Sponsored Content
Special Forums Cybersecurity Unix attacks in the last 5 years. Post 7905 by suzant on Wednesday 3rd of October 2001 08:08:14 AM
Old 10-03-2001
MySQL thankyou for unix attack sites

Thankyou for your quick reply.

Speaking to my lecturer tonight he said that we would have to go back more then five years(this fact he says verifies the qualities of unix over MS).

I will check the sites that you have given me, all I am looking for is any attacks, famous or broad cross-section, that may be documented(I understand that few organisations are not willing to do such a thing). So far searching on the sun site has been very useful.

Again thankyou for your help.

ps. I am looking

Last edited by suzant; 10-03-2001 at 09:10 AM..
 

8 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Easy unix/sed question that I could have done 10 years ago!

Hi all and greetings from Ireland! I have not used much unix or awk/sed in years and have forgotten a lot. Easy enough query tho. I am cleansing/fixing 10,000 postal addresses using global replacements. I have 2 pipe delimited files , one is basically a spell checker for geographical... (4 Replies)
Discussion started by: dewsbury
4 Replies

2. UNIX for Dummies Questions & Answers

Unix Command to separate this years files and last years?

Hello - I have a folder that contains files from 2003 till 2010. I am trying to figure out a command that would seperate each years file and show me a count? Even if i can find a command that would give me year by year count, thats good enough too. Thanks (8 Replies)
Discussion started by: DallasT
8 Replies

3. Shell Programming and Scripting

unix korn shell leap years problem

Write a function called dateToDays that takes three parameters -a month string such as Sep, a day number such as 18, and a year number such as 1962-and return s the number of days from January 1, 1900, to the date. Notes: I am asking you to account for leap years. my script is not... (0 Replies)
Discussion started by: babuda0059
0 Replies

4. Homework & Coursework Questions

Report on Javascript attacks on Unix

1. The problem statement, all variables and given/known data: Prepare a report discussing from an administration and security perspective, role and function of a JavaScript within a UNIX network. You should illustrate your answer with practical examples. In particular attention should me paid to... (1 Reply)
Discussion started by: afdesignz
1 Replies

5. UNIX for Dummies Questions & Answers

Interview topics or questions for unix developers with 4.years experience

Hi , I am gonna attend interview this week end for unix developer ( 4.5 years exp) opening .. Can you help me out the topics or the questions which I can expect in the interview. This is may be silly but it is very important to me. Thanks in Advance (5 Replies)
Discussion started by: arukuku
5 Replies

6. Cybersecurity

SSH attacks

The attached file contains 36 months data sorted in descending order by number of attempts and originating ip address. Is it possible to block any type of communication with an ip address after so many (5 or 10) failed attempts. The documentation(for Openssh) says that it is possible to slow the... (8 Replies)
Discussion started by: jgt
8 Replies

7. What is on Your Mind?

The Great History of UNIX (1969-1999) | 30 Years of UNIX History | YouTube Video

I am pleased to announce this new video in 1080 HD for UNIX lovers honoring thirty years of UNIX history spanning from 1969 to 1999 presented in 150 seconds (two and a half minutes) in 1080 HD, celebrating the 50th anniversary of UNIX. The Great History of UNIX (1969-1999) | 30 Years of UNIX... (8 Replies)
Discussion started by: Neo
8 Replies

8. What is on Your Mind?

The Dark Years of UNIX (2003 - 2011) | A Decade Lost to Legal Battles | YouTube Video

The Dark Years of UNIX (2003 - 2011) | A Decade Lost to Legal Battles | UNIX and Linux Legal Attacks https://youtu.be/ILH5CVYdl8w Here is the second video in the "history of unix" short videos. The first video was on the "great history of UNIX" and this second video covers the "years of... (7 Replies)
Discussion started by: Neo
7 Replies
CHECKSENDMAIL(8)					    BSD System Manager's Manual 					  CHECKSENDMAIL(8)

NAME
checksendmail -- verify sendmail address transformations. SYNOPSIS
checksendmail [-a] [-d] [-b] [-C file.cf] [-b sendmail_binary] [-l log_file] [-r resolve] [-T test.address] DESCRIPTION
The checksendmail program is a perl script that aids the testing of sendmail(8) 's various configuration files. checksendmail passes typical addresses (supplied in input files) through sendmail and prints the results of the resolution and transformation routines. The input files contain a list of addresses, one per line. For example: user user@site user@site.com The input file can contain comments started with a # and blank lines. OPTIONS
-a Show aliasing of local addresses in mail address resolution phase of testing -d Preceed each address translation line with ruleset sequence summary -C file.cf Use the sendmail configuration file file.cf instead of the default /etc/sendmail.cf file. -b sendmail_binary Use the specified sendmail_binary as the path to invoke sendmail (instead of /usr/sbin/sendmail). -l log_file Log sendmail address test mode debugging output to log_file -r resolve Use resolve as the input file for the addresses to be used for mail resolving. Defaults to address.resolve. -T test.address Use test.address as the single address to test. Cannot be used in conjunction with file setting flags. EXAMPLES
The following command will pass the addresses in address.resolve through sendmail using the configuration information in myconfig.cf. example% cat address.resolve user user@site user@site.com example% checksendmail -C myconfig.cf system: myhost.gadget.com current dir: /tmp/Checksendmail resolve file: address.resolve sendmail binary: /usr/sbin/sendmail sendmail version: 8.9.3 config file: /etc/sendmail.cf config file version: V8/Berkeley Mail address resolution user --(ether )--> user[rmtc] user@site --(ether )--> user@site[rmtc] user@site.com --(ether )--> user@site.com[rmtc] `To' address transformations for mailer ether: user ----> user user@site ----> user@site user@site.com ----> user@site.com `From' address transformations for mailer ether: user ----> user user@site ----> user user@site.com ----> user The first section of the output shows how the addresses in the input files are resolved by sendmail(8). Consider the following output line: user@site.com --(ether )--> user@site.com[rmtc] The input address user@site.com resolves to use the ether mailer. That mailer is directed to send the mail to to the user user@site.com at site rmtc (as indicated in the square brackets). The two later sections of output show how the addresses specified as the To and From address are transformed in the text of the headers. In the example above, the To addresses are untouched. The From addresses, however, all lose their machine information on the way through the mailer: user@site ----> user This may be desirable when using a configuration file on a workstation which is to be hidden as a mailhost from the rest of the network. The following is a set of addresses used at one site for the purposes of testing address resolution. Comments after the addresses detail why particular addresses are present: user Standard trivial address user@rmtc qualified at one level user@rmtc.central qualified at two levels user@rmtc.central.sun.com qualified all the way rmtc!user local but specified as uucp user@summit a workstation (normally delivered locally, though) user@summit.central same but more qualified user@summit.central.sun.com same but fully qualified summit!user same but specified as uucp user@prisma Backward compatibility tests user@prisma.com prisma!user user@central Superior domain testing user@machine.central more qualified, but unknown user@summit.central more qualified and known user@eng name in faraway domain user@machine.eng unknown machine in faraway domain user@summit.eng local machine, far away domain user@hoback far away machine user@machine apparently local but unknown machine user@sun.com Standard trivial address user@machine.dom.sun.com fully qualified but unknown machine user@foo.com standard, known, really far away domain user@foo.dom standard, unknown, really far away domain site!user Single level uucp site1!site2!user Double level uucp user@foo.dom@bar.dom Trickier address site!user@foo.dom Mixed uucp/domain site!user@uunet.uu.net Mixed double uucp/domain NOTES
Note that checksendmail is a perl script. If your site does not have perl(1), it can be obtained via anonymous ftp from ftp.uu.net. sendmail requires that the user have access to directory specified by the OQ parameter in the configuration file (normally /usr/spool/mqueue). checksendmail verifies that the user has access to this directory before allowing the test to continue. AUTHORS
Gene Kim Rob Kolstad Jeff Polk Modified by Robert Harker SEE ALSO
sendmail(8) BSD
November 14, 2000 BSD
All times are GMT -4. The time now is 05:39 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy