System Hacking

Table of contents:

  • The NetBIOS Auditing Tool (NAT) is a command-line automated password guessing tool.
  • Windows authentication protocols include

    • LM authentication Used by 95/98/ME and based on DES.
    • NTLM authentication Used by NT until service pack 3 and based on DES and MD4.
    • NTLM v2 authentication Used post NT service pack 2 and based on MD4 and MD5.
    • Kerberos Implemented in Windows 2000 and created by MIT in 1988.
  • LM passwords are considered weak. The maximum 14 character password is divided into two seven character parts; the two hashed results are concatenated and stored as the LM hash, which is stored in the SAM. Each piece can be cracked separately.
  • NTFS alternate data streams (ADS) was developed to provide for compatibility outside the Windows world with structures such as the Macintosh Hierarchical File System (HFS). It is a prime tool that can be used by hackers to hide tools. It only works with NTFS drives.

Trojans and Backdoors

Part I: Exam Preparation

The Business Aspects of Penetration Testing

The Technical Foundations of Hacking

Footprinting and Scanning

Enumeration and System Hacking

Linux and Automated Security Assessment Tools

Trojans and Backdoors

Sniffers, Session Hijacking, and Denial of Service

Web Server Hacking, Web Applications, and Database Attacks

Wireless Technologies, Security, and Attacks

IDS, Firewalls, and Honeypots

Buffer Overflows, Viruses, and Worms

Cryptographic Attacks and Defenses

Physical Security and Social Engineering

Part II: Final Review

Part III: Appendixes

Appendix A. Using the ExamGear Special Edition Software

Certified Ethical Hacker Exam Prep
Certified Ethical Hacker Exam Prep
ISBN: 0789735318
EAN: 2147483647
Year: 2007
Pages: 247
Authors: Michael Gregg © 2008-2020.
If you may any questions please contact us: