Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Hatch B., Lee J., Kurtz G. — Hacking linux exposed: linux security secrets & solutions
Hatch B., Lee J., Kurtz G. — Hacking linux exposed: linux security secrets & solutions



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Hacking linux exposed: linux security secrets & solutions

Авторы: Hatch B., Lee J., Kurtz G.

Аннотация:

If you have a vulnerable computer attached to the BIG BAD INTERNET, sooner or later your box will be compromised. Notice I prefer the term compromised to hacked. Hacking is a benign activity. You hack out of curiosity and [hopefully] with prior permission. Can this be done? Can I get into this box? How is he trying to keep me out? What stone has he left unturned? Woops: He has a bulletproof firewall but he left this one vulnerable cgi script in his httpd directory: HA! I'M IN! At that point the correct thing to do is to stop and notify the hackee. But once a hacker gets in, (especially if he is there without permission) the temptation to quietly mess around and cover his guilty tracks is usually overwhelming. Then it has gone from hacking to compromising someone else's box.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2001

Количество страниц: 566

Добавлена в каталог: 02.12.2005

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Viruses vs. trojans      146
Viruses, described      146
Viruses, email programs and      147
Viruses, Linux and      147—148
Viruses, Melissa virus      146
Viruses, methods of spreading      147
Viruses, scanning software      148
Viruses, UNIX and      148
VMailer      See "Postfix"
VMWare      164
VRFY command      376—377
Wall, Larry      6
wardialing      157 185—186
Warez      4 60
Web      See also "Web sites"
Web browsers, HTTP requests      418—425
Web browsers, proxy servers and      438—439
Web farms      455—456
Web pages, cookies      See "Cookies"
Web pages, defacement of      60
Web pages, JavaScript      451—452
Web pages, password protected      304
Web pages, referer headers      448
Web servers      417—457 See
Web servers, AOL server      456
Web servers, Apache Web server      See "Apache Web server"
Web servers, awk-httpd server      456
Web servers, back-door CGIs      350—351
Web servers, bash-httpd server      456
Web servers, break-ins      528—541
Web servers, CGI problems      439—456
Web servers, CGIs shipped with      440—442
Web servers, connections to      418—419
Web servers, displaying status      437—438
Web servers, files to monitor      351
Web servers, hacking from local account      538—539
Web servers, header information      419—120
Web servers, HTTP requests      418—425
Web servers, IP forwarding and      218
Web servers, Jigsaw server      456
Web servers, listed      456
Web servers, netcat connection to      536—537
Web servers, nmap scans      528—529
Web servers, probing      529—531
Web servers, restricting file access      427—428
Web servers, root user and      426
Web servers, scanning      528—529
Web servers, SSL and      424
Web servers, SuiteSpot program      187
Web servers, symbolic links      427—428
Web servers, telnet      418—419
Web servers, thttpd server      456
Web sites, "The Cathedral and the Bazaar" monograph      5—6
Web sites, AIDE      52
Web sites, AOL server      456
Web sites, awk-httpd server      456
Web sites, bash-httpd server      456
Web sites, buffer overflows      265
Web sites, Bugtraq      71
Web sites, Checkpoint      486
Web sites, confidential information on      420—421
Web sites, COPS      25
Web sites, Crack program      290 294
Web sites, encryption      422—424
Web sites, firewall scripts      480
Web sites, FireWall Tool Kit      486
Web sites, Floppyfw router      486
Web sites, Gauntlet firewall      486
Web sites, GNU Privacy Guard      388
Web sites, Hacking Exposed      512
Web sites, hacking information      511—512
Web sites, Halloween Document      6
Web sites, insecure CGIs and      431—434
Web sites, ISPs and      455—456
Web sites, Jigsaw server      456
Web sites, John the Ripper program      295
Web sites, Linux capabilities      20
web sites, Linux distributions      510
Web sites, Linux kernel code      359
Web sites, Linux Router project      486
Web sites, Nabou program      26 59
Web sites, Netfilter      479
Web sites, network devices      191—192
Web sites, npasswd program      310—311
Web sites, OPIE      312
Web sites, ORBS      383
Web sites, packetstorm      298 299
Web sites, password crackers      298 299
Web sites, Pluggable Authentication Modules      305
Web sites, Pretty Good Privacy      309
Web sites, RBL      383
Web sites, Security Focus      440
Web sites, security resources      511—512
Web sites, SINUS firewall      486
Web sites, sniffers      196
Web sites, Sonicwall product      486
Web sites, SSL and      422—424
Web sites, SSL certificates and      220
Web sites, StackGuard compiler      267
Web sites, thttpd server      456
Web sites, Tiger utility      26
Web, confidential data on      420—424
Web, denial-of-service attacks      232—239
Web, domain names      73—75
Web, firewalls      See "Firewalls"
Web, mailing lists      71—73
Web, newsgroups      71—73
Web, online searches      70—73
Web, packets      See "Packets"
Web, protecting data      421
Web, telnet      See "Telnet connections"
Webmin tool      193
Webmitm program      227 229—232
Webspy program      227
Wheel groups      259—260
Whisker tool      440
whitespace characters      281
whois command      73 516
whois databases      73—77
whois queries      76—77
whois.arin.net database      76—77
Wildcards      467
Window scans      96
Windows platform, dual booting      163—164
Windows platform, fingerprinting and      105—106
Windows platform, OS detection and      105—106
Workplace, attacks to      156—163
Workplace, dumpster diving      158—159
Workplace, employee directories      137
Workplace, information gathering tools      137
Workplace, precautions      158
worms      146—152 See
Worms, described      146
Worms, email programs and      147
Worms, file sharing and      147
Worms, Linux and      148—152
Worms, methods of spreading      147
Worms, Morris Internet worm      149 371
Worms, Ramen worm      149—152 413
Worms, UNIX and      149 152
wrappers      529—531 See
Write access      35
write permission      13
wtmp file      61
wu-ftpd banner      396—398
wu-ftpd service      200 201
X Windows system      189—190
X11 forwarding      190
xconf.pl program      462—464
Xftp FTP client      405 407
xhost facility      189
xinetd      461—464
xinetd, configuration      462—464
xinetd, features      461—462
xinetd, host access control with      467—469
xinetd, overview      461—464
xinetd, resource exhaustion and      475—476
xinit program      189
Xkey program      189
XMAS tree scans      95 96 100
Xscan program      189
YaST (Yet another Startup Tool)      508
yast2      508
zone transfers      84—86
\ (backslash)      450 465
\0 (null character)      451
| (vertical bar)      450
~ (tilde)      432
1 2 3 4 5 6 7 8
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте