COMPUTER SECURITY ANALYSIS

COMPUTER SECURITY ANALYSIS - = =INTRODUCTION TO DENIAL OF...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
=================================== =INTRODUCTION TO DENIAL OF SERVICE= =================================== = Brian -------- B Bri000001@aol.com Last updated: Friday, March 28, 1997 10:19:23 AM 10:19:23 L .0. FOREWORD . .A. INTRODUCTION .A.1. WHAT IS A DENIAL OF SERVICE ATTACK? .A.2. WHY WOULD SOMEONE CRASH A SYSTEM? .A.2.1. INTRODUCTION .A.2.2. SUB-CULTURAL STATUS .A.2.3. TO GAIN ACCESS .A.2.4. REVENGE .A.2.5. POLITICAL REASONS .A.2.6. ECONOMICAL REASONS .A.2.7. NASTINESS .A.3. ARE SOME OPERATING SYSTEMS MORE SECURE? . .B. SOME BASIC TARGETS FOR AN ATTACK .B.1. SWAP SPACE .B.2. BANDWIDTH .B.3. KERNEL TABLES .B.4. RAM .B.5. DISKS .B.6. CACHES .B.7. INETD . .C. ATTACKING FROM THE OUTSIDE .C.1. TAKING ADVANTAGE OF FINGER .C.2. UDP AND SUNOS 4.1.3. .C.3. FREEZING UP X-WINDOWS .C.4. MALICIOUS USE OF UDP SERVICES .C.5. ATTACKING WITH LYNX CLIENTS .C.6. MALICIOUS USE OF telnet .C.7. MALICIOUS USE OF telnet UNDER SOLARIS 2.4 .C.8. HOW TO DISABLE ACCOUNTS .C.9. LINUX AND TCP TIME, DAYTIME .C.10. HOW TO DISABLE SERVICES .C.11. PARAGON OS BETA R1.4 .C.12. NOVELLS NETWARE FTP .C.13. ICMP REDIRECT ATTACKS .C.14. BROADCAST STORMS .C.15. EMAIL BOMBING AND SPAMMING .C.16. TIME AND KERBEROS .C.17. THE DOT DOT BUG .C.18. SUNOS KERNEL PANIC .C.19. HOSTILE APPLETS .C.20. VIRUS .C.21. ANONYMOUS FTP ABUSE .C.22. SYN FLOODING .C.23. PING FLOODING .C.24. CRASHING SYSTEMS WITH PING FROM WINDOWS 95 MACHINES
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
.C.25. MALICIOUS USE OF SUBNET MASK REPLY MESSAGE .C.26. FLEXlm .C.27. BOOTING WITH TRIVIAL FTP . .D. ATTACKING FROM THE INSIDE .D.1. KERNEL PANIC UNDER SOLARIS 2.3 .D.2. CRASHING THE X-SERVER .D.3. FILLING UP THE HARD DISK .D.4. MALICIOUS USE OF eval .D.5. MALICIOUS USE OF fork() .D.6. CREATING FILES THAT IS HARD TO REMOVE .D.7. DIRECTORY NAME LOOKUPCACHE .D.8. CSH ATTACK .D.9. CREATING FILES IN /tmp .D.10. USING RESOLV_HOST_CONF .D.11. SUN 4.X AND BACKGROUND JOBS . .D.12. CRASHING DG/UX WITH ULIMIT .D.13. NETTUNE AND HP-UX .D.14. SOLARIS 2.X AND NFS .D.15. SYSTEM STABILITY COMPROMISE VIA MOUNT_UNION .D.16. trap_mon CAUSES KERNEL PANIC UNDER SUNOS 4.1.X . .E. DUMPING CORE .E.1. SHORT COMMENT .E.2. MALICIOUS USE OF NETSCAPE .E.3. CORE DUMPED UNDER WUFTPD .E.4. ld UNDER SOLARIS/X86 . .F. HOW DO I PROTECT A SYSTEM AGAINST DENIAL OF SERVICE ATTACKS? .F.1. BASIC SECURITY PROTECTION .F.1.1. INTRODUCTION .F.1.2. PORT SCANNING .F.1.3. CHECK THE OUTSIDE ATTACKS DESCRIBED IN THIS PAPER .F.1.4. CHECK THE INSIDE ATTACKS DESCRIBED IN THIS PAPER .F.1.5. EXTRA SECURITY SYSTEMS .F.1.6. MONITORING SECURITY .F.1.7. KEEPING UP TO DATE .F.1.8. READ SOMETHING BETTER .F.2. MONITORING PERFORMANCE
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 7

COMPUTER SECURITY ANALYSIS - = =INTRODUCTION TO DENIAL OF...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online