Seven Deadliest USB Attacks phần 2

Với quyền lực lớn và tiện lợi đến rất nhiều trách nhiệm đảm bảo cho dữ liệu được bảo vệ từ TightVNC là một gói phần mềm điều khiển từ xa được cung cấp miễn phí (GNU General Public License) với đầy đủ mã nguồn có sẵn. Nó cung cấp một khách hàng ổn định hoặc máy chủ từ xa tiện ích, | 10 CHAPTER 1 USB Hacksaw described here it is not uncommon for an attacker to use multiple proxies to ensure anonymity. In Figure the VNC and OpenSSH connections are viable attacks for low-security installations which allow inbound connections although these are the minority. Most medium- to high-level security-minded environments will not allow these connections without a network component modification. However if a session were established from the inside out this could evade most detection mechanisms. These programs are not loaded in the default installation of Hacksaw but they will be covered in Chapter 2 USB Switchblade. How to Recreate the Attack First you will need to purchase a U3 drive unless you were able to customize your own by going to http . When purchasing a preconfigured U3 platform be sure to look for the U3 symbol on the front or back cover of the packaging on the flash drive. If you are unable to locate the symbol then try another vendor. SanDisk Memorex and Toshiba are three flash drive vendors who include the U3 technology on their products for turnkey operation. Others are out there and more are likely to join this or new portable platform types in the near future. The USB Hacksaw tool is designed to work with Windows 2000 XP or 2003 systems only although some success has been achieved on Vista. The program will manually install onto Windows 7 although Stunnel is not compatible resulting in a failure to establish a connection to the e-mail server. A Windows XP operating system was used to build the Hacksaw version outlined in the next section. In order to get the programs on the U3 drive you must replace the launcher with the open-source code. The tool is designed to run automatically if autorun has not been disabled by the user or policy. If autorun has been disabled user interaction is required to execute the program. More information related to Windows default settings and applicable updates to autorun and autoplay can

Không thể tạo bản xem trước, hãy bấm tải xuống
TỪ KHÓA LIÊN QUAN
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.