Chinaunix首页 | 论坛 | 博客
  • 博客访问: 1148427
  • 博文数量: 153
  • 博客积分: 10576
  • 博客等级: 上将
  • 技术积分: 2137
  • 用 户 组: 普通用户
  • 注册时间: 2007-12-02 21:01
文章分类

全部博文(153)

文章存档

2009年(43)

2008年(110)

分类: 网络与安全

2008-04-07 15:16:55

Attack Descriptions

back Denial of service attack against apache webserver where a client requests a URL containing many backslashes. 
 
crashiis A single, malformed http request causes the webserver to crash.
 
dict Guess passwords for a valid user using simple variants of the account name over a telnet connection. 
 
eject Buffer overflow using eject program on Solaris. Leads to a user->root transition if successful. 
 
ffb Buffer overflow using the ffbconfig UNIX system command leads to root shell 
 
format Buffer overflow using the fdformat UNIX system command leads to root shell 
 
ftp-write Remote FTP user creates .rhost file in world writable anonymous FTP directory and obtains local login. 
 
guest Try to guess password via telnet for guest account. 
 
httptunnel There are two phases to this attack: 
Setup - a  web "client" is setup on the machine being attacked, which is configured, perhaps via crontab, to periodically make requests of a "ser ver" running on a non-privilaeged port on the attacking machine.
Action - When the periodic requests are recieved, the server encapsulates commands to be run by the "client" in a cookie.. things like "cat /etc/passwd".. etc..
 
imap Remote buffer overflow using imap port leads to root shell 
 
ipsweep Surveillance sweep performing either a port sweep or ping on multiple host addresses. 
 
land Denial of service where a remote host is sent a UDP packet with the same source and destination 
 
loadmodule Non-stealthy loadmodule attack which resets IFS for a normal user and creates a root shell 
 
mailbomb A Denial of Service attack where we send the mailserver many large messages for delivery in order to slow it down, perhaps effectively halting normal operation.
 
multihop Multi-day scenario in which a user first breaks into one machine 
 
neptune Syn flood denial of service on one or more ports. 
 
nmap Network mapping using the nmap tool. Mode of exploring network will vary--options include SYN 
 
ntinfoscan A process by which the attacker scans an NT machine for information concerning its configuration, including ftp services, telnet services, web services,  system account information, file systems and permissions.
 
perlmagic Perl attack which sets the user id to root in a perl script and creates a root shell 
 
phf Exploitable CGI script which allows a client to execute arbitrary commands on a machine with a misconfigured web server. 
 
pod Denial of service ping of death 
 
portsweep Surveillance sweep through many ports to determine which services are supported on a single host. 
 
ps Ps takes advantage of a racecondition in the ps command in Sol. 2.5, allowing a user to gain root access.
 
rootkit Multi-day scenario where a user installs one or more components of a rootkit 
 
satan Network probing tool which looks for well-known weaknesses. Operates at three different levels. Level 0 is light 
 
secret
 
smurf Denial of service icmp echo reply flood. 
 
spy Multi-day scenario in which a user breaks into a machine with the purpose of finding important information where the user tries to avoid detection. Uses several different exploit methods to gain access. 
 
syslog Denial of service for the syslog service connects to port 514 with unresolvable source ip. 
 
teardrop Denial of service where mis-fragmented UDP packets cause some systems to reboot. 
 
warez User logs into anonymous FTP site and creates a hidden directory. 
 
warezclient Users downloading illegal software which was previously posted via anonymous FTP by the warezmaster. 
 
warezmaster Anonymous FTP upload of Warez (usually illegal copies of copywrited software) onto FTP server. 
阅读(2376) | 评论(0) | 转发(0) |
给主人留下些什么吧!~~