apa.htm

来自「Maximum Security (First Edition) 网络安全 英文」· HTM 代码 · 共 1,435 行 · 第 1/5 页

HTM
1,435
字号
<UL>	<LI><A HREF="http://www.ilf.net/~toast/files/"><TT>http://www.ilf.net/~toast/files/</TT></A></UL><P><B>XIT: </B>Cracks UNIX passwords on the DOS platform.<UL>	<LI><A HREF="http://www.ilf.net/~toast/files/xit20.zip"><TT>http://www.ilf.net/~toast/files/xit20.zip</TT></A></UL><P><B>Claymore: </B>A generalized password cracker for Windows.<UL>	<LI><A HREF="http://www.ilf.net/~toast/files/claym10.zip"><TT>http://www.ilf.net/~toast/files/claym10.zip</TT></A></UL><P><B>Guess: </B>Cracks UNIX passwords on the DOS platform. This utility is availableeverywhere. Try the search string <TT>guess.zip</TT>.</P><P><B>PC UNIX Password Cracker:</B> The name of this utility says it all. This toolis hard to find; I know of no reliable locations, but you might try the name as asearch string.</P><P><B>ZipCrack: </B>Cracks the passwords on Zip archives. Try the search string <TT>zipcrk10.zip</TT>.</P><P><B>Password NT: </B>Cracks NT passwords.<UL>	<LI><A HREF="http://www.omna.com/yes/AndyBaron/recovery.htm"><TT>http://www.omna.com/yes/AndyBaron/recovery.htm</TT></A></UL><H4><FONT COLOR="#000077"><B>Sniffers</B></FONT></H4><P><B>Gobbler: </B>Sniffs in the DOS environment. This tool is good for sniffingNovell NetWare networks.<UL>	<LI><A HREF="http://www.macatawa.org/~agent43/gobbler.zip"><TT>http://www.macatawa.org/~agent43/gobbler.zip</TT></A></UL><P><B>ETHLOAD: </B>Sniffs Ethernet and token ring networks.<UL>	<LI><A HREF="ftp://oak.oakland.edu/SimTel/msdos/lan/ethld104.zip"><TT>ftp://oak.oakland.edu/SimTel/msdos/lan/ethld104.zip</TT></A></UL><P><B>Netman: </B>Awesome sniffer suite for use on UNIX platforms.<UL>	<LI><A HREF="http://www.cs.curtin.edu.au/~netman/"><TT>http://www.cs.curtin.edu.au/~netman/</TT></A></UL><P><B>Esniff.c: </B>Sniffer for use on UNIX machines (specifically SunOS and Solaris).<UL>	<LI><A HREF="http://pokey.nswc.navy.mil/Docs/Progs/ensnif.txt"><TT>http://pokey.nswc.navy.mil/Docs/Progs/ensnif.txt</TT></A></UL><P><B>Sunsniff:</B> The title says it all. This utility is a good sniffer for SunOS.<UL>	<LI><A HREF="http://mygale.mygale.org/08/datskewl/elite/"><TT>http://mygale.mygale.org/08/datskewl/elite/</TT></A></UL><P><B>linux_sniffer.c: </B>Runs on the Linux platform.<UL>	<LI><A HREF="http://www.hacked-inhabitants.com/warez/"><TT>http://www.hacked-inhabitants.com/warez/</TT></A></UL><P><B>Nitwit.c: </B>For use on the Sun platform.<UL>	<LI><A HREF="http://www.catch22.com/Twilight.NET/phuncnet/hacking/proggies/sniffers/nitwit.c"><TT>www.catch22.com/Twilight.NET/phuncnet/hacking/proggies/sniffers/nitwit.c</TT></A></UL><H4><FONT COLOR="#000077"><B>Scanners and Related Utilities</B></FONT></H4><P><B>NSS:</B> Network Security Scanner. Written in Perl, runs on UNIX.<UL>	<LI><A HREF="http://www.giga.or.at/pub/hacker/unix"><TT>http://www.giga.or.at/pub/hacker/unix</TT></A></UL><P><B>Strobe: </B>Runs on UNIX.<UL>	<LI><A HREF="http://sunsite.kth.se/Linux/system/Network/admin/"><TT>http://sunsite.kth.se/Linux/system/Network/admin/</TT></A></UL><P><B>SATAN: </B>Runs on UNIX; you must have Perl.<UL>	<LI><A HREF="http://www.fish.com"><TT>http://www.fish.com</TT></A></UL><P><B>Jakal: </B>Runs on UNIX. Scans behind firewalls.<UL>	<LI><A HREF="http://www.giga.or.at/pub/hacker/unix"><TT>http://www.giga.or.at/pub/hacker/unix</TT></A></UL><P><B>IdentTCPscan: </B>Runs on UNIX; identifies the UID of all running processes.<UL>	<LI><A HREF="http://www.giga.or.at/pub/hacker/unix"><TT>http://www.giga.or.at/pub/hacker/unix</TT></A></UL><P><B>CONNECT:</B> Are you looking for a vulnerable TFTP server? Try this utility.It runs on UNIX.<UL>	<LI><A HREF="http://www.giga.or.at/pub/hacker/unix/"><TT>http://www.giga.or.at/pub/hacker/unix/</TT></A></UL><P><B>FSPScan:</B> This UNIX utility<B> </B>identifies vulnerable FSP servers.<UL>	<LI><A HREF="http://www.giga.or.at/pub/hacker/unix"><TT>http://www.giga.or.at/pub/hacker/unix</TT></A></UL><P><B>XSCAN: </B>Locates vulnerable X servers.<UL>	<LI><A HREF="http://www.giga.or.at/pub/hacker/unix"><TT>http://www.giga.or.at/pub/hacker/unix</TT></A></UL><P><B>NetScan Tools:</B> Win95 port of many UNIX snooping utilities.<UL>	<LI><A HREF="http://www.eskimo.com/~nwps/index.html"><TT>http://www.eskimo.com/~nwps/index.html</TT></A></UL><P><B>Network Toolbox: </B>Runs on Windows 95. Has many common UNIX snooping utilitiesand a port scanner.<UL>	<LI><A HREF="http://www.jriver.com/netbox.html"><TT>http://www.jriver.com/netbox.html</TT></A></UL><P><B>IS User Information for Windows 95:</B> A very good generalized network analysistool.<UL>	<LI><A HREF="http://www.csn.net/~franklin/user_info.html"><TT>http://www.csn.net/~franklin/user_info.html</TT></A></UL><P><B>TCP/IP Surveyor: </B>Microsoft platform.<UL>	<LI><A HREF="ftp://wuarchive.wustl.edu/systems/ibmpc/win95/netutil/wssrv32n.zip"><TT>ftp://wuarchive.wustl.edu/systems/ibmpc/win95/netutil/wssrv32n.zip</TT></A></UL><P><B>MacTCP Watcher:</B> TCP/IP analysis tool for the Macintosh platform.<UL>	<LI><A HREF="http://www.share.com/share/peterlewis/mtcpw/"><TT>http://www.share.com/share/peterlewis/mtcpw/</TT></A></UL><P><B>Query It!:</B> Nslookup utility for Mac.<UL>	<LI><A HREF="http://www.cyberatl.net/~mphillip/index.html#Query It!"><TT>http://www.cyberatl.net/~mphillip/index.html#Query	It!</TT></A></UL><P><B>WhatRoute: </B>Port of the popular UNIX utility Traceroute to Mac.<UL>	<LI><A HREF="http://homepages.ihug.co.nz/~bryanc/"><TT>http://homepages.ihug.co.nz/~bryanc/</TT></A></UL><H4><FONT COLOR="#000077"><B>Destructive Devices</B></FONT></H4><P><B>The UpYours Mail Bombing Program:</B> To obtain UpYours, try the string <TT>upyours3.zip</TT>.</P><P><B>Kaboom:</B> This device is an e-mail bomber. To obtain it, try the string <TT>kaboom3.exe</TT>.</P><P><B>Avalanche:</B> This device is yet another mail-bombing utility. Avalanche isfor Windows. Try the search string <TT>avalanche20.zip</TT>.</P><P><B>The UnaBomber:</B> This utility is a mail bomber for the Windows platform.To obtain it, try the search string <TT>unabomb.exe</TT>.</P><P><B>eXtreme Mail:</B> This utility is a mail bomber for the Windows platform. Toobtain it, try the search string <TT>xmailb1.exe</TT>.</P><P><B>Homicide:</B> This utility is a mail bomber for the Windows. platform. To obtainit, try the search string <TT>homicide.exe</TT>.</P><P><B>The UNIX MailBomb:</B> This mail-bomb utility by CyBerGoAT works on all UNIXplatforms. To obtain it, try the search string <TT>MailBomb by CyBerGoAT</TT>.</P><P><B>Bombtrack: </B>This is a mail bombing utility for Macintosh.</P><P><B>FlameThrower:</B> This is a<B> </B>Macintosh mail-bombing utility.<H4><FONT COLOR="#000077"><B>Finger Clients</B></FONT></H4><P><B>WSFinger</B> (Windows)<UL>	<LI><A HREF="ftp://papa.indstate.edu/winsock-l/finger/wsfngr14.zip"><TT>ftp://papa.indstate.edu/winsock-l/finger/wsfngr14.zip</TT></A></UL><P><B>Macfinger</B> (Macintosh)<UL>	<LI><A HREF="ftp://ftp.global.net.id/pub/mac/"><TT>ftp://ftp.global.net.id/pub/mac/</TT></A></UL><P><B>FFEU</B> (OS/2)<UL>	<LI><A HREF="http://www.musthave.com/OS2/"><TT>http://www.musthave.com/OS2/</TT></A></UL><H3><FONT COLOR="#000077"><B>Technical Reports and Publications</B></FONT></H3><P><B>&quot;A Basis for Secure Communication in Large Distributed Systems.&quot;</B>David P. Anderson and P. Venkat Rangan. UCB//CSD-87-328. January 1987.<UL>	<LI><A HREF="ftp://tr-ftp.cs.berkeley.edu/pub/tech-reports/csd/csd-87-328/"><TT>ftp://tr-ftp.cs.berkeley.edu/pub/tech-reports/csd/csd-87-328/</TT></A></UL><P><B>&quot;A Cryptographic File System for UNIX.&quot;</B> Matt Blaze. 1st ACM Conferenceon Computer and Communications Security. pp. 9-16. ACM Press. November, 1993.</P><P><B>Actually Useful Internet Security Techniques.</B> New Riders. Larry J. Hughes,Jr. ISBN: 1-56205-508-9. 1995.</P><P><B>&quot;A Network Perimeter With Secure External Access.&quot;</B> FrederickM. Avolio and Marcus J. Ranum. An extraordinary paper that details the implementationof a firewall purportedly at the White House. Trusted Information Systems, Incorporated.Glenwood, MD. January 25, 1994.<UL>	<LI><A HREF="http://www.alw.nih.gov/Security/FIRST/papers/firewall/isoc94.ps"><TT>http://www.alw.nih.gov/Security/FIRST/papers/firewall/isoc94.ps</TT></A></UL><P><B>&quot;A Prototype B3 Trusted X Window System.&quot;</B> J. Epstein, J. Mc Hugh,R. Pascale, H. Orman, G. Benson, C. Martin, A. Marmor-Squires, B. Danner, and M.Branstad, The proceedings of the 7th Computer Security Applications Conference, December,1991.</P><P><B>&quot;A Security Architecture for Fault-Tolerant Systems.&quot;</B> MichaelK. Reiter, Kenneth P. Birman, and Robbert Van Renesse. TR93-1354. June 1993.<UL>	<LI><A HREF="http://cs-tr.cs.cornell.edu:80/Dienst/Repository/2.0/Body/ncstrl.cornell%2fTR93-1354/ocr"><TT>http://cs-tr.cs.cornell.edu:80/Dienst/Repository/2.0/Body/ncstrl.cornell%2fTR93-1354/ocr</TT></A></UL><P><B>&quot;Augmented Encrypted Key Exchange: a Password-Based Protocol Secure AgainstDictionary Attacks and Password File Compromise.&quot;</B> 1st ACM Conference onComputer and Communications Security, pp. 244-250. ACM Press. November 1993.</P><P><B>&quot;Benchmarking Methodology for Network Interconnect Devices.&quot;</B>RFC 1944. S. Bradner and J. McQuaid.<UL>	<LI><A HREF="ftp://ds.internic.net/rfc/rfc1944.txt"><TT>ftp://ds.internic.net/rfc/rfc1944.txt</TT></A></UL><P><B>Building Internet Firewalls.</B> D. Brent Chapman and Elizabeth D. Zwicky.O'Reilly &amp; Associates. ISBN: 1-56592-124-0. 1995.</P><P><B>&quot;Charon: Kerberos Extensions for Authentication over Secondary Networks.&quot;</B>Derek A. Atkins. 1993.</P><P><B>&quot;Check Point FireWall-1 Introduction.&quot;</B> Checkpoint Technologiesfirewall Information.<UL>	<LI><A HREF="http://www.checkpoint.com/products/firewall/intro.html"><TT>http://www.checkpoint.com/products/firewall/intro.html</TT></A></UL><P><B>&quot;Cisco PIX Firewall.&quot;</B> Cisco Systems firewall information.<UL>	<LI><A HREF="http://www.cisco.com/univercd/data/doc/cintrnet/prod_cat/pcpix.htm"><TT>http://www.cisco.com/univercd/data/doc/cintrnet/prod_cat/pcpix.htm</TT></A></UL><P><B>&quot;Comparison: Firewalls.&quot;</B> <I>LANTimes</I>. June 17, 1996. Comprehensivecomparison of a wide variety of firewall products.<UL>	<LI><A HREF="http://www.lantimes.com/lantimes/usetech/compare/pcfirewl.html"><TT>http://www.lantimes.com/lantimes/usetech/compare/pcfirewl.html</TT></A></UL><P><B>&quot;Computer User's Guide to the Protection of Information Resources.&quot;</B>NIST Special Publication.<UL>	<LI><A HREF="ftp://ftp.ffeu101.zipinternet/finger-15.hqx"><TT>ftp.ffeu101.zipinternet/finger-15.hqx</TT></A></UL><P><B>&quot;Covert Channels in the TCP/IP Protocol Suite.&quot;</B> Craig Rowland.Rotherwick &amp; Psionics Software Systems Inc.<UL>	<LI><A HREF="http://www.zeuros.co.uk/firewall/papers.htm"><TT>http://www.zeuros.co.uk/firewall/papers.htm</TT></A></UL><P><B>&quot;Crack Version 4.1: A Sensible Password Checker for UNIX.&quot;</B> A.Muffett. Technical Report, March 1992.</P><P><B>&quot;Daemons And Dragons UNIX Accounting.&quot;</B> Dinah McNutt. <I>UNIXReview</I>. 12(8). August 1994.</P><P><B>&quot;Designing Plan 9.&quot;</B> Rob Pike, Dave Presotto, and Ken Thompson.<I>

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?