... CERT® GUIDE TO SYSTEMANDNETWORK SECURITY PRACTICES
8 THE CERT® GUIDE TO SYSTEMANDNETWORK SECURITY PRACTICES
To
Identify and Enable
Systems andNetwork
Logging Mechanisms
Identify and Install ... establishment and maintenance of secure configura-
tions and the secure operations of critical assets.
Most systemandnetwork administrators have developed their knowledge of how to
protect and secure systems ... following informa-
tion assets:
• Detection tools
•Networks
• Systems (including processes and user behavior)
• Networkandsystem performance
• Files and directories
• Hardware
• Access to physical...
... and re- near the grammatical end of the continuum
are called grammatical morphemes.
Note that grammatical morphemes include forms that we can consider to be
words like the, a, and, and of and ... of all, we
should understand deeply about its morpheme system.
Living in a community, human beings need a tool to communicate with each
other, and to carry on human and social affairs. They, ... also play an
17
English morpheme system Luong Thuan & Kim Phuong
• First, both English morphemes and Vietnamese morphemes are the smallest
unit of language and can not be divided into smaller...
... DOES THE WEB APPLICATION
REQUIRE AUTHENTICATION OF THE
USER?
Many Web applications require another server
authenticate users
Examine how information is passed between the
two servers
Encrypted channels
Verify that logon and password information is
stored on secure places
Authentication servers introduce a second target
44
37
34
APPLICATION VULNERABILITIES
COUNTERMEASURES (CONTINUED)
Top10 Web application vulnerabilities (continued)
Remote administration flaws
Attacker can gain access to the Web server through the
remote administration interface
Web andapplication server misconfiguration
Any Web server software out of the box is usually vulnerable
to attack
Default accounts and passwords
Overly informative error messages
32
16
WEB FORMS
Use the <form> element or tag in an HTML document
Allows customer to submit information to the Web server
Web servers process information from a Web form by
using a Web application
Easy way for attackers to intercept data that users
submit to a Web server
7
APPLICATION VULNERABILITIES
COUNTERMEASURES
Open Web Application Security Project (OWASP)
Open, notforprofit organization dedicated to finding
and fighting vulnerabilities in Web applications
Publishes the Ten Most Critical Web Application
Security Vulnerabilities
Top10 Web application vulnerabilities
Unvalidated parameters
HTTP requests are not validated by the Web server
Broken access control
Developers implement access controls but fail to test them
properly
29
USING SCRIPTING LANGUAGES
Dynamic Web pages can be developed using scripting
languages
VBScript
JavaScript
PHP
18
OPEN DATABASE CONNECTIVITY
(ODBC) (CONTINUED)
ODBC defines
Standardized representation of data types
A library of ODBC functions
Standard methods of connecting to and logging on to a
DBMS
24
WEB APPLICATION COMPONENTS
Static Web pages
Created using HTML
Dynamic Web pages
Need special components
<form> tags
Common Gateway Interface (CGI)
Active Server Pages (ASP)
PHP
ColdFusion
Scripting languages
Database connectors
6
APACHE WEB SERVER
Tomcat Apache is another Web Server program
Tomcat Apache hosts anywhere from 50% to 60% of all
Web sites
Advantages
Works on just about any *NIX and Windows platform
It is free
Requires Java 2 Standard Runtime Environment (J2SE,
version 5.0)
15
ON WHAT PLATFORM WAS THE WEB
APPLICATION DEVELOPED?
Several different platforms and technologies can
be used to develop Web applications
Attacks differ depending on the platform and
technology used to develop the application
Footprinting is used to find out as much information
as possible about a target system
The more you know about a system the easier it is to
gather information about its vulnerabilities
45
OPEN DATABASE CONNECTIVITY
(ODBC)
Standard database access method developed by
the SQL Access Group
ODBC interface allows an application to access
Data stored in a database management system
Any system that understands and can issue ODBC
commands
Interoperability among backend DBMS is a key
feature of the ODBC interface
23
48
UNDERSTANDING WEB APPLICATIONS
It is nearly impossible to write a program without bugs
Some bugs create security vulnerabilities
Web applications also have bugs
Web applications have a larger user base than standalone
applications
Bugs are a bigger problem for Web applications
5
DOES THE WEB APPLICATION
CONNECT TO A BACKEND DATABASE
SERVER? (CONTINUED)
Basic testing should look for
Whether you can enter text with punctuation marks
Whether you can enter a single quotation mark followed by
any SQL keywords
Whether you can get any sort of database error when
attempting to inject SQL
43
DOES THE WEB APPLICATION USE
DYNAMIC WEB PAGES?
Static Web pages do not create a security
environment
IIS attack example
Submitting a specially formatted URL to the
attacked Web server
IIS does not correctly parse the URL
information
Attackers could launch a Unicode exploit
http://www.nopatchiss.com/scripts/ ... DOES THE WEB APPLICATION
REQUIRE AUTHENTICATION OF THE
USER?
Many Web applications require another server
authenticate users
Examine how information is passed between the
two servers
Encrypted channels
Verify that logon and password information is
stored on secure places
Authentication servers introduce a second target
44
37
34
APPLICATION VULNERABILITIES
COUNTERMEASURES (CONTINUED)
Top10 Web application vulnerabilities (continued)
Remote administration flaws
Attacker can gain access to the Web server through the
remote administration interface
Web andapplication server misconfiguration
Any Web server software out of the box is usually vulnerable
to attack
Default accounts and passwords
Overly informative error messages
32
16
WEB FORMS
Use the <form> element or tag in an HTML document
Allows customer to submit information to the Web server
Web servers process information from a Web form by
using a Web application
Easy way for attackers to intercept data that users
submit to a Web server
7
APPLICATION VULNERABILITIES
COUNTERMEASURES
Open Web Application Security Project (OWASP)
Open, notforprofit organization dedicated to finding
and fighting vulnerabilities in Web applications
Publishes the Ten Most Critical Web Application
Security Vulnerabilities
Top10 Web application vulnerabilities
Unvalidated parameters
HTTP requests are not validated by the Web server
Broken access control
Developers implement access controls but fail to test them
properly
29
USING SCRIPTING LANGUAGES
Dynamic Web pages can be developed using scripting
languages
VBScript
JavaScript
PHP
18
OPEN DATABASE CONNECTIVITY
(ODBC) (CONTINUED)
ODBC defines
Standardized representation of data types
A library of ODBC functions
Standard methods of connecting to and logging on to a
DBMS
24
WEB APPLICATION COMPONENTS
Static Web pages
Created using HTML
Dynamic Web pages
Need special components
<form> tags
Common Gateway Interface (CGI)
Active Server Pages (ASP)
PHP
ColdFusion
Scripting languages
Database connectors
6
APACHE WEB SERVER
Tomcat Apache is another Web Server program
Tomcat Apache hosts anywhere from 50% to 60% of all
Web sites
Advantages
Works on just about any *NIX and Windows platform
It is free
Requires Java 2 Standard Runtime Environment (J2SE,
version 5.0)
15
ON WHAT PLATFORM WAS THE WEB
APPLICATION DEVELOPED?
Several different platforms and technologies can
be used to develop Web applications
Attacks differ depending on the platform and
technology used to develop the application
Footprinting is used to find out as much information
as possible about a target system
The more you know about a system the easier it is to
gather information about its vulnerabilities
45
OPEN DATABASE CONNECTIVITY
(ODBC)
Standard database access method developed by
the SQL Access Group
ODBC interface allows an application to access
Data stored in a database management system
Any system that understands and can issue ODBC
commands
Interoperability among backend DBMS is a key
feature of the ODBC interface
23
48
UNDERSTANDING WEB APPLICATIONS
It is nearly impossible to write a program without bugs
Some bugs create security vulnerabilities
Web applications also have bugs
Web applications have a larger user base than standalone
applications
Bugs are a bigger problem for Web applications
5
DOES THE WEB APPLICATION
CONNECT TO A BACKEND DATABASE
SERVER? (CONTINUED)
Basic testing should look for
Whether you can enter text with punctuation marks
Whether you can enter a single quotation mark followed by
any SQL keywords
Whether you can get any sort of database error when
attempting to inject SQL
43
DOES THE WEB APPLICATION USE
DYNAMIC WEB PAGES?
Static Web pages do not create a security
environment
IIS attack example
Submitting a specially formatted URL to the
attacked Web server
IIS does not correctly parse the URL
information
Attackers could launch a Unicode exploit
http://www.nopatchiss.com/scripts/ ... DOES THE WEB APPLICATION
REQUIRE AUTHENTICATION OF THE
USER?
Many Web applications require another server
authenticate users
Examine how information is passed between the
two servers
Encrypted channels
Verify that logon and password information is
stored on secure places
Authentication servers introduce a second target
44
37
34
APPLICATION VULNERABILITIES
COUNTERMEASURES (CONTINUED)
Top10 Web application vulnerabilities (continued)
Remote administration flaws
Attacker can gain access to the Web server through the
remote administration interface
Web andapplication server misconfiguration
Any Web server software out of the box is usually vulnerable
to attack
Default accounts and passwords
Overly informative error messages
32
16
WEB FORMS
Use the <form> element or tag in an HTML document
Allows customer to submit information to the Web server
Web servers process information from a Web form by
using a Web application
Easy way for attackers to intercept data that users
submit to a Web server
7
APPLICATION VULNERABILITIES
COUNTERMEASURES
Open Web Application Security Project (OWASP)
Open, notforprofit organization dedicated to finding
and fighting vulnerabilities in Web applications
Publishes the Ten Most Critical Web Application
Security Vulnerabilities
Top10 Web application vulnerabilities
Unvalidated parameters
HTTP requests are not validated by the Web server
Broken access control
Developers implement access controls but fail to test them
properly
29
USING SCRIPTING LANGUAGES
Dynamic Web pages can be developed using scripting
languages
VBScript
JavaScript
PHP
18
OPEN DATABASE CONNECTIVITY
(ODBC) (CONTINUED)
ODBC defines
Standardized representation of data types
A library of ODBC functions
Standard methods of connecting to and logging on to a
DBMS
24
WEB APPLICATION COMPONENTS
Static Web pages
Created using HTML
Dynamic Web pages
Need special components
<form> tags
Common Gateway Interface (CGI)
Active Server Pages (ASP)
PHP
ColdFusion
Scripting languages
Database connectors
6
APACHE WEB SERVER
Tomcat Apache is another Web Server program
Tomcat Apache hosts anywhere from 50% to 60% of all
Web sites
Advantages
Works on just about any *NIX and Windows platform
It is free
Requires Java 2 Standard Runtime Environment (J2SE,
version 5.0)
15
ON WHAT PLATFORM WAS THE WEB
APPLICATION DEVELOPED?
Several different platforms and technologies can
be used to develop Web applications
Attacks differ depending on the platform and
technology used to develop the application
Footprinting is used to find out as much information
as possible about a target system
The more you know about a system the easier it is to
gather information about its vulnerabilities
45
OPEN DATABASE CONNECTIVITY
(ODBC)
Standard database access method developed by
the SQL Access Group
ODBC interface allows an application to access
Data stored in a database management system
Any system that understands and can issue ODBC
commands
Interoperability among backend DBMS is a key
feature of the ODBC interface
23
48
UNDERSTANDING WEB APPLICATIONS
It is nearly impossible to write a program without bugs
Some bugs create security vulnerabilities
Web applications also have bugs
Web applications have a larger user base than standalone
applications
Bugs are a bigger problem for Web applications
5
DOES THE WEB APPLICATION
CONNECT TO A BACKEND DATABASE
SERVER? (CONTINUED)
Basic testing should look for
Whether you can enter text with punctuation marks
Whether you can enter a single quotation mark followed by
any SQL keywords
Whether you can get any sort of database error when
attempting to inject SQL
43
DOES THE WEB APPLICATION USE
DYNAMIC WEB PAGES?
Static Web pages do not create a security
environment
IIS attack example
Submitting a specially formatted URL to the
attacked Web server
IIS does not correctly parse the URL
information
Attackers could launch a Unicode exploit
http://www.nopatchiss.com/scripts/...
... Linux
ext2 Kiểu filesystem đợc dùng chủ yếu trên Linux partition.
iso9660 Kiểu ISO 9660 filesystem đợc dùng với CD-ROM disks.
sysv Kiểu Nhằm hỗ trợ cho dạng UNIX System V filesystem.
msdos ... dới Linux systems:
#
# Sample /etc/fstab file for a Linux machine
#
# Local mounts
/dev/sda1 / ext2 defaults 1 1
mkswap /dev/hda2
2. Mounting and unmounting file systems
Mounting file systems
Nh ... Bỏ mount một hệ thống file (điểm mount).
I. File Systemand Disk Administration
1. Cấu trúc th mục trên Unix
/ - Th mục gốc trên UNIX file system.
/bin - Là symbol link tới /usr/bin chứa các...
... solaris dùng lệnh newfs), mkswap tạo swap file
system.
Ví dụ
mke2fs /dev/hda1
mkswap /dev/hda2
3. Mounting and unmounting file systems
Mounting file systems
Như ta đ biêt hệ thống file của UNIX ... của người sử dụng.
ỹ Số trang đ in.
VIII.
File Systemand Disk Administration
1. Cấu trúc thư mục trên Unix
ỹ / - Thư mục gốc trên UNIX file system.
ỹ /bin - Là symbol link tới /usr/bin chứa ... recover bởi fsck.
2. Creating file systems
Giới thiệu về UNIX- Một số thao tác cơ bản trên UNIX
77
ỹ sysv Kiểu Nhằm hỗ trợ cho dạng UNIX System V filesystem.
ỹ msdos Kiểu DOS partition...
... configure Nagios.
CHAPTER 6
N
NETWORK MONITORING
159
The last options from the Monitoring section that I want to cover here are Service
Problems, Host Problems, andNetwork Outages. Each of these ... small example network in which four Linux
servers are used. Three of these are on the internal network, and one of them is on the
Internet. Nagios can monitor other operating systems as well, ...
N
NETWORK MONITORING
132
+ap_+j]ceko.+dpl]oos`*qoano
, but this file is not created automatically. The following
command creates it for you, puts a user with the name
j]ceko]`iej
in it, and...
...
Each office uses a standard user account and password for all servers in that office. Network
administrators in each office know the user account and password combination. Network administrators ... of the bandwidth used between the Chicago and New York offices.
Bandwidth utilization between these two offices is currently cause for concern. Network traffic
between the Chicago and New York ... level of availability and reduced
latency between the New York and Boston offices is required. Bandwidth utilization between the
Boston and New York offices is minimal and is not a concern in...
... standards and transmitted using well-defined networks and
protocols. An understanding of the coding formats, standards, and pro-
tocols and the standards for transmission is useful to understand ... This includes the file formats, protocols, and video and
audio coding standards as standardized by the 3GPP and 3GPP2 for use
on mobile networks. Graphics and animation in the mobile environment
are ... location detection and navigation, and the utility of such
multimedia is magnified manifold as a personal mobility tool. The
ability to handle office applications and mail and to view and modify
documents...