Eicon Networks S92 Manual de usuario Pagina 203

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 209
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 202
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 203
Viathenonemailroute:
IfGIAChasanantivirussolutionrunning,theemailattachmentmaybestripped
beforereachingtheendusers. Toworkaroundthis,wecan setupaFTPlocation
somewhereontheinternettohostthefile.Then,sendanemailtothecontactpeople
inGIACwithnoattachment.Intheemail,tellthemthatwerepresentasupplierwith
gooddealsforthem.Askthem tologontoourFTP anddownloadthe“catalog”file.
ForkBombsandViruses
Abovearejustexamplesofhowwecan“bypass”theunderfiredsecurity
architecture.The“files”weusecanbeamacrovirus,aforkbomboranythingelse.
AccordingtoRohitSingh,ForkBombsare:
“…programsorshellscriptswhich(either intentionallyoraccidentally)createnew
processesrepeatedly(usingthefork()systemcall.)Newprocessesarecreatedsofast
thatwithinnotimetheprocesstablegetsfilledupandthesystemcomestoagrinding
halt.Nootherprocesscanthenbe started,noteven'ps'toseewhotriggeredthatfork
bomb!Killingthatforkbombmeansyetanotherprocess,andthat’sexactlywhatis
scarce!AforkbombmightmeanpressingthebigRedbutton!”
76
AccordingtotheWordMacroVirusFAQ,aWordMacroVirus:
“…isamacro(listofinstructions)ortemplatefile(usuallywiththe.DOTextension)
whichmasquerades as legitimateMSWORDdocuments(usuallywiththeextension
*.DOC).Aninfected*.DOCfile,doesn'tlookanydifferenttotheaveragePCuser,as
itcanstillcontainanormaldocument.Thedifferenceisthatthisdocumentisreally
justatemplateormacrofile,withinstructions toreplicate,andpossiblycause
damage.M SWORDwillinterpretthe*.DOTmacro/templatefileregardlessof
extension,asatemplatefile.Thisallowsforitbeingpassedoffasalegitimate
document(*.DOC)ThisFAQtakesthepositionthatadocumentismeanttobeDATA,
andaMACROisatleastpartiallyexecutableCODE.Whenadocumenthasbeen
infected,ithasbeenmergedwithexecutablecodeinamultipartfile,partdata/part
76
http://rexgrep.tripod.com/rexfbdmain.htm
Vista de pagina 202

Comentarios a estos manuales

Sin comentarios