﻿<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/"><channel><title>IT博客-刘锐欢迎你的到来!-文章分类-网络安全</title><link>http://www.cnitblog.com/liserui/category/2463.html</link><description>&lt;P&gt;&lt;IMG height=50 alt=ms_masthead_10x7a_ltr.jpg src="http://www.cnitblog.com/images/cnitblog_com/liserui/ms_masthead_10x7a_ltr.jpg" width=140 border=0&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;IMG height=70 alt=mcse.gif src="http://www.cnitblog.com/images/cnitblog_com/liserui/mcse.gif" width=150 border=0&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;IMG height=70 alt=mcp.gif src="http://www.cnitblog.com/images/cnitblog_com/liserui/mcp.gif" width=150 border=0&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;IMG height=60 alt=huawei.gif src="http://www.cnitblog.com/images/cnitblog_com/liserui/huawei.gif" width=100 border=0&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;IMG height=73 alt=logo.gif src="http://www.cnitblog.com/images/cnitblog_com/liserui/logo.gif" width=110 border=0&gt;&lt;/P&gt;
</description><language>zh-cn</language><lastBuildDate>Sun, 02 Oct 2011 03:02:45 GMT</lastBuildDate><pubDate>Sun, 02 Oct 2011 03:02:45 GMT</pubDate><ttl>60</ttl><item><title>网络攻击举例</title><link>http://www.cnitblog.com/liserui/articles/9549.html</link><dc:creator>www.liserui.cnitblog.com</dc:creator><author>www.liserui.cnitblog.com</author><pubDate>Sat, 22 Apr 2006 12:28:00 GMT</pubDate><guid>http://www.cnitblog.com/liserui/articles/9549.html</guid><wfw:comment>http://www.cnitblog.com/liserui/comments/9549.html</wfw:comment><comments>http://www.cnitblog.com/liserui/articles/9549.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.cnitblog.com/liserui/comments/commentRss/9549.html</wfw:commentRss><trackback:ping>http://www.cnitblog.com/liserui/services/trackbacks/9549.html</trackback:ping><description><![CDATA[物理层攻击举例<br />    通过网络设备：Hub, 无线AP等进行攻击<br />数据链路层攻击举例<br />    恶意获取数据或MAC地址，由于大多数IDS和*作系统对网络层以下的防御很弱，因此很危险<br />   ARP Spoofing<br />   ARP cache poisoning<br />   ARP cache flooding<br />   MAC spoofing<br />   MAC device flooding<br />   Network topology change<br />   Defeat VLAN separation<br />   Rogue DHCP servers<br />网络层攻击举例<br />   IP Spoofing<br />   Fragmentation Attacks<br />   Reassembly attacks<br />   Protocol anomalies<br />   IP flag attacks<br />   PING of death<br />传输层攻击举例<br />   Port Scan<br />   TCP reset attack<br />   SYN DoS floods<br />   LAND attack<br />   Session hijacking<br />会话层攻击举例<br />   Blaster RPC buffer overflow worm<br />   PRC endpoint mapper DoS attack<br />   SSL vulnerabilities<br />   SSH vulnerabilities<br />   未授权即时消息会话*作<br />表示层攻击举例<br />   Winmap buffer overflow<br />   JPG/ICQ buffer overflow<br />   MIME type mismatch<br />   HTTP directory transversal<br />应用层攻击举例<br />   MS-SQL Slammer worm 缓冲区溢出<br />   IIS 红色警报<br />   Email 蠕虫<br />   蠕虫，病毒，木马<br />   垃圾邮件<br />   IE漏洞<img src ="http://www.cnitblog.com/liserui/aggbug/9549.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.cnitblog.com/liserui/" target="_blank">www.liserui.cnitblog.com</a> 2006-04-22 20:28 <a href="http://www.cnitblog.com/liserui/articles/9549.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item></channel></rss>