Eicon Networks S92 Uživatelský manuál Strana 196

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 209
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 195
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 196
Intheory,wecan pingaroundtheinternettofindoutwhocanbeusedasamplifiers.
Thisis,however,extremelytimeconsuming.Also,thedegreeof damageproducedby
individualsystemsishighly limited.Forlaunchingattackofmassivescale,theideal
amplifiercandidatesarenetworksthathaveIPdirectedbroadcastcapableroutersat
theborderandnumerousclientsintheinternalnetwork.
Inresponsetothethreatsposedbythiskindofattack,aprojectknownasSmurf
AmplifierRegistry (SAR)hasbeenlaunched.AccordingtotheofficialSARpage,
“TheSARisatoolforInternetadministratorsbeingattackedbyor implicatedin
smurfattacks,orthosewhowishtotakeprecautions.TheSARletsyouprobe
InternetconnectedIPnetworkstoseewhetherornottheyareconfiguredinaway
thatwillallowperpet ratorstousethemforsmurfamplification.Probingcanbedone
interactivelyorinbulk.IninteractivemodetheSARwillprobeanetwork,findthe
numberofduplicatesreturned,andsavethisinformationinadatabase.If,andonlyif,
theprobednetwo rkreturns1ormoreduplicatepackets,itismarkedas"broken". 
Upongainingknowledgeofabrokennetwork,theSARwillautomaticallyobtain
informationaboutthenetworkandnotifytherelevantpeopleofthis.”
71
SARappearstobeatoolagainstsmurfattack.However,wecantakeadvantageofits
probingfeaturetolocatenetworksthatare stillvulnerable,andthenmakeuseof
them.
UsingSAR:
WecanuseSARinthefollowingways:
1,Useittoprobeapotentialamplifiernetwork:
71
http://www.powertech.no/smurf/
Zobrazit stránku 195
1 2 ... 191 192 193 194 195 196 197 198 199 200 201 ... 208 209

Komentáře k této Příručce

Žádné komentáře