Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] packet sniffers packet subsystem, SSH server, code audits packet-filtering firewalls proxy firewalls, compared stateful firewalls directionality fragmentation stateful inspection firewalls TCP (Transport Control Protocol) UDP (User Datagram Protocol) stateless firewalls fragmentation FTP (File Transfer Protocol) TCP (Transmission Control Protocol) UDP (User Datagram Protocol) packets DNS (Domain Name System) encapsulation IP packets packet sniffers source routing TCP packets, scanning padding bits, unsigned integer types page flow Paget, Chris parameterized queries parameters, transmitting to Web applications embedded path information forms GET method 2nd parameter encoding POST method query strings parent directories, UNIX parent functions, vunerabilities parroted request variables parse_rrecord( ) function parsing HTTP headers passive FTP password files, UNIX PATH environment variable (UNIX) path information (HTTP) path metacharcters file canonicalization Windows registry path traversal PATH_INFO environment variable 2nd PATH_TRANSLATED environment variable pathnames hexadecimal encoding UNIX pathological code paths pathological fragment sets, IP (Internet Protocol) paths files, UNIX path traversal Payloads, ISAKMP (Internet Security Association and Key Management Protocol) certificate payloads certificate request payloads delete payloads hash payloads identification payloads key exchange payloads 2nd nonce payloads notification payloads proposal payloads SA (security association) payloads signature payloads transform payloads vendor ID payloads PCI (Payment Card Industry) 1.0 Data Security Requirement peer reviews, application review PER (Packed Encoding Rules), ASN.1 (Abstract Syntax Notation) Perl cross-site scripting file access file inclusion inline evaluation open( ) function shell invocation SQL injection queries taint mode permission bitmasks permissions DCOM (Distributed Component Object Model), subsystem access permissions Directories, UNIX file access, Windows NT 2nd file systems files, UNIX mailsots object systems registry keys, Windows NT UNIX files, race conditions Windows NT pipes personal user files, UNIX phishing PHP (PHP Hypertext Preprocessor) 2nd configuration settings cross-site scripting file access file inclusion inline evaluation shell invocation 2nd SQL injection queries php_error_docref( ) function phrack magazine physical layer, network segmentation PIDs (process IDs), UNIX pipe squatting, Windows NT pipe( ) system call pipes UNIX, 612, named pipes Windows NT anonymous pipes creating impersonation IPC (interprocess communications) named pipes permissions pipe squatting PKI (Public Key Infrastructure) point-of-sale (PoS) system Pointer Arithmetic Vulnerability Example listing (6-29) pointer updates, lists, errors pointers arithmetic C programming language EBP (extended base pointer) ESP (extended stack pointer) function pointers, obfuscation outdated pointers 2nd ProFTPD text strings, incrementing incorrectly vunerabilities Pol, Joost policies (security) access control policy breaches enforcing pop( ) function popen( ) function 2nd Portable Operating System Interface for UNIX (POSIX) PoS (point-of-sale) system positive decimal integers, binary notation, converting to positive numbers, decimal conversion from binary notation POSIX (Portable Operating System Interface for UNIX) 2nd signals, handling POST method Postincrement Loop Vulnerability listing (7-21) posting data, HTTP (Hypertext Transfer Protocol) 2nd 3rd posttest loops, pretest loops, compared Practical Cryptography Pragma header field (HTTP) preassessment phase, code review application access information collection scoping precedence, C programming language precision, integer types predefined registry keys, Windows NT prepared statements preprocessors, C programming language Prescan Sign Extension Vulnerability in Sendmail listing (6-13) prescan( ) function 2nd presentation layer, network segmentation presentation logic preshared keys (PSKs), discovery of Pretest Loop Vulnerability listing (7-22) pretest loops, posttest loops, compared primary groups, UNIX printf( ) function 2nd Privilege Misuse in XFree86 SVGA Server listing (9-1) privilege separation, SSH server, code audits privileges UNIX capabilities directory permissions dropping permanently 2nd dropping temporarily extensions file IDs file permissions file security files group ID functions management code audits programs user ID functions vunerabilities Windows NT sessions, access tokens XF86_SVGA servers, misuse of problem domain logic Problems with 64-bit Systems listing (7-42) proc file system (UNIX) procedures, stored Process Explorer process memory layout, buffer overflows process outline, code review process_file( ) function process_login( ) function process_string( ) function process_tcp_packet( ) function process_token_string( ) function processes multiple process, shared memory process synchronization interprocess synchronization lock matching synchronization object scoreboard System V synchronization Windows NT signals asynchronous-safe function 2nd 3rd default actions handling interruptions 2nd jump locations non-returning signal handlers 2nd repetition sending signal handler scoreboard signal masks vunerabilities 2nd UNIX 2nd attributes child processes children creating environment arrays fork( ) system call groups interprocess communication open( ) function program invocation RPCs (Remote Procedure Calls sessions system file table terminals termination Windows NT DLL loading IPC (interprocess communications) loading services ShellExecute( ) function ShellExecuteEx( ) function processing IP fragmentation TCP (Transmission Control Protocol) options sequence number boundary condition sequence number representation state processing URG pointer processing window scale option processJob( ) processNetwork( ) function processThread( ) function profiling source code ProFTPD, outdated pointers program configuration files, UNIX program files, UNIX program invocation, UNIX direct invocation indirect invocation programmatic SSI programming interfaces, Windows NT, security descriptors programming languages C arithmetic boundary conditions binary encoding bit fields bitwise shift operators byte order character types data storage floating types format strings function invocations implementation definied behavior integer types macros objects operators order of evaluation pointers precedence preprocessor signed integer boundaries standards stdio file interface structure padding switch statements type conversion vunerabilities type conversions types typos unary + operator unary - operator unary operator undefinied behavior unsigned integer boundaries Perl, open( ) function Programming Windows Security programs, UNIX, privileged programs promotions, integers PROPFIND method ProPolice, stack cookies proposal payloads, ISAKMP (Internet Security Association and Key Management Protocol) PROPPATCH method proprietary state mechanisms, RPCs (Remote Procedure Calls) protocol quirks protocol state protocols application protocols ASN.1 (Abstract Syntax Notation) auditing 2nd DNS (Domain Name System) 2nd 3rd HTTP (Hypertext Transfer Protocol) 2nd 3rd 4th ISAKMP (Internet Security Association and Key Management Protocol) 2nd binary protocols, data type matching 2nd FTP (File Transfer Protocol) HTTP (Hypertext Transport Protocol) authentication 2nd cookies embedded path information forms headers methods 2nd overview of parameter encoding query strings requests responses sessions 2nd state maintenance versions network protocols IP (Internet Protocol) TCP (Transmission Control Protocol) TCP/IP UDP (User Datagram Protocol) REST (Representational State Transfer) SOAP (Simple Object Access Protocol) SSL/TLS (Secure Sockets Layer/Transport Layer Security) text-based protocols, data type matching proxies, COM (Component Object Model) proxy firewalls packet-filtering firewalls, compared Proxy-Authorization header field (HTTP) pseudo-objects, Windows NT PSKs (preshared keys), discovery of PThreads API condition variables mutexes public directories, UNIX Public header field (HTTP) public key encryption Public Key Infrastructure (PKI) public-facing administrative interfaces, Web-based applications punctuation errors, loops punycode Purczynski, Wojciech push( ) function PUT method putenv( ) function 2nd pw_lock( ) function |