⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 ch08.htm

📁 Maximum Security (First Edition) 网络安全 英文版
💻 HTM
📖 第 1 页 / 共 5 页
字号:
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN"><HTML><HEAD>		<TITLE>Maximum Security -- Ch 8 -- Internet Warfare</TITLE></HEAD><BODY TEXT="#000000" BGCOLOR="#FFFFFF"><CENTER><H1><IMG SRC="../button/samsnet.gif" WIDTH="171" HEIGHT="66" ALIGN="BOTTOM" BORDER="0"><BR><FONT COLOR="#000077">Maximum Security: </FONT></H1></CENTER><CENTER><H2><FONT COLOR="#000077">A Hacker's Guide to Protecting Your Internet Site and Network</FONT></H2></CENTER><CENTER><P><A HREF="../ch07/ch07.htm"><IMG SRC="../button/previous.gif" WIDTH="128" HEIGHT="28"ALIGN="BOTTOM" ALT="Previous chapter" BORDER="0"></A><A HREF="../ch09/ch09.htm"><IMGSRC="../button/next.gif" WIDTH="128" HEIGHT="28" ALIGN="BOTTOM" ALT="Next chapter"BORDER="0"></A><A HREF="../index.htm"><IMG SRC="../button/contents.gif" WIDTH="128"HEIGHT="28" ALIGN="BOTTOM" ALT="Contents" BORDER="0"></A> <HR></CENTER><CENTER><H1><FONT COLOR="#000077">8</FONT></H1></CENTER><CENTER><H1><FONT COLOR="#000077">Internet Warfare</FONT></H1></CENTER><P>The Internet is an amazing resource. As you sit before your monitor, long afteryour neighbors are warm and cozy in their beds, I want you to think about this: Beyondthat screen lies 4,000 years of accumulated knowledge. At any time, you can reachout into the void and bring that knowledge home.</P><P>There is something almost metaphysical about this. It's as though you can fuseyourself to the hearts and minds of humanity, read its innermost inspirations, itstriumphs, its failures, its collective contributions to us all. With the averagesearch engine, you can even do this incisively, weeding out the noise of things youdeem nonessential.</P><P>For this reason, the Internet will ultimately revolutionize education. I'm notreferring to home study or classes that save time by virtue of teaching 1,000 studentssimultaneously. Although these are all useful techniques of instruction that willundoubtedly streamline many tasks for teachers and students alike, I am referringto something quite different.</P><P>Today, many people have forgotten what the term <I>education</I> really means.Think back to your days at school. In every life there is one memorable teacher:One person who took a subject (history, for example) and with his or her words, broughtthat subject to life in an electrifying display. Through whatever means necessary,that person transcended the identity of <I>instructor</I> and entered the realm ofthe <I>educator</I>. There is a difference: One provides the basic information neededto effectively pass the course; the other <I>inspires</I>.</P><P>The Internet can serve as a surrogate educator, and users can now inspire themselves.The other night, I had dinner with a heavy-equipment operator. Since his childhood,he has been fascinated with deep space. Until recently, his knowledge of it was limited,primarily because he didn't have enough resources. He had a library card, true, butthis never provided him with more than those books at his local branch. Only on twooccasions had he ever ordered a book through inter-library loan. At dinner, he explainedthat he had just purchased a computer and gone online. There, he found a river ofinformation. Suddenly, I realized I was no longer having dinner with a heavy-equipmentoperator; I was dining with an avid student of Einstein, Hawking, and Sagan. Histalk was so riveting that I went away hungry for lack of having eaten.</P><P>So this much is true: The Internet is a an incredible resource for information.However, it is also an incredible resource for communication and basic human <I>networking</I>.Networking from a human standpoint is different from computer networking; human networkingcontains an added ingredient called <I>action</I>. Thus, individuals from all overthe world are organizing (or I should say, crystallizing) into groups with sharedinterests. Women are organizing for equality, voters are organizing for representation,and parents are organizing for legislation to protect their children.</P><P>Inherent within this process is the exchange of opinions, or more aptly put, ideology.Ideology of any sort is bound to bring controversy, and controversy brings disagreement.Whether that disagreement occurs between two nations or between two individuals isirrelevant. When it occurs on the Internet, it often degenerates into warfare. Thatis what this chapter is about.</P><P>Much like the term <I>information</I> <I>warfare</I>, the term <I>Internet</I><I>warfare</I> is often misunderstood. To understand Internet warfare, you must knowthat there are different classifications of it. Let's start with those classifications.From there, we can discuss warfare at its most advanced levels. The classificationsare</P><UL>	<LI>Personal Internet warfare	<LI>Public Internet warfare	<LI>Corporate Internet warfare	<LI>Government Internet warfare</UL><P>More generally, <I>Internet warfare</I> is activity in which one or more participantsutilize tools over the Internet to attack another or the information of another.The objective of the attack may be to damage information, hardware, or software,or to deny service. Internet warfare also involves any defensive action taken torepel such an attack.</P><P>Such warfare may be engaged in by anyone, including individuals, the general public,corporations, or governments. Between these groups, the level of technology varies(by <I>technology</I>, I am referring to all aspects of the tools required, includinghigh-speed connections, software, hardware, and so forth). In general, the levelof technology follows an upward path, as expressed in Figure 8.1.</P><P><A NAME="01"></A><A HREF="01.htm"><B>Figure 8.1.</B></A><B><BR></B><I>The level of technology in Internet warfare.</I></P><BLOCKQUOTE>	<P><HR><FONT COLOR="#000077"><B>NOTE:</B></FONT><B> </B>The categories Public and Individual	may seem confusing. Why are they not included together? The reason is this: A portion	of the public fails to meet the requirements for either corporate forces or individuals.	This portion is composed of middle-level businesses, ISPs, universities, and so on.	These groups generally have more technologically advanced tools than individuals,	and they conduct warfare in a different manner. <HR></BLOCKQUOTE><P>As you might guess, there are fundamental reasons for the difference between thesegroups and the tools that they employ. These reasons revolve around economic andorganizational realities. The level of technology increases depending upon certainrisks and demands regarding security. This is graphically illustrated in Figure 8.2.</P><P><A NAME="02"></A><A HREF="02.htm"><B>Figure 8.2.</B></A><B><BR></B><I>Risks and demands as they relate to various levels of technology.</I></P><P>Naturally, government and corporate entities are going to have more financialresources to acquire tools. These tools will be extremely advanced, created by vendorswho specialize in high-performance, security-oriented applications. Such applicationsare generally more reliable than average tools, having been tested repeatedly undera variety of conditions. Except in extreme cases (those where the government is developingmethods of destructive data warfare for use against foreign powers), nearly all ofthese tools will be defensive in character.</P><P>Public organizations tend to use less powerful tools. These tools are often <I>shareware</I>or <I>freeware</I>, which is freely available on the Internet. Much of this softwareis designed by graduate students in computer science. Other sources include companiesthat also sell commercial products, but are giving the Internet community a littletaste of the quality of software available for sale. (Many companies claim to providethese tools out of the goodness of their hearts. Perhaps. In any event, provide themthey do, and that is sufficient.) Again, nearly all of these tools are defensivein character.</P><P>Private individuals use whatever they come across. This may entail shareware orfreeware, programs they use at work, or those that have been popularly reviewed atsites of public interest.<H2><FONT COLOR="#000077"><B>The Private Individual</B></FONT></H2><P>The private individual doesn't usually encounter warfare (at least, not the averageuser). When one does, it generally breaks down to combat with another user. Thistype of warfare can be anticipated and, therefore, avoided. When a debate on theNet becomes heated, you may wish to disengage before warfare erupts. Although ithas been said a thousand times, I will say it again: Arguments appear and work differentlyon the Internet than in person. E-mail or Usenet news messages are delivered in theirentirety, without being interrupted by points made from other individuals. That is,you have ample time to write your response. Because you have that time, you mightdeliver a more scathing reply than you would in person. Moreover, people say themost outrageous things when hiding behind a computer, things they would <I>never</I>utter in public. Always consider these matters. That settled, I want to examine afew tools of warfare between individuals.<H3><FONT COLOR="#000077"><B>The E-Mail Bomb</B></FONT></H3><P>The e-mail bomb is a simple and effective harassment tool. A bomb attack consistsof nothing more than sending the same message to a targeted recipient over and overagain. It is a not-so-subtle form of harassment that floods an individual's mailboxwith junk.</P><P>Depending upon the target, a bomb attack could be totally unnoticeable or a majorproblem. Some people pay for their mail service (for example, after exceeding a certainnumber of messages per month, they must pay for additional e-mail service). To theseindividuals, an e-mail bomb could be costly. Other individuals maintain their ownmail server at their house or office. Technically, if they lack storage, one couldflood their mailbox and therefore prevent other messages from getting through. Thiswould effectively result in a denial-of-service attack. (A denial-of-service attackis one that degrades or otherwise denies computer service to others. This subjectis discussed in Chapter 14, &quot;Destructive Devices.&quot;) In general, however,a bomb attack (which is, by the way, an irresponsible and childish act) is simplyannoying. Various utilities available on the Internet will implement such an attack.</P><P>One of the most popular utilities for use on the Microsoft Windows platform isMail Bomber. It is distributed in a file called <TT>bomb02.zip</TT> and is availableat many cracker sites across the Internet. The utility is configured via a singlescreen of fields into which the user enters relevant information, including target,mail server, and so on (see Figure 8.3).</P><P><A NAME="03"></A><A HREF="03.htm"><B>Figure 8.3.</B></A><B><BR></B><I>The Mail Bomber application.</I></P><P>The utility works via Telnet. It contacts port 25 of the specified server andgenerates the mail bomb. Utilities like this are commonplace for nearly every platform.Some are for use anywhere on any system that supports SMTP servers. Others are morespecialized, and may only work on systems like America Online. One such utility is<I>Doomsday</I>, which is designed for mass mailings over AOL but is most commonlyused as an e-mail bomber. The entire application operates from a single screen interface,shown in Figure 8.4.</P><P><A NAME="04"></A><A HREF="04.htm"><B>Figure 8.4.</B></A><B><BR></B><I>The Doomsday mail bomber.</I></P><BLOCKQUOTE>	<P><HR><FONT COLOR="#000077"><B>NOTE:</B></FONT><B> </B>For several years, the key utility	for AOL users was AOHELL, which included in its later releases a mail-bomb generator.	AOHELL started as a utility used to unlawfully access America Online. This, coupled	with other utilities such as credit-card number generators, allowed users to create	free accounts using fictitious names. These accounts typically expired within two	to three weeks. <HR></BLOCKQUOTE><P>On the UNIX platform, mail bombing is inanely simple; it can be accomplished withjust a few lines. However, one wonders why someone skilled in UNIX would even entertainthe idea. Nevertheless, some do; their work typically looks something like this:</P><PRE><FONT COLOR="#0066FF">#!/bin/perl$mailprog = `/usr/lib/sendmail';$recipient = `victim@targeted_site.com';$variable_initialized_to_0 = 0;while ($variable_initialized_to_0 &lt; 1000) {open (MAIL, &quot;|$mailprog $recipient&quot;) || die &quot;Can't open $mailprog!\n&quot;;print MAIL &quot;You Suck!&quot;;close(MAIL);sleep 3;$variable_initialized_to_0++;}</FONT></PRE><P>The above code is fairly self-explanatory. It initializes a variable to <TT>0</TT>,then specifies that as long as that variable is less than the value <TT>1000</TT>,mail should be sent to the targeted recipient. For each time this program goes throughthe <TT>while</TT> loop, the variable called <TT>$variable_initialized_to_0</TT>is incremented. In short, the mail message is sent 999 times.</P><P>Mail bombing is fairly simple to defend against: Simply place the mailer's identityin a kill or bozo file. This alerts your mail package that you do not want to receivemail from that person. Users on platforms other than UNIX may need to consult theirmail applications; most of them include this capability.</P><P>UNIX users can find a variety of sources online. I also recommend a publicationthat covers construction of intelligent kill file mechanisms: <I>Teach Yourself theUNIX Shell in 14 Days</I> by David Ennis and James Armstrong Jr. (Sams Publishing).Chapter 12 of that book contains an excellent script for this purpose. If you are

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -