curiosity and [hopefully] with prior permission. Can this be done? Can I get into this box? How is he trying to keep me out? What stone has he left unturned? Woops: He has a bulletproof firewall but he left this one vulnerable cgi script in his httpd directory: HA! I'M IN! At that point the correct thing to do is to stop and notify the hackee. But once a hacker gets in, (especially if he is there without permission) the temptation to quietly mess around and cover his guilty tracks is usually overwhelming. Then it has gone from hacking to compromising someone else's box.


ßçûê: en

Ðóáðèêà: Òåõíîëîãèÿ/

Ñòàòóñ ïðåäìåòíîãî óêàçàòåëÿ: Ãîòîâ óêàçàòåëü ñ íîìåðàìè ñòðàíèö

ed2k: ed2k stats

Ãîä èçäàíèÿ: 2001

Êîëè÷åñòâî ñòðàíèö: 566

Äîáàâëåíà â êàòàëîã: 02.12.2005

Îïåðàöèè: Ïîëîæèòü íà ïîëêó | Ñêîïèðîâàòü ññûëêó äëÿ ôîðóìà | Ñêîïèðîâàòü ID
blank
Ïðåäìåòíûé óêàçàòåëü
OpenSSL libraries      424
Openwall Linux patch      34
Operating system calls      452—455
Operating systems, default configuration      186—187
Operating systems, detection of      96 100—108
Operating systems, dual-boot systems      163—164
Operating systems, fingerprinting      103—108
Operating systems, hardening      32—36
Operating systems, impersonating      106
Operating systems, network banners      101—103
Operating systems, open ports      101
Operating systems, scanners      24—27
Operating systems, single-user mode      62 167—172 362
Operating systems, SNMP and      101—102
OPIE (One Time Passwords in Everything) tool      312
ORBS (Open Relay Behavior-Modification System)      383
OS      See "Operating systems"
OSPF (Open Shortest Path First)      217 219
OTPs (one-time passwords)      312
Package installations      63
package management tools      492—499
packet filtering      477—480
Packet filters      239—241
Packet filters, Cisco Pix packet filter      486
Packet filters, described      478
packet filters, stateful      477
Packet-filtering firewalls      476 477—480
Packets, accepting      478
Packets, denying      478—479
Packets, described      477
Packets, firewall strategy      483—485
Packets, network broadcast      221
Packets, routing      220
Packets, source-routed      217—218
Packetstorm web site      298 299
PAM (pluggable authentication modules)      304—305 311 345—347
PAM libraries      345—347
Partitions      17
Passive stack fingerprinting      106—108
passwd command      260—261 303
passwd file      321
passwd program      321
passwd+ program      310
password attacks      285
Password files, changes to      320—321
Password files, new users in      61
Password files, null characters in      451
Password safe      158
Passwordless access, r-commands      323—326
Passwordless access, SSH      326—329
Passwords for different systems      309—310
Passwords in Linux      284—289
Passwords in system files      254—255
Passwords in user files      253—254
Passwords on command lines      256—257
Passwords on multiple machines      293
passwords, /etc/passwd file      See "/etc/passwd file"
Passwords, /etc/shadow file      253 299—305 320—322
Passwords, anlpasswd program      311
Passwords, Apache Web server      303—304
Passwords, BIOS settings      165—166
Passwords, brute-force attacks      See "Brute-force attacks"
Passwords, Cisco products and      523
Passwords, cleartext      253—256 389—391 394—395
passwords, cracking      283—313
Passwords, crypt ()      290—291 298
passwords, default      187 190—192
Passwords, deleted      285
Passwords, DES passwords      307 313
Passwords, dial-up access      255
passwords, dictionary attacks      289 290
Passwords, dynamic      185 199
passwords, encrypted      7 158 255—256 284—289
Passwords, encryption algorithms      286—289
Passwords, environment variables and      257
passwords, expiration      311—312
Passwords, forcing good passwords      310—311
Passwords, FTP and      394—395
passwords, guessing      196—199
Passwords, guidelines      306—309
Passwords, history files and      257
Passwords, HTTP authentication and      421—424 435
Passwords, identity passwords      328—329
Passwords, length of      196 198
Passwords, LILO and      168—172
Passwords, magic passwords      344—345
Passwords, MD5 passwords      313
Passwords, Netscape and      187
passwords, network      190—192 196—199
Passwords, network devices      191—192
Passwords, nonuser accounts and      320
Passwords, npasswd program      310—311
Passwords, one-time passwords (OTPs)      312
Passwords, OPIE system      312
Passwords, PAM libraries      345—347
Passwords, passwd+program      310
Passwords, password cracking programs      289—299 313
Passwords, PGP and      309
Passwords, Piranha virtual servers      190—191
Passwords, Pluggable Authentication Modules system      304—305 311
Passwords, POP clients      391
Passwords, precautions for      158
Passwords, protection      299 305—313
Passwords, recoverable      255—256
Passwords, requirements for      198—199
Passwords, reversible hashes      253—254
passwords, root password      190 294
Passwords, S/Key OTP system      312
Passwords, screen savers      160—161
Passwords, SecurelD system      312
Passwords, shadow passwords      292 296 299—303 310
Passwords, sniffers and      193—194 226
Passwords, storage of      253—257
Passwords, Sudo tool and      260—265
Passwords, UNIX passwords      328—329
Passwords, usage      253—257
Passwords, web sites      304
PASV command      394 399 401—404
PASV FTP data hijacking      401—404
patches, kernel patches      34—35 267 279
Patches, no-setuseridbatch      322 323
Patches, Openwall Linux      34
Patches, Postfix      388
Patches, trojaned      144
Paths      250—253
PDAs (Personal Data Assistants)      162—163
Performance, network      183
Period (.) symbol      251—252 466 467
Perl code, CGI problems and      443—444
Perl code, checking data length      447
Perl language      5 6 293 538
Perl scripts      333—335
Perl scripts, connections      536—537
Perl scripts, generating checksum/permissions database      49—50
Perl scripts, Nabou program      26—27
Permissions, /proc filesystem      34
Permissions, default permissions      14—16
Permissions, devices      258—259
permissions, directories      10 13—16
Permissions, execute permission      12—14
permissions, files      10—16 48—49 55
Permissions, groups      258
Permissions, log files      40 48
Permissions, mail server files      379—381
Permissions, POSIX capabilities      19—20
Permissions, programs      48
Permissions, scripts      48
Permissions, setXid programs      49
Permissions, symlink and      277—278
Permissions, write permission      13
Personal Data Assistants (PDAs)      162—163
PGP (Pretty Good Privacy)      143—144 158 309 388
PGP keys      143 144
PGP signatures      143—144
Phone numbers, formats      451—452
Phone numbers, JavaScript preprocessing      451—452
Phone numbers, locating      137 157
Phone numbers, wardialers      185—186
physical attacks      155—175
Physical attacks, boot access      163—173
Physical attacks, console access      160—161
Physical attacks, dumpster diving      158—159
Physical attacks, encrypted filesystems and      173—174
Physical attacks, laptop theft      162—163 174
Physical attacks, network facilities      159—160
Physical attacks, precautions      174—175
Physical attacks, workplace      156—163
Ping command      78
Ping floods      232—233
Ping sweeps      77—80
Ping sweeps, countermeasures      80
Ping sweeps, echo port pings      78
Ping sweeps, Fping utility      79
Ping sweeps, ICMP pings      78
Ping sweeps, Nmap utility      79—80
ping utility      232—233
pings      90 96 480—482
Pipes, exploiting      452—455
Pipes, opening      454—455
Piranha virtual server      190—191
pkgtool program      498—499
Pluggable Authentication Modules      See "PAM"
POP clients      391
POP mail server      467
POP protocol      389—391
POP3 authentication      255—256
Popauth authentication      255—256
popd service      200
Port      111 108 110
port command      398—401 408 409 412
PORT FTP data hijacking      404—406 415
port scanning      90—100
Port scanning, countermeasures      100
Port scanning, described      90
Port scanning, detection tools      29—32
Port scanning, FTP servers and      398—406
Port scanning, netcat port scanning      91—92
Port scanning, nmap FTP bounce scanning      398—401
Port scanning, nmap port scanning      94—100 109—110
Port scanning, PASV FTP data hijacking      401—404
Port scanning, PORT FTP data hijacking      404—406
Port scanning, Scanlogd program and      30
Port scanning, stoke tool      92—34
Port scanning, UDF ports      207
portmap daemon      108—109
Portmapper      108—109
Ports, binding to      21
Ports, echo ports      78 80
Ports, firewalls and      410—413
Ports, ident/auth port      32
Ports, inbound access to      337
Ports, Isof tool      205—206
Ports, Klaxon and      29
ports, open      101
Ports, privileged      21
Ports, probing      121
Ports, RPC      108
Ports, SNMP      117
Ports, TCP ports      91—100 181
Ports, UDP ports      91—32 115
PortSentry scan detector      31—32
POSIX capabilities      19—20
Post connections      443
postdrop program      387
Postfix      372—373
Postfix, email relaying and      382
Postfix, encryption and      388
Postfix, mail server file permissions      380
Postfix, resource restrictions      385—386
Postfix, running as non-root      374
Postfix, security and      414
Postfix, SMTP banner      376
Postfix, SMTP EXPN command      379
Postfix, spam and      382 384
Postfix, VRFY responses      388
Postfix, world-writable maildrop directory      386—387
PPDD filesystem      174
Pretty Good Privacy (PGP)      See "PGP"
Printers, access to      254
Privilege elevation attacks      272—282
privileged ports      21
Privileges, elevation of      247—282
Privileges, root user      248—250
Privileges, users      248—250
Processes, hiding      340—341
Processes, killing      20—21
Processes, reporting      340—341
Processes, signals to      20—21
Processes, suspicious      61
Procmail rules      383
ProFTPD      397—398
Programming flaws      272—282
Programs      See also "Software"
Programs, deleting      49
Programs, helper applications      268
Programs, installation of      49
Programs, keeping current      491—499
Programs, logging levels      37
Programs, password cracking      289—299
Programs, passwords and      304
Programs, permissions for      48
Programs, Trojan horse      138—139
Programs, unneeded      501—508
Programs, upgrades      420
promiscuous mode      60 192—193
protocol stack      178
Protocols      178—184 225—226 227
Proxies, described      188
Proxies, HTTP      438—439
Proxy firewalls      477
Proxy servers      438—439 476 477
ps command      319
PTR records      87
Public phone networks      184—186
Publicfile FTP server      414
Public_html directories      438
pwck program      301—302
pwconv program      302
pwunconv program      302
Qmail, described      372
Qmail, email relaying and      382
Qmail, encryption and      388
Qmail, mail server file permissions      380
Qmail, resource restrictions      385
Qmail, running as non-root      374
Qmail, security and      414
Qmail, SMTP banner      375
Qmail, SMTP EXPN command      379
Qmail, spam and      382 384
Qmail, VRFY responses      377
Queries, DNS      82—87
Queso tool      103—104
Quotas      17—18
r- commands      239—241 323—327
race conditions      272—274
Ramen worm      149—152 413
Raymond, Eric      5—6
RBL (Realtime Blackhole List)      383
Rblsmtpd      384
rc#.d entries      504—508
1 2 3 4 5 6 7 8
blank
Ðåêëàìà
blank
blank
HR
@Mail.ru
       © Ýëåêòðîííàÿ áèáëèîòåêà ïîïå÷èòåëüñêîãî ñîâåòà ìåõìàòà ÌÃÓ, 2004-2024
Ýëåêòðîííàÿ áèáëèîòåêà ìåõìàòà ÌÃÓ | Valid HTML 4.01! | Valid CSS! Î ïðîåêòå