Essays24.com - Term Papers and Free Essays
Search

Ssh

Essay by   •  August 25, 2010  •  493 Words (2 Pages)  •  973 Views

Essay Preview: Ssh

Report this essay
Page 1 of 2

ssh

Used to protect against IP spoofing and source routing

SSL

Used to provide security for general Internet services

SATAN

Used for remote scanning of Unix and firewall systems

Kerberos

Used to reduce system vulnerability to .rhosts attacks

Features of the Client/Server authentication exchange:

The client uses the session key from the credentials obtained for the server for a KRB_AP_REP

message

The client and server share an encryption key that can be used by the application

The client verifies that the timestamp field matches that in the authenticator it sent to the server

other

Begins with a prefix followed by a colon and the rest of the name

domain

Consists of components separated by periods

X.500.

Contains an equals sign with the components separated by slashes

reserved

Has no names assigned to it.

Steps used in the authentication process of Kerberos are sequenced as:

A: The client sending a request to the Authentication Server for a ticket

B: The TIcket Granting Ticket being supplied to the client

C: The client requesting a ticket from the Ticket Granting Server

D: A Ticket for the application server or the TIcket Granting Server being provided

E: The Client transmitting the ticket containing the client's identity

F: The session key shared by the client authenticating the client and the server

Steps involved in the search for network vulnerabilities by SATAN:

Scanning the hosts within a proximity level away from the target

Generating reports from the database with the search information

Initiating a search when informed about the target.

1 Local users gain read access to files on the local system

2 Local users gain execute access to nonroot-owned files

3 Local users gain write access to root-owned files

4 Remote users gain read access to files on the system

5 Remote users gain execute access to nonroot-owned files

8 Remote users across a firewall gain write access to files

Method involved in the phase of obtaining access to a system during a network attack:

...

...

Download as:   txt (3.4 Kb)   pdf (63.3 Kb)   docx (10 Kb)  
Continue for 1 more page »
Only available on Essays24.com