List of Tables

 < Day Day Up > 



Chapter 4: Port Scanners

Table 4-1: TCP Flag Definitions
Table 4-2: Nmap Timing Options and Policies

Chapter 6: Windows Enumeration Tools

Table 6-1: Net Command-Line Arguments
Table 6-2: Common NetBIOS Codes

Chapter 7: Web Hacking Tools

Table 7-1: Basic Nikto Command-Line Options
Table 7-2: Additional Nikto Command-Line Options
Table 7-3: Useful Web-Oriented Curl Options
Table 7-4: Additional stunnel.conf Directives

Chapter 9: Host Hardening

Table 9-1: Select /usr/share/msec/perm.n File Entries
Table 9-2: Select /usr/share/msec/level.n File Entries
Table 9-3: Some /etc/security/msec/security.conf Settings

Chapter 11: Simple Source Auditing Tools

Table 11-1: Flawfinder Command-Line Options

Chapter 12: Combination System Auditing Tools

Table 12-1: Nessus Categories of Vulnerabilities
Table 12-2: Tripwire Property Masks
Table 12-3: Tripwire Predefined Property Mask Variables
Table 12-4: Tripwire Rule Attributes
Table 12-5: Additional Tripwire Property Masks for NTFS and NTREG Sections
Table 12-6: Tripwire Predefined Property Mask Variables for NTFS and NTREG Sections

Chapter 13: Firewalls

Table 13-1: Ipchains Chain and Rule Manipulation Commands
Table 13-2: Ipchains Command-Line Flags for Defining Packet Matching Rules
Table 13-3: Iptables Command-Line Flags for Defining Packet Matching Rules
Table 13-4: IPFW Command-Line Options
Table 13-5: IPFW Commands
Table 13-6: IPFW Rule Actions
Table 13-7: IPFW Rule Options

Chapter 14: Network Reconnaissance Tools

Table 14-1: Common Ping Command-Line Options
Table 14-2: Common Traceroute Command-Line Options
Table 14-3: Traceroute ICMP Flag Message Interpretation

Chapter 16: Sniffers

Table 16-1: Other Tcpdump Qualifiers
Table 16-2: Tcpdump Command-Line Options
Table 16-3: Decimal Numbers and Binary Representations
Table 16-4: Snort Rule Options
Table 16-5: Snort Preprocessors
Table 16-6: Snort Output Modules

Chapter 17: Wireless Tools

Table 17-1: NetStumbler Filters
Table 17-2: /usr/local/etc/kismet.conf Options That Should Be Modified
Table 17-3: More kismet.conf Settings
Table 17-4: Important kismet_ui.conf Settings
Table 17-5: gpsd Command-Line Options

Chapter 18: War Dialers

Table 18-1: Important ToneLoc Screen Commands
Table 18-2: THC-Scan Description Shortcut Keys
Table 18-3: THC-Scan Command Shortcut Keys

Chapter 19: TCP/IP Stack Tools

Table 19-1: isic Tool Test Scenarios
Table 19-2: Common Test Scenarios
Table 19-3: Iptest Options and Their Point Tests

Chapter 24: Tools to Aid in Internet Activity Reconstruction

Table 24-1: Summary of Mail Storage Locations for Outlook Express
Table 24-2: Locations of History Files

Chapter 25: Generalized Editors and Viewers

Table 25-1: Often Used Key Commands



 < Day Day Up > 



Anti-Hacker Tool Kit
Anti-Hacker Tool Kit, Third Edition
ISBN: 0072262877
EAN: 2147483647
Year: 2004
Pages: 189

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net