Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Open Source Security Tools : Practical Guide to Security Applications part 7. Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses. Written with the harried IT manager in mind, Open Source Security Tools is a practical, hands-on introduction to open source security tools. | Howlett_CH02.fm Page 39 Wednesday June 23 2004 2 58 PM traceroute UNIX or tracert Windows Network Diagnostic Tools 39 Table 2.2 dig Record Types Options Descriptions AXFR Attempts to get the whole file for the domain or zone file. Some servers are now configured not to allow zone file transfers so you may have to ask for specific records. A Returns any A records. A records are individual host names on the network such as webserver.example.com and firewaU1.example.com. MX Returns the registered mail host name for that domain. This is useful if you want to contact an administrator try administrator@mailhost.example.com or root@mailhost.example.com . CNAME Returns any CNAMED hosts also known as aliases. For example fido.example.com www.example.com. ANY Returns any information it can generate on the domain. Sometimes this works when AXFR doesn t. finger A User Information Service finger Author primary contact Unknown Web site Various including www.infonet.st-johns.nf.ca adm finger.html www.developer.com net cplus article.php 627661 Platforms Most UNIX and Windows platforms Licenses Various UNIX manual pages Type man finger at any command prompt. Finger is an old UNIX command that isn t used much anymore but it is still running on many machines as a legacy service. It was originally designed when the Internet was a friendlier place and users didn t mind people halfway across the world knowing their schedule office numbers and other information. Most competent system administrators turn this daemon off now because it has been associated with many security holes. However you d be surprised how many servers still run it. Many routers come with it I can t figure out why except maybe the vendor implemented a TCP stack that included it and some UNIX operating systems still enable it by default on installation and people forget or don t know how to turn it off. Howlett_CH02.fm Page 40 Wednesday June 23 2004 2 58 PM 40 Chapter 2 Operating System Tools The finger command lets .