'application'에 해당되는 글 4건

  1. 2011.03.15 OSI Layers by CEOinIRVINE
  2. 2011.03.04 Web Vulnerability regarding F company by CEOinIRVINE
  3. 2009.02.06 CIS benchmarks by CEOinIRVINE
  4. 2008.11.25 As Bush's Term Ends, Some Big Names Seek Pardons by CEOinIRVINE

OSI Layers

IT 2011. 3. 15. 07:05

Application layer(7) Recognized as the top layer of the OSI model, this layer serves as the window for application services. home of email programs, FTP, Telnet, web browsers, and office productivity suites, a viruses, worms, Trojan horse programs,

Presentation layer(6) The Presentation layer is responsible for taking data that has been passed up from lower levels and putting it into a format that Application layer programs can understand. The most critical process handled at this layer is encryption and decryption.

Session layer(5) Its functionality is put to use when creating, controlling, or shutting down a TCP session. Items such as the TCP connection establishment and TCP connection occur here. Session-layer protocols include items such as Remote Procedure Call and SQLNet from Oracle. The Session layer is vulnerable to attacks such as session hijacking. A session hijack can occur when a legitimate user has his session stolen by a hacker.

Transport layer(4) ensures completeness by handling end-to-end error recovery and flow control. Transport-layer protocols include TCP, a connection-oriented protocol. TCP provides reliable communication through the use of handshaking, acknowledgments, error detection, and session teardown, as well as User Datagram Protocol (UDP), a connectionless protocol. UDP offers speed and low overhead as its primary advantage. Security concerns at the transport level include Synchronize (SYN) attacks, Denial of Service (DoS), and buffer overflows.

Network layer(3). logical addressing and routing. The Network layer is the home of the Internet Protocol (IP), which makes a best effort at delivery of datagrams from their source to their destination. Security concerns at the network level include route poisoning, DoS, spoofing, and fragmentation attacks. Fragmentation attacks occur when hackers manipulate datagram fragments to overlap in such a way to crash the victim’s computer. IPSec is a key security service that is available at this layer.

Data Link layer(2). is responsible for formatting and organizing the data before sending it to the Physical layer. The Data Link layer organizes the data into frames. A frame is a logical structure in which data can be placed; it’s a packet on the wire. When a frame reaches the target device, the Data Link layer is responsible for stripping off the data frame and passing the data packet up to the Network layer. The Data Link layer is made up of two sub layers, including the logical link control layer (LLC) and the media access control layer (MAC). You might be familiar with the MAC layer, as it shares its name with the MAC addressing scheme. These 6-byte (48-bit) addresses are used to uniquely identify each device on the local network. A major security concern of the Data Link layer is the Address Resolution Protocol (ARP) process. ARP is used to resolve known Network layer addresses to unknown MAC addresses. ARP is a trusting protocol and, as such, can be used by hackers for ARP poisoning, which can allow them access to traffic on switches they should not have.

Physical layer(1). bit-level communication takes place. The bits have no defined meaning on the wire, but the Physical layer defines how long each bit lasts and how it is transmitted and received. From a security standpoint, you must be concerned anytime a hacker can get physical access. By accessing a physical component of a computer network—such as a computer, switch, or cable—the attacker might be able to use a hardware or software packet sniffer to monitor traffic on that network. Sniffers enable attacks to capture and decode packets. If no encryption is being used, a great deal of sensitive information might be directly available to the hacker.

from CEH

Posted by CEOinIRVINE
l

  1. XSS
    1. Severity : High
    2. URI was set to 1<div style=width:expression(prompt(957586))>
      URL encoded GET input genre was set to " onmouseover=prompt(968437) bad="


  2. Application Error Msg
    1. Severity : Medium
    2. URL encoded GET input key was set to '"'");|]*{%0d%0a<%00>
      Error message found:
      java.lang.NumberFormatException: For input string:


  3. Error Msg on Page
    1. Severity : Medium
    2. Pattern found:
      java.lang.NumberFormatException: For input string:


  4. Insecure crossdomain.xm
    1. Severity : Medium
    2. The browser security model normally prevents web content from one domain from accessing data from another domain. This is commonly known as the "same origin policy". URL policy files grant cross-domain permissions for reading data. They permit operations that are not permitted by default. The URL policy file is located, by default, in the root directory of the target server, with the name crossdomain.xml (for example, at www.example.com/crossdomain.xml).

      When a domain is specified in crossdomain.xml file, the site declares that it is willing to allow the operators of any servers in that domain to obtain any document on the server where the policy file resides. The crossdomain.xml file deployed on this website opens the server to all domains (use of a single asterisk "*" as a pure wildcard is supported) like so:
      <cross-domain-policy>
      <allow-access-from domain="*" />
      </cross-domain-policy>
      
      This practice is suitable for public servers, but should not be used for sites located behind a firewall because it could permit access to protected areas. It should not be used for sites that require authentication in the form of passwords or cookies. Sites that use the common practice of authentication based on cookies to access private or user-specific data should be especially careful when using cross-domain policy files.
      This vulnerability affects Server.


'IT' 카테고리의 다른 글

worst companies to work for  (0) 2011.03.15
OSI Layers  (0) 2011.03.15
Intermediate CA Certificates Problem  (1) 2011.03.04
iPad 2 구매대행..  (0) 2011.03.03
Galaxy Tab vs. the iPad  (0) 2010.11.24
Posted by CEOinIRVINE
l

CIS benchmarks

Hacking 2009. 2. 6. 09:19

'Hacking' 카테고리의 다른 글

How to be penetration tester? (Computer Security Specialist?)  (0) 2009.02.08
XSS Cheat Sheet  (0) 2009.02.06
Below is a list of resources you've selected:  (0) 2009.02.06
Security Metrics  (0) 2009.02.06
CIS BenchMark  (0) 2009.02.06
Posted by CEOinIRVINE
l

(Lenny Ignelzi - AP)

With a backlog of applications piled up at the Justice Department, high-profile criminals and their well-connected lawyers increasingly are appealing directly to President Bush for special consideration on pardons and clemency, according to people involved in the process.

Among those seeking presidential action are former junk-bond salesman Michael Milken, who hired former solicitor general Theodore B. Olson, one of the nation's most prominent GOP lawyers, to plead his case for a pardon on 1980s-era securities fraud charges. Two politicians convicted of public corruption, former congressman Randy "Duke" Cunningham (R-Calif.) and four-term Louisiana governor Edwin W. Edwards (D), are asking Bush to shorten their prison terms.

It remains to be seen how Bush will respond to these requests as his term ends. The president has used his broad pardon powers rarely during seven years in office, granting 157 pardons out of 2,064 petitions, and only six of 7,707 requests for commutations, according to an analysis by former Justice Department lawyer Margaret C. Love.

Aggressive appeals for clemency at the end of an administration are not unusual, but they can raise concerns about influence peddling and fairness, particularly if the president and his legal advisers are not fully transparent, pardon scholars say.

During his last days in office, President Bill Clinton prompted congressional and federal investigations by pardoning 140 people, including his brother, former Arkansas real estate partner Susan McDougal and fugitive financier Marc Rich. White House officials and former deputy attorney general Eric H. Holder Jr., now a contender for attorney general under President-elect Barack Obama, testified about the last-minute pardons in fiery congressional hearings.

Bush has not mentioned pardons often, but in a statement released in July 2007, he said "the Constitution gives the President the power of clemency to be used when he deems it to be warranted."

White House spokesman Tony Fratto said, "Generally the president will review pardon recommendations as he has throughout his presidency, in a thoughtful way . . . on a case-by-case basis, and he'll make his determination."

Not all prominent criminals chose to seek presidential intervention. Alaska Sen. Ted Stevens, a powerful Republican, told reporters this week that he would not ask Bush to pardon him on his recent seven-count felony conviction.

Onetime vice presidential aide I. Lewis "Scooter" Libby, whose prison term Bush commuted last year, has not submitted a formal pardon request, the Justice Department said.

Efforts by high-profile felons come as a list of more routine applicants awaits action from a special Justice Department pardons office, a process that may take up to 18 months. Last month alone, 103 felons submitted pardon applications and 280 sought commutation of their prison terms, according to department statistics. Those figures stack atop an already daunting backlog of hundreds more petitions.

The overwhelming majority of petitioners are not household names. Rather, they are people who served prison time for garden-variety fraud or drug offenses and now seek the president's help so they can vote, live in public housing, own handguns or find jobs.

Clemency is the umbrella term for people seeking presidential relief after being convicted of a felony crime. Some applicants request their sentences be commuted, or shortened, by White House action. Others seek a formal pardon, described by one former Justice Department official as "an official statement of forgiveness."








Posted by CEOinIRVINE
l