1. Trang chủ
  2. » Kinh Doanh - Tiếp Thị

Hack Attacks Revealed A Complete Reference with Custom Security Hacking Toolkit phần 10 pdf

89 334 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 89
Dung lượng 464,04 KB

Nội dung

Tiger Tools 2000 File: TT2K.HTM Open with frames-compatible Web browser Requirements: Windows/LINUX/Solaris/OS2/Mac; frames-compatible web browser With more than 15,000 security resour

Trang 1

port 1170 Psyber Stream Server, Streaming Audio Trojan, Voice

port 1234 Ultors Trojan

port 1243 BackDoor-G, SubSeven, SubSeven Apocalypse

port 1245 VooDoo Doll

port 1269 Mavericks Matrix

port 2140 DeepThroat, The Invasor

port 2155 Illusion Mailer

port 2283 HVL Rat5

port 2565 Striker

port 2583 WinCrash

port 2600 Digital RootBeer

port 2801 Phineas Phucker

port 2989 (UDP) RAT

port 3024 WinCrash

port 3128 RingZero

port 3129 Masters Paradise

port 3150 DeepThroat, The Invasor

port 3459 Eclipse 2000

port 3700 Portal of Doom

Trang 2

port 5000 Bubbel, Back Door Setup, Sockets de Troie

port 5001 Back Door Setup, Sockets de Troie

port 5011 One of the Last Trojans (OOTLT)

port 5031 NetMetro

port 5321 Firehotcker

port 5400 Blade Runner, Back Construction

port 5401 Blade Runner, Back Construction

port 5402 Blade Runner, Back Construction

port 5512 Illusion Mailer

port 6776 BackDoor-G, SubSeven

port 6912 Shit Heep (not port 69123!)

Trang 3

port 7789 Back Door Setup, ICKiller

port 8080 RingZero

port 9400 InCommand

port 9872 Portal of Doom

port 9873 Portal of Doom

port 9874 Portal of Doom

port 9875 Portal of Doom

port 9876 Cyber Attacker

port 10167

(UDP)

Portal of Doom port 10520 Acid Shivers

port 12223 Hack´99 KeyLogger

port 12345 GabanBus, NetBus, Pie Bill Gates, X-bill

port 12346 GabanBus, NetBus, X-bill

port 12361 Whack-a- mole

port 12362 Whack-a- mole

port 23456 Evil FTP, Ugly FTP, Whack Job

port 23476 Donald Dick

Trang 4

port 23477 Donald Dick

port 40412 The Spy

port 40421 Agent 40421, Masters Paradise

port 40422 Masters Paradise

port 40423 Masters Paradise

port 40426 Masters Paradise

port 47262

(UDP)

Delta Source

Trang 5

port 50505 Sockets de Troie

port 50766 Fore, Schwindler

port 53001 Remote Windows Shutdown port 54320 Back Orifice 2000

port 54321 School Bus

port 54321

(UDP)

Back Orifice 2000 port 60000 DeepThroat

port 61466 Telecommando

port 65000 Devil

Trang 6

Figure E.1 Companion CD components

Figure E.2 Searching the Tiger Tools Repository

Trang 7

Tiger Tools 2000

File: TT2K.HTM (Open with frames-compatible Web browser)

Requirements: Windows/LINUX/Solaris/OS2/Mac; frames-compatible web browser

With more than 15,000 security resources, Tiger Tools 2000 (see Figure E.2) is the largest repository and link structure on the Internet Local Internet access is required to follow these hyperlinks Also included in the repository is the complete, original Rainbow Books series, which encompasses the Department of Defense (DOD) Computer Security Standards The series (so named because each book is a different color) evaluates ‘‘trusted computer systems,” according to the National Security Agency (NSA)

To quickly search for a specific topic within this section, use your browser Edit/Find menu function

TigerSuite (see Chapter 12)

File: TSmobile.EXE (Execute to run TS from the CD)

File: TSsetup.EXE (Execute to install on local hard drive)

Requirements: Windows 9x, NT, 2000

TigerSuite is the first complete TigerBox tool set; it was designed and programmed by the author for the new Windows generation, and is being released for the first time in this book TigerSuite was developed to provide network security tools unique to the computer industry and sorely needed by individuals, commercial organizations, network professionals, and corporate managers concerned with maintaining a secure network Such security violations include personal attacks, external

attacks, and internal attempts at viewing or leveraging confidential company information against the organization or individual

This suite can be used to facilitate an analysis to examine, test, and secure personal computers and networks for and against security vulnerabilities The goal of the TigerSuite is to take the mystery out of security and to bring it directly to the consumer and/or technology professional, where it belongs

Chapter 5

Scanning exploitable security holes and keeping track of those that are receptive or useful to a particular need is not new A scanner program reports these receptive listeners, analyzes weaknesses, and cross-references those vulnerabilities with a database of known hack methods for further

explication

The scanner process can be broken down into three steps: locating nodes, performing service

discoveries on them, and testing those services for known security holes This directory contains various scanners defined in Chapter 5

jakal

File: UNIX jakal.c.gz

Requirements: Linux/Solaris

Trang 8

Among scanners, jakal is among the more popular of the “stealth” or “half- scan” variety

nmap

File: UNIX nmap-2.53.tgz

Requirements: Linux, FreeBSD, NetBSD, OpenBSD, Solaris, IRIX, BSDI

The nmap utility is world-renowned for port-scanning large networks, although it works well on single hosts, too

SAFEsuite

Requirements: Windows NT, Linux, Solaris, SunOS, HPUX, AIX

SAFEsuite is a security application that also identifies security ‘‘hot spots” in a network

SATAN

File: UNIX satan_tar.gz

Requirements: Linux, Solaris, IRIX

As the acronym defines, a security administrator’s tool for analyzing networks

Chapter 8

Numerous vulnerability penetrations are used to substantiate and take advantage of breaches

uncovered during the discovery and site scan phases of a security analysis Hackers typically use these methods to gain administrative access, and to break through and control computers, servers, and internetworking equipment

Backdoor Kits

Files: UNIX telnet-acker.c, UNIX crackpipe.c

Hackers often want to preserve access to systems that they have penetrated even in the face of

obstacles such as new firewalls, filters, proxies, and/or patched vulnerabilities To accomplish this, the attacker must install a backdoor that does the job and is not easily detectable

Flooders

Files: UNIX ping.c, UNIX pong.c, UNIX synflood.c

Hackers use malicious penetration attacks, known as flooding, to render some or all network services unavailable

Log Bashers

Files: UNIX cloaker.c, UNIX convert.c, UNIX W95klog.c

Trang 9

Hackers use audit-trail editing as a method to cover their tracks when accessing a system, using log bashers, wipers, and track-editing mechanisms such as anti-keyloggers

Mail Bombers and Spammers

Password Crackers

Forget your password? Have your passwords been destroyed? Need access to password-protected files or systems? Did former employees leave without unprotecting their files? Or do you simply want to learn how hackers gain access to your network, system, and secured files? If so, these files can help recover passwords

Ami BIOS Cracker

Ami BIOS Decoder

Award BIOS v4.22 Password Cracker

Kill CMOS

WINBIOS

Snap Cracks POP

CAIN

Trang 11

dictionaries word files

Trang 12

AMI BIOS password cracker

UNIX ARJ password cracker

Screensaver password cracker

UNIX slurpie.tgz

sqlbf.zip

thermoprog.zip

Trang 13

UNIX Password sniffing/cracking tool

Access database password cracker

Microsoft Excel password cracker

Share password cracker

PDC brute- force password cracker

Win95 cached password cracker

Web site brute- force password cracker

Microsoft Word password cracker

WordPerfect password cracker

UNIX password cracker

Windows NT password cracker

Winsock password cracker

Zip file password cracker

Zipcracker

UNIX Zipcracker

Zipcracker

Trang 14

on the cake is that the victim never knows it’s happening

Trang 15

UNIX Ethernet Packet Sniffer

UNIX Ethernet sniffer and decryptor

Trang 17

NetBus Windows Trojan

NetBus Pro Windows Trojan

Trang 18

Prosiac

Smart Guard II

Stealth Spy

SubSeven v1,7

Back Orifice 2000 Windows Trojan

Windows Trojan remover

Windows Trojan bundler

Full read/write share Trojan

Viral Kits

A computer virus is a program that will copy its code into one or more larger host programs when it

is activated; when the infected programs are run, the viral code is executed and the virus replicates This means that along with executable files, the code that controls your hard disk can be infected

Programs:

Nuke Virus Creation

Virus Creation Lab

Word 97 Cons Kit

Wardialers

Wardialers are programs developed to facilitate the probing of entire phone exchanges and more The basic idea is simple: If you dial a number and your modem gives you a potential CONNECT status, it is recorded Otherwise, the computer hangs up and tirelessly dials the next one, and so on

Trang 19

Figure E.3 Contents of Chapters 9, 10, and 11

Chapters 9, 10, and 11

Programs: See Figure E.3

The files in this directory correlate to the vulnerability exploits illustrated in Chapters 9, 10, and 11 These hacking secrets accommodate for gateways, Internet servers daemons, operating systems, proxies, and firewalls

Tools

To accommodate non-UNIX operating systems, which lack the necessary compilers to utilize some

of the software contained on this CD, the files in this directory include C compilers for DOS and Windows-compatible systems

Programs:

Pacific

Pic785

Z80

Trang 20

Appendix F

Most Common Viruses

A virus is classified according to its specific form of malicious operation: Partition Sector Virus, Boot Sector Virus, File Infecting Virus, Polymorphic Virus, Multi-Partite Virus, Trojan Horse Virus, Worm Virus, or Macro Virus The following list identifies the most common viruses from the more than 69,000 known today These names can be compared to the ASCII found in data fields of sniffer captures for virus signature assessments

Alphabet Alphastrike Always.2000 AM/AccessiV AM/Cross Ambulance Amilia AmiMacro Amoeba AMSE Amstrad ANANAS Anarkia Andryushka Angarsk Angelina

Astral

AT

AT II Atas Athens Atom Attention August 16th Avalanche AZEUSS-1 Azusa B1 Baba.470 Baba.700 Baboon Baby Back Orifice Backfont Backform

BAT.Orag BBS-1643 Beast Bebe Bebe-486 Beer Beijing Beryllium Best Wishes Best Wishes-970 Beta

Betaboys Better World Beware Bewarebug BFD Big Caibua Big Joke BigMouse BillMe Biological Warfare Bios

BIOSPASS Birdie Bit Addict Bizatch Black Jec

Trang 21

Black Monday Black Peter Black Widow Black Wizard BlackJack Bleah Bleah.C Blee Blinker Bliss Blood Blood-2 Bloodhound BloodLust Bloody!

Bloomington Blue_Nine

BW Bye Byway Bzz Bzz-based C-23693 Cabanas Cabanas.B Cadkill Cancer Cansu Cantando CAP CAP.dam Capital Capitall Captain Trips CARA

Cascade.a Casino Casper Catholic Caz CB-1530 CB-4111

CC

CD CDC-BO CDC-BO.A CDC-BO.Addon.A CDC-BO.Addon.A1 CDC-BO.Addon.B CDC-BO.Addon.C CDC-BO.Addon.D CDC-BO.Addon.E CDC-BO.Addon.E1 Cemetery

Central Point Century Cerebrus Chad Chance Changsha Chaos Chavez CheapExe Checksum Checksum 1.01 Cheeba

Chemist Chemnitz Cheolsoo Chicago 7 Chill Chinese_Fish

Trang 22

Chipaway Choinka CHOLEEPA CHOLLEPA Christmas in Japan Christmas Tree Christmas Violator

Creeper Creeper-425 Creeper-476 Creeping Death Creeping Tormentor Crepate

Crew-2480 Cri-Cri Criminal Crooked Cross Cross.A Cross.D Crotale Cruel Cruncher Crusaders Crypt.A Cryptlab

Cryptor-based CSFR-1000 CSL

CSL-V4 CSL-V5 CSSR 528 CUP Cursy Cvil_Defense CVirus Cyber Riot CyberAIDS D2D

D3 DA’BOYS Dad Dada Dagger Dalian Damage Damage-2 DAME Daniel Danish Tiny Danish Tiny.163 Danish Tiny.476 Danube

Dark Dark Avenger Dark End Dark Lord DarkElf Darkside

Dash-em Data Molester DataCrime Datacrime II Datalock Datalock-1043 Date

Datos David Davis Day10 dBASE

DBF Virus

Deadbabe

Dir-II.Byway Dir.Byway DirFill

Dutch Tiny Dutch Tiny-124 Dutch Tiny-99

Trang 23

Disk Killer Diskspoiler Diskwasher_

Dismember Disnomia Divina

DM DM-310 DM-330 DMSetup DMV Do-Nothing Dodgy Donald Duck Donatello Doodle Doom II DOOM_II_Death Doomsday

DOS-62 DOShunt Dossound Dot Killer Doteater DR&ET

Dr Q

Drain Drazil DRET DSCE DSME Dual_GTM DuBois Dull_Boy Dullboy Durban Dutch 424 Dutch 555

Dyslexia DZT E.T.C

Ear Earthday Eastern Digital Ebola

Eclypse Eco Eddie Eddie 2 EDS EDV Edwin

EE Ehhehe EICAR-test Eight tunes Einstein Ekaterinburg EkoTerror Eliza Eliza.1282 Elvira Elvis Embarrasment EMF

Emmie Empire.Monkey End of

End Times Enemy ENET 37 Enigma Enjoy Enola Enun Epbr Erasmus Error_vir Espejo

Freelove Freew French Boot Frere Jacque s Friday

Friday the 13th Friday-13th-440 Friends

Frodo Frodo Soft Frog’s Alley Frogs

FruitFly

Trang 24

FS

Fu Manchu Fumble Funeral Fungus FunYour Futhark G-Virus G2 Galicia Gaxelle Gdynia.680 Geek GenB Gene Generic Boot Gennops Genocide GenP GenVir Gergana Gergana-222 Gergana-300 Gergana-450 Gergana-512 Ghost

GhostBalls Ghosts Ginger Gingerbread man Girafe

Haifa Halloechen Hamster Hanger Hanta Happy Happy Birthday Happy Day Happy Monday Happy New Year Harakiri

Hare Hare.7750 Hare.7786 Hark Harkone Harry

Hippie Hitchcock Hitchcock.1238 HIV

HK HLL HLLC HLLC.Plane HLLC.TAVC.18287 HLLO

HLLO.17892 HLLO.40932 HLLO.41478 HLLO.CVirus.4601 HLLO.Honi

HLLO.Kamikaze HLLO.Lowlevel HLLO.Novademo.A HLLO.Novademo.B HLLP

HLLP.3263 HLLP.4608 HLLP.4676

Trang 25

Hi Hide and Seek Hidenowt Highlander

HLLP.5850 HLLP.5880 HLLP.6146 HLLP.16196 HLLP.Brian.4933 HLLP.Fidonet.7200 HLLP.HTC

HLLP.Krile HLLP.Siri.4996 HLLP.Sui.5674 HLLP.Voodoo.4415 HLLT

HLLT.6917 HLLT.Krile HLLW.Ehhehe HM2

HndV Holland Girl Honey Hong Kong Hooker

Israeli IstanbulCCC

Jack the Ripper Jackal

Japanese Christmas Japanese Xmas Java virus

JD Jeddah Jeff Jerk Jerk1n Jerusalem JETDB JETDB_ACCESS Jews

JH Jihuu.621 Jihuu.686 Jimi Jindra

Jo Jo-Jo Joe’s Demise Johnny Johnny.B Join the club Join the Crew Joke Program Joke.Win.Desktop.Puzzle Joke.Win.Stupid

Joker Joker-01 Joshi Joshua

Trang 26

JSB July 13th Jumper June 16th June 7 June_4th Junior Junkie Jurassic.3763 Justice Kaczor

La multi ani LadyDi Lambada Lao Doung Lapse Laroux Larry Later Lavot Lazy LBC Boot Leandro Leapfrog Lego Legozz Lehigh Lemming Lenart Leningrad Lennon Leo Leprosy Leprosy-C Leprosy-D Letter_h Liberty Lima Linux virus Linux/Bliss Linux/Staog Lippi

Lisbon Lithium Little Brother Little Girl Little Pieces Little_Red LiXi Lizard Loading Bootstrap Locker

Login Loki Lomza Londhouse Lord Zer0 Lordzero Loslobos Love LoveChild Love You, I Lowercase Lozinsky lpt1 Lucifer Ludwig_Boot_Bait Ludwig_EXE_Bait Lunch

Lyceum Lyceum-1788 Lyceum-1832 LZR

Macabi Macedonia MacGyver Macho Macro Macro.Access Macro.Excel Macro.Word Mad Satan MadMan Mages.604 Mages.606

Trang 27

MG MGTU MH-757 Michelangelo Micro-128 Microbes Microelephant Microsofa Migram Miky Milan Milana Milano Millenium Milous Mimic Ming Minimal Ministry Minnow Minsk Minsk Ghost Minus1 MIR mIRC/Gerr_exe mIRC-virus mIRC/Worm_exe Mirror

Misis MIX-2 MIX1 MLTI MMIR MMIR.DAS_BOOT Moctezuma

Mog Moloch Monday 1st Monica Monika

Monkey Mono Monster.342 Month 4-6 Monxla Moose Morgoth.189 Mosquito Move MPS-OPC MPS-OPC 1.1 MPS-OPC 4.01

Mr D

Mr Virus Mr_D MrKlunky Mshark MSK MSTU MSTU.554 MtE Mtf Mtf1 Mud Mule MultiAni Mummy Munich Murphy Murphy-2 Music Bug MutaGen Mutant Mutation Engine MVF

MX Mystic N.R.L.G

N8fall Nabob Nado Natas Naughty Hacker NaughtyRobot

Nov7 November November 13th November_17th

One_Half Onkogen Only Ontario Ontario-730 Orion Orion-365 Ornate Oropax Otto6

Trang 28

Npox NRLG NTKC NTTHNTA Nuclear Nucleii.1203 nul

Null Set Number 1 Nutcracker NV71 NWait NYB Nygus Offspring OFIDX Ogre Ohio Old Yankee Olivia Olympic Olympic Aids Omega Omicron

On 64

Outland Over OVER1644 OverDoze.568 OverDoze.572 OverDoze.582 OverDoze.585 OverDoze.588 OverDoze.591 OverDoze.596 OverDoze.606 Padded

Page Paix Palette Pandaflu Panic Parasite Paris Parity Parity.Boot.Enc Parity.enc Parity_Boot Pascal 7808 Pastika Path Pathhunt Pathogen Patras PayCheck Payday PC-Flu PC-FLU 2 PC-Format

Pro-aLife Problem Problem-856 Problem-863 Protect Protector Proto-T Proud Prudents Ps!ko PS-MPC Psychic Neon Budd Psychogenius Puerto

Puppet Purcyst QD335 QMU QQ-1513 Qrry

Trang 29

Pro

Quake Quandary Quandry Quarter Quartz Queeg Query Quest Quicksilver Quicky Quiet Quit-1992 Quiz Qumma Quox R-440 Raadioga Radiosys Rage Rainbow Rape Rape-10 Rape-11 Rape-2.2

RP RPS RPS.A RPS.B RPS.C RPVS rrAa RRaA RSY Russian Mirror Russian Mutant Russian Tiny Russian Virus 666 Russian_Flag Rust

Ryazan Rybka S-Bug Sabrina Sad SADAM Sadist Safwan Sampo

School_Suck Schrunch Scion Scitzo Scmpoo Scotch Scott’s Valley Scrap Object Files Scream

Screamer Screamer II Screaming_Fist Screen+1 Scribble SCRIPT.INI SD-123 Seacat Sean Rowe Secret Service Secshift SemiSoft Semtex Seneca Senorita Sentinel September 18th Seventh son Shadow Shadowbyte Shake

Trang 30

Sblank SC.Replicator

Shaker Share The Fun ShareFun Shatin She_Has Sheep Shehas Shell SHHS SHHS-B Shield Shifter Shiftpar Shirley

Slow load Slugger Slydell Smack Small EXE Small-ARCV Smallv SMEG SMEG.Pathogen SMEG.Queeg Smile

Smiley Snake Socha Sofa Solano Sorry Soupy South African Sova

Spanish Spanska Spanska.1000 Spanska.1120.B Spanska.1500 Spanska.4250 Spanska_II Spanz Sparkle Spartak.1360 Sparse Spirit Spreader Squawk Squeaker Squisher SSSSS

Stanco Staog Stardot Stardot-600 Stat

STEALTH_B KOH Stealth_boot

STEALTH_C STELBOO Steroid Stickykeys Stigmata StinkFoot Stoned Stoned.Angelina Stoned.i

Stoned.Kiev Stoned.Monkey Stoned.P Stoned.r Stoney Storm Strange Days StrangeBrew Stranger Strezz Striker #1 STSV Stupid Sub-Zero Subliminal SUHDLOG.DAT Suicidal

Suicidal Dream Suicide

Sunday Suomi Superhacker Surfer Suriv 1

Trang 31

Slayer

Sleeper

Sleepwalker

Staf Stahlplatte Stamford

Suriv 2 Suriv 3.00 Surrender Sux

Tenbyte Tentacle Tentacle_II Tentacle_III Tentatrickle Teocatl Tequila Tere Terminator Terror Testvirus B TH-IP Th-Th Thailand Thanksgiving TheFreak Thirteen minutes Three_Tunes THU

Thursday 12th Tic

Tim Time Timemark Timeslice Timewarp Timid Timor Tiny DI Tiny Family Tiny Hunter Tiny.Ghost Tiphoon Tired

Titz TNT Tokyo Tony Tonya Topo Tormentor Torn Toten Toten.A Toten.B Touche TOX TPE Tpvo Trabajo_hacer.b Traceback Trackswap Trakia Trash.b Traveller Tremor Triadi.3998 Trigger Triple Trivial Trivial-based Trivial.Elf.256 TrJP

Troi Troi II Trojan Trojan-17 Trojan.Cmd640x Trojector

TS TS.1200 Tsadbot Tubo Tula Tula-419 Tumen TUQ Turbo

Virus Creation Center Virus Lesson

Virus-101 Virus-90 Virus-B Virus9

Trang 32

Vbasic VCC VCL VCL.716 VCL.RedTeam VCL.Werbe Vcomm VCS VDV-853 Vengence Venom VFSI Vice Vice.05.Code VICE5 Victor Vienna Vienna.2279 Vienna.Bua Vienna.Reboot Vindicator Violator Violetta Viper Viperize Viral Code B Viral Code F Viral_Messiah Virdem Virdem 792 Virdem 824 Viresc Virogen Virtual Onkogen Virus #2

Vision.Boot Vivaldi Vivi.a VLamiX Void Poem Voronezh Voronezh-370 Voronezh-600 Vote

VP Vriest VVF 3.4 W-13 W-13 C W-boot W.E.T

W32.Semisoft.59904C W32.Semisoft.Gen W95.Marburg.B W95/Anxiety W95/Apparition.B W97M

Walkabout Walker Warez Warrier Warrior Wazzu Wazzu.A Wazzu.B Wazzu.C Wazzu.D Wazzu.DG Wazzu.DH Wazzu.DO Wazzu.DP Wazzu.DS Wazzu.DU

Wordswap World Cup Fever WorldCup98 Worm-16580 Wormy-1 WW-217 WW6Macro

XM/Shiver XM/Shiver.A XM/Trasher.D XM/Trasher.E XM97

Xmas in Japan XPEH

Xtac Xtratank Xuxa Y2K Yafo Yale Yankee Yankee-1150 Yankee-1202

Trang 33

XF XF/Paix XF97 XLFormula XLMacro

XM XM/Compat.A XM/Dado.A XM/Extras XM/Laroux.EB XM/Laroux.EC XM/Laroux.EK XM/Laroux.EE XM/Laroux.Newvar8 XM/Laroux.Newvar9 XM/Laroux.Newvar10 XM/Laroux.Newvar11 XM/Neg.B

XM/NoSave.A

Yankee-tune Yankee_Doodle YAP

Yaunch Year 1992 Year 2000 virus Yeke

Yeke.2425 Yellow Worm Yesmile Yesterday YOM You have GOT to see this Youth

ystanbul Yukon YUKON3U.mp Z-90

Z10 Zappa Zaragosa Zaraza Zarm Zarma Zed Zeleng Zentory Zero Bug

Zonked

Zu Zyx

ZZ

Trang 34

122 East 1700 South M/S: E-12-1

Provo, UT 84606

S-721 67 Vasteras, Sweden

Unit 8, 7 West Way, Botley, Oxford, OX2 OJB United Kingdom

2903 Bunker Hill La ne Santa Clara, CA 95054

246 Industrial Way West Eatontown, NJ 07724

E 22425 Appleway Liberty Lake, WA 99019

90 Vincent Drive Edgbaston, Birmingham B152SP United Kingdom NEC Corporation

Tokyo 108-01 Japan

15025 S.W Koll Parkway Beaverton, OR 97006-6056

Brandsstatter-Str.2-10 D-8502 Zirndorf 000051 Germany

1101 E Arapaho Road Richardson, TX 75081

2355 South 1070 West

Trang 35

Salt Lake City, UT 84119

Internet Assigned Numbers.Authority

4676 Admiralty Way Marina Del Rey, CA 90292-6695 1-1-3, Shimaya

Konohana-Ku Osaka 554 Japan

2941 Alton Avenue Irvine CA 92714

SI Headquarters Division

No 25 Kowa Bldg 8-7 Sanbancho Chiyoda-Kutokyo 102 Japan

4200 Bohannon Drive Menlo Park, CA 94025

1300 E Lambert Road

La Habra, CA 90632

P.O Box 254, Caxton Way Watford Business Park Watford Hertswd 18XH United Kingdom

691 East River Road Tucson, AZ 85704

100 Lodge Lane Chalfont St Giles Buckshp 84AH United Kingdom

2446 Toda, Atsugi City Kanagawa Pref

243 Japan Networth Incorporated

9480 Carroll Park Drive San Diego, CA 92121

Postfach 56 60

Trang 36

NR Alton, Hampshire GU34 3QW, United Kingdom

821 Fox Lane San Jose, CA 95131

450 Donald Lynch Boulevard Marlborough, MA 01752

3301 Terminal Drive Raleigh, NC 27604

Fulbourn Road, Cherry Hinton Cambridge CB1 4JN,

United Kingdom P.O Box 17220 Boulder, CO 80308-7220

350 North Bernardo Mountain View, CA 94043

55 Fairbanks Blvd Marlboro, MA 01752

7600 Boone Avenue North Minneapolis, MN 55428-1099

Office Systems Division

3450 Hillview Avenue Palo Alto, CA 94304 Telecommunications

9, Rue Elsa Triolet Z.I Des Gatines-78370 Plaisir France

3501 Sunflower Santa Ana, CA 92704

Trang 37

1200 North 23rd Street Wilmington, NC 28405

555 Briarwood Circle Ann Arbor, MI 48108

Nybrovej 114 DK-2800 Lyngby Denmark

1-23-11, Kamitakaido Suginami-Ku, Tokyo 168 Japan

P.O Box 31-310 Lower Hutt New Zealand

856-51st Street East Saskatoon Saskatchewan S7K 5C7 Canada

Contract Administration Mgr

2400 Bisso Lane Concord, CA 94520 Imp, No 1 Industrial Estate Consett, Co Dukham DH86TJ United Kingdom

61, Chemin du Vieux-Chene Zirst-Bp 177

38244 Meylan Cedex France

29300 Aurora Road Solon, OH 44139

46750 Fremont Blvd #104 Fremont, CA 94538

1920 West Corporate Way Anaheim, CA 92803-6122

Trang 38

7491 Briar Road Montreal, Quebec H4W 1K4 Canada

Digital Equipment Corporation

F-5464 Asbach Germany

2202 N Forbes Blvd

Tucson, AZ 85745

Lan Internetworking Division

155 Swanson Road Boxborough, MA 01719

FL 182, NO 531-1 Chung Cheng Road Hsin Tien City Taiwan, R.O.C

48531 Warmsprings Blvd Fremont, CA 94539

1555 S Sinclair Street Anaheim, CA 92806

9425 Canoga Avenue Chatsworth, CA 913211

28310 Industrial Blvd., Ste K Hayward, CA 94545

3530 Hyland Avenue Costa Mesa, CA 92626

Kobe Hi-Tech Park 1-2-2 Murotani Nishi-Ku Kobe 651-22 Japan

Trang 39

Global View Co., Ltd

Hsi-Chih, Taipei, Hsien Taiwan R.O.C

16 Chemin des Aulx

1228 Plan les Ovates Switzerland

NO 20-25, Seishin 8-Chome Sagamihara,Kanagawa

229 Japan

Industrial Zone P.O Box 215

70651 Yavne Israel

West Egg Systems, Inc

355 Old Pymouth Road Sagamore Beach, MA 02562

523 Fellowship Road, STE 205

MT Laurel, NJ 08054

P.O Box 280 Necedah, WI 54646

83 Jolly Maker Chambers II Nariman Point

Bombay 400021 India

911 N Plum Grove Road Schaumburg, IL 60173

10075 Barnes Canyon Road San Diego, CA 92121

5734 MiddleBrook Pike Knoxville, TN 37921

4F, NO 5, Lane 45 Pao Hsin Rd., Hsin Tien Taipei Hsien

Taiwan, R.O.C

65 High Ridge Road, -STE 286

Trang 40

Simi Valley, CA 93063 3F, NO 36-1, Hwang Hsi Shin- lin

Taipei Taiwan, R.O.C

5556 Atlantic Highway Flowery Branch, GA 30542

1/2 Lavelle Road Bangalore, 560001 India

4, Ming Sheng Street Ticheng Industrial District

Taipei Hsieh Taiwan ROC

4822 Albermarle Road, #104 Charlotte, NC 28205

5600 Rowland Road STE 205 Minnetonka, MN 55364

St John’s Innovation Centre Cowley Road

Cambridge CB4 4WS United Kingdom

BOX 277 S-53224 Skara Sweden 8-2-1 Kokuryp Cho Chofu shi

Tokyo182 Japan

8966 Comanche Ave

Chatsworth, CA 91311

Ngày đăng: 10/08/2014, 12:21

TỪ KHÓA LIÊN QUAN

w