tailieunhanh - HACK PROOFING YOUR NETWORK INTERNET TRADECRAFT phần 3

" Dĩ nhiên, đây là những gì diễn ra trong các diễn đàn nào. Chúng tôi không có ý tưởng những gì các cuộc đàm phán tư nhân có thể xảy ra, nếu có. Đó là chưa rõ có bao nhiêu của các loại chi tiêu các nỗ lực để tìm hiểu các kỹ năng cho bản thân. | 68 Chapter 3 Classes of Attack Introduction To properly protect your network you must be aware of the types of attacks that can be launched against it. This chapter covers the various classes of attack that you may encounter and gives you ideas on how to protect against them. New exploits are created almost daily but normally they will fall into one of the classes identified in this chapter. It is important to remember that attacks come from both inside and outside your firewall. This chapter attempts to cover some of the more common attacks but an entire book could be written on every attack that is out there. Keep this fact in mind as you read through this chapter do not become comfortable thinking that you are protected from all attacks just because you have taken the precautions mentioned here. What Are the Classes of Attack The classes of attack that are examined in this chapter are denial-of-service information leakage file creation reading modification and removal misinformation special file database access and elevation of privileges. Let s start with denial-of-service. Denial-of-Service What is a denial-of-service DoS attack A DoS attack takes place when availability to a resource is intentionally blocked or degraded due to maliciousness. In other words the attack impedes the availability of the resource to its regular authorized users. The attack may concentrate on degrading processes degrading storage capability destroying files to render the resource unusable or shutting down parts of the system or processes. Let s take a closer look at each of these items. Degrading processes occurs when the attacker reduces performance by overloading the target system by either spawning multiple processes to eat up all available resources of the host system or by spawning enough processes to overload the central processing unit CPU . A simple UNIX fork bomb can be used to degrade processes on a system by recursively spawning copies of itself until the system runs out

TỪ KHÓA LIÊN QUAN
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.