L

L0pht advisory, 282
L0phtcrack (LC) tool
password cracking, 179-183
password hashes, 178-183
Windows family, 158-161
L2F (Layer 2 Forwarding), 335
L2TP (Layer 2 Tunneling Protocol), 335
LACNIC organization, 20
LAN Manager, 158, 160, 178, 183
LAN Rovers, 312
Land attaack, 490
LanMan authentication, 160-161, 182-183
LanManager (LM) hash, 158-159, 182-183, 337-338
laptop computers, 647
Larholm, Thor, 592
Last Stage of Delirium (LSD) Research Group, 161
LaTierra attaack, 490
Lauritsen, Jesper, 94, 197
Layer 2 Forwarding (L2F), 335
Layer 2 Tunneling Protocol (L2TP), 335
lc_cli.exe tool, 181
.lcs extension, 179-180
LDAP (Lightweight Directory Access Protocol), 118-122
LDAP clients , 118
LDAP system, 541
LEAP wireless technology, 453-456
Legion tool, 98-99, 146-147
Lembke, Holger, 497
LHF (low hanging fruit), 314-315, 652
libpng buffer overflow, 615-618
Libradiate, 447, 457
libraries
input validation, 532-533
shared, 270-271
Libsafe tool, 220, 515
LIDS (Linux Intrusion Detection System), 288-289
lidsadm tool, 288
LifeChanges worm, 587
Lightweight Directory Access Protocol. See LDAP
link-state advertisements (LSAs), 398
linsniff program, 281
Linux Administrator's Security Guide (LASG), 291
Linux HostAP-driver, 441
Linux Intrusion Detection System (LIDS), 288-289
Linux kernel
flaws, 271-272
rootkits, 285-289
Linux platform
Carbonite kernel module, 288
DoS attacks, 493, 495, 502-504
enumeration, 86-88
firewalls, 466-467, 485
FreeSWAN project, 282
Openwall Linux, 221
passwords, 384
pingd daemon, 50
RPM format, 278
security resources, 290-292
St. Michael tool, 289
SUID files and, 275
wireless attacks, 410, 427, 436-437, 448, 461
Linux wireless cards, 427-429
Linux WLAN package, 427
Lipner, Steve, 524
LIRs (Local Internet Registries), 20
listening ports, 51-52, 361
listening service, 215
Litchfield, David, 106, 128, 132
Liu Die Yu, 592, 599
LiveScript, 579
LKM (loadable kernel module), 222, 285, 288-289
LM (LanManager) hash, 158-159, 182-183, 337-338
LMZ (Local Machine Zone), 583, 599, 608-610
LMZ lockdown feature, 583, 608-610
loadable kernel module (LKM), 222, 285, 288-289
local accounts, 144-145
Local Intranet zone, 601
local Machine Zone (LMZ), 583, 608-610
Local Procedure Call (LPC), 173-174
local resource access exploit, 595-597
Local Security Authority. See LSA Local Security Authority Subsystem (LSASS), 163-165, 177
local tool, 106
localhost, 480-484
lockouts, 153
log files
ELM Log Manager, 156
event logs, 155-156, 172, 197-198
port scans and, 67
Psionic Logcheck, 67
resources, 292
scanlogd utility, 49, 67
security logs, 28, 154-156
syslog, 282-285
Logcheck, 67
logging
threshhold, 67
Windows family, 154-156, 172
login program, 277
logons , interactive, 174-175, 188, 210
loki program, 49, 479
lokid program, 479
Long, Johnny, 15
lookups
ARIN database, 356
Autonomous System, 356-358
DNS, 478
IP addresses, 28-31, 356
IP BGP path , 358-359
reverse DNS, 355, 358, 392
loopback floods, 490
low hanging fruit (LHF), 314-315, 652
LPC (Local Procedure Call), 173-174
LPC port requests , 173-174
ls option, 33
LSA (Local Security Authority), 179-185
LSA Secrets, 179-185
LSADump utility, 184-185
lsadump2 utility, 184-185
LSAs (link-state advertisements), 398
LSASS (Local Security Authority Subsystem), 163-165, 177
lsass.exe process, 165, 177
LSD (Last Stage of Delirium) Research Group, 161
lsof tool, 282


Hacking Exposed
Hacking Exposed 5th Edition
ISBN: B0018SYWW0
EAN: N/A
Year: 2003
Pages: 127

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net