Matt's Web World presents...
Established November 1, 1995.
Last updated on
May 1, 2018.
Welcome to my Unix security page! This page is not a complete listing of Unix security information
and tools. What is hosted here is what I personally find useful and/or interesting. Hyperlinks to other sites
are provided at the bottom of this page for those seeking something not listed here.
This page started out as a place to store Unix-related research papers I downloaded from FTP sites, back when I was really
happy to be reading
Usenet newsgroups at 9600bps. It's been almost 15 years since and the content here has grown a bit beyond
Unix, to include Windows-based tools (I know, I know...), live CD distros, and another favorite topic of mine,
lockpicking.
I have not done a great deal in the last decade other than link maintenance. But the page remains popular and I think it
presents much of the core Unix lore and security knowledge. All of the links are current now, and the content
is a bit more modern in its focus. There is so much more out there in the world since I started this in '95,
but here lies an early signpost, and you would do well to master its content.
For those who might think it unwise to publicly disclose security holes and the techniques used to pass through them, I urge
you to read Charles Tomlinson's
Rudimentary Treatise on the Construction of Locks.
Everything here is provided for informational purposes only. The presence of any link on this page is not an endorsement
of its content. And I certainly do not endorse unauthorized access to other people's computers! Property rights
exist and should be respected. Think
white hat.
If you wish to comment on this page please use the
contact form
to send me a message. If you are interested in advertising on this page please contact me to discuss terms.
Click any of the blue section separators to return to this table of contents.
Icons
indicate a link which will take you away from this site. (In the same window! Shift-click on links if you want them
in a new window.)
May 1, 2018
- External links have been validated and freshened.
- One new external site with crypto and network security info from ShoreTel.
The file archive uses various extensions, sometimes with multiple extensions in series. The extensions are summarized in
the following table and links to the utility software needed to read these formats are provided.
.c
|
'C' language source file. Use
gcc to compile to machine code.
|
.gz
|
Gzip compressed file. Use
gzip or
IZArc to decompress these files.
|
.pdf
|
Adobe Acrobat file. Use
Acrobat Reader
to view and print these files.
|
.ps
|
Adobe Postscript file. Use
Ghostview
to view and print these files. Ghostscript also does Postscript-to-ASCII conversions.
|
.tar
|
Unix Tape Archive file. Use your Unix's native
tar command or on Windows try
IZArc to handle these files.
|
.txt
|
ASCII Text file. Use standard text editor or browser.
|
.zip
|
PKZip compressed file archive. Use
Info-Zip
or
IZArc to handle these files.
|
Sorted alphabetically by author name.
The papers here were orignally in Adobe Postscript (
.ps) format. I have converted them all to Adobe Acrobat (
.pdf), since this is the successor format from Adobe, and has many advantages to Postscript. The Postscript
.ps
files are all gzip'd and therefore end in
.ps.gz The
.pdf PDF files are almost as small as their gzip'd counterparts and therefore have not been compressed; just
click and read (or print).
-
Unix Computer Security Checklist
AUSCERT, Australian Computer Emergency Response Team; 1995; ASCII Text; 89k
-
A comprehensive checklist for securing your Unix box.
-
Packets Found on an Internet
Bellovin, Steven M.; 1993; Acrobat format; also available in
Postscript format
-
A very interesting paper describing the various attacks, probes, and miscellaneous packets floating past AT&T Bell Labs'
net connection.
-
Security Problems in the TCP/IP Protocol Suite
Bellovin, Steven M.; 1989; Acrobat format; also available in
Postscript format
-
A broad overview of problems within TCP/IP itself, as well as many common application layer protocols which rely on TCP/IP.
-
There Be Dragons
Bellovin, Steven M.; 1992; Acrobat format; also available in
Postscript format
-
Another Bellovin paper discussing the various attacks made on
att.research.com. This paper is also the source for this page's title.
-
An Advanced 4.3BSD IPC Tutorial
Berkeley CSRG; date unknown; Acrobat format; also available in
Postscript format
-
This paper describes the IPC facilities new to 4.3BSD. It was written by the CSRG as a supplement to the manpages.
-
NFS Tracing by Passive Network Monitoring
Blaze, Matt; 1992; ASCII Text
-
Blaze, now famous for cracking the Clipper chip while at Bell Labs, wrote this paper while he was a PhD candidate at Princeton.
-
Generic Unix Security Information
CERT Advisory Team, 1993, ASCII Text
-
A good general commentary on Unix security, with specific places to look for suspicious files if you believe your machine's
security may be compromised. It's a bit dated, so don't pay attention to the version numbers (Sendmail 8.6.4
is definitely not current anymore!)
-
IP Spoofing
CERT Advisory Team, 1995, ASCII Text
-
Not too exciting, but useful for the uninitiated.
-
Securing Anon FTP Servers
CERT Advisory Team, 1995, ASCII Text
-
This CERT advisory details the access permissions and server configuration which should be followed to prevent anonymous
FTP security breaches.
-
Network (In)Security Through IP Packet Filtering
Chapman, D. Brent; 1992; Acrobat format; also available in
Postscript format
-
Why packet filtering is a difficult to use and not always secure method of securing a network.
-
An Evening with Berferd
Cheswick, Bill; 1991; Acrobat format; also available in
Postscript format
-
A cracker from the Netherlands is "lured, endured, and studied."
-
Design of a Secure Internet Gateway
Cheswick, Bill; 1990; Acrobat format; also available in
Postscript format
-
Details the history and design of AT&T's Internet gateway.
-
Improving the Security of your Unix System
Curry, David, SRI International; 1990; Acrobat format; also available in
Postscript format
-
This is the somewhat well known SRI Report on Unix Security. It's a good solid starting place for securing a Unix box.
-
With Microscope & Tweezers
Eichin & Rochlis; 1989; Acrobat format; also available in
Postscript format
-
An analysis of the Morris Internet Worm of 1988 from MIT's perspective.
-
The COPS Security Checker System
Farmer & Spafford; 1994; Acrobat format; also available in
Postscript format
-
The original Usenix paper from 1990 republished by CERT in 1994.
-
COPS and Robbers
Farmer, Dan; 1991; ASCII Text
-
This paper discusses a bit of general security and then goes into detail regarding Unix system misconfigurations, specifically
ones that
COPS checks for.
-
Improving The Security of Your System by Breaking Into It
Farmer & Venema; 1993; HTML
-
An excellent text by Dan Farmer and Wietse Venema. If you haven't read this before, here's your opportunity.
-
A Unix Network Protocol Security Study: NIS
Hess, Safford, & Pooch; date unknown; Acrobat format; also available in
Postscript format
-
Outlines NIS and its design faults regarding security.
-
A Simple Active Attack Against TCP
Joncheray, Laurent; 1995; Acrobat format; also available in
Postscript format
-
This paper describes an active attack against TCP which allows re-direction (hijacking) of the TCP stream.
-
Foiling the Cracker
Klein, Daniel; 1990; Acrobat format; also available in
Postscript format
-
A Survey of, and Improvements to, Password Security. Basically a treatise on how to select proper passwords.
-
A Weakness in the 4.2BSD Unix TCP/IP Software
Morris, Robert T; 1985; Acrobat format; also available in
Postscript format
-
This paper describes the much ballyhooed method by which one may forge packets with TCP/IP. Morris wrote this in 1985. It
only took the media 10 years to make a stink about it!
-
Covering Your Tracks
Phrack Vol. 4, Issue #43; Acrobat format; also available in
Postscript format
-
A Phrack article describing the unix system logs and how it is possible to reduce the footprint and visibility of unauthorized
access.
-
Cracking Shadowed Password Files
Phrack Vol. 5, Issue #46; Acrobat format; also available in
Postscript format
-
A Phrack article describing how to use the system call password function to bypass the shadow password file.
-
TCP SYN Flood (Project Neptune)
Phrack Vol. 7, Issue #48; 1996; HTML
-
Includes explanation of this denial-of-service attack as well as Linux source implementation. Also of interest may be the
CERT document
warning that Phrack had published this vulnerability.
-
Thinking About Firewalls
Ranum, Marcus; 1992; Acrobat format; also available in
Postscript format
-
A general overview of firewalls, with tips on how to select one to meet your needs.
-
Addressing Weaknesses in the Domain Name System Protocol
Schuba, Christoph L.; 1993; Acrobat format
-
Describes problems with the DNS and one of its implementations that allow the abuse of name based authentication.
-
Public Key Certification & Secure File Transfer
Shuba & Sheth; approx. 1994; Acrobat format
-
This document describes secure file transfer between agents, providing confidentiality and integrity of transferred files,
originator authentication, and non-repudiation.
-
Source Routing Info
Usenet
comp.security.unix; 1995; ASCII Text
-
An interesting discussion of TCP/IP source routing stuff.
-
Countering Abuse of Name-based Authentication
Schuba & Spafford; approx. 1994; Acrobat format
-
Discusses conceptual design issues of naming systems, specifically DNS, and how to address the shortcomings.
-
TCP Wrapper
Venema, Wietse; 1992; Acrobat format; also available in
Postscript format
-
Wietse's paper describing his TCP Wrapper concept, the basis for the TCP Wrappers security and logging suite.
Sorted alphabetically by name
-
arnudp.c
-
Source code demonstrates how to send a single UDP packet with the source/destination address/port set to arbitrary values.
-
block.c
-
Prevents a user from logging in by monitoring utmp and closing down his tty port as soon as it appears in the system.
-
esniff.c
-
Source for a basic ethernet sniffer. Originally came from an article in Phrack, I think.
-
hide.c
-
Code to exploit a world-writeable /etc/utmp and allow the user to modify it interactively.
-
identd.c
-
A modified identd that tests for the queue-file bug which is present in Sendmail versions earlier than 8.6.10 and possibly
some versions of 5.x.
-
listhosts.c
-
Requests a DNS name server to do a zone transfer and list the hosts it knows about.
-
mnt
-
This program demonstrates how to exploit a security hole in the HP-UX 9 rpc.mountd program. Essentially, it shows how to
steal NFS file handles which will allow access from clients which do not normally have privileges.
-
NFS-Bug
-
Demonstrates a bug in NFS which allows non-clients to access any NFS served partition. AIX & HPUX patches included.
-
NFS Shell
-
A shell which will access NFS disks. Very useful if you have located an insecure NFS server.
-
RootKit
-
A suite of programs like ps, ls, & du which have been modified to prevent display of certain files & processes in
order to hide an intruder. Modified Berkeley source code.
-
rpc_chk.sh
-
Bourne shell script to get a list of hosts from a DNS nameserver for a given domain and return a list of hosts running
rexd or
ypserve.
-
seq_number.c
-
Code to exploit the TCP Sequence Number Generator bug. An brief but clear explanation of the bug can be found in Steve Bellovin's
sequence number comment. Note that this code won't compile as-is because it is missing a library that
does some of the low-level work. This is how the source was released by Mike Neuman, the author.
-
Socket Demon v1.3
-
Daemon to sit on a specified IP port and provide passworded shell access.
-
Solaris Sniffer
-
A version of E-Sniff modified for Solaris 2.
-
telnetd Exploit
-
This tarfile contains source code to the
getpass() and
openlog() library routines which /bin/login can be made to link at runtime due to a feature of telnetd's
environment variable passing. Root anyone? The fix is to make sure your /bin/login is statically linked.
-
ttysurf.c
-
A simple program to camp out on the /dev/tty of your choice and capture logins & passwords when users log into that tty.
-
xcrowbar.c
-
Source code demonstrates how to get a pointer to an X Display Screen, allowing access to a display even after "
xhost -" has disabled acess. Note that access must be present to read the pointer in the first place! (Originally
posted to USENET's
comp.unix.security.)
-
xghostwriter-1.0b
-
xghostwriter takes a string, or message, and ensures that this string is "typed" from the keyboard, no matter what keys are
actually pressed. Useful for injecting keypress commands into an X session. More info from the auther is here
in his
USENET post.
-
xkey.c
-
Attach to any X server you have perms to and watch the user's keyboard.
-
xspy-1.0c
-
xspy is mostly useful for spying on people; it was written on a challenge, to trick X into giving up passwords from the xdm
login window or xterm secure-mode. More info from the auther is here in his
USENET post.
-
xwatchwin
-
If you have access permission to a host's X server, XWatchWin will connect via a network socket and display the window on
your X server.
-
YPX
-
YP/NIS is a horrible example of "security through obscurity." YPX attempts to guess NIS domain names, which is all that's
needed to extract passwd maps from the NIS server. If you already know the domain name, ypx will extract the
maps directly, without configuring a host to live in the target NIS domain. (GZip'd Bourne Shell Archive)
-
ypsnarf.c
-
Exercise security holes in YP / NIS.
Sorted alphabetically by name
-
COPS v1.04
-
COPS (Computer Oracle and Password System) checks for many common Unix system misconfigurations. I find this tool very valuable,
as it is non-trivial to break a system which has passed a COPS check. I run it on all the systems I admin. It's
getting a bit old, but it's still an excellent way to systematically check for file permission mistakes.
-
Crack v4.1
-
Crack is a tool for insuring that your Unix system's users have not selected easily guessed passwords which appear in standard
dictionaries. (Only a very small dictionary is included so grab the one below if you wish.)
-
Crack Dictionary
-
A general 50,000 word dictionary for use with Crack.
-
fping
-
Like Unix ping(1), but allows efficient pinging of a large list of hosts. V2.2.
-
ICMPinfo v1.1
-
ICMPinfo is a tool for looking at the ICMP messages received on the running host.
-
ISS v1.3
-
The Internet Security Scanner is used to automatically scan subnets and gather information about the hosts it finds, including
the guessing of YP/NIS domainnames and the extraction of passwd maps via
ypx. It also does things like check for verisons of sendmail which have known security holes.
-
lsof v4.82
-
List
All
Open
Files. Displays a listing of all files open on a Unix system. Useful for nosing around as well as trying
to locate stray open files when trying to unmount an NFS-served partition.
-
netcat v1.1
-
Like Unix cat(1) but this one talks network packets (TCP or UDP). Very very flexible. Allows outbound connections with many
options as well as life as a daemon, accepting inbound connections and allowing commands to be executed.
-
RScan
-
An older tool for Heterogeneous Network Interrogation. Includes links to a Usenix paper as well.
-
SATAN
-
Security Administrator Tool for Analyzing Networks. Dan Farmer's tool that caused a huge stir in the media back in '95 when
he wrote it and released it. I believe he ended up leaving SGI over this thing. So silly. Where is SGI now? That's
what I thought...
-
Strobe v1.03
-
Strobe uses a bandwidth-efficient algorithm to scan TCP ports on the target machine and reveal which network server daemons
are currently running. Version 1.03 is an update to 1.02.
-
Tiger
-
Tiger is a security tool that can be use both as a security audit and intrusion detection system. It is similar to COPS or
SATAN, but has system specific extensions for SunOS, IRIX, AIX, HPUX, Linux and a few others. The original TAMU
project has been resurrected and is now being maintained as part of Savannah.
-
Traceroute
-
Traceroute is an indispensable tool for troubleshooting and mapping your network.
Sorted alphabetically by name
-
How to Encrypt Your Hard Drive
-
Good article covering the various options for whole disk encryption on Windows, Linux, and Mac.
-
Kismet
-
Kismet is an 802.11 layer 2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any
wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11a, 802.11b, and 802.11g traffic.
-
PuTTY
-
PuTTY is a free implementation of Telnet and SSH for Windows and Unix platforms, along with an xterm terminal emulator.
-
TrueCrypt
-
TrueCrypt creates virtual encrypted file-systems which can be stored as a file or as a whole disk partition. Works on USB
sticks too. Don't lose your data if your PC is stolen -- encrypt it!
-
WireShark
-
The best network sniffer & protocol analyzer out there.
Sorted alphabetically by name
-
NetStumbler 0.40
-
NetStumbler is a wireless LAN tool which scans for access points and reports back with a list which includes signal strengths
and protocols in use. More details are available here in the
NetStumbler Readme.
-
Fiddler
-
Fiddler is a Web Debugging Proxy which logs all HTTP(S) traffic between your computer and the Internet. The application is
Windows-only but it hooks very low level API's which allows it to work with any browser (IE, Firefox, Opera,
etc.) and also decrypt SSL traffic without setting up the required private cert keys (as in WireShark).
-
netcat NT v1.1
-
Like Unix cat(1) but this one talks network packets (TCP or UDP). Very very flexible. Allows outbound connections with many
options as well as life as a daemon, accepting inbound connections and allowing commands to be executed.
-
Password Safe
-
Password Safe allows you to safely and easily create a secured and encrypted user name/password list. With Password Safe
all you have to do is create and remember a single "Master Password" of your choice in order to unlock and access
your entire user name/password list. Much safer than re-using passwords between sites!
-
Sam Spade 1.14
-
Sam Spade is an integrated network query tool for Windows. Most of what it does can be had elsewhere, but it has the ability
to parse email headers and determine where forgeries have been made in the headers and forwarding chain. Very
useful for well forged spam, reduces analysis time a lot to have Sam take a crack at it first.
-
Secunia PSI
-
This is a great tool which scans your system for old and unpatched application software which has security vulnerabilities.
Does for applications what Windows Update does for the Windows OS.
-
Security Essentials
-
Security Essentials is Microsoft's new real-time anti-virus and malware protection solution. It's reported to be better than
most anti-virus compeitors and it's free.
-
WinDirStat
-
Scans NTFS filesystems and represents them as a colored, graphical heat map based on size. Great for seeing what is taking
up the most space on your system. Think of it as graphical
du for Windows.
-
WinSCP
-
Free SFTP, FTP and SCP client for Windows. This is a great Windows file transfer client which also supports SCP, which most
ISP's are moving to now for secure file transfer.
Sorted alphabetically by name
-
BackTrack
-
BackTrack is the #1 Linux LiveCD focused on penetration testing.
-
BartPE
-
BartPE is a preinstalled environment builder for Windows. It uses your original Windows media to create a Live CD bootable
CDROM OS image.
-
GNUStep/OpenStep
-
Remember the NeXT cube running NeXTStep? Well I do, and this LiveCD brings it all back. No other reason to include it other
than it's Unix, and I miss my cube.
-
Helix
-
Helix is focused on incident response, forensics, and e-discovery. Free CD with option to buy support and access to the member
community.
-
Knoppix
-
This is not a security distro, but it's the best general Linux Live CD going, so it gets included for general usefulness.
-
Knoppix-STD
-
Security
Tools
Distribution of the Knoppix LiveCD. Zillions of things here, for all aspects of security work.
-
Trinity Rescue Kit
-
Trinity Rescue Kit or TRK is a free live Linux distribution that aims specifically at recovery and repair operations on Windows
machines, but is equally usable for Linux recovery issues.
-
-
These links aren't Unix related, but they are security related, and you may find them interesting. Ultimately, the integrity
of your computer's electronic security rests on the integrity of its physical security. So you need to know how locks
work because your whole security world is premised on them. Perhaps a section on alarm systems will be next...
Links last verified July 13
th, 2015. All of these external links leave this site.
People
Places & Organizations
Tools & Download Sites
Zines & Publications