I

IANA (Internet Assigned Numbers Authority), 19, 22-23, 28
IBSS (Independent BSS), 417
ICANN (Internet Corporation for Assigned Names and Numbers), 19-24, 28
ICF (Internet Connection Firewall). See Windows Firewall
ICMP attack, 496
ICMP ECHO packets, 42, 44, 48-50, 479, 493, 502
ICMP enumeration, 48
ICMP errors, 70
ICMP headers, 479
ICMP messages, 68
ICMP packets
blocking, 202, 500
information gathering with, 50-51
restrictions, 355-356
tracerouting, 38-39, 355
ICMP pings , 42-50, 480
ICMP queries, 50-51
ICMP redirects, 371
ICMP traceroute packets, 355-356
ICMP traffic
amplification and, 493
bandwidth consumption attacks, 491-497
blocked, 45-47, 51, 467
evaluating, 49-50
limiting, 40
ICMP tunneling, 479-480
icmpenum tool, 48
icmpquery tool, 50-51
icmpush tool, 50-51
ICS (Internet Connection Sharing), 205
IDA files, 543
IDA.DLL, 166
ident scanning, 58
identity theft, 340, 597-598, 623-628. See also privacy issues
IDN (International Domain Name ), 585
IDQ files, 543
IDS (intrusion-detection systems), 157, 260, 465, 503
IDS/IPS (intrusion detection/prevention) tools, 643
IE. See Internet Explorer
IE Administration Kit (IEAK), 601
IEEE 802 standard, 457, 460
ifconfig command, 444-445
IFRAME tags, 583, 589, 595-596
IGRP (Interior Gateway Routing Protocol), 397-398
IIS (Internet Information Server)
ASP vulnerabilities, 538-541
banner changing, 90-91
canonicalization issues, 520-522
FrontPage and, 546-547
HTR Chunked Encoding Transfer Heap Overflow, 543
IISHack vulnerability, 543
input validation, 532-533
ISAPI idq.dll buffer overflows, 543
NTLM authentication, 556-557
patches, 168-169
protecting, 168-173
security resources, 166
Translate: f vulnerability, 540-542
version 4.0, 538, 543
version 5.0, 542-543
web applications and, 173
IIS (Internet Information Services)
attacks against, 165-173
buffer overflows, 166-173
directory traversal, 165, 171
Double Decode exploit, 171 +.htr vulnerability, 171
information disclosure, 165
security and, 165
Unicode exploit, 171
IIS Lockdown Tool, 90-91, 166, 172
IISHack vulnerability, 543
IKE (Internet Key Exchange) protocol, 338
ILOVEYOU worm, 590
IM (instant messaging), 591-592
ImageMagick, 423
.inc extension, 171
incident response, 290
include files, 171
Independent BSS (IBSS), 417
Industrial Scientific and Medical (ISM), 456
ingress filters, 168, 500
inheritance rights filter (IRF), 127
Initial Sequence Number (ISN), 70
Initialization Vector (IV), 415
input validation attacks, 518-522
input validation libraries, 532-533
insertion points, 635
instant messaging (IM), 591-592
integer overflows, 226-230
integer underflows, 592-593
in.telnetd environment, 271
interception attacks, 341-345
Interdo tool, 561
Interior Gateway Routing Protocol (IGRP), 397-398
International Domain Name (IDN), 585
Internet, 573-648. See also e-mail; web
Active Scripting exploits, 579-580
ActiveX. See ActiveX
adware, 628-633
America Online, 32, 505, 621
bots. See bots
company presence on, 9
cookies. See cookies
DNS and, 250-252
drop points, 586-587
eBay, 621-622, 624
finding phone numbers, 9, 11, 31-32, 295-296, 303
footprinting and. See footprinting
guidelines for safe use of, 612, 647-648
hacking milestones, 575-579
ICANN Board, 19-24
identity theft, 340, 597-598, 623-628
instant messaging (IM), 591-592
Java abuse, 577-579
JavaScript exploits, 579-580
malware, 503, 634-646
online services, 619-623
Passport vulnerability, 620-621
payloads, 586-587
PayPal, 621-622, 624
phishing, 623-628
physical security, 10, 646-647
precautions , 612
search engines. See search engines
software vulnerabilities, 574-623
spam, 628-633, 641
spyware, 628-633, 643
SSL. See SSL
vulnerabilities, 574-623
web browsers. See web browsers
zombies . See zombies
Internet Assigned Numbers Authority (IANA), 19
Internet clients
Active Scripting exploits, 579-580
ActiveX exploits, 575-577
cookies. See cookies
drop points, 586-587
instant messaging (IM), 591-592
Java abuse, 577-579
JavaScript exploits, 579-580
Microsoft Internet. See Microsoft Internet clients
non-Microsoft clients, 613-619
payloads, 586-587
SSL. See SSL
Internet Connection Firewall (ICF).
See Windows Firewall
Internet Connection Sharing (ICS), 205
Internet Control Messaging Protocol. See ICMP
Internet Corporation for Assigned Names and Numbers (ICANN), 19-24
Internet egress, 168
Internet Exploder, 576
Internet Explorer (IE)
ActiveX controls, 575-577
Add-On Manager, 606-607
Browser Helper Object (BHO), 629-630
cookies and, 580-581
cross-domain issues, 582-583
cross-zone exploits, 595-597
GDI+ JPEG buffer overflows, 592-594
HTML HelpControl attacks, 599-600
IFRAME tags and, 583
improper URL canonicalization, 597-598
pop-up blocker, 607
security zones, 601-610, 614
SSL fraud and, 583-586
using alternate browsers, 613-615
Internet Information Server. See IIS
Internet Key Exchange (IKE) protocol, 338
Internet Protocol. See IP
Internet Protocol Security. See IPSec
Internet Relay Chat. See IRC
Internet Service Providers (ISPs), 352, 403
Internet zone, 601-602
InterNIC, 295-296
Interprocess Communications (IPC), 143
intranet connections, 6-7
Intruder Alert (ITA) tool, 157
intrusion detection/prevention (IDS/IPS) tools, 643
intrusion-detection systems (IDS), 157, 260, 465, 503
IP (Internet Protocol), 381-382
IP addresses
ARIN database, 356
blocking, 402, 499, 505
disabling broadcast functionality, 500-501
DNS names, 354
enumeration and, 91-92
looking up, 28-31, 356
ping sweeps , 42-50
promiscuous mode and, 261
spoofing, 67
tracerouting, 355
unroutable, 42
vs. NetBIOS names, 94
zone transfers and, 32-37
IP BGP path lookups, 358-359
IP forwarding, 371-372, 395
IP headers, 377, 382-383
IP Network Browser, 114-115, 387-388
IP: Next Generation (IPng), 382
IP packets, 37, 114, 116, 377
IP- related searches, 28-31, 356
IP Security Protocol. See IPSec
IPC (Interprocess Communications), 143
ipchains, 221
ipEye scanner, 63, 66
ipf tool, 221
IPng (IP: Next Generation), 382
Ippl program, 49, 466
IPSec (Internet Protocol Security), 148, 202-203, 282, 335-339
IPSec connections, 202-203
IPSec filters, 202-203, 210
ipsecpol utility, 203
IPv4 (Internet Protocol version 4), 381
IPv6 (Internet Protocol version 6), 382
IPX networks, 123, 127
IRC (Internet Relay Chat), 494, 592, 640
IRC bots, 497, 640
IRC scripts, 494
IRF (inheritance rights filter), 127
Irix systems, 261
IRPAS toolset, 366, 379
ISAPI extensions, 169-170
ISAPI filters, 90, 169-170, 172, 542
ISAPI idq.dll buffer overflows, 543
ISM (Industrial Scientific and Medical), 456
ISM.DLL extension, 166, 169
ISN (Initial Sequence Number), 70
isp-routing newsgroup, 403
isp-security newsgroup, 403
ISPs (Internet Service Providers), 352, 499-500, 506
ITA (Intruder Alert) tool, 157
ITS4 tool, 527
IV (Initialization Vector), 415
Ivgi, Rafel, 595
iwconfig interface, 441, 444


Hacking Exposed
Hacking Exposed 5th Edition
ISBN: B0018SYWW0
EAN: N/A
Year: 2003
Pages: 127

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net