Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 3: Virtual Machines & Emulators
Figure 3-1: VMware welcome screen
Figure 3-2: VMware network options
Figure 3-3: Virtual disk management options
Figure 3-4: VMware virtual machine fully configured
Figure 3-5: Virtual PC configuration wizard
Figure 3-6: Virtual PC device management
Figure 3-7: Using a floppy image with Virtual PC
Figure 3-8: Gnoppix welcome screen
Figure 3-9: Cygwin setup
Figure 3-10: Cygwin setup full view
Chapter 4: Port Scanners
Figure 4-1: NmapFE on X Window System
Figure 4-2: NmapFE on Mac OS X
Figure 4-3: WUPS port scanner in action
Chapter 6: Windows Enumeration Tools
Figure 6-1: Winfingerprint default settings
Figure 6-2: Winfingerprint scan
Figure 6-3: GUI interface
Figure 6-4: Example output
Chapter 7: Web Hacking Tools
Figure 7-1: Paros tracks the directory structure of each web site.
Figure 7-2: Apply filters to save specific data.
Figure 7-3: Enable specific vulnerability scans .
Figure 7-4: View the vulnerability alerts from a scan.
Figure 7-5: Trap and modify a URL request.
Figure 7-6: Trap the HTTP Headers and Body of a request.
Figure 7-7: Configure advanced options.
Figure 7-8: Launch Burp Proxy.
Figure 7-9: Configure intercept options.
Figure 7-10: Capture and modify a browser request.
Figure 7-11: Examine the server's response.
Chapter 10: Backdoors and Remote Access Tools
Figure 10-1: A victim machine listening
Figure 10-2: Use File/Directory to access files on the victim machine.
Figure 10-3: Sub7 opening screen
Figure 10-4: Managing files, Windows, and processes from the Miscellaneous folder
Figure 10-5: Having fun with the Fun Manager and Extra Fun folders
Figure 10-6: Loki and traffic captured with Ethereal
Figure 10-7: Stcpshell and traffic captured by Ethereal
Chapter 12: Combination System Auditing Tools
Figure 12-1: Nessus client authentication schemes
Figure 12-2: Nessus Plugin selection
Figure 12-3: Detail information about a single check
Figure 12-4: Prevent Nessus from executing potentially dangerous checks.
Figure 12-5: Customize scan behavior.
Figure 12-6: Nessus Report window
Figure 12-7: Configure Cain's sniffing features.
Figure 12-8: Sniffing password hashes with Cain
Figure 12-9: Enumerate listening services with Cain.
Figure 12-10: Manage multiple agents .
Figure 12-11: Modify policies.
Figure 12-12: Schedule checks.
Chapter 13: Firewalls
Figure 13-1: Setting up outgoing filters
Figure 13-2: Setting up port forwards
Figure 13-3: SonicWALL Access List
Figure 13-4: SonicWALL One-to-One NAT
Chapter 14: Network Reconnaissance Tools
Figure 14-1: Traceroute diagram
Chapter 16: Sniffers
Figure 16-1: View network traffic with Ethereal.
Figure 16-2: Create a display filter.
Figure 16-3: Following a TCP stream
Figure 16-4: Time/sequence number graph
Figure 16-5: Throughput graph
Figure 16-6: The Summary dialog box
Figure 16-7: SSH session details
Figure 16-8: View local hosts .
Figure 16-9: Find active network connections.
Figure 16-10: Extracting specific values with filters
Figure 16-11: Attacking active connections
Figure 16-12: More ettercap capabilities
Chapter 17: Wireless Tools
Figure 17-1: Detecting wireless networks
Figure 17-2: Select a wireless adapter.
Figure 17-3: Capture wireless traffic.
Figure 17-4: Wellenreiter in action
Figure 17-5: Linux kismet_client
Figure 17-6: OS X kismet client
Figure 17-7: Press
i
on a highlighted SSID to view network information.
Figure 17-8: Press
i
on a highlighted network to view client information.
Chapter 18: War Dialers
Figure 18-1: ToneLoc's configuration utility, tlcfg.exe
Figure 18-2: ToneLoc custom file locations
Figure 18-3: Modem commands
Figure 18-4: Modem options
Figure 18-5: ScanOptions menu options
Figure 18-6: ToneLoc in action
Figure 18-7: A sample ToneMap
Figure 18-8: Configuring THC-Scan
Figure 18-9: Modem configuration options
Figure 18-10: Modem responses
Figure 18-11: Logfiles
Chapter 20: Creating a Bootable Environment and Live Response Tool Kit
Figure 20-1: The System Event Log from dumpel
Figure 20-2: The Application Event Log from dumpel
Figure 20-3: The Security Event Log from dumpel
Chapter 23: Tool Kits to Aid in Forensic Analysis
Figure 23-1: Use this screen in AccessData's Forensic Toolkit to enter specific information about your case.
Figure 23-2: The Overview tab
Figure 23-3: Click the Graphics button to see any images that exist in a document that you select.
Figure 23-4: Notice how the user of this computer was apparently reading stories about creating bombs .
Figure 23-5: The Explore tab has a Windows Explorerlike interface to browse evidence contents.
Figure 23-6: Devices are loaded and ready for the examination.
Figure 23-7: SweepCase options
Figure 23-8: Timeline view of several files on a suspect's computer
Figure 23-9: Search hit results for the word " nuclear "
Chapter 25: Generalized Editors and Viewers
Figure 25-1: The output of hexdump for suspiciousfile.bin
Figure 25-2: Frhed's suspiciousfile.bin representation
Figure 25-3: WinHex reading drive C:
Figure 25-4: Quick View's Explorer-like interface
Figure 25-5: Quick View's display pane
Figure 25-6: Quick View can display files in native format.
Figure 25-7: Quick View can display files such as hexdump.
Figure 25-8: The main screen of Midnight Commander
Figure 25-9: Midnight Commander's ability to view files
Figure 25-10: Midnight Commander can view files in hexadecimal mode.
Previous page
Table of content
Next page
Anti-Hacker Tool Kit, Third Edition
ISBN: 0072262877
EAN: 2147483647
Year: 2006
Pages: 175
Authors:
Mike Shema
,
Chris Davis
,
David Cowen
BUY ON AMAZON
High-Speed Signal Propagation[c] Advanced Black Magic
Rules of Scaling
Scaling Multimode Fiber-Optic Cables
Common-Mode Balance
FAQ: Building-Cabling Practices
The Underlying Simulation Engine
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
SWT Event Handling, Threading, and Displays
Basic SWT Widgets
Layouts
Text Controls
Creating a Text Editor with JFace Text
C++ GUI Programming with Qt 3
Signals and Slots in Depth
Input/Output
Pointer-Based Containers
QString and QVariant
Platform-Specific Features
Cisco IOS Cookbook (Cookbooks (OReilly))
Configuring the Router via TFTP
Disabling the Cisco Discovery Protocol
Floating Static Routes
Using STUN
Filtering Based on Noncontiguous Ports
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The AJAX Revolution
The Microsoft Client Library for AJAX
The Pulsing Heart of ASP.NET AJAX
Partial Page Rendering
Building AJAX Applications with ASP.NET
Quantitative Methods in Project Management
Project Value: The Source of all Quantitative Measures
Introduction to Probability and Statistics for Projects
Organizing and Estimating the Work
Risk-Adjusted Financial Management
Special Topics in Quantitative Management
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies