Eicon Networks S92 Manuel d'utilisateur Page 196

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 209
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 195
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 196
Intheory,wecan pingaroundtheinternettofindoutwhocanbeusedasamplifiers.
Thisis,however,extremelytimeconsuming.Also,thedegreeof damageproducedby
individualsystemsishighly limited.Forlaunchingattackofmassivescale,theideal
amplifiercandidatesarenetworksthathaveIPdirectedbroadcastcapableroutersat
theborderandnumerousclientsintheinternalnetwork.
Inresponsetothethreatsposedbythiskindofattack,aprojectknownasSmurf
AmplifierRegistry (SAR)hasbeenlaunched.AccordingtotheofficialSARpage,
“TheSARisatoolforInternetadministratorsbeingattackedbyor implicatedin
smurfattacks,orthosewhowishtotakeprecautions.TheSARletsyouprobe
InternetconnectedIPnetworkstoseewhetherornottheyareconfiguredinaway
thatwillallowperpet ratorstousethemforsmurfamplification.Probingcanbedone
interactivelyorinbulk.IninteractivemodetheSARwillprobeanetwork,findthe
numberofduplicatesreturned,andsavethisinformationinadatabase.If,andonlyif,
theprobednetwo rkreturns1ormoreduplicatepackets,itismarkedas"broken". 
Upongainingknowledgeofabrokennetwork,theSARwillautomaticallyobtain
informationaboutthenetworkandnotifytherelevantpeopleofthis.”
71
SARappearstobeatoolagainstsmurfattack.However,wecantakeadvantageofits
probingfeaturetolocatenetworksthatare stillvulnerable,andthenmakeuseof
them.
UsingSAR:
WecanuseSARinthefollowingways:
1,Useittoprobeapotentialamplifiernetwork:
71
http://www.powertech.no/smurf/
Vue de la page 195
1 2 ... 191 192 193 194 195 196 197 198 199 200 201 ... 208 209

Commentaires sur ces manuels

Pas de commentaire