Flylib.com
List of Tables
Previous page
Table of content
Next page
List of Examples
Honeypots for Windows
by Roger A. Grimes
Apress
2005
Chapter 2: A Honeypot Deployment Plan
Example 2.1: Example Route Print Output
Chapter 3: Windows Honeypot Modeling
Example 3.1: Nbtstat -n Output
Example 3.2: Microsoft FTP Service Login Banner
Example 3.3: Telnet Server Logon Banner Text
Example 3.4: Using Netcat to Retrieve IIS HTTP Headers
Example 3.5: IIS Virtual SMTP Server Banner Text
Example 3.6: Banner Text Received from Various Exchange Server Services
Chapter 4: Windows Honeypot Deployment
Example 4.1: Windows Auto-Run Areas
Chapter 5: Honeyd Installation
Example 5.1: Nmap Entry for Windows 2000 Server with Service Pack 2
Example 5.2: Honeyd.log File Entries
Chapter 6: Honeyd Configuration
Example 6.1: Sample Honeyd.bat File
Example 6.2: A Honeyd.bat Configuration File with Multiple Runtime Configurations
Example 6.3: Sample Honeyd Exchange Server Template
Example 6.4: Sample Honeyd Configuration File
Chapter 7: Honeyd Service Scripts
Example 7.1: Source Code of Test.sh
Example 7.2: Modified Test.sh
Example 7.3: Source Code of Router-telnet.pl
Example 7.4: Source Code of Web.sh
Example 7.5: Script Used to Clean MSBlaster Worm from Originating Hosts
Example 7.6: Ms-ftp.sh Script File Mimicking a Microsoft FTP Server
Previous page
Table of content
Next page
Honeypots for Windows (Books for Professionals by Professionals)
ISBN: 1590593359
EAN: 2147483647
Year: 2006
Pages: 119
Authors:
Roger A. Grimes
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Introduction
ORM Constraints
Reverse Engineering and Importing to ORM
Conceptual Model Reports
Other Features and Best Practices
C & Data Structures (Charles River Media Computer Engineering)
Introduction to the C Language
Control Structures
The scanf Function
Function
Storage of Variables
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
IDS and IPS Internals
Internet Security Systems RealSecure
Snort
NFR Security
Laws, Standards, and Organizations
Special Edition Using Crystal Reports 10
Using Multiple Report Sections
Crystal Reports Semantic Layer Business Views
Understanding the Core Functions of Crystal Enterprise
Deploying Crystal Enterprise in a Complex Network Environment
Configuring the Crystal Enterprise Architecture for Your Network Environment
Comparing, Designing, and Deploying VPNs
Ensuring High Availability in an IPsec VPN
Designing and Building SSL Remote Access VPNs (WebVPN)
Review Questions
Python Programming for the Absolute Beginner, 3rd Edition
File Tools
Things to Do When Visiting Chicago
Part IV: Assorted Topics
Doing the Right Thing
Section B.2. Book Examples Distribution
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies