Professional Documents
Culture Documents
博二
888311 李鎮宇
Outline
Introduction
Unix Password decryption
Buffer Overflow Attack
Trojan horse/Horse
Conclusion
Introduction
Oversight( 人為疏忽 )
Password decryption. (Unix/Win)
System vulnerability ( 系統漏洞 )
Buffer Overflow Attack( 緩衝區溢位 )
(IIS vulnerability)
Inveiglement( 誘騙 )
Trojan horse( 木馬 )
Unix Password decryption
Get password file.
/etc/passwd or passwd.OLD
sirhack:89fGc%^7&a:100:100:Sir Hackalot:/usr/sirhack:/bin/sh
username:password:UserID:GroupID:description(or real name):homedi
r:shell
Client Server
Port Victim
Intruder
Trojan horse/Horse
How Horse hide/Slink.
Form.Visible=False, Form.ShowInTaskBar=False,
Port
Invader
Ping
Conclusion
Known one bully ignorant one