Hacker Ghanoonmand

Total Page:16

File Type:pdf, Size:1020Kb

Hacker Ghanoonmand ﻓﻬﺮﺳﺖ ﻣﻄﺎﻟﺐ ﻣﻘﺪﻣﻪ 2 ﻓﺼﻞ 1 ﻣﻘﺪﻣﻪ اي ﺑﺮ ﻫﻚ ﻗﺎﻧﻮﻧﻤﻨﺪ 3 ﻓﺼﻞ 2 ﺟﻤﻊ آوري اﻃﻼﻋﺎت و ﻣﻬﻨﺪﺳﻲ اﺟﺘﻤﺎﻋﻲ 18 18 ﻓﺼﻞ 3 اﺳﻜﻦ و enumeration 36 ﻓﺼﻞ 4 ﻫﻚ ﺳﻴﺴﺘﻢ 61 ﻓﺼﻞ Worm ، Virus ، Backdoor ، Trojan 5 87 ﻓﺼﻞ Sniffer 6 ﻫﺎ 108 ﻓﺼﻞ Session hijacking 7 و Denial of Service 122 ﻫﻚ وب ﺳﺮورﻫﺎ، آﺳﻴﺐ ﭘﺬﻳﺮي ﺑﺮﻧﺎﻣﻪ ﻫﺎي ﺗﺤﺖ وب، و ﺗﻜﻨﻴﻚ ﻫﺎي ﺷﻜﺴﺘﻦ ﻓﺼﻞ 8 142 ﭘﺴﻮردﻫﺎي ﻣﺒﺘﻨﻲ ﺑﺮ وب ﻓﺼﻞ Buffer Overflow 9 و SQL Injection 164 ﻓﺼﻞ 10 ﻫﻚ ﺷﺒﻜﻪ ﻫﺎي واﻳﺮﻟﺲ 178 ﻓﺼﻞ 11 اﻣﻨﻴﺖ ﻓﻴﺰﻳﻜﻲ 189 ﻓﺼﻞ 12 ﻫﻚ ﻟﻴﻨﻮﻛﺲ 200 ﻓﺼﻞ 13 ﮔﺮﻳﺰ از IDS ﻫﺎ، honeypot ﻫﺎ، و ﻓﺎﻳﺮوال ﻫﺎ 211 ﻓﺼﻞ 14 رﻣﺰﻧﮕﺎري 223 ﻓﺼﻞ 15 روش ﻫﺎي ﺗﺴﺖ ﻧﻔﻮذ 229 ﻣﻘﺪﻣﻪ ﻳﻜﻲ از ﻣﻌﺮوف ﺗﺮﻳﻦ و ﻛﺎرﺑﺮدي ﺗﺮﻳﻦ ﻣﺪارك اﻣﻨﻴﺖ، ﻣﺪرك CEH ﻳﺎ ﻣﺪرك ﺗﺨﺼﺼﻲ ﻫﻜﺮﻫﺎي ﻗﺎﻧﻮﻧﻤﻨﺪ اﺳﺖ . ﻣﺪرك CEH ، ﻣﺪرﻛﻲ اﻣﻨﻴﺘﻲ ﺑﻪ ﻣﻨﻈﻮر ارزﻳﺎﺑﻲ ﻣﻬﺎرت اﻓﺮاد در ﺑﺮﻗﺮاري اﻣﻨﻴﺖ ﺳﻴﺴﺘﻢ ،ﻫﺎ و ﺷﺒﻜﻪ ﻫﺎي ﺳﺎزﻣﺎﻧﻲ و ﻧﻴﺰ ﻛﻤﻚ ﺑﻪ آﻧﻬﺎ ﺟﻬﺖ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ﺣﻤﻼت و ﻧﻔﻮذﻫﺎي ﻫﻜﺮﻫﺎ اﺳﺖ . در اﻳﻦ دوره اﻓﺮاد ﺑﺎ ﺗﻜﻨﻴﻚ ﻫﺎ و روش ﻫﺎي ﻫﻚ و ﻧﻴﺰ ﭼﻚ ﻟﻴﺴﺖ ﻫﺎي اﻣﻨﻴﺘﻲ آﺷﻨﺎ ﺷﺪه و ﻗﺎدر ﺑﻪ ﺑﺮرﺳﻲ وﺿﻌﻴﺖ اﻣﻨﻴﺘﻲ ﺳﻴﺴﺘﻢ ﻫﺎ و ﺷﺒﻜﻪ ﻫﺎ ﺧﻮاﻫﻨﺪ ﺑﻮد ﺗﺎ ﻧ ﻘﺎط ﺿﻌﻒ آﻧﻬﺎ را ﺷﻨﺎﺳﺎﻳﻲ و ﺑﺮﻃﺮف ﺳﺎزﻧﺪ . ﻛﺘ ﺎﺑﻲ ﻛﻪ ﭘﻴﺶ رو دارﻳﺪ ﺗﺮﺟﻤﻪ ﻛﺘﺎب رﺳﻤﻲ CEH و ﻧﻴﺰ اﺳﻼﻳﺪﻫﺎي آﻣﻮزﺷﻲ ﻣﺮﺑﻮط ﺑﻪ اﻳﻦ ﻣﺪرك، و ﻧﻴﺰ ﺑﺮﺧﻲ از ﺗﺠﺎرب ﺷﺨﺼﻲ ﺑﻨﺪه اﺳﺖ . ﺳﻌﻲ ﺷﺪه اﺳﺖ ﺗﺎﺟﺎﺋﻴﻜﻪ اﻣﻜﺎن دارد ﻣﺘﻦ ﻛﺘﺎب روان ﺑﺎﺷﺪ ﺗﺎ ﻫﺪف اﺻﻠﻲ آن ﻛﻪ اﻧﺘﻘﺎل ﻣﻄﻠﺐ اﺳﺖ، ﺑﻪ درﺳﺘﻲ ﺑﺮآورده ﺷﻮد وﻟﻲ ﻣﻄﻤﺌﻨﺎ اﺷﻜﺎﻻت ﻓﻨﻲ و وﻳﺮاﻳﺸﻲ ﻓﺮاواﻧﻲ دارد ﻛﻪ ﺗﻘﺎﺿﺎ دارم ﺑﻪ اﻃﻼع ﺑﻨﺪه ﺑﺮﺳﺎﻧﻴﺪ ﺗﺎ در ﻧﺴﺨﻪ ﻫﺎي ﺑﻌﺪي ﻛﺘﺎب، اﺻﻼح ﻛﻨﻢ . در ﭘﺎﻳﺎن ﺑﺮ ﺧﻮد ﻻزم ﻣﻲ داﻧﻢ ﻛﻪ از ﺗﻤﺎم اﺳﺎﺗﻴﺪي ﻛﻪ ﺑﺮاﻳﻢ زﺣﻤﺖ ﻛﺸﻴﺪه اﻧﺪ ﺑﻪ وﻳﮋه از آﻗﺎﻳﺎن ﻣﻬﻨﺪس راﺳﺘﻲ دوﺳﺖ و ﻣﻬﻨﺪس ﻣﺎﻳﺎن ﻛﻤﺎل ﺗﺸﻜﺮ را داﺷﺘﻪ ﺑﺎﺷﻢ . اﻣﻴﺪوارم ﻛﺘﺎب ﺣﺎﺿﺮ ﺑﺘﻮاﻧﺪ ﮔﺎﻣﻲ ﻫﺮ ﭼﻨﺪ ﻛﻮﭼﻜﻲ در ﺟﻬﺖ اﻓﺰاﻳﺶ ﺳ ﻄﺢ ﻋﻠﻤﻲ ﻫﻤﮕﺎن ﺑﺎﺷﺪ . ﻣﺤﺴﻦ آذرﻧﮋاد [email protected] ﺗﺎﺑﺴﺘﺎن 90 ﻓﺼﻞ اول ﻣﻘﺪﻣﻪ اي ﺑﺮ ﻫﻚ ﻗﺎﻧﻮﻧﻤﻨﺪ ﻣﻘﺪﻣﻪ اﻏﻠﺐ ﻣﺮدم ﻓﻜﺮ ﻣﻲ ﻛﻨﻨﺪ ﻛﻪ ﻫﻜﺮﻫﺎ، ﻣﻬﺎرت و داﻧﺶ ﺑﺎﻻﻳﻲ دارﻧﺪ ﻛﻪ ﻣﻲ ﺗﻮاﻧﻨﺪ ﺳﻴﺴﺘﻢ ﻫﺎي ﻛﺎﻣﭙﻴﻮﺗﺮي را ﻫﻚ ﻛﻨﻨﺪ و ﻧﻘﺎط آﺳﻴﺐ ﭘﺬﻳﺮ را ﭘﻴﺪا ﻛﻨﻨﺪ . در ﺣﻘﻴﻘﺖ، ﻳﻚ ﻫﻜﺮ ﺧﻮب، ﺗﻨﻬﺎ ﺑﺎﻳﺪ ﻧﺤﻮه ﻛﺎر ﺳﻴﺴﺘﻢ ﻛﺎﻣﭙﻴﻮﺗﺮي را ﺑﺪاﻧﺪ و ﻧﻴﺰ ﺑﺪاﻧﺪ ﻛﻪ از ﭼﻪ اﺑﺰارﻫﺎﻳﻲ ﺑﺮاي ﻳﺎﻓﺘﻦ ﺿﻌﻒ ﻫﺎي اﻣﻨﻴﺘﻲ اﺳﺘﻔﺎده ﻣﻲ ﺷﻮد . اﻳﻦ ﻓﺼﻞ دﻧﻴﺎي ﻫﻜﺮﻫﺎي ﻗﺎﻧﻮﻧ ﻤﻨﺪ را ﻣﻌﺮﻓﻲ ﻣﻲ ﻛﻨﺪ . ﻫﻚ ﻗﺎﻧﻮﻧ ﻤﻨﺪ ﻧﻮﻋﻲ ﻫﻚ اﺳﺖ ﻛﻪ ﺑﺎ ﻣﺠﻮز ﺳﺎزﻣﺎﻧﻲ و ﺑﺮاي اﻓﺰاﻳﺶ اﻣﻨﻴﺖ اﻧﺠﺎم ﻣﻲ ﮔﻴﺮد . واژﮔﺎن ﻓﻨﻲ ﺗﻮاﻧﺎﻳﻲ درك و ﺗﻌﺮﻳﻒ اﺻﻄﻼﺣﺎت ﻫﻚ، ﺑﺨﺶ ﻣﻬﻤﻲ از ﻣﺴﺌﻮﻟﻴﺖ ﻫﻜﺮ ﻗﺎﻧﻮﻧﻤﻨﺪ اﺳﺖ . در اﻳﻦ ﺑﺨﺶ، در ﻣﻮرد ﺑﺮﺧﻲ از اﺻﻄﻼﺣﺎت راﻳﺞ در دﻧﻴﺎي ﻫﻚ آﺷﻨﺎ ﻣﻲ ﺷﻮﻳﺪ . ﺗﻬﺪﻳﺪ ( threat ) ، ﺷﺮاﻳﻂ ﻳﺎ ﺣﺎﻟﺘﻲ اﺳﺖ ﻛﻪ ﻣﻲ ﺗﻮاﻧﺪ اﻣﻨﻴﺖ را ﻣﺨﺘﻞ ﻛﻨﺪ . ﻫﻜﺮﻫﺎي ﻗﺎﻧﻮﻧﻤﻨﺪ، زﻣﺎﻧﻴﻜﻪ ﺗﺤﻠﻴﻞ اﻣﻨﻴﺘﻲ اﻧﺠﺎم ﻣﻲ دﻫﻨﺪ، ﺗﻬﺪﻳﺪات را اوﻟﻮﻳﺖ ﺑﻨﺪي ﻣﻲ ﻛﻨﻨﺪ . اﻛﺴﭙﻠﻮﻳﺖ ( exploit ) ، ﻗﻄﻌﻪ اي از ﻧﺮم اﻓﺰار، اﺑﺰار ﻳﺎ ﺗﻜﻨﻴﻚ اﺳﺖ ﻛﻪ ﻣﺰاﻳﺎي آﺳﻴﺐ ﭘﺬﻳﺮ ي ﻫﺎ را دارد و ﻣﻲ ﺗﻮاﻧﺪ ﻣﻨﺠﺮ ﺑﻪ اﻳﺠﺎد دﺳﺘﺮﺳﻲ، از دﺳﺖ دادن ﻳﻜﭙﺎرﭼﮕﻲ، ﻳﺎ ﺣﻤﻠﻪ DoS ﺑﺮ روي ﻳﻚ ﺳﻴﺴﺘﻢ ﻛﺎﻣﭙﻴﻮﺗﺮي ﺷﻮد . دو دﺳﺘﻪ ﺑﻨﺪي از exploit ﻫﺎ دارﻳﻢ : : Remote exploit ، روي ﺷﺒﻜﻪ ﻛﺎر ﻣﻲ ﻛﻨﺪ و از آﺳﻴﺐ ﭘﺬﻳﺮي ﻫﺎي اﻣﻨﻴﺘﻲ اﺳﺘﻔﺎده ﻣﻲ ﻛﻨﺪ ﺑﺪون آﻧﻜﻪ از ﻗﺒﻞ ﺑﻪ آن ﺳﻴﺴﺘﻢ دﺳﺘﺮﺳﻲ داﺷﺘﻪ ﺑﺎﺷﺪ . Local exploit ، ﻧﻴﺎز ﺑ ﻪ دﺳﺘﺮﺳﻲ ﺑﻪ ﺳﻴﺴﺘﻢ دارد ﺗﺎ ﺳﻄﺢ دﺳﺘﺮﺳﻲ را ﺑﺎﻻ ﺑﺒﺮ .د اﻛﺴﭙﻠﻮﻳﺖ ، روﺷﻲ ﺑﺮاي ﻣﺨﺘﻞ ﻛﺮدن اﻣﻨﻴﺖ ﻳﻚ ﺳﻴﺴﺘﻢ IT از ﻃﺮﻳﻖ آﺳﻴﺐ ﭘﺬﻳﺮي ﻫﺎ اﺳﺖ . 4 آﺳﻴﺐ ﭘﺬﻳﺮي ( vulnerability)، وﺟﻮد ﺿﻌﻔﻲ در ﻃﺮاﺣﻲ ﻳﺎ ﭘﻴﺎده ﺳﺎزي ﻧﺮ م اﻓﺰار ﺳﻴﺴﺘﻢ اﺳﺖ . ﺑﺎ ﭘﻴﺎده ﺳﺎزي ﺻﺤﻴﺢ و اﻗﺪاﻣﺎت اﻣﻨﻴﺘﻲ، آ ﺳﻴﺐ ﭘﺬﻳﺮيﻫﺎ ﻛﺎﻫﺶ ﻣ ﻲﻳﺎﺑﻨﺪ. ﻫﺪف ارزﻳﺎﺑﻲ ( target of evaluation) ، ﺳﻴﺴﺘﻢ، ﺑﺮﻧﺎﻣﻪ ﻳﺎ ﺷﺒﻜﻪ اي اﺳﺖ ﻛﻪ ﻣﻮﺿﻮع ﺣﻤﻠﻪ ﻳﺎ ارزﻳﺎﺑﻲ اﻣﻨﻴﺘﻲ اﺳﺖ . ﺣﻤﻠﻪ ( attack) ، زﻣﺎﻧﻲ رخ ﻣﻲ دﻫﺪ ﻛﻪ ﺳﻴﺴﺘﻤﻲ ﺑﻪ ﺧﺎﻃﺮ آﺳﻴﺐ ﭘﺬﻳﺮيﻫﺎ ، ﺑﻪ ﺧﻄﺮ ﻣﻲ اﻓﺘﺪ . ﺑﺴﻴﺎري از ﺣﻤﻼت، ﺑﺎ اﺳﺘﻔﺎده از اﻛﺴﭙﻠﻮﻳﺖ ﻫﺎ، ﻫﻤﻴﺸﮕﻲ ﻣ ﻲ ﺷﻮﻧﺪ . ﻫﻜﺮﻫﺎي ﻗﺎﻧﻮﻧﻤﻨﺪ از اﺑﺰارﻫﺎﻳﻲ ﺑﺮاي ﻳﺎﻓﺘﻦ آﺳﻴﺐ ﭘﺬﻳﺮي ﺳﻴﺴﺘﻢﻫﺎ، اﺳﺘﻔﺎده ﻣﻲ ﻛﻨﻨﺪ . ﻋﻼوه ﺑﺮ اﻳﻦ اﺻﻄﻼﺣﺎت، ﻻزم اﺳﺖ ﻛﻪ در ﻣﻮرد ﺗﻔﺎوت ﺑﻴﻦ ﻫﻜﺮﻫﺎي ﻗﺎﻧﻮﻧ ﻤﻨﺪ و ﺷﺮور و ﻓﻌﺎﻟﻴﺖ ﻫﺎﻳﻲ ﻛﻪ ﻫﻜﺮ ﻗﺎﻧﻮﻧ ﻤﻨﺪ اﻧﺠﺎم ﻣﻲ دﻫﺪ، آﮔﺎﻫﻲ داﺷﺘﻪ ﺑﺎﺷﻴﺪ . اﻧﻮاع ﻣﺨﺘﻠﻒ ﺗﻜﻨﻮﻟﻮژي ﻫﺎي ﻫﻚ روش ﻫﺎ و اﺑﺰارﻫﺎي زﻳﺎدي ﺑﺮاي ﺷﻨﺎﺳﺎﻳﻲ آﺳﻴﺐ ﭘﺬﻳﺮي ﻫﺎ ، اﺟﺮاي اﻛﺴﭙﻠﻮﻳﺖ ﻫﺎ، و ﺑﻪ ﺧﻄﺮ اﻧﺪاﺧﺘﻦ ﺳﻴﺴﺘﻢ ﻫﺎ وﺟﻮد دارد . ﺗﺮوﺟﺎن ﻫﺎ، backdoor ﻫﺎ، Sniffer ﻫﺎ، rootkit ﻫﺎ، exploit ﻫﺎ، buffer overflow ، و SQl injection ، ﺗﻜﻨﻮﻟﻮژي ﻫﺎﻳﻲ ﻫﺴﺘﻨﺪ ﻛﻪ ﻣﻲ ﺗﻮاﻧﻨﺪ ﺑﺮاي ﻫﻚ ﻛﺮدن ﺳﻴﺴﺘﻢﻫﺎ ﻳﺎ ﺷﺒﻜﻪﻫﺎ اﺳﺘﻔﺎده ﺷﻮﻧﺪ . 5 ﺑﺴﻴﺎري از اﺑﺰارﻫﺎي ﻫﻚ، ﺑﻪ ﻳﻜﻲ از ﭼﻬﺎر روش زﻳﺮ از ﺿﻌﻒ ﻫﺎ اﺳﺘﻔﺎده ﻣﻲ ﻛﻨﻨﺪ : : • ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻫﺎ : ﺑﺴﻴﺎري از ﻣﺪﻳﺮان ﺳﻴﺴﺘﻢ ﻫﺎ، ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ ﻫﺎ را ﺑﺎ ﺗﻨﻈﻴﻤﺎت ﭘﻴﺶ ﻓﺮض ﻧﺼﺐ ﻣﻲ ﻛﻨﻨﺪ در ﻧﺘﻴﺠﻪ، ﻗﺎﺑﻠﻴﺖ آﺳﻴﺐ ﭘﺬﻳﺮي دارﻧﺪ. • ﺑﺮﻧﺎﻣﻪ ﻫﺎ : ﻣﻌﻤﻮﻻ ﺑﺮﻧﺎﻣ ﻪ ﻧﻮﻳﺲ ﻫﺎ، ﺑﺮﻧﺎﻣﻪ ﻫﺎ را ﺗﺴﺖ ﻧﻤﻲ ﻛﻨﻨﺪ ﺑﻨﺎﺑﺮاﻳﻦ ﻫﻜﺮﻫﺎ ﻣﻲ ﺗﻮاﻧﻨﺪ از آﺳﻴﺐ ﭘﺬﻳﺮي آن ﺳﻮ اﺳﺘﻔﺎده ﻛﻨﻨﺪ. • Shrink-wrap code : ﺑﺴﻴﺎري از ﺑﺮﻧﺎﻣﻪ ﻫﺎ، ﻗﺎﺑﻠﻴﺖ ﻫﺎﻳﻲ دارﻧﺪ ﻛﻪ ﻛﺎرﺑﺮان ﻋﺎدي از وﺟﻮد آن ﺑﻲ ﺧﺒﺮﻧﺪ و و ﻣﻲ ﺗﻮاﻧﻨﺪ ﺑﺮاي ﻫﻚ ﺳﻴﺴﺘﻢ اﺳﺘﻔﺎده ﺷﻮﻧﺪ . ﺑﺮاي ﻣﺜﺎل، ﻣﺎﻛﺮوﻫﺎ در ﻧﺮم اﻓﺰار Microsoft word ﺑﻪ ﻫﻜﺮ اﺟﺎزه اﺟﺮاي ﺑﺮﻧﺎﻣﻪ از داﺧﻞ را ﻣﻲ .ﺪﻨدﻫ • ﭘﻴﻜﺮﺑﻨﺪي ﻧﺎدرﺳﺖ : ﻣﻤﻜﻦ اﺳﺖ ﺳﻴﺴﺘﻢ ﺑﻪ درﺳﺘﻲ ﭘﻴﻜﺮﺑﻨﺪي ﻧﺸﺪه ﺑﺎﺷﺪ ﻳﺎ ﺣﺪاﻗﻞ ﻧﻜﺎت اﻣﻨﻴﺘﻲ در آن رﻋﺎﻳﺖ ﻧ ﺸﺪه ﺑﺎﺷﺪ ﺗﺎ ﻛﺎرﺑﺮان ﺑﺘﻮاﻧﻨﺪ ﺑﻪ راﺣﺘﻲ از ﺳﻴﺴﺘﻢ اﺳﺘﻔﺎده ﻛﻨﻨﺪ وﻟﻲ اﻳﻦ اﻣﺮ ﻣﻲ ﺗﻮاﻧﺪ ﻗﺎﺑﻠﻴﺖ آﺳﻴﺐ ﭘﺬﻳﺮي ﺳﻴﺴﺘﻢ را ﺑﺎﻻ ﺑﺒﺮد. ﻋﻼوه ﺑﺮ اﻧﻮاع ﺗﻜﻨﻮﻟﻮژي ﻫﺎي ﻣﺨﺘﻠﻔﻲ ﻛﻪ ﻫﻜﺮ ﻣﻲ ﺗﻮاﻧﺪ اﺳﺘﻔﺎده ﻛﻨﺪ، اﻧﻮاع ﻣﺨﺘﻠﻒ ﺣﻤﻠﻪ ﻧﻴﺰ وﺟﻮد دارد . ﺣﻤﻼت ﻣﻲ ﺗﻮاﻧﻨﺪ ﺑﻪ دو دﺳﺘﻪ ﭘﺴﻴﻮ و اﻛﺘﻴﻮ ﺗﻘﺴﻴﻢ ﺷﻮﻧﺪ . ﺣﻤﻼت اﻛﺘﻴﻮ، ﺳﻴﺴﺘﻢ ﻳﺎ ﺷﺒﻜﻪ را ﺗﻐﻴﻴﺮ ﻣﻲ دﻫﻨﺪ وﻟﻲ ﺣﻤﻼت ﭘﺴﻴﻮ، ﺑﻪ دﻧﺒﺎل ﺟﻤﻊ آوري اﻃﻼﻋﺎت از ﺳﻴﺴﺘﻢ ﻫﺎ ﻫﺴﺘﻨﺪ . ﺣﻤﻼت اﻛﺘﻴﻮ، ﺑﺮ روي دﺳﺘﺮﺳﻲ ﭘﺬﻳﺮي، ﻳﻜﭙﺎرﭼﮕﻲ، و ﺻﺤﺖ داده ﻫﺎ ﻣﻮﺛﺮ ﻫﺴﺘﻨﺪ در ﺣﺎﻟﻴﻜﻪ ﺣﻤﻼت ﭘﺴﻴﻮ، ﻣﺤﺮﻣﺎﻧﮕﻲ را ﻣﺨﺘﻞ ﻣﻲ ﻛﻨﻨﺪ . ﻋﻼوه ﺑﺮ ﺣﻤﻼت اﻛﺘﻴﻮ و ﭘﺴﻴﻮ، ﻣﻲ ﺗﻮان ﺣﻤﻼت را ﺑﻪ دو دﺳﺘﻪ داﺧﻠﻲ ( insider ) و ﺧﺎرﺟﻲ ( outsider ) ﻧﻴﺰ ﺗﻘﺴﻴﻢ ﻛ ﺮد . ﺷﻜﻞ زﻳﺮ ارﺗﺒﺎط ﺑﻴﻦ ﺣﻤﻼت ﭘﺴﻴﻮ و اﻛﺘﻴﻮ، داﺧﻠﻲ و ﺧﺎرﺟﻲ را ﻧﺸﺎن ﻣﻲ دﻫﺪ . ﺣﻤﻼﺗﻲ ﻛﻪ از داﺧﻞ ﻳﻚ ﺳﺎزﻣﺎن ﺷﻜﻞ ﻣﻲ ﻧﮔﻴﺮ ﺪ، را ﺣﻤﻼت داﺧﻠﻲ ﻣﻲ ﻧﺎﻣﻨﺪ و ﻣﻌﻤﻮﻻ ﺗﻮﺳﻂ ﻛﺎرﻣﻨﺪي از داﺧﻞ ﺳﺎزﻣﺎن ﺻﻮرت ﻣﻲ ﮔﻴﺮد ﺗﺎ ﺑﻪ ﻣﻨﺎﺑﻊ ﺑﻴﺸﺘﺮي دﺳﺘﺮﺳﻲ ﭘﻴﺪا ﻛﻨﺪ . ﺣﻤﻠﻪ ﺧﺎرﺟﻲ، از ﺑﻴﺮون ﺳﺎزﻣﺎن ﺻﻮر ت ﻣﻲ ﮔﻴﺮد از ﻗ ﺒﻴﻞ اﻳﻨﺘﺮﻧﺖ . اﻧﻮاع ﺣﻤﻼت 6 ﭘﻨﺞ ﻣﺮﺣﻠﻪ ﻣﺨﺘﻠﻒ ﻫﻚ ﻗﺎﻧﻮﻧﻤﻨﺪ ﻫﻜﺮ ﻗﺎﻧﻮﻧﻤﻨﺪ، ﻣﺮاﺣﻠﻲ را ﻛﻪ ﻫﻜﺮ ﺷﺮور اﻧﺠﺎم ﻣﻲ دﻫﺪ را اﻧﺠﺎم ﻣﻲ دﻫﺪ . ﺷﻜﻞ زﻳﺮ، ﭘﻨﺞ ﻣﺮﺣﻠﻪ اي ﻛﻪ ﻫﻜﺮﻫﺎ ﺑﺮاي ﻫﻚ ﻛﺮدن ﺳﻴﺴﺘﻢ ﻫﺎ اﻧﺠﺎم ﻣﻲ دﻫﻨﺪ را ﺗﻮﺿﻴﺢ ﻣﻲ دﻫﺪ . ﻣﺮاﺣﻞ ﻫﻚ ﻣﺮﺣﻠﻪ 1 : ﺷﻨﺎﺳﺎﻳﻲ ﭘﺴﻴﻮ و اﻛﺘﻴﻮ ﺷﻨﺎﺳﺎﻳﻲ ﭘﺴﻴﻮ، ﺷﺎﻣﻞ ﺟﻤﻊ آوري اﻃﻼﻋﺎت ﺑﺎ در ﻧﻈﺮ ﮔﺮﻓﺘﻦ ﻫﺪف ﺑﺎﻟﻘﻮه ﺑﺪون ﻣﺪ ﻧﻈﺮ ﻗﺮار دادن داﻧﺶ ﺷﺨﺺ ﻳﺎ ﺷﺮﻛﺖ اﺳﺖ . ﺷﻨﺎﺳﺎﻳﻲ ﭘﺴﻴﻮ، ﻣﻲ ﺗﻮاﻧﺪ ﺑﻪ ﺳﺎدﮔﻲ ﺗﻤﺎﺷﺎي ﻳﻚ ﺳﺎﺧﺘﻤﺎن ﺑﺮاي ﺷﻨﺎﺳﺎﻳﻲ زﻣﺎن ورود و ﺧﺮوج ﻛﺎرﻣﻨﺪان ﺑﺎﺷﺪ . اﻣﺎ ﻣﻌﻤﻮل اﺳﺖ ﻛﻪ از ﺟﺴﺘﺠﻮي اﻳﻨﺘﺮﻧﺘﻲ اﺳﺘﻔﺎده ﺷﻮد ﻳﺎ در ﻣﻮرد ﺷﺮﻛﺖ و ﻛﺎرﻣﻨﺪان آن، اﻃﻼﻋﺎت ﺟﻤﻊ آوري ﺷﻮد . اﻳﻦ ﻓﺮآﻳﻨﺪ، ﺑﻄﻮر ﻛﻠﻲ، ﺟﻤﻊ آوري اﻃﻼﻋﺎت ﻧﺎﻣﻴﺪه ﻣﻲ ﺷﻮد . ﻣﻬﻨﺪﺳﻲ اﺟﺘﻤﺎﻋﻲ ( social engineering ) و آﺷﻐﺎل ﮔﺮدي ( dumpster diving ) ﺑﻪ ﻋﻨﻮان روش ﻫﺎي ﭘﺴﻴﻮ ﺟﻤﻊ آوري اﻃﻼﻋﺎت ﺗﻠﻘﻲ ﻣﻲ ﺷﻮد . اﺳﺘﺮاق ﺳﻤﻊ ﺷﺒﻜﻪ ( sniffing ) ، روش دﻳﮕﺮي ﺑﺮاي ﺷﻨﺎﺳﺎﻳﻲ ﭘﺴﻴﻮ اﺳﺖ و ﻣﻲ ﺗﻮاﻧﺪ اﻃﻼﻋﺎت ﻣﻔﻴﺪي ﻫﻤﭽﻮن آدرس ﻫﺎي IP ، ﻗﺎﻧﻮن ﻧﺎم ﮔﺬاري دﺳﺘﮕﺎه ﻫﺎ، و ﺳﺮوﻳﺲ ﻫﺎي ﻗﺎﺑﻞ دﺳﺘﺮس دﻳﮕﺮ ﺑﺮ روي ﺳﻴﺴﺘﻢ ﻫﺎ و ﺷﺒﻜﻪ ﻫﺎي دﻳﮕﺮ را ﺑﺪﻫﺪ . اﺳﺘﺮاق ﺳﻤﻊ ﺗﺮاﻓﻴﻚ ﺷﺒﻜﻪ، ﻣﺸﺎﺑﻪ ﻣﺎﻧﻴﺘﻮرﻳﻨﮓ اﺳﺖ : ﻫﻜﺮ، ﺗﺮاﻓﻴﻚ داده ﻫﺎ را ﺑﺮرﺳﻲ ﻣﻲ ﻛﻨﺪ ﺗﺎ ﺑﺒﻴﻨﺪ ﭼﻪ زﻣﺎﻧﻲ ﺗﺮاﻛﻨﺶ ﻫﺎي ﻣﺸﺨﺺ اﺗﻔﺎق ﻣﻲ اﻓﺘﺪ و ﺗﺮاﻓﻴﻚ از ﻛﺠﺎ ﺟﺮﻳﺎن ﻣﻲ ﻳﺎﺑﺪ . 7 ﺷﻨﺎﺳﺎﻳﻲ اﻛﺘﻴﻮ، ﻛﺎوش ﺷﺒﻜﻪ ﺑﺮاي ﻛﺸﻒ ﻛﺎﻣﭙﻴﻮﺗﺮﻫﺎي ا ﻓﺮاد ، آدرس ﻫﺎي IP ، و ﺳﺮوﻳﺲ ﻫﺎي ﺷﺒﻜﻪ اﺳﺖ . ﻣﻌﻤﻮﻻ ﻧﺴﺒﺖ ﺑﻪ ﺷﻨﺎﺳﺎﻳﻲ ﭘﺴﻴﻮ، داراي رﻳﺴﻚ ﺑﺎﻻﻳﻲ اﺳﺖ و ﮔﺎﻫﻲ اوﻗﺎت از آن ﺑﻪ ﻋﻨﻮان rattling the door knobe ﻧﺎم ﺑﺮده ﻣﻲ ﺷﻮد . ﺷﻨﺎﺳﺎﻳﻲ اﻛﺘﻴﻮ و ﭘﺴﻴﻮ، ﻫﺮ دو ﻣﻨﺠﺮ ﺑﻪ ﻛﺸﻒ اﻃﻼﻋﺎت ﻣﻔﻴﺪ ﺑﺮاي ﺣﻤﻠﻪ ﻣﻲ ﺷﻮﻧﺪ . ﺑﺮاي ﻣﺜﺎل، ﻣﻌﻤﻮﻻ ﻳﺎﻓﺘﻦ ﻧﻮع وب ﺳﺮور و ﻧﺴﺨﻪ ﺳﻴﺴﺘﻢ ﻋﺎﻣﻠﻲ ﻛﻪ ﺳﺎزﻣﺎن اﺳﺘﻔﺎده ﻣﻲ ﻛﻨﺪ، ﺳﺎده اﺳﺖ . اﻳﻦ اﻃﻼﻋﺎت ﺑﻪ ﻫﻜﺮ ﻛﻤﻚ ﻣﻲ ﻛﻨﻨﺪ ﻛﻪ آﺳﻴﺐ ﭘﺬﻳﺮي ﻫﺎي ﺳﻴﺴﺘﻢ ﻋﺎﻣﻞ را ﭘﻴﺪا ﻛﻨﺪ و از اﻛﺴﭙﻠﻮﻳﺖ ﺑﺮاي اﻳﺠﺎد دﺳﺘﺮﺳﻲ اﺳﺘﻔﺎده ﻛﻨﺪ . ﻣﺮﺣﻠﻪ 2 : اﺳﻜﻦ ﺑﺪﺳﺖ آوردن اﻃﻼﻋﺎت ﻛﺸﻒ ﺷﺪه در ﻃﻮل ﺷﻨﺎﺳﺎﻳﻲ ، و اﺳﺘﻔﺎده از آن ﺑﺮاي ﺗﺴﺖ ﺷﺒﻜﻪ اﺳﺖ . اﺑﺰارﻫﺎﻳﻲ ﻛﻪ ﻫﻜﺮ در ﻃﻮل ﻣﺮﺣﻠﻪ اﺳﻜﻦ ﺑﻜﺎر ﻣﻲ ﮔﻴﺮد ﻣﻲ ﺗﻮاﻧﺪ dialer ﻫﺎ، اﺳﻜﻨﺮﻫﺎي ﭘﻮرت، اﺑﺰارﻫﺎي ﺗ ﺮﺳﻴﻢ ﻧﻘﺸﻪ ﺷﺒﻜﻪ، sweeper ﻫﺎ و اﺳﻜﻨﺮﻫﺎي ﺗﺴﺖ آﺳﻴﺐ ﭘﺬﻳﺮي ﺑﺎﺷ ﺪﻨ . ﻫﻜﺮﻫﺎ ﺑﻪ دﻧﺒﺎل اﻃﻼﻋﺎﺗﻲ ﻫﺴﺘﻨﺪ ﻛﻪ ﺑﻪ آﻧﻬﺎ در اﻧﺠﺎم ﺣﻤﻠﻪ ﻛﻤﻚ ﻛﻨﺪ از ﻗﺒﻴﻞ ﻧﺎم ﻛﺎﻣﭙﻴﻮﺗﺮﻫﺎ، آدرس ﻫﺎي IP ، و ﺣﺴﺎب ﻫﺎي ﻛﺎرﺑﺮي . ﻣﺮﺣﻠﻪ 3 : اﻳﺠﺎد دﺳﺘﺮﺳﻲ در اﻳﻦ ﻣﺮﺣﻠﻪ، ﺣﻤﻠﻪ واﻗﻌﻲ رخ ﻣﻲ دﻫﺪ . آﺳﻴﺐ ﭘﺬﻳﺮي ﻫﺎي ﺷﻨﺎﺧﺘﻪ ﺷﺪه در ﻣﺮاﺣﻞ ﺷﻨﺎﺳﺎﻳﻲ و اﺳﻜﻦ، اﻛﻨﻮن ﺑﺮاي اﻳﺠﺎد دﺳﺘﺮﺳﻲ اﺳﺘﻔﺎده ﻣﻲ ﺷﻮﻧﺪ . روش ارﺗﺒﺎﻃﻲ ﻛﻪ ﻫﻜﺮ اﺳﺘﻔﺎده ﻣﻲ ﻛﻨﺪ ﻣﻲ ﺗﻮاﻧﺪ از ﻃﺮﻳﻖ ﺷﺒﻜﻪ ﻣﺤﻠﻲ ( LAN) ، دﺳﺘﺮﺳﻲ ﻣﺤﻠﻲ ﺑﻪ ﻛﺎﻣﭙﻴﻮﺗﺮ ( local) ، اﻳﻨﺘﺮﻧﺖ و ﻳﺎ ﺑﻪ ﺻﻮرت آﻓﻼﻳﻦ ﺑﺎﺷﺪ . از ﻗﺒﻴﻞ session hijacking ، DoS ، و stack-based buffer overflow . در دﻧﻴﺎي ﻫﻜﺮﻫﺎ، اﻳﺠﺎد دﺳﺘﺮﺳﻲ ﺑﺎ ﻧﺎم ﻣﺎﻟﻜﻴﺖ ﺳﻴﺴﺘﻢ ( owning the system ) ﺷﻨﺎﺧﺘﻪ ﻣﻲ ﺷﻮد . 8 ﻣﺮﺣﻠﻪ 4 : ﺣﻔﻆ دﺳﺘﺮﺳﻲ زﻣﺎﻧﻴﻜﻪ ﻫﻜﺮ ﺗﻮاﻧﺴﺖ دﺳﺘﺮﺳﻲ اﻳﺠﺎد ﻛﻨﺪ، ﻣﻲ ﺧﻮاﻫﺪ ﻛﻪ ﺑﺮاي ﺣﻤﻼت ﺑﻌﺪي، دﺳﺘﺮﺳﻲ ﺧﻮد را ﺣﻔﻆ ﻛﻨﺪ . ﮔﺎﻫﻲ اوﻗﺎت، ﻫﻜﺮﻫﺎ، ﺳﻴﺴﺘﻢ را از د ﺳﺘﺮﺳﻲ ﻫﻜﺮﻫﺎي دﻳﮕﺮ اﻣﻦ ﻣﻲ ﻛﻨﻨﺪ آﻧﻬﺎ اﻳﻨﻜﺎر را از ﻃﺮﻳﻖ backdoor ﻫﺎ، rootkit ﻫﺎ، و ﺗﺮوﺟﺎن ﻫﺎ اﻧﺠﺎم ﻣﻲ ﺪﻨدﻫ . زﻣﺎﻧﻴﻜﻪ ﻫﻜﺮي ﺳﻴﺴﺘﻢ را ﺑﻪ ﺗﺼﺮف ﺧﻮد درآورد، ﻣﻲ ﺗﻮاﻧﺪ از آن ﺑﺮاي اﻧﺠﺎم ﺣﻤﻼت دﻳﮕﺮ اﺳﺘﻔﺎده ﻛﻨﺪ . در اﻳﻦ ﺣﺎﻟﺖ، ﺑﻪ آن ﺳﻴﺴﺘﻢ، ﺳﻴﺴﺘﻢ zombie ﮔﻔﺘﻪ ﻣﻲ ﺷﻮد .
Recommended publications
  • Protokollsupport
    Reference Guide WinRoute Pro 4.1 SE För version 4.1 Build 22 och sinare Tiny Software Inc. Contents Innehållsförteckning Läs mig först 2 Beskrivning av WinRoute 5 WinRoute sammanfattning...................................................................................... 6 Omfattande protokollsupport .................................................................................. 9 NAT-router............................................................................................................ 10 Introduktion i NAT .................................................................................... 11 Hur NAT fungerar...................................................................................... 12 WinRoutes struktur .................................................................................... 13 Att ställa in NAT på båda gränssnitten ...................................................... 15 Portmappning - paketbefordran ................................................................. 18 Portmappning för system med flera hem (flera IP-adresser)...................... 21 Multi-NAT ................................................................................................. 22 Gränssnittstabell......................................................................................... 24 VPN-support .............................................................................................. 24 Brandvägg med paketfilter.................................................................................... 25 Översikt
    [Show full text]
  • J I Truste Ne Ork
    Internet Security A Jumpstart for Systems Administrators and IT Managers Tim Speed Juanita Ellis Digital Press An imprint of Elsevier Science Amsterdam, Boston • London • New York o Oxford • Paris • San Diego San Francisco • Singapore • Sydney • Tokyo Digital Press is an imprint of Elsevier Science. Copyright © 2003, Elsevier Science (USA). All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Recognizing the importance of preserving what has been written, Elsevier Science prints its books on acid-free paper whenever possible. Library of Congress Cataloging-in-Publication Data ISBN 1-55558-298-2 British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library. The publisher offers special discounts on bulk orders of this book. For information, please contact: Manager of Special Sales Elsevier Science 200 Wheeler Road Burlington, MA 01803 Tel: 781-313-4700 Fax: 781-313-4882 For information on all Digital Press publications available, contact our World Wide Web home page at: http://www.digitalpress.com or http://www.bh.com/digitalpress 1098765432 1 Printed in the United States of America To Linda Speed~my split apart. -T.S. To my dad, Charles Ellis. -J.E. This Page Intentionally Left Blank Contents Foreword ix Acknowledgments xi Introduction xiii The Internet and Security I. I The
    [Show full text]
  • Novell Bordermanager 3.9 Installation Guide Novdocx (ENU) 29 January 2007
    Novell BorderManager 3.9 Installation Guide novdocx (ENU) 29 January 2007 January 29 (ENU) novdocx Novell BorderManager 3.9 www.novell.com INSTALLATION GUIDE April 05, 2007 novdocx (ENU) 29 January 2007 January 29 (ENU) novdocx Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc. makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes. Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of other countries. You agree to comply with all export control regulations and to obtain any required licenses or classification to export, re-export or import deliverables. You agree not to export or re-export to entities on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses.
    [Show full text]
  • Novell Zenworks 6.5 Desktop Management Installation Guide May 19, 2006
    Novell Confidential Manual (ENU) 21 December 2004 Novell ZENworks® Desktop Management 6.5 www.novell.com INSTALLATION GUIDE May 19, 2006 Novell Confidential Manual (ENU) 21 December 2004 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc. makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes. Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of other countries. You agree to comply with all export control regulations and to obtain any required licenses or classification to export, re-export, or import deliverables. You agree not to export or re-export to entities on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses. Please refer to www.novell.com/info/exports/ for more information on exporting Novell software.
    [Show full text]
  • Hacking for Dummies.Pdf
    01 55784X FM.qxd 3/29/04 4:16 PM Page i Hacking FOR DUMmIES‰ by Kevin Beaver Foreword by Stuart McClure 01 55784X FM.qxd 3/29/04 4:16 PM Page v 01 55784X FM.qxd 3/29/04 4:16 PM Page i Hacking FOR DUMmIES‰ by Kevin Beaver Foreword by Stuart McClure 01 55784X FM.qxd 3/29/04 4:16 PM Page ii Hacking For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 Copyright © 2004 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permis- sion of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4447, e-mail: permcoordinator@ wiley.com. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc.
    [Show full text]
  • (12) United States Patent (10) Patent No.: US 8,943,201 B2 Larson Et Al
    USOO8943 201B2 (12) United States Patent (10) Patent No.: US 8,943,201 B2 Larson et al. (45) Date of Patent: Jan. 27, 2015 (54) METHOD FORESTABLISHING ENCRYPTED (58) Field of Classification Search CHANNEL USPC .......................................... 709/225 229, 245 See application file for complete search history. (75) Inventors: Victor Larson, Fairfax, VA (US); Robert Dunham Short, Leesburg, VA (56) References Cited (US); Edmund Colby Munger, Crownsville, MD (US); Michael U.S. PATENT DOCUMENTS Williamson, South Riding, VA (US) 2,895,502 A 7/1959 Roper et al. 4.405,829 A 9, 1983 RiveSt (73) Assignee: VirnetX, Inc., Zephyr Cove, NV (US) (Continued) (*) Notice: Subject to any disclaimer, the term of this patent is extended or adjusted under 35 FOREIGN PATENT DOCUMENTS U.S.C. 154(b) by 0 days. DE 1992.4575 12/1999 EP O838.930 4f1988 (21) Appl. No.: 13/285,962 (Continued) (22) Filed: Oct. 31, 2011 OTHER PUBLICATIONS (65) Prior Publication Data Exhibit G, Opening Expert Report of Dr. Stuart Stubblebine Regard ing Invalidity of the 135,211, and 504 Patents. US 2012/OO4208.6 A1 Feb. 16, 2012 (Continued) Related U.S. Application Data Primary Examiner — Krisna Lim (60) Continuation of application No. 1 1/679,416, filed on (74) Attorney, Agent, or Firm — McDermott, Will & Emery Feb. 27, 2007, now Pat. No. 8,051,181, which is a continuation of application No. 10/702,486, filed on (57) ABSTRACT Nov. 7, 2003, now Pat. No. 7,188,180, which is a A technique is disclosed for establishing a secure communi cation link between a first computer and a second computer (Continued) over a computer network.
    [Show full text]
  • Supported Log File Formats
    Supported Log File Formats Vendor/Product Log Format Analyzer Analyzer Vantage & Live Standard Premium & Vantage Giga Analyzer Giga 3Com 3Com Firewall Yes Yes Yes Yes 8e6 R2000 Yes Yes Yes Yes 8e6 R3000 Yes Yes Yes Yes Aladin Esafe Blocked Logs Yes Yes No Yes Allied Telesyn ATI Level 3 No No Yes No Switch Model 9812 Apache HTTP Server - Yes Yes Yes Yes Access Log Applied Data Control Native Log Yes Yes No Yes Arkoon SMTP No Yes Yes Yes Arkoon Web (WELF) Yes Yes Yes Yes Arkoon Arkoon Yes *New Yes *New No Yes *New Firewall Astaro Native Syslog Yes Yes Yes Yes 3 Avirt Proxy Native Log Yes Yes Yes Yes AVM AVM Ken! Yes *New Yes *New No Yes *New Barracuda Networks Spam Firewall No No Yes *New No (CSV Format) Barracuda Networks Spam Firewall No No Yes *New No (Syslog Format) Bintec VPN Bintec VPN 25 No No Yes No Bloxx Proxy Server W3C Log No No Yes *New No Bluecoat Proxy SG Yes Yes Yes Yes Common Log Bluecoat Proxy SG Yes Yes Yes Yes Squid Native Log Bluecoat Proxy SG W3C Yes Yes Yes Yes Log Bluecoat Instant No No Yes *New No Messaging Log W3C Bluecoat Websense Yes Yes No Yes BlueReef Virtual Server SQUID Native Yes Yes Yes Yes Log Borderware Firewall Yes Yes Yes *New Yes Borderware Direct Packet No No Yes *New No Borderware Mail Yes Yes Yes *New Yes BT Proxy Native Log Yes Yes No Yes CacheFlow Proxy Squid Log Yes Yes No Yes CacheXpress Squid Log Yes Yes Yes Yes CC Proxy Native Log Yes 1 Yes Yes Yes Checkpoint Firewall-1 Yes 1 *Mod Yes *Mod Yes No Checkpoint Firewall Yes 1 *Mod Yes *Mod Yes No Custom Checkpoint NG Yes 1 *Mod Yes *Mod Yes No CipherTrust
    [Show full text]
  • Novell Bordermanager 3.9 Administration Guide Novdocx (ENU) 29 January 2007
    Novell BorderManager 3.9 Administration Guide novdocx (ENU) 29 January 2007 January 29 (ENU) novdocx Novell BorderManager 3.9 www.novell.com ADMINISTRATION GUIDE April 5, 2007 novdocx (ENU) 29 January 2007 January 29 (ENU) novdocx Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc. makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes. Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of other countries. You agree to comply with all export control regulations and to obtain any required licenses or classification to export, re-export or import deliverables. You agree not to export or re-export to entities on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses.
    [Show full text]
  • Log & Event Manager
    Log & Event Manager Copyright © 1995-2012 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled, disassembled, published or distributed, in whole or in part, or translated to any electronic medium or other means without the written consent of SolarWinds. All right, title, and interest in and to the software and documentation are and shall remain the exclusive property of SolarWinds and its respective licensors. SOLARWINDS DISCLAIMS ALL WARRANTIES, CONDITIONS OR OTHER TERMS, EXPRESS OR IMPLIED, STATUTORY OR OTHERWISE, ON SOFTWARE AND DOCUMENTATION FURNISHED HEREUNDER INCLUDING WITHOUT LIMITATION THE WARRANTIES OF DESIGN, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT. IN NO EVENT SHALL SOLARWINDS, ITS SUPPLIERS, NOR ITS LICENSORS BE LIABLE FOR ANY DAMAGES, WHETHER ARISING IN TORT, CONTRACT OR ANY OTHER LEGAL THEORY EVEN IF SOLARWINDS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. The SolarWinds, the SolarWinds & Design, ipMonitor, LANsurveyor, Orion, and other SolarWinds marks, identified on the SolarWinds website, as updated from SolarWinds from time to time and incorporated herein, are registered with the U.S. Patent and Trademark Office and may be registered or pending registration in other countries. All other SolarWinds trademarks may be common law marks or registered or pending registration in the United States or in other countries. All other trademarks or registered trademarks contained and/or mentioned herein are used for identification purposes only and may be trademarks or registered trademarks of their respective companies. Microsoft®, Windows®, and SQL Server® are registered trademarks of Microsoft Corporation in the United States and/or other countries.
    [Show full text]
  • Novells Guide to Bordermanager Pdf, Epub, Ebook
    NOVELLS GUIDE TO BORDERMANAGER PDF, EPUB, EBOOK J.D. Marymee, Sandy Stevens | 384 pages | 01 Jan 1998 | John Wiley & Sons Inc | 9780764545405 | English | Foster City, United States pdfFiller. On-line PDF form Filler, Editor, Type on PDF, Fill, Print, Email, Fax and Export All of the information presented in this book has been gathered from hands-on, real world experiences of the authors. A best-seller that once showed you how to reign in a panther can now show you …. Today, software engineers need to know not only how to program effectively but also how to …. You Will Learn Python 3! Zed Shaw has perfected the world's best system for learning Python …. If you think you should have access to this content, click the button to contact our support team. Contact us. To read the full version of this content please select one of the options below. You may be able to access this content by logging in via Shibboleth, Open Athens or with your Emerald account. To rent this content from Deepdyve, please click the button. Rent from Deepdyve. Join us on our journey Platform update page Visit emeraldpublishing. This retrieval method along with NetWare's fast file IO and other proprietary code made BorderManager's proxy engine one of the fastest in existence. This makes it possible for the customer to choose which NetWare or Linux kernel the services will run on. At this time Novell all but announced the end of development for the NetWare kernel numerous public and private statements that there is no bit future for NetWare and that Linux is the path to bit computing for OES.
    [Show full text]
  • Novell Zenworks Desktop Management? 17 Automatisches Importieren Und Entfernen Von Arbeitsstationen
    Novell Confidential Manual (DEU) 6 October 2004 Novell ZENworks® Desktop Management 6.5 www.novell.com INSTALLATIONSHANDBUCH 11.02.05 Novell Confidential Manual (DEU) 6 October 2004 Rechtliche Belange Novell, Inc., leistet keinerlei Gewähr bezüglich des Inhalts oder Gebrauchs dieses Handbuchs. Insbesondere werden keine ausdrücklichen oder stillschweigenden Gewährleistungen hinsichtlich der handelsüblichen Qualität oder Eignung für einen bestimmten Zweck übernommen. Novell, Inc. behält sich weiterhin das Recht vor, diese Dokumentation zu revidieren sowie ihren Inhalt jederzeit und ohne vorherige Ankündigung zu ändern. Novell, Inc. gibt ebenfalls keine Erklärungen oder Garantien in Bezug auf Softwareprodukte und schließt insbesondere jegliche ausdrückliche oder stillschweigende Garantie auf Marktgängigkeit oder Eignung für einen bestimmten Zweck aus. Außerdem behält sich Novell, Inc. das Recht vor, Novell-Software jederzeit ganz oder teilweise zu ändern, ohne dass für Novell, Inc. die Verpflichtung entsteht, Personen oder Organisationen von diesen Änderungen in Kenntnis zu setzen. Die Ausfuhr bzw. die Wiederausfuhr dieses Produkts ist nur im Rahmen gültiger Gesetze bzw. Richtlinien, darunter die US-Exportbestimmungen bzw. Gesetze Ihres Heimatlands, gestattet. Copyright © 2005 Novell, Inc. Alle Rechte vorbehalten. Ohne ausdrückliche schriftliche Genehmigung des Herausgebers darf kein Teil dieser Veröffentlichung reproduziert, fotokopiert, übertragen oder in einem Speichersystem verarbeitet werden. Novell, Inc., besitzt die Rechte auf geistiges Eigentum für die Technologie, die in dem in dieser Dokumentation beschriebenen Produkt enthalten ist. Diese Rechte auf geistiges Eigentum umfassen möglicherweise insbesondere ein oder mehrere Patente in den USA, die unter http://www.novell.com/ company/legal/patents aufgeführt sind (ohne darauf beschränkt zu sein). Diese Rechte umfassen möglicherweise außerdem ein oder mehrere andere Patente oder laufende Patentanträge in den USA und in anderen Ländern.
    [Show full text]
  • Appendix a Practical Technical Implementation
    Optimising Internet Bandwidth in Developing Country Higher Education Appendix A Practical technical implementation 1. Web caching A Web proxy server is a server on the local network that keeps copies of recently retrieved or often used Web pages, or parts of pages. When the next person retrieves these pages, they are served from the local proxy server instead of from the Internet. This results in faster Web access in most cases. Bandwidth usage can also be reduced. When a proxy server is implemented, the administrator should also be aware that some pages are not cacheable – for example, pages that are the output of server-side scripts. Loading of Web pages is also affected. Where previously the page would begin to load slowly, first showing some text and then displaying the graphics one by one, in a network with a proxy server, there could be a delay when nothing seems to happen, and then the page will load almost at once. The time it takes to load the whole page might take 10 seconds, whereas without a proxy server it may take 30 seconds, but unless this is explained to some impatient users, they may say the proxy server has made things slower. It is usually the task of the network administrator to deal with user perception like these. 1.1 Proxy server products Squid. Open source Squid is the de facto standard at universities. It is free, reliable, easy to use and can be enhanced with for example content filtering and advertisement blocking. Squid produces logs that can be analysed using software such as Sawmill (commercial) or Awstats, Webalizer (Open Source), both of which produce good graphical reports.
    [Show full text]