检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:金涛 李新剑 刘宏斌 史震宇 Jin Tao;Li Xinjian;Liu Hongbin;Shi Zhenyu(School of Public Security Technology,Gansu Political Science and Law Institute,GansuLanzhou 730070)
机构地区:[1]甘肃政法学院公安技术学院
出 处:《网络空间安全》2019年第3期28-35,共8页Cyberspace Security
摘 要:随着网络技术的高速发展,黑客攻击的手段越来越多,操作系统的安全性也必须随之提升。由于Linux操作系统内部的权限机构比较复杂且周密,所以相比于Windows来说更安全,常被用在服务器平台。但并不是说Linux就是绝对安全的,出于保护系统的目的,需要对系统进行渗透测试,用来找出测试对象的安全隐患,提高系统的安全性。文章分析了Linux系统的两个安全漏洞,并且对Linux系统进行模拟攻击,获取漏洞主机的控制权限,进一步说明了安全漏洞的危害性。With the rapid development of network technology,the means of hacker attack are more and more,and the security of operating system must be improved accordingly.Because of the complexity and sophistication of the privilege mechanism within the Linux operating system,it is safer than Windows and is often used on the server platform.But it does not mean that Linux is absolutely safe.For the purpose of protecting the system,it is necessary to conduct penetration testing of the system to find out the potential security hazards of the test objects and improve the security of the system.This paper analyses two security vulnerabilities of Linux system,and simulates attacks on Linux system to obtain the control rights of vulnerable hosts,which further illustrates the harmfulness of security vulnerabilities.
分 类 号:TP393[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.116.14.133