Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 25 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
25
Dung lượng
541,13 KB
Nội dung
[...]... 873 TCP Rsync 10 80 TCP, UDP SOCKS Proxy 10 81 TCP, UDP SOCKS Proxy alternate 11 69 TCP, UDP Tripwire (file integrity monitor) 12 14 TCP Kazaa Network 12 41 TCP Nessus 12 70 TCP, UDP Microsoft Operations Manager (MOM) 12 43 TCP TROJAN subseven 14 33 TCP Microsoft SQL Server 14 34 UDP Microsoft SQL Monitor service 14 98 TCP Sybase 16 00 TCP Issd 17 23 TCP Point-to-Point Tunneling Protocol (PPTP) 17 45 TCP Winsock-proxy... Services Protocol Reference Center Port Number RC 8 Reference Center Port Number Protocol Description 81 TCP HTTP (alternate, sometimes admin) 88 TCP Kerberos 99 TCP TROJAN hidden port 10 9 TCP POP-2 (Post Office Protocol) 11 0 TCP POP-3 11 1 TCP Sun RPC Portmapper 11 3 TCP Ident 11 9 TCP NNTP (Network News Transfer Protocol) 12 3 TCP, UDP NTP (Network Time Protocol) 13 3 TCP TROJAN farnaz 13 5 TCP, UDP NT RPC... techniques discussed Reference Center Hacking Fundamentals: Concepts ICMP Message Types RC 2 RC 5 Common Ports and Services RC 7 Common NetBIOS Name Table Definitions RC 12 Windows Security Fundamentals: Concepts RC 13 RC 14 Windows Authentication Methods RC 15 Common Security Identifiers (SIDs) RC 16 RC 17 RC 18 Windows Default User Accounts Windows NT File System... UDP NT RPC endpoint mapper 13 7 TCP, UDP NetBIOS Name Service 13 8 UDP NetBIOS Datagram Service 13 9 TCP NetBIOS Session Service 14 3 TCP, UDP IMAP (Internet Message Access Protocol) 16 1 UDP SNMP 16 2 UDP SNMP Trap 17 0 TCP Network PostScript print server / TROJAN a-trojan 17 7 TCP, UDP X Display Manager 17 9 TCP, UDP BGP (Border Gateway Protocol) 19 4 TCP IRC (Internet Relay Chat) 216 TCP, UDP Computer Associates... (IPSEC Internet Key Exchange) 512 TCP Rexec 513 TCP Rlogin 513 UDP Rwho 514 TCP Rshell 514 UDP Syslog 515 TCP, UDP Printer 520 UDP RIP (Routing Information Protocol) 524 TCP Netware Core Protocol 5 31 TCP TROJAN rasmin 540 TCP UUCP 543 TCP Kerberos Login 544 TCP Kerberos Shell 563 TCP NNTPS (Secure NNTP) Common Ports and Services Protocol 9 Reference Center Port Number RC RC 10 Reference Center Port Number...This page intentionally left blank HACKNOTES: THE SERIES M cGraw-Hill/Osborne has created a brand-new series of portable reference books for security professionals These are quick-study books kept to an acceptable number of pages and meant to be a truly portable reference The goals of the HackNotes series are ■ To provide quality condensed security reference information that is easy to access... Character Encodings RC 18 RC 20 Testing for Internet Information Services ISAPI Applications RC 21 Security Related Group Policy Settings RC 22 RC 26 Useful Tools Quick Command Lines WinPcap / libpcap Filter Reference RC 28 RC 29 nslookup Command Reference RC 30 Microsoft Management Console RC 31 RC 32 Online References RC 1 RC 2 Reference Center... powerful security facilities, the initial security profile of the operating system is very inviting to attackers Because it is not necessary to configure security parameters to get an application or server working properly, system hardening is often overlooked or dismissed under the classic rule of “if it ain’t broke, don’t fix it.” HackNotes Windows Security Portable Reference is designed to provide the Windows. .. getting across the point of the topic Most importantly, so that these handy portable references don’t burden you with unnecessary verbiage to wade through during your busy day, we have kept the writing clear, concise, and to the point xi xii HackNotes Windows Security Portable Reference Whether you are new to the information security field and need useful starting points and essential facts without... password is by using a brute-force or dictionary attack and applying the hash LSA Comprised of the Local Security Authority Subsystem (LSASS) and the Security Reference Monitor (SRM), the Local Security Authority is the system responsible for enforcing Windows system security Figure RC -1 Use the Security Options grouping of the Local Group Policy Object (GPO) to apply controls for anonymous users and . . 11 5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 7 vi HackNotes Windows Security Portable Reference HackNote / HackNotes Windows Security Portable. 235 viii HackNotes Windows Security Portable Reference HackNote / HackNotes Windows Security Portable Reference / O’Dea / 222785-0 / FM P: 010 CompHackNote785-0fm.vp Friday, June 20, 2003 10 :30:34. whoami root xii HackNotes Windows Security Portable Reference HackNote / HackNotes Windows Security Portable Reference / O’Dea / 222785-0 / FM P: 010 CompHackNote785-0fm.vp Friday, June 20, 2003 10 :30:35