Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] IDA Pro binary navigation tool IDC (Internet Database Connection) identification payloads, ISAKMP (Internet Security Association and Key Management Protocol) idioms, UNIX privileges, misuse of IDL files, RPCs (Remote Procedure Calls) IDs, files, UNIX IDSs (intrusion detection systems) host-based IDSs (intrusion detection systems) If Header Processing Vulnerability in Apache's mod_dav Module listing (8-6) If-Match header field (HTTP) If-Modified-Since header field (HTTP) If-None-Match header field (HTTP) If-Range header field (HTTP) If-Unmodified-Since header field (HTTP) Ignoring realloc( ) Return Value listing (7-25) Ignoring Return Values listing (7-28) ImpersonateNamedPipe( ) function impersonation DCOM (Distributed Component Object Model) IPC (interprocess communications) levels SelimpersonatePrivilege RPCs (Remote Procedure Calls) Windows NT sessions, access tokens implementation SDLC (Systems Development Life Cycle) vunerabilities implementation analysis, OpenSSH, code auditing implementation defined behavior, C programming language implicit type conversions import function tables imports, Windows binary layout in-band representation, metadata in-house software audits .inc files ASP PHP include( ) method, Java servlets Incorrect Temporary Privilege Relinquishment in FreeBSD Inetd listing (9-2) independent research indexed queries 2nd Indirect Memory Corruption listing (5-5) indirect program invocation, UNIX information collection application review threat modeling inheritance ACLs (access control lists), Windows NT Windows NT object handles initgroups( ) function initialization vector (IV) initialization, variables, auditing initialize_ipc( ) function initJobThreads( ) function inline evaluation ASP ASP.NET Java servlets Perl PHP inodes (information nodes), UNIX files input extraneous input thinning malicious input, tracing treating as hostile vulnerabilities input_userauth_info_response( ) function insecure defaults insufficient validation, authentication integer conversion rank integer overflow Integer Overflow Example listing (6-2) Integer Overflow with 0Byte Allocation Check listing (7-37) Integer Sign Boundary Vulnerability Example in OpenSSL 0.9.6l listing (6-6) integer types, C programming language integer underflow 2nd integers promotions signed integers boundaries vunerabilities type conversions narrowing sign extensions value preservation widening unsigned integers boundaries 2nd numeric overflow numeric underflow vunerabilities integration, SDLC (Systems Development Life Cycle) integrity auditing, importance of 2nd common vunerabilities cryptographic signatures expectations of hash functions originator validation salt values Intel architectures carry flags (CFs) multiplication overflows 2nd interface proxies, COM (Component Object Model) interfaces COM (Component Object Model) applications auditing network interfaces RPC servers, registering vulnerabilities internal flow analysis, code auditing internal trusted sources, spoofing attacks, firewalls Internet Database Connection (IDC) Internet Server Application Programming Interface (ISAPI) interprocess communication, UNIX interprocess communications (IPC) [See IPC (interprocess communications), Windows NT.] interprocess synchronization, vulnerabilities interruptions, signals 2nd interviewing developers intrusion prevention systems (IPSs) [See IPSs (intrusion prevention systems).] INVALID_HANDLE_VALUE, NULL, compared invocation DCOM objects UNIX programs direct invocation indirect invocation IP (Internet Protocol) addresses maintaining state with addressing checksum fragmentation overlapping fragments pathological fragment sets processing header validation IP packets options source routing subnet IPC (interprocess communications), Windows NT COM (Component Object Model) DDE (Dynamic Data Exchange) desktop object impersonation mailslots messaging pipes redirector RPCs (Remote Procedure Calls) security shatter attacks window station WTS (Windows Terminal Services) IPSs (intrusion prevention systems) host-based IPSs (intrusion prevention systems) IRIX ISAKMP (Internet Security Association and Key Management Protocol) encryption vunerabilities headers payloads certificate payloads certificate request payloads delete payloads hash payloads identification payloads key exchange payloads 2nd nonce payloads notification payloads proposal payloads SA (security association) payloads signature payloads transform payloads vendor ID payloads ISAPI (Internet Server Application Programming Interface) ISAPI filters IsDBCSLeadByte( ) function iterative process, application review |