Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 1: Footprinting
Table 1-1: Environments and the Critical Information Attackers Can Identify
Table 1-2: WHOIS Searching Techniques and Data Sources
Chapter 2: Scanning
Table 2-1: UNIX Host-Based Ping-Detection Tools
Table 2-2: Popular Scanning Tools and Features
Chapter 3: Enumeration
Table 3-1: Common NetBIOS Service Codes
Table 3-2: Anonymous Access Settings on Windows XP/Server 2003 and Windows 2000
Table 3-3: Permissions on Active Directory User and Group Objects for the Pre-Windows 2000 Compatible Access Group
Chapter 4: Hacking Windows
Table 4-1: High Probability Username/Password Combinations
Table 4-2: Selected Windows Intrusion Detection/Prevention Tools
Chapter 5: Hacking UNIX
Table 5-1: Freeware Tools That Help Protect Against Brute-force Attacks
Table 5-2: Popular, Freely Available UNIX Sniffer Software
Table 5-3: Unix Security Resources
Chapter 6: Remote Connectivity and VoIP Hacking
Table 6-1: Test Voicemail Passwords
Chapter 7: Network Devices
Table 7-1: Commonly Used Listening Ports
Chapter 8: Wireless Hacking
Table 8-1: Decibel-to-Volts-to-Watts Conversion Table
Chapter 11: Hacking Code
Table 11-1: The Different Types of Overlong UTF-8 Characters Possible for / and \
Table 11-2: Tools for Assessing and Improving Code Security
Chapter 12: Web Hacking
Table 12-1: Pros and Cons of Nikto
Table 12-2: Pros and Cons of Whisker 2.0
Table 12-3: Common XSS Payloads
Chapter 13: Hacking the Internet User
Table 13-1: Recommended Internet Zone Security Settings (Custom Level Settings Made after Setting Default to High)
Table 13-2: Microsoft ActiveX Controls That Ship with Windows That Should Have the Kill Bit Set
Previous page
Table of content
Next page
Hacking Exposed 5th Edition
ISBN: B0018SYWW0
EAN: N/A
Year: 2003
Pages: 127
Authors:
Stuart McClure
,
Joel Scambray
,
George Kurtz
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 1.1 Install OpenSSH to Replace the Remote Access Protocols with Encrypted Versions
Step 2.1 Use the OpenSSH Tool Suite to Replace Clear-Text Programs
Step 4.4 How to Generate a Key Using PuTTY
Step 4.7 Using Public Key Authentication for Automated File Transfers
Conclusion
Strategies for Information Technology Governance
Structures, Processes and Relational Mechanisms for IT Governance
An Emerging Strategy for E-Business IT Governance
Linking the IT Balanced Scorecard to the Business Objectives at a Major Canadian Financial Group
Measuring and Managing E-Business Initiatives Through the Balanced Scorecard
Governance Structures for IT in the Health Care Industry
Software Configuration Management
A Practical Approach to Configuration Verification and Audit
Appendix I System Service Request
Appendix L Software Requirements Changes
Appendix P Project Statement of Work
Appendix U Acronyms and Glossary
A Practitioners Guide to Software Test Design
Case Studies
State-Transition Testing
Domain Analysis Testing
Data Flow Testing
Scripted Testing
An Introduction to Design Patterns in C++ with Qt 4
const Member Functions
Run-Time Type Identification (RTTI)
Functions with Variable-Length Argument Lists
Visitor: Generating Playlists
Section C.3. Debugging
Understanding Digital Signal Processing (2nd Edition)
UNDERSTANDING THE DFT EQUATION
OPTIMIZED IIR FILTER DESIGN METHOD
REFERENCES
SIMPLIFIED FIR FILTER STRUCTURE
DUAL-MODE AVERAGING
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies