< Day Day Up > |
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] UDP listener covert channel ports, security risks of protocol Ultra Edit umask command UNION command Universal Root Kit (URK) Unix access control application-specific access controls binary logs building a honeynet daytime service, security risks dd command directory sticky bit echo ports, security risks file attributes file permissions groups history log analysis remote logging Windows logging framework integration network protocols network security attacks on [See Unix attacks] automated hardening backups BIOS passwords daemons eavesdropping, prevention filesystem permissions hardening host-based firewalls login security NFS and NIS physical security removal of insecure software resource control SSH 2nd system configuration changes system logging and accounting system patches TCP wrappers 2nd /tmp directory, risks of user management X Windows passwords 2nd encrypted vs. nonencrypted storage in files process accounting remote logging root runtime monitoring system logging 2nd [See also logfiles] vendor web sites Unix attacks application crashing boot prompt attacks chroot command, circumvention DoS (denial-of-service) filling kernel data structures local attacks DoS (denial-of-service) network attacks password attacks path abuse ports most frequently attacked screensaver attacks SUID TCP services /tmp and symlink /hardlink abuse Unix binary logs Unix shell history unpackers ProcDump UPDATE command uplddrvinfo.htm UPnP (Universal Plug and Play) buffer overflow attack using URK (Universal Root Kit) user processes, Windows CE usernames |
< Day Day Up > |