CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] - نسخه متنی

Tebyan

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید











  • Trust Exploitation Attacks


    A trust relationship exists between two systems when each system agrees to accept communication from the other system without explicitly authenticating the connection. Trust is established in a variety of ways. There are Windows trust relationships in which one domain may trust another domain and provide for pass-through authentication. On UNIX systems, there is the r-services trust relationship. The trust involved with r-services differs from Windows trust relationships in that no authentication beyond host name or IP address is needed to establish a communication channel.rlogin, rcp, rsh, or rdist facilities.

  • The originating machine's name exists in the /etc/hosts.equiv file (or in the requesting user's .rhosts file in the home directory).

  • The username of the user making the request exists in the target host's /etc/passwd file.


  • When these three conditions are met simultaneously, the request is granted by means of the trust relationship, and the request completely bypasses all configured authentication mechanisms on the host.

    Another type of trust relationship can occur when two or more systems exist on the same subnet. It is assumed that because the systems reside within the same subnet, they must be trustable. One compromised system can easily lead to a compromise of others because of this misguided trust. Another possibility exists when a system on the inside of a firewall explicitly trusts a system on the outside. A compromised external system can then lead to a compromised internal system.

    / 290