【概要】
- システムに存在するサービス/弱点の探査 (プローブ、スキャン)
- 電子メールの不正な中継、電子メール爆撃
- statd サーバを悪用した攻撃
- システムへの不正侵入および管理者権限詐取
- Web サーバの cgi-bin プログラムを悪用した攻撃
- ネットワークやホストの運用を妨害しようとする攻撃
- ネットニュースのコントロールメッセージを悪用した攻撃
- パケット盗聴プログラムによる攻撃
- named サーバを悪用した攻撃
- Anonymous FTP サービスの不正利用
【公開情報】
◆活動概要: 不正アクセスの動向 [ 1998年7月1日 ~ 1998年9月30日 ] (JPCERT/CC, 1998/10/16)
http://www.jpcert.or.jp/pr/199x/nl-98-0004-01.txt
【関連情報】
◆New Tools Used For Widespread Scans
http://www.cert.org/incident_notes/IN-98.02.html
◆Packet Filtering for Firewall Systems
ftp://info.cert.org/pub/tech_tips/packet_filtering
ftp://ftp.jpcert.or.jp/pub/cert/tech_tips/packet_filtering
◆Email Bombing and Spamming
ftp://info.cert.org/pub/tech_tips/email_bombing_spamming
ftp://ftp.jpcert.or.jp/pub/cert/tech_tips/email_bombing_spamming
◆Spoofed/Forged Email
ftp://info.cert.org/pub/tech_tips/email_spoofing
ftp://ftp.jpcert.or.jp/pub/cert/tech_tips/email_spoofing
◆Buffer Overrun Vulnerability in statd(1M) Program
ftp://info.cert.org/pub/cert_advisories/CA-97.26.statd
ftp://ftp.jpcert.or.jp/pub/cert/cert_advisories/CA-97.26.statd
◆CS-98.01 - SPECIAL EDITION
ftp://info.cert.org/pub/cert_summaries/CS-98.01
ftp://ftp.jpcert.or.jp/pub/cert/cert_summaries/CS-98.01
◆Vulnerability in rpc.statd
ftp://info.cert.org/pub/cert_advisories/CA-96.09.rpc.statd
ftp://ftp.jpcert.or.jp/pub/cert/cert_advisories/CA-96.09.rpc.statd
http://www.jpcert.or.jp/ESA/CA-96.09.jis.txt
◆Steps for Recovering from a UNIX Root Compromise
ftp://info.cert.org/pub/cert_advisories/root_compromise
ftp://ftp.jpcert.or.jp/pub/cert/cert_advisories/root_compromise
◆Protecting Yourself from Password File Attacks
ftp://info.cert.org/pub/tech_tips/passwd_file_protection
ftp://ftp.jpcert.or.jp/pub/cert/tech_tips/passwd_file_protection
◆Vulnerability in NCSA/Apache CGI example code
ftp://info.cert.org/pub/cert_advisories/CA-96.06.cgi_example_code
ftp://ftp.jpcert.or.jp/pub/cert/cert_advisories/CA-96.06.cgi_example_code
http://www.jpcert.or.jp/ESA/CA-96.06.jis.txt
◆Interpreters in CGI bin Directories
ftp://info.cert.org/pub/cert_advisories/CA-96.11.interpreters_in_cgi_bin_dir
ftp://ftp.jpcert.or.jp/pub/cert/cert_advisories/CA-96.11.interpreters_in_cgi_bin_dir
◆Vulnerability in the httpd nph-test-cgi script
ftp://info.cert.org/pub/cert_advisories/CA-97.07.nph-test-cgi_script
ftp://ftp.jpcert.or.jp/pub/cert/cert_advisories/CA-97.07.nph-test-cgi_script
◆Vulnerability in webdist.cgi
ftp://ftp.cert.org/pub/cert_advisories/CA-97.12.webdist
ftp://ftp.jpcert.or.jp/pub/cert/cert_advisories/CA-97.12.webdist
◆Buffer Overrun Vulnerability in Count.cgi cgi-bin Program
ftp://ftp.cert.org/pub/cert_advisories/CA-97.24.Count_cgi
ftp://ftp.jpcert.or.jp/pub/cert/cert_advisories/CA-97.24.Count_cgi
◆Sanitizing User-Supplied Data in CGI Scripts
ftp://ftp.cert.org/pub/cert_advisories/CA-97.25.CGI_metachar
ftp://ftp.jpcert.or.jp/pub/cert/cert_advisories/CA-97.25.CGI_metachar
◆How To Remove Meta-characters From User-Supplied Data In CGI Scripts
ftp://info.cert.org/pub/tech_tips/cgi_metacharacters
ftp://ftp.jpcert.or.jp/pub/cert/tech_tips/cgi_metacharacters
◆Buffer Overflow in php.cgi
http://www.secnet.com/sni-advisories/sni-11.php_overflow.advisory.html
◆Denial of Service
ftp://info.cert.org/pub/tech_tips/denial_of_service
ftp://ftp.jpcert.or.jp/pub/cert/tech_tips/denial_of_service
◆UDP Port Denial-of-Service Attack
ftp://info.cert.org/pub/cert_advisories/CA-96.01.UDP_service_denial
ftp://ftp.jpcert.or.jp/pub/cert/cert_advisories/CA-96.01.UDP_service_denial
http://www.jpcert.or.jp/ESA/CA-96.01.jis.txt
◆TCP SYN Flooding and IP Spoofing Attacks
ftp://info.cert.org/pub/cert_advisories/CA-96.21.tcp_syn_flooding
ftp://ftp.jpcert.or.jp/pub/cert/cert_advisories/CA-96.21.tcp_syn_flooding
◆Denial-of-Service Attack via ping
ftp://info.cert.org/pub/cert_advisories/CA-96.26.ping
ftp://ftp.jpcert.or.jp/pub/cert/cert_advisories/CA-96.26.ping
◆IP Denial-of-Service Attacks
ftp://info.cert.org/pub/cert_advisories/CA-97.28.Teardrop_Land
ftp://ftp.jpcert.or.jp/pub/cert/cert_advisories/CA-97.28.Teardrop_Land
◆"smurf" IP Denial-of-Service Attacks
ftp://info.cert.org/pub/cert_advisories/CA-98.01.smurf
ftp://ftp.jpcert.or.jp/pub/cert/cert_advisories/CA-98.01.smurf
◆Ongoing Network Monitoring Attacks
ftp://info.cert.org/pub/cert_advisories/CA-94:01.network.monitoring.attacks
ftp://ftp.jpcert.or.jp/pub/cert/cert_advisories/CA-94:01.network.monitoring.attacks
◆CS-98.04 - SPECIAL EDITION
ftp://info.cert.org/pub/cert_summaries/CS-98.04
ftp://ftp.jpcert.or.jp/pub/cert/cert_summaries/CS-98.04
◆CS-98.05 - SPECIAL EDITION
ftp://info.cert.org/pub/cert_summaries/CS-98.05
ftp://ftp.jpcert.or.jp/pub/cert/cert_summaries/CS-98.05
◆Multiple Vulnerabilities in BIND
ftp://info.cert.org/pub/cert_advisories/CA-98.05.bind_problems
ftp://ftp.jpcert.or.jp/pub/cert/cert_advisories/CA-98.05.bind_problems
◆BIND - the Berkeley Internet Name Daemon
ftp://info.cert.org/pub/cert_advisories/CA-97.22.bind
ftp://ftp.jpcert.or.jp/pub/cert/cert_advisories/CA-97.22.bind
◆Anonymous FTP Abuses
ftp://info.cert.org/pub/tech_tips/anonymous_ftp_abuses
ftp://ftp.jpcert.or.jp/pub/cert/tech_tips/anonymous_ftp_abuses
◆ANONYMOUS FTP CONFIGURATION GUIDELINES
ftp://info.cert.org/pub/tech_tips/anonymous_ftp_config
ftp://ftp.jpcert.or.jp/pub/cert/tech_tips/anonymous_ftp_config