Literaturverzeichnis
Transcription
Literaturverzeichnis
“firewall” — 2006/1/4 — 15:26 — page 617 — #636 Literaturverzeichnis [1] Linux Standard Base Specification 1.0.0 http://www.linuxbase.org/spec/ [2] Paul Russel, »IPCHAINS-HOWTO«, zu finden unter /usr[/share]/doc/howto oder http://people.netfilter.org/~rusty/ipchains/ [3] Rusty Russel, »Linux 2.4 Packet Filtering HOWTO«, zu finden unter http://netfilter.filewatcher.org/unreliable-guides/index.html [4] Rusty Russel, »Linux 2.4 NAT HOWTO«, zu finden unter http://netfilter.filewatcher.org/unreliable-guides/index.html [5] Marc Grennan, »Firewall and Proxy Server HOWTO«, zu finden unter /usr[/share]/doc/howto oder http://www.grennan.com/Firewall-HOWTO.html [6] Simson Garfinkel, Gene Spafford, »Practical UNIX and Internet Security«, O’Reilly, 1996 [7] D. J. Bernstein, »SYN cookies« http://cr.yp.to/syncookies.html [8] Scott Wunsch, »Chroot-BIND HOWTO v1.5«, 1. Dezember 2001, http://www.losurs.org/docs/howto/Chroot-BIND.html http://tldp.org/HOWTO/Chroot-BIND-HOWTO.html [9] »DVD+RW/+R/-R[W] for Linux«, August 2004, http://fy.chalmers.se/~appro/linux/DVD+RW/ [10] Michael D. Bauer, »Linux Server Security«, 2nd Edition, O’Reilly, 2005 [11] John Borland, »Hacker smears Web sites with pro-Napster messages«, CNET News, 7. September 2000, http://news.com.com/2100-1023-245470.html | 617 “firewall” — 2006/1/4 — 15:26 — page 618 — #637 [12] Peter van Dijk, »How we defaced www.apache.org«, Bugtraq 4. Mai 2000, Auf den Seiten von Security-Focus ist die Bugtraq-Mail nicht mehr zu finden, es existieren Server, auf denen sich Kopien dieses Artikels befinden. Zum Beispiel: http://www.dataloss.net/papers/how.defaced.apache.org.txt [13] Hubert Erb, »Die Cyberspace-Fallen des FBI«, Telepolis 15.5.2001, http://www.heise.de/tp/r4/artikel/7/7634/1.html [14] Steve Gibson, »The Strange Tale of the Denial of Service Attacks against GRC.COM«, Gibson Research Corporation, April 2001, http://grc.com/dos/grcdos.htm [15] Steve Gibson, »DRDoS – Distributed Reflection Denial of Service«, Gibson Research Corporation, 22. Februar 2002, http://grc.com/dos/drdos.htm [16] Kevin J. Houle, George M. Weaver, »Trends in Denial of Service Attack Technology«, CERT Coordination Center, October 2001, http://www.cert.org/archive/pdf/DoS_trends.pdf [17] Craig A. Huegen, »The Latest in Denial of Service Attacks: ‚Smurfing‘ «, Die Originalquelle ist nicht mehr verfügbar, aber eine Suche mit Google findet schnell Server, auf denen eine Kopie zu finden ist, z. B.: http://www.governmentsecurity.org/articles/ THELATESTINDENIALOFSERVICEATTACKSSMURFING.php (Dies ist eine Zeile, der Umbruch war aus drucktechnischen Gründen notwendig.) [18] Robert G. Ferrell, »Have Root, Will Hack – 80 Agonizing Hours in the life of an Information Systems Security Officer«, Security Focus, 13. Juni 2000, http://www.securityfocus.com/infocus/1256 [19] Fyodor, »The Art of Port Scanning«, http://www.insecure.org/nmap/nmap_doc.html [20] Fyodor, »Remote OS detection via TCP/IP Stack Fingerprinting«, Phrack Magazine 54, http://www.phrack.org/show.php?p=54&a=9 [21] Inoshiro, »Auditing kuro5hin«, http://www.kuro5hin.org/?op=displaystory;sid=2000/4/24/72315/1468 [22] Laurent Joncheray, »A simple Attack against TCP«, Merit Network Inc., 24. April 1995, http://www.deter.com/unix/papers/tcp_attack.pdf [23] Toby Miller, »Analysis of the T0rn rootkit«, SANS Institute 2000, http://www.sans.org/y2k/t0rn.htm (t0rn wird t - NUll - r - n buchstabiert) 618 | Literaturverzeichnis “firewall” — 2006/1/4 — 15:26 — page 619 — #638 [24] Viktor Mraz, Klaus Weidner, »Falsch verbunden – Gefahr durch DNS-Spoofing«, c’t 10/97, S. 286 [25] Peter Münster, »local user can delete arbitrary files on SuSE-Linux«, Bugtraq 21.4.2000, http://cert.uni-stuttgart.de/archive/bugtraq/2000/04/msg00152.html [26] Noel, »Cracked!«, http://rootprompt.org/article.php3?article=403 [27] Aleph One, »Smashing The Stack For Fun And Profit«, Phrack Vol. 7, Issue 49, 8. November 1996, http://www.phrack.org/show.php?p=49&a=14 [28] Rain Forest Puppy, »How I hacked PacketStorm«, Advisory RFP2K01, 19.5.2000, http://www.securityfocus.com/advisories/2234 [29] Marcus J. Ranum, »artificial ignorance: how-to guide«, Firewall Wizards Mailing List, 23.9.1997, http://www.ranum.com/security/computer_security/papers/ai/ http://archives.neohapsis.com/archives/nfr-wizards/1997/09/0098.html [30] Greg Sandoval, Troy Wolverton, »Leading Web sites under attack«, CNet News, 9. Februar 2000, http://news.com.com/2100-1017-236683.html [31] »Security Advisory, BIND Vulnerabilities and Solutions«, Secure Networks Inc & CORE Seguridad de la Informacion, 22. April 1997 [32] Richard M. Smith, »The Web Bug FAQ«, 11. November 1999, http://www.eff.org/Privacy/Marketing/web_bug.html [33] Chris Oakes, »Word Docs With Ears?«, Wired News, 31.August 2000, http://www.wired.com/news/technology/0,1282,38516,00.html [34] Clifford Stoll, »Kuckucksei – Die Jagd auf die deutschen Hacker, die das Pentagon knackten«, S. Fischer Verlag GmbH, 1989 [35] Tyler, »My experience with being cracked«, Rootprompt.org, 19. Juli 2000, http://rootprompt.org/article.php3?article=678 [36] Wietse Vennema, »TCP WRAPPER – Network monitoring, access control, and booby traps.«, Eindhoven University of Technology, ftp://ftp.porcupine.org/pub/security/tcp_wrapper.txt.Z [37] Jonathan Wilkins, »Taranis«, Phrack Vol. 11 Issue 57, 11. August 2001 http://www.phrack.org/show.php?p=57&a=6 [38] »Hacker Posts Credit Card Info«, Wired News, 10. Januar 2000, http://www.wired.com/news/technology/0,1282,33539,00.html Literaturverzeichnis | 619 “firewall” — 2006/1/4 — 15:26 — page 620 — #639 [39] »Three Kazak Men Arrested in London for Hacking into Bloomberg L.P.’s Computer System«, Pressemitteilung des U.S. Department of Justice, 14. August 2000, http://www.usdoj.gov/criminal/cybercrime/bloomberg.htm [40] James Troup, »more details on the recent compromise of debian.org mirrors«, 28. November 2003, http://lists.debian.org/debian-devel-announce/2003/ debian-devel-announce-200311/msg00012.html (Dies ist eine Zeile, der Umbruch war aus drucktechnischen Gründen notwendig.) http://www.wiggy.net/debian/explanation [41] David Barroso Berrueta, »The Rise of the Spammers«, 26. Sptember 2003, Die Originalquelle ist nicht länger verfügbar, aber es existieren noch Server, auf denen Kopien zu finden sind. Zum Beispiel: http://www.infosecwriters.com/text_resources/pdf/spammers.pdf http://www.securitydocs.com/library/676 [42] »Dialer – Die Tricks unseriöser Anbieter«, Dialerschutz.de, Webseite besucht am 12.12.2003, http://www.dialerschutz.de/home/Tricks/body_tricks.html [43] »Gator Information Center«, PC Pitstop, Webseite besucht am 12.12.2003, http://www.pcpitstop.com/gator/default.asp [44] Steve Gibson, »The Anatomy of File Download Spyware«, Gibson Research Corporation, 14.7.2000, http://www.grc.com/downloaders.htm [45] Alexey Podrezov, »F-Secure Virus Descriptions: Xombe«, F-Secure Corporation, 9.1.2004, http://f-secure.com/v-descs/xombe.shtml [46] Alexey Podrezov, »F-Secure Virus Descriptions: SubSeven«, F-Secure Corporation, 1998 – 2001, http://www.f-secure.com/v-descs/subseven.shtml [47] Scott Gettis, »Backdoor.Tofger«, Symantec Corporation, 15.12.2003, http://www.symantec.com/avcenter/venc/data/backdoor.tofger.html [48] Peter Szor, »F-Secure Virus Descriptions: Ska«, F-Secure Corporation, 1999, http://www.f-secure.com/v-descs/ska.shtml [49] Motoaki Yamamura, »W32.DoS.Trinoo«, Symantec Corporation, 22.2.2000, http://www.symantec.com/avcenter/venc/data/w32.dos.trinoo.html [50] Eric Chien, »PWSteal.Freemega«, Symantec Corporation, 12.1.2004, http://www.symantec.com/avcenter/venc/data/pwsteal.freemega.html 620 | Literaturverzeichnis “firewall” — 2006/1/4 — 15:26 — page 621 — #640 [51] Alexey Podrezov, »F-Secure Virus Descriptions: Sober.C«, F-Secure Corporation, 21.12.2003, http://www.f-secure.com/v-descs/sober_c.shtml [52] Douglas Knowles, »Trojan.Qhosts«, Symantec Corporation, 4.10.2003, http://securityresponse.symantec.com/avcenter/venc/data/trojan.qhosts.html [53] Alexey Podrezov, Katrin Tocheva, »F-Secure Virus Descriptions: Webber«, F-Secure Corporation, 11.11.2003, http://www.f-secure.com/v-descs/webber_a.shtml [54] »F-Secure Virus Descriptions: Fakerr«, F-Secure Corporation, 16.7.2003, http://www.f-secure.com/v-descs/fakerr.shtml [55] »F-Secure Virus Descriptions: Fizzer«, F-Secure Corporation, 9.5.2003, http://www.f-secure.com/v-descs/fizzer.shtml [56] Kevin Poulsen, »Rise of the Spam Zombies«, The Register, 13.12.2003, http://www.theregister.co.uk/content/55/30414.html [57] »Reverse-Proxy Spam Trojan – Migmaf«, LURHQ Corporation, 11.7.2003 http://www.lurhq.com/migmaf.html [58] »Virus attack on PC downloaded kiddie porn«, The Inquirer, 18.4.2003 http://www.theinquirer.net/?article=9023 [59] Florian Rötzer, »Der Trojaner ist Schuld«, Telepolis, 11.8.2003 http://www.heise.de/tp/deutsch/inhalt/te/15422/1.html [60] Cristiano Lincoln Mattos, »Security flaw in Linux 2.4 IPTables using FTP PORT«, Tempest Security Technologies, 2001, http://www.netfilter.org/security/2001-04-16-ftp.html [61] »Cisco Secure PIX Firewall FTP Vulnerabilities«, Cisco, 2000, http://www.securityfocus.com/advisories/2133 [62] Jozsef Kadlecsik, Harald Welte, »IRC connection tracking opens unwanted ports«, The Netfilter Project, 25. Feb 2002, http://www.netfilter.org/security/2002-02-25-irc-dcc-mask.html [63] John Leyden, »Office workers give away passwords for a cheap pen«, The Register, 18.4.2003 http://www.theregister.co.uk/2003/04/18/office_workers_give_away_passwords/ [64] John Leyden, »Brits are crap at password security«, The Register, 20.4.2004 http://www.theregister.co.uk/2004/04/20/password_surveys/ [65] Sarah Granger, »Social Engineering Fundamentals, Part I: Hacker Tactics«, Security Focus, 18.12.2001 http://www.securityfocus.com/infocus/1527 Literaturverzeichnis | 621 “firewall” — 2006/1/4 — 15:26 — page 622 — #641 [66] »Kevin Mitnick«, Wikipedia, 16.9.2005 http://en.wikipedia.org/wiki/Kevin_Mitnick [67] Israel, »Introducing social engineering to the workplace«, Lineman.Net, 22.3.2004, http://lineman.net/article136.html [68] Israel, »Penetration Testing Using Social Engineering (Part 1)«, Lineman.Net, 14.5.2004, http://lineman.net/node/270 [69] »Phishing«, Wikipedia, 15.9.2005 http://en.wikipedia.org/wiki/Phishing [70] Alfred Krüger, »Auftragswürmer für die Mafia«, Telepolis, 19.4.2005. http://www.heise.de/tp/r4/artikel/19/19913/1.html [71] Brian Krebs, »Technology Fueling Wave of Phishing Scams«, Washington Post, 18.1.2005, http://www.washingtonpost.com/ac2/wp-dyn/A17680-2005Jan18 [72] »Strategiewechsel bei Wurmautoren: Weniger auffallen, mehr Kontrolle«, Heise Newsticker, 15.4.2005, http://www.heise.de/newsticker/meldung/58614 [73] » Wurm hört Netzwerkverkehr ab«, Heise Newsticker, 15.9.2004 http.//www.heise.de/newsticker/meldung/51099 622 | Literaturverzeichnis