R

r0ckstar group , 461
race conditions, 268-269
RADB routing registry, 359
Rainbow crack project, 181
randomization, 303-304
RAS (Remote Access Service), 94, 184-185
rate filtering, 501
rate limit command, 501
RATS tool, 527
raw packet transmissions, 473-474
raw sockets, 497
Razor security research team, 104, 126
Razor team, 173
RC4 algorithm, 337
RC4 streams, 446
RC5-64 cracking session, 339
read/write MIBs, 387-390
read/write SNMP, 400
readsmb utility, 158, 160
Real-time Transport Control Protocol (RTCP), 340
Real-time Transport Protocol (RTP), 340
RealPlayer media player, 618
RealSecure Server Protection, 157
reassociation requests , 439
"Red Button" vulnerability, 97
RedHat Package Manager (RPM), 278
redirection
RP, 159, 369-373
described, 190-191
ICMP, 371
port. See port redirection
regdmp utility, 100, 188
REG.EXE tool, 190, 194
registrars, 32
Registry. See Windows Registry
Registry keys, 193-195, 638
relative identifier (RID), 102-103
remote access, 6-7
Remote Access Services. See RAS
remote attacks, 235-261
remote control
back doors. See back doors
lockouts and, 153
UNIX, 213-261
VNC tool, 188-190
Windows family, 176-190
Remote Procedure Call. See RPC
Remotely Possible program, 484
removable media devices, 210
remove program, 282
Reskit (Resource Kit), 94
resources. See also web sites
adware, 628-629
encryption, 438
log files, 292
rootkits, 290
software development, 533-534
source code, 533-534
spam, 628-629
spyware, 628-629
viruses, 634-635
Windows Server 2003, 209
wireless technology, 458-460
worms, 634-635
RestrictAnonymous setting
blocking null sessions, 107-108
enumeration countermeasures, 106-111
Windows XP/2003, 110-111
Restricted Sites zone, 591, 604-605
resumes, online, 15-18
reverse DNS lookups, 355, 358, 392
Reverse Path Forwarding (RPF), 500
reverse telnet, 233-235
RFC 793, 53, 69-70
RFC 826, 369
RFC 959, 58
RFC 1323, 70
RFC 1519, 57
RFC 1812, 70
RFC 1918, 42
RFC 2109, 580
RFC 2196, 18
RFC 2328, 398
RFC 2644, 500-501
RID (relative identifier), 102-103
RIP (Routing Information Protocol), 394-396, 501
RIP spoofing, 394-396
RIPE organization, 21
RIRs (Regional Internet Registries), 20-21, 28-29
Ritchie, Dennis, 212
RKDetect tool, 644-645
rkill.exe utility, 195
rlogin program, 236
rmtshare tool, 98
Robert Morris Worm, 219
robocopy tool, 171
Roesch, Marty, 39
Rolm PhoneMail system, 327-328
root, UNIX
access to, 212-213
exploiting, 276-290
hacking, 211-292
local access, 261-276
remote access, 213-261
running web servers as, 57-58
root.exe file, 193
rootkits
described, 634
Hacker Defender, 639-640
kernel rootkits, 285-289
Linux, 285-289
overview, 636-639
resources, 290
rootkit recovery, 289-290
UNIX, 277
Windows, 199, 636-640
RotoRouter program, 40
route tracing, 467-468
route-views, 116-117
routers
ACLs and, 481, 505
Ascend, 361
Bay, 361
BGP, 116-118, 399-400
border, 466
Cisco. See Cisco routers
cleanup rules, 467
DNS security, 36
flooding, 379
identifying, 360
AS lookups, 356-358
OSPF and, 398
RIP, 394-396
spoofing, 379-380
TFTP and, 392-393
viewing, 354-355
Routing and Remote Access Service (RRAS), 203
Routing Information Protocol. See RIP
routing protocols, 393-404
RPC (Remote Procedure Call)
enumeration, 91-92, 128-129
OSF RPC protocol, 161
patches, 240-241
Secure RPC, 240
UNIX, 238-241
Windows systems, 91-92
RPC applications, 163
RPC clients , 163
RPC over HTTP, 92
RPC portmappers, 128-129
RPC scans , 53
RPC servers, 163
RPC services, 238-241
rpcbind program, 128-129, 134
rpc.cmsd services, 239
rpcdump tool, 92, 128
rpcinfo tool, 128-129
RPCSS (RPS service), 163
rpc.statd service, 239
rpc.ttdbserverd services, 239
RPF (Reverse Path Forwarding), 500
RPM (RedHat Package Manager), 278
rprobe utility, 394
RRAS (Routing and Remote Access Service), 203
RST packets, 53, 57
RTCP (Real-time Transport Control Protocol), 340
RTP (Real-time Transport Protocol), 340
RTP packets, 340-341
Rudnyi, Evgenii, 102
rulesets, 53
runas command, 203-204
rusers program, 130
Russinovich, Mark, 102
rwho program, 130


Hacking Exposed
Hacking Exposed 5th Edition
ISBN: B0018SYWW0
EAN: N/A
Year: 2003
Pages: 127

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net