Skip to content

Commit

Permalink
ftp info sheet, and some useful lists
Browse files Browse the repository at this point in the history
  • Loading branch information
angelaevans committed Dec 11, 2013
1 parent fb7df34 commit 79830a0
Show file tree
Hide file tree
Showing 3 changed files with 51 additions and 0 deletions.
20 changes: 20 additions & 0 deletions ftp
Original file line number Diff line number Diff line change
@@ -0,0 +1,20 @@
#ftp client commands
binary - set binary transfer type
cd - change remote working directory
lcd - change local working directory
get - recieve file
mget - get multiple files
passive - enter passive transfer mode
ls - list contents of remote directory

#Traditional ports, though they can be dynmically assigned
Port 21 - control commands
Port 20 - data transfer

#Active mode
Client initiates control session on port 21 and leaves port 20 open for the server to send data, and the server initiates the connection for port 20.
***If client is behind a firewall, or NAT, then the sever might not be able to connect to send data.

#Passive mode
Server gives teh client a port to initiate a connection to for data transfer.
***Most commonly used by browsers, ect.
14 changes: 14 additions & 0 deletions web-servers-vulnerability.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
#Sample Files
Since web servers are hard to make from the ground up, sample files are often in the distributions, and the knowledge of these sample files can provide openings.

#Source Code Disclosure
Allowing the source code to be viewed can make holes an files accessible if they can can be found referenced in the code.

#Canonicalization
Errors usually occur when the web server fails to fully carry out the law (that the root word for any URL/filename would be the same if it is for the same resource), and thus the web server will fail to recognize that a URL is associated with a file it addresses.

#Input Validation
Classic hacking technique, but it can lead to buffer overflows, integer errors, and heap exploits.

#Denial of Service
Attempting to waste server time to get a denial. For example, one can identify many strings that hash to the same location in an environment with a naive programming language hash table implementation.
17 changes: 17 additions & 0 deletions wireless-encryptions
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
#Wired Equivalent Privacy (WEP)
RC4 stream cipher w/ CRC32 for integrity check
-->Crack:
by sniffing an ARP packet, then replaying it to get many encrypted replies with different IVs
-->Avoidance:
Use WPA2

#Wifi Protected Access (WPA)
Temporal Key Integrity Protocol (TKIP) Message Integrity Check
-->Crack:
Uses a four way handshake, and if that handshake can be captured, then a dictionary attack ban be mounted to find the Pairwise Master Key for the Access Point and client Station
-->Avoidance:
Use long-keys

#WPA2
Advanced Encryption Standard (AES)
-->crack and avoidance the same was WPA

0 comments on commit 79830a0

Please sign in to comment.