tailieunhanh - Breaking into computer networks from the Internet
While I was writing this document a book "Hack Proofing Your Network" was released. I haven't been able to read it (dunno if its in print yet, and besides - everything takes a while to get to South Africa). I did however read the first chapter, as it is available to the public. In this chapter the author writes about different views on IT security - hackers, crackers, script kiddies and everything in between. I had some thoughts about this and decided that it was a good starting point for this document | Breaking into computer networks from the Internet roelof@ 2000 12 31 First run 2001 07 01 Updated a bit 2001 09 20 Added Trojans 2000 2001 Roelof Temmingh SensePost Pty Ltd - 1 - Breaking into computer networks from the Internet Roelof Temmingh SensePost Chapter 0 What is this document about anyway .4 Chapter 1 Setting the Permanent connection leased line cable fiber .6 Mobile GSM How Using the Other Chapter 2 Mapping your Websites MX records. .DNS .10 RIPE ARIN APNIC and Routed or not .16 Traceroute world Reverse DNS Chapter 3 Alive kicking .24 Unrouted nets Ping - Ping -TCP no service wrappers filters .26 Method1 against stateful inspection FWs .26 Method2 against stateless Firewalls .29 Before we go Chapter 4 Loading the General scanners vs. custom The hacker s view on it quick kill example .31 Hacker s view no kill at all .34 Chapter 5 Fire .36 Telnet 23 TCP .36 HTTP 80 TCP .38 HTTPS SSL2 443 TCP .40 HTTPS SSL3 443 TCP .41 HTTP Basic Data Web based ELZA IDS Now what .50 What to execute .53 SMTP 25 TCP .54 FTP 21 TCP reverse .55 DNS 53 TCP UDP .57 Finger 79 TCP .59 NTP 123 UDP .61 RPC portmapper 111 TCP other UDP .61 TFTP 69 UDP .63 SSH 22 TCP .64 - 2 - Breaking into computer networks from the Internet Roelof Temmingh SensePost POP3 110 TCP .64 SNMP 161 UDP .65 Proxies 80 1080 3128 8080 TCP .66 X11 6000 TCP .67 R-services rshell rlogin 513 514 TCP .68 NetBIOS SMB 139 TCP .68 Chapter 6 Now what .70 Only port 139 open - administrator Port 21 Port 80 open and can Port 80 and port 139 What to execute .74 What to execute .76 Things that do not fit in anywhere - Network level attack - Source port 20 53 .77 Other .
đang nạp các trang xem trước