下载此文档

网络安全.ppt


文档分类:IT计算机 | 页数:约38页 举报非法文档有奖
1/38
下载提示
  • 1.该资料是网友上传的,本站提供全文预览,预览什么样,下载就什么样。
  • 2.下载该文档所得收入归上传者、原创者。
  • 3.下载的文档,不会出现我们的网址水印。
1/38 下载此文档
文档列表 文档介绍
网络安全 By Blank Zhang Agenda ? 1. From Outside ? Packet level protocol issue ? Lower level protocols ? Direct Attacks ? 2. User-Level Local Attacks ? Buffer Overflow ? ld_preload ? Dictionary Attack ? 3. Root-Level Local Attacks ? Rootkits & Backdoor ? Kernel Modules A Typical Setup of a TCP Connection A typical tear down of TCP connection ? Sequence No. & Flags ? The sequence number in a packet corresponds to the first byte of data in that packet. ? The acknowledgement number holds the value of the next expected sequence number, implicitly acknowledging all data up until that number. ? In addition to SYN and ACK, there are other flags: - FIN: I would like to close this connection now - PSH: please push all the data currently queued - URG: This message is urgent, please interrupt the current connectioin . Note that the response to this is highly implementation- dependent - RST: something has gone wrong, please reset this connection Ways to exploit the TCP protocol ? Sequence No. Prediction ? IP spoofing ? SYN flooding ? Land Attack ? Sniping ? Hijacking Sequence No. Prediction ? After a client send a SYN packet to the server, the server will response SYN+ACK with a sequence number of choosing, which then must be ACK by the client. ? This sequence number is predictable, the attack connects to a service first with its own IP address, records the sequence number chosen, then opens a second connection from a forged IP address. ? The attack doesn ’ t see the AYN+ACK from the server, but can guess the correct responses. If the source IP address is used for authentication, then the attacker can use the one-munication to break into the server. IP Spoofing ? In general, an attacker can claim to be from a different IP than he actually is, by setting the packet source address to the IP address of a different (possibly non-existent) host. ? This makes it easier to convince the target of a different identity in certain trust-based attacks, and also makes it

网络安全 来自淘豆网m.daumloan.com转载请标明出处.

相关文档 更多>>
非法内容举报中心
文档信息
  • 页数38
  • 收藏数0 收藏
  • 顶次数0
  • 上传人wangzhidaol
  • 文件大小0 KB
  • 时间2016-06-07
最近更新