"Lend thy serious hearing to what i shall unfold."
  -- Shakespeare
 
Wishes and fears, memories and beliefs, secrets and dreams.

   
Pictures
  Recent Pics
  baby pics
  tennessee pix
  Misc Pix
  ISS Game
  MY CAR WRECK
  Rain pix
  Bubble bath
  Pigtail pix
  More pix
  Ladybug
  Koolaid and pix.
  belly piercing
  el8 shirts
  Pumpcon
  Interview Amity
  Snow pix

About
  About Angieb
  Content
  How 2 Bag n IRCH0E
  What's up
  IRC
  Music
  Aesthetics

Links
  Links
   Silicon Graphics
   Dangergrl
   b0w
   cDc
   food.com
   hoe e'zine
   Phrack
   IRCH0E
   Cameo's Page!.
   r00t
   Kiad's sexlist!
   pea!@#
   CDRom.com
   HDF
   My sistah Kym
   Sloppy rools!#@!
   route
   Juliet
   X
   max-q
   jennicide

Cheerleading
  Cheerleading
  Cars
  Quotes

Stardust
  Stardust
  Ambitions
  Metaleye
  Drown
  Curses
  Holy
  Belfast
  Neverready
  Ride
  Thirst




Angieb's page started Feb 6, 1999 updated regualrly when i feel like it which isn't all too often..


Send me mail


 
   

  Unix Security .

 
Unix Security Info.



  Advisories

 
A number of groups from around the world provide information about security vulnerabilities and methods to remove or reduce the danger of particular vulnerabilities for different computer operating systems.



  Documents

 
Many articles have been written about various topics in computer and network security that have been published on the Internet.



  Electronic Magazines, Newsletters and News Sites

 
There are some magazines, newsletters and news sites available online that provide timely information about computer security.



  Security Related FAQs (Frequently Asked Questions)

 
A FAQ is a summary document written by knowledgeable individuals for a particular topic and it contains commonly requested information about the topic.



  Groups and Organizations

 
A number of computer security organizations exists that provide information to the public or to their members. 



  Mailing Lists

 
Mailing Lists provide a dialog on areas of interest to the members of the list.



  Newsgroups

 
USENET newsgroups are a series of discussion groups that can be useful to obtain current information of a specific topic. Some newsgroups are a better source of information than others.



  Request for Comments (RFC) on computer and network security topics.

 
A RFC is a document from Internet Engineering Task Force (IETF) containing information about a new proposed standard. 



  World Wide Web (WWW) Sites

 
Many WWW sites provide a large amount of information about various topics in computer security. Some of these sites are simply large indexes but others contain a collection of information on a specific topic.



  Unix Computer Security Checklist

 
AUSCERT, Australian Computer Emergency Response Team; 1995; ASCII Text; 89k A comprehensive checklist for securing your Unix box.



  Packets Found on an Internet

 
Bellovin, Steven M.; 1993; GZip'd Postscript; 32k A very interesting paper describing the various attacks, probes, and miscellaneous packets floating past AT&T Bell Labs' net connection.



  Security Problems in the TCP/IP Protocol Suite

 
Bellovin, Steven M.; 1989; GZip'd Postscript; 10k A broad overview of problems within TCP/IP itself, as well as many common application layer protocols which rely on TCP/IP.



  There Be Dragons

 
Bellovin, Steven M.; 1992; GZip'd Postscript; 58k Another Bellovin paper discussing the various attacks made on att.research.com. This paper is also the source for this page's title.



 
An Advanced 4.3BSD IPC Tutorial

 
Berkeley CSRG; date unknown; GZip'd Postscript; 60k This paper describes the IPC facilities new to 4.3BSD. It was written by the CSRG as a supplement to the manpages.



  NFS Tracing by Passive Network Monitoring

 
Blaze, Matt; 1992; ASCII Text Blaze, now famous for cracking the Clipper chip while at Bell Labs, wrote this paper while he was a PhD candidate at Princeton.



  Network (In)Security Through IP Packet Filtering

 
Chapman, D. Brent; 1992; GZip'd Postscript; 46k Why packet filtering is a difficult to use and not always secure method of securing a network.



  An Evening with Berferd

 
Cheswick, Bill; 1991; GZip'd Postscript; 32k A cracker from the Netherlands is "lured, endured, and studied."



  Design of a Secure Internet Gateway

 
Cheswick, Bill; 1990; GZip'd Postscript; 17k Details the history and design of AT&T's Internet gateway.



  Improving the Security of your Unix System

 
Curry, David, SRI International; 1990; GZip'd Postscript; 99k This is the somewhat well known SRI Report on Unix Security. It's a good solid starting place for securing a Unix box.



  With Microscope & Tweezers

 
Eichin & Rochlis; 1989; GZip'd Postscript.gz; 99k An analysis of the Morris Internet Worm of 1988 from MIT's perspective.



  The COPS Security Checker System

 
Farmer & Spafford; 1994; GZip'd Postscript; 45k The original Usenix paper from 1990 republished by CERT in 1994.



  COPS and Robbers

 
Farmer, Dan; 1991; ASCII Text This paper discusses a bit of general security and then goes into detail regarding Unix system misconfigurations, specifically ones that COPS checks for.



  Improving The Security of Your System by Breaking Into It

 
Farmer & Venema; date unknown; HTML An excellent text by Dan Farmer and Wietse Venema. If you haven't read this before, here's your opportunity.



  A Unix Network Protocol Security Study: NIS

 
Hess, Safford, & Pooch; date unknown; GZip'd Postscipt; 20k Outlines NIS and its design faults regarding security.



  A Simple Active Attack Against TCP

 
Joncheray, Laurent; 1995; GZip'd Postscript; 90k This paper describes an active attack against TCP which allows re-direction (hijacking) of the TCP stream.



  Foiling the Cracker

 
Klein, Daniel; GZip'd Postscript; 38k A Survey of, and Improvements to, Password Security. Basically a treatise on how to select proper passwords.



  A Weakness in the 4.2BSD Unix TCP/IP Software

 
Morris, Robert T; 1985; GZip'd Postscript; 10k This paper describes the much ballyhooed method by which one may forge packets with TCP/IP. Morris wrote this in 1985. It only took the media 10 years to make a stink about it!



  Covering Your Tracks

 
Phrack Vol. 4, Issue #43; GZip'd Postscript; 16k A Phrack article describing the unix system logs and how it is possible to reduce the footprint and visibility of unauthorized access.



  Cracking Shadowed Password Files

 
Phrack Vol. 5 Issue #46 GZip'd Postscript; 19k A Phrack article describing how to use the system call password function to bypass the shadow password file.



  Thinking About Firewalls

 
Ranum, Marcus; Gzip'd Postscript; 30k A general overview of firewalls, with tips on how to select one to meet your needs.



  An Introduction to Internet Firewalls

 
Wack & Carnahan for NIST; Gzip'd Postscript; 600k This is a special publication of the National Institute of Standards and Technology which provides a solid introduction to firewalls concepts and uses.



  TCP Wrapper

 

Venema, Wietse; Gzip'd Postscript; 13k Wietse's paper describing his TCP Wrapper concept, the basis for the TCP Wrappers security and logging suite.



  Miscellaneous Information

 



  Intercepted White House Pager Transcripts [inch.com]

 
April 27, 1997; Interceptor Unknown Well, well, well! It seems the Feds have fallen victim to their own short-sightedness. By restricting secure, cheap encryption in consumer grade products (like the pagers they evidently use) the Feds forestall (but only for a time I'd bet) the tool which would have saved them this embarrasment. My favorite line is "DON'T FORGET TO PAGE ME TONIGHT WHEN YOU WANT ME IN YOUR ROOM". I wonder who was going to whom's room, and what for what purpose... Hehe. Of course, the Feds know their pagers can be traced. Question is, did you?



  Generic Unix Security Information

 
CERT Advisory Team, 1993, ASCII A good general commentary on Unix security, with specific places to look for suspicious files if you believe your machine's security may be compromised. It's a bit dated, so don't pay attention to the version numbers (Sendmail 8.6.4 is definitely not current anymore!)



  HP-UX Boot Single User

 
The magic incantation for booting an HP-700 series machine into single user mode.



  IP Spoofing

 
CERT Advisory Team, 1995, ASCII Not too exciting, but useful for the uninitiated.



  Securing Anon FTP Servers

 
CERT Advisory Team, 1995, ASCII This CERT advisory details the access permissions and server configuration which should be followed to prevent anonymous FTP security breaches.



  Source Routing Info

 
An interesting discussion of TCP/IP stuff from comp.security.unix.



  TCP SYN Flood (Phrack)

 
From Phrack Volume 7, Issue 48. Includes explanation of this denial-of-service attack as well as Linux source implementation.



  TCP SYN Flood (CERT)

 
Here's the CERT advisory warning of the above article.



 

Unix-based Software

 
Sorted by Name



  arnudp.c

 
Source code demonstrates how to send a single UDP packet with the source/destination address/port set to arbitrary values.



  block.c

 
Prevents a user from logging in by monitoring utmp and closing down his tty port as soon as it appears in the system.



  COPS (V1.04)

 
COPS (Computer Oracle and Password System) checks for many common Unix system misconfigurations. I find this tool very valuable, as it is non-trivial to break a system which has passed a COPS check. I run it on all the systems I admin. It's getting a bit old, but it's still an excellent way to systematically check for file permission mistakes.



  Crack (V4.1)

 
Crack is a tool for insuring that your Unix system's users have not selected easily guessed passwords which appear in standard dictionaries. (Only a very small dictionary is included so grab the one below if you wish.)



  Crack Dictionary

 
A general 50,000 word dictionary for use with Crack.



  esniff.c

 
Source for a basic ethernet sniffer. Originally came from an article in Phrack, I think.



  fping

 
Like Unix ping(1), but allows efficient pinging of a large list of hosts. V2.2.



  hide.c

 
Code to exploit a world-writeable /etc/utmp and allow the user to modify it interactively.



  ICMPinfo (V1.10)

 
ICMPinfo is a tool for looking at the ICMP messages received on the running host.



  identd.c

 
A modified identd that tests for the queue-file bug which is present in Sendmail versions earlier than 8.6.10 and possibly some versions of 5.x.



  ISS (V1.3)

 
The Internet Security Scanner is used to automatically scan subnets and gather information about the hosts it finds, including the guessing of YP/NIS domainnames and the extraction of passwd maps via ypx. It also does things like check for verisons of sendmail which have known security holes.



  listhosts.c

 
Requests a DNS name server to do a zone transfer and list the hosts it knows about.



  LSOF (V3.50)

 
List All Open Files. Displays a listing of all files open on a Unix system. Useful for nosing around as well as trying to locate stray open files when trying to unmount an NFS-served partition.



  mnt

 
This program demonstrates how to exploit a security hole in the HP-UX 9 rpc.mountd program. Essentially, it shows how to steal NFS file handles which will allow access from clients which do not normally have privileges.



  netcat (V1.10)

 
Like Unix cat(1) but this one talks network packets (TCP or UDP). Very very flexible. Allows outbound connections with many options as well as life as a daemon, accepting inbound connections and allowing commands to be executed. Now at version 1.1!



  NFS-Bug

 
Demonstrates a bug in NFS which allows non-clients to access any NFS served partition. AIX & HPUX patches included.



  NFS Shell

 
A shell which will access NFS disks. Very useful if you have located an insecure NFS server.



  RootKit

 
A suite of programs like ps, ls, & du which have been modified to prevent display of certain files & processes in order to hide an intruder. Modified Berkeley source code.



  rpc_chk.sh

 
Bourne shell script to get a list of hosts from a DNS nameserver for a given domain and return a list of hosts running rexd or ypserve.



  seq_number.c

 
Code to exploit the TCP Sequence Number Generator bug. An brief but clear explanation of the bug can be found in Steve Bellovin's



  sequence number comment.

 
Note thatthis code won't compile as-is because it is missing a library that does some of the low-level work. This is how the source was released by Mike Neuman, the author. See his



  Bugtraq post

 
for more info.



  Socket Demon (V1.3)

 
Daemon to sit on a specified IP port and provide passworded shell access.



  Solaris Sniffer

 
A version of E-Sniff modified for Solaris 2.



  Strobe (V1.03)

 
Strobe uses a bandwidth-efficient algorithm to scan TCP ports on the target machine and reveal which network server daemons are currently running. Version 1.03 is an update to 1.02.



  Telnetd Exploit

 
This tarfile contains source code to the getpass() and openlog() library routines which /bin/login can be made to link at runtime due to a feature of telnetd's environment variable passing. Root anyone? The fix is to make sure your /bin/login is statically linked.



  Tiger (V2.2.3)

 
Tiger attempts to exploit known bugs, holes, and misconfigurations in order to attain root. It is similar to COPS, but has system specific extensions for SunOS, IRIX, AIX, HPUX, Linux and a few others.



  Traceroute

 
Traceroute is an indispensable tool for troubleshooting and mapping your network.



  ttysurf.c

 
A simple program to camp out on the /dev/tty of your choice and capture logins & passwords when users log into that tty.



  xcrowbar.c

 
Source code demonstrates how to get a pointer to an X Display Screen, allowing access to a display even after "xhost -" has disabled acess. Note that access must be present to read the pointer in the first place! (Originally posted to USENET's comp.unix.security.)



  xkey.c

 
Attach to any X server you have perms to and watch the user's keyboard.



  X Watch Window

 
If you have access permission to a host's X server, XWatchWin will connect via a network socket and display the window on your X server.



  YPX

 
YP/NIS is a horrible example of "security through obscurity." YPX attempts to guess NIS domain names, which is all that's needed to extract passwd maps from the NIS server. If you already know the domain name, ypx will extract the maps directly, without configuring a host to live in the target NIS domain. (GZip'd Bourne Shell Archive)



  ypsnarf.c

 
Exercise security holes in YP / NIS.



  DOS & Windows-based Software

 



  sniff.c or sniff.exe

 
DOS based Ethernet sniffer with logs readable by sniffod.c filtering tool. Requires a packet driver at 0x60.



  sniffod.c or sniffod.exe

 
DOS based filter for sniff.c logs.



  Etherdump

 
Etherdump is a vanilla DOS Ethernet sniffer. Dumps all frames to a file. Filtering is not supported, unfortunately.



  Etherload

 
Etherload is a utility for measuring performance and other characteristics of Ethernets, such as packet origination via the MAC address.