L0phtcrack (LC) tool
password cracking, 179-183
password hashes, 178-183
Windows family, 158-161
L2F (Layer 2 Forwarding), 335
L2TP (Layer 2 Tunneling Protocol), 335
LAN Manager, 158, 160, 178, 183
LanMan authentication, 160-161, 182-183
LanManager (LM) hash, 158-159, 182-183, 337-338
Last Stage of Delirium (LSD) Research Group, 161
Lauritsen, Jesper, 94, 197
Layer 2 Forwarding (L2F), 335
Layer 2 Tunneling Protocol (L2TP), 335
LDAP (Lightweight Directory Access Protocol), 118-122
LEAP wireless technology, 453-456
Legion tool, 98-99, 146-147
LHF (low hanging fruit), 314-315, 652
libpng buffer overflow, 615-618
libraries
input validation, 532-533
shared, 270-271
LIDS (Linux Intrusion Detection System), 288-289
Lightweight Directory Access Protocol. See LDAP
link-state advertisements (LSAs), 398
Linux Administrator's Security Guide (LASG), 291
Linux Intrusion Detection System (LIDS), 288-289
Linux kernel
flaws, 271-272
rootkits, 285-289
Linux platform
Carbonite kernel module, 288
DoS attacks, 493, 495, 502-504
enumeration, 86-88
firewalls, 466-467, 485
FreeSWAN project, 282
Openwall Linux, 221
passwords, 384
pingd daemon, 50
RPM format, 278
security resources, 290-292
St. Michael tool, 289
SUID files and, 275
wireless attacks, 410, 427, 436-437, 448, 461
Linux wireless cards, 427-429
LIRs (Local Internet Registries), 20
listening ports, 51-52, 361
Litchfield, David, 106, 128, 132
LKM (loadable kernel module), 222, 285, 288-289
LM (LanManager) hash, 158-159, 182-183, 337-338
LMZ (Local Machine Zone), 583, 599, 608-610
LMZ lockdown feature, 583, 608-610
loadable kernel module (LKM), 222, 285, 288-289
local Machine Zone (LMZ), 583, 608-610
Local Procedure Call (LPC), 173-174
local resource access exploit, 595-597
Local Security Authority. See LSA Local Security Authority Subsystem (LSASS), 163-165, 177
log files
ELM Log Manager, 156
event logs, 155-156, 172, 197-198
port scans and, 67
Psionic Logcheck, 67
resources, 292
scanlogd utility, 49, 67
security logs, 28, 154-156
syslog, 282-285
logging
threshhold, 67
Windows family, 154-156, 172
logons , interactive, 174-175, 188, 210
lookups
ARIN database, 356
Autonomous System, 356-358
DNS, 478
IP addresses, 28-31, 356
IP BGP path , 358-359
reverse DNS, 355, 358, 392
low hanging fruit (LHF), 314-315, 652
LPC (Local Procedure Call), 173-174
LPC port requests , 173-174
LSA (Local Security Authority), 179-185
lsadump2 utility, 184-185
LSAs (link-state advertisements), 398
LSASS (Local Security Authority Subsystem), 163-165, 177
lsass.exe process, 165, 177
LSD (Last Stage of Delirium) Research Group, 161