Escolar Documentos
Profissional Documentos
Cultura Documentos
http://remote-execution.blogspot.com.br/search?updated-ma...
1 of 3
08-09-2012 15:16
http://remote-execution.blogspot.com.br/search?updated-ma...
Ferramentas whois, host, usenet, edgar db, dig, nslookup, samspade, google nmap, unicornscan, paketto, queso, siphon, scanline, cheops-ng, nbtscan, snmpwalk, ike-scan dumpsec, sid enum, nat, legion, dcetest, rpcinfo, showmount, netcat, telnet tcpdump, nat, legion,
identificao de 3 Enumerao contas de usurio vlido, pastas mal protegidas Reunidos dados 4 Ganhando acesso suficientes, tendo acesso ao sistema/rede conseguir acesso ao 5 Escalao de privilgios administrador, obter controle completo (root/admin) Consegui acesso ao sistema/rede concluir propriedade 7 Cobrindo rastros de sistema, escondendo intruso configurando 8 Backdooring backdoors para recuperar o acesso privilegiado
tftp, pwdump, ttdb, bind, IIS .HTR/ISM.DLL, dsniff, ettercap, hydra, brutus-aet2
quebra de senha(password rainbow crack, ophcrack, cracking), exploits conhecidos john the ripper, ophcrack, l0phtcrack, local exploits rhosts, hosts, lsa secrets, user data, config files, registry, scripts, services logcleaner-ng, winzapper, rootkits, file streaming
Furtando dados
limpando os logs, escondendo ferramentas criar usurio, lotes de cronograma, infectar arquivos de inicializao, trojanisation, controle remoto SYN flood, ICMP techniques, SRC/DSTSYN-requests, OOB, DDoS
cron, at, rc, netcat, keystroke loggers, fpnwclnt.dll, tini, adore, vnc, bo2k smurf, bonk, jolt, land, nestea, newtear, syndrop, teardrop, winnuke, trinoo, tfn2k, slowloris, loic
Negao de Servio
2 of 3
08-09-2012 15:16
http://remote-execution.blogspot.com.br/search?updated-ma...
3 of 3
08-09-2012 15:16