期刊文献+

Linux操作系统root账号密码获取防范技术研究 被引量:3

Research on Password Access Defense Technology for Linux Operating System' Root Account
下载PDF
导出
摘要 在拥有Webshell或者服务器权限下,如何获取Linux操作系统的最高管理用户的密码是一个难题,文章就如何获取Linux操作系统root帐号密码进行了研究和探讨,并针对这些可能获取Linux密码账号的手段给出了安全防范方法。 For the Linux operating system, the server has authority under Webshell or how to get the highest administrative user password for the Linux operating system is a problem, this article on how to get the Root account password has been studied and discussed.
作者 陈小兵
出处 《信息网络安全》 2014年第3期24-27,共4页 Netinfo Security
关键词 LINUX 操作系统 root账号 密码获取防范 Linux operating system root account password access prevention
  • 相关文献

参考文献7

  • 1月光博客.LAMP网站架构方案分析[EB/OL].http://www.williamlonginfo/archives/1908.html.2009-8-28.
  • 2季雨辰,伏晓,石进,骆斌,赵志宏.计算机入侵取证中的入侵事件重构技术研究[J].计算机工程,2014,40(1):315-320. 被引量:3
  • 351cto博客.Linux-I用户帐号与组管理[EB/OL].http://youyeblog.5lcto.com/1056318/296589.2010-04-1.
  • 4美好生活网.1inux中的shadow文件以及所采用的加密算法[EB/OL].http://www.wzzjlacom/Html/201209/500html,2012-09-20.
  • 5Iinux521cornlinux下记录SU密码的代码[EB/OL].http://www.1inux521.com/2009/svstem/201005/11364html,2010-05-10.
  • 6icewolf0077unix密码破解软件J0hntheIKipper中文说明[EB/OL].http://wenku.baidu.corn/view/d1121af6f61fb736(Ib4c65dd.html,2011-08-11.
  • 7维基百科.Secure ShelL.http://zh.wikipeia.org/zh/Sccure=Shcll,2013-12-19.

二级参考文献37

  • 1丁丽萍,周博文,王永吉.基于安全操作系统的电子证据获取与存储[J].软件学报,2007,18(7):1715-1729. 被引量:8
  • 2伏陰.入侵取证中的自动证据分析技术研究[D]{H}南京:南京大学,2011.
  • 3Bogen A C,Dampier D A. Unifying Computer Forensics Modeling Approaches--A Software Engineering Perspec-tive[A].IEEE Press,2005.27-39.
  • 4Herrer?as J,Gómez R. Log Analysis Towards an Automated Forensic Diagnosis System[A].IEEE Press,2010.659-664.
  • 5Arasteh A R,Debbabi M,Sakha A. Analyzing Multiple Logs for Forensic Evidence[J].{H}DIGITAL INVESTIGATION,2007.82-91.
  • 6Morgan T D. Recovering Deleted Data From the Windows Registry[J].{H}DIGITAL INVESTIGATION,2008.33-41.
  • 7Mee V,Tryfonas T,Sutherland I. The Windows Registry as a Forensic Artefact:Illustrating Evidence Collection for Internet Usage[J].{H}DIGITAL INVESTIGATION,2006.166-173.
  • 8Khan M N A,Chatwin C R,Young R C D. A Framework for Post-event Timeline Reconstruction Using Neural Networks[J].{H}DIGITAL INVESTIGATION,2007.146-157.
  • 9Rutkowska J. Beyond the CPU:Defeating Hardware Based RAM Acquisition[EB/OL].http://www.docin.com/p-23650823.html,2007.
  • 10Libster E,Kornblum J D. A Proposal for an Integrated Memory Acquisition Mechanism[J].ACM SIGOPS Operating Systems Review,2008,(03):14-20.

共引文献2

同被引文献64

  • 1张玉安,冯登国.一种实用的仿一次一密分组加密方案[J].北京邮电大学学报,2005,28(2):101-104. 被引量:16
  • 2杜建超,吴成柯,杨亚东,肖嵩.一种基于图像内容的数据分割方法[J].西安电子科技大学学报,2006,33(2):200-204. 被引量:2
  • 3覃政仁,吴渝,王国胤.一种基于RoughSet的海量数据分割算法[J].模式识别与人工智能,2006,19(2):249-256. 被引量:7
  • 4Hillol Kargupta, Kamalika Das, Kun Liu .A game theoretic approach toward multi-party privacy preserving distributed data miningJA]. Technical Report Tt?.-CS[C]. 2007,vo1(1):7,443-449.
  • 5Cramer P., Damgard I, Maurer U. General Secure Multi-party Computation from Any Linear Secret Sharing Scheme[A]. Proceedings of" Advances in Cryptology--EUROCRYPT 2000[C]. Berlin: Springer- Verlag, 2003. 316-334.
  • 6HALPERN J,TEAGUE V. Rational secret sharing and multi- party computation:extended abstract[ A]. Proc of 36th ACM Symposium on Theory of Computing(STOC)[C]. Chicago : ACM Press, 2004 : 623 -632.
  • 7A.YAO. Protocols for secure computations[A].ln Proceedings of the 23rd Annual IEEESymposium on Foundations of Computer Science[C]. 1982.PP.160-164.
  • 8Ittai Abraham, Danny Dolev, tZica Gonen, and Joe Halpern. Distributed computing meets game theory: Robust mechanisms for rational secret sharing and multi-party computationIA]. In Twenty-Fifth Annual ACM Symposium on Principles of Distributed Computing (PODC)[C]. Colorado, USA, July 2006.
  • 9Du heng. Rational cyptographic protocols with application[D].In: SJT University, 2009.
  • 10swama home page[EB/OL]. www.swarm.org.

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部