C

skip navigation

honeypots for windows
Index
Honeypots for Windows
by Roger A. Grimes
Apress 2005
progress indicator progress indicatorprogress indicator progress indicator

D

-d command-line parameter

displaying activity summaries in Honeyd with, 134

-d parameter

Snort command-line switch, 253–254

data analysis.

See also forensic analysis

determining if attack was manual or automated, 302–303

for honeypots, 301–336

a structured forensic approach, 304–325

data backup

needed for operating a honeypot, 12

data capture

in honeypots, 36

keystroke logging programs, 22–23

methods for honeypots, 22–23

data collection

applications for collecting and prioritizing Windows log files, 288–290

importance of centralizing, 287–290

data control

for honeypots, 21–22, 36

data correlation

tools for honeynets, 293

data filtering

importance of, 291–293

data filtering tools, 291–292

DataGrab

for checking for IM services hacker activity, 317

data-link layer

in OSI model, 228

DataRescue’s IDA Pro. See IDA Pro Disassembler and Debugger

Davis, Michael

porting of Honeyd to Windows environment by, 121

porting of Sebek from Unix to Windows by, 277

DBXpress tool

for recovering deleted e-mail files from Outlook Express databases, 315

DCF Software’s Hard Disk Copy

website address, 308

dd --list command

for listing all available storage devices and their GUIDs, 307

Dd.exe command-line tool

example of Dd commands, 307

making copies of the hard drive with, 306–307

website address, 306

Debug register command

using, 347

Debug.exe disassembler

in Windows, 318

Debug.exe program

for seeing an example of Windows 16-bit registers, 346–348

use of by malware programs after initial exploitation, 349

Deception Tool Kit (DTK)

honeypot developed by Dr. Fred Cohen, 21

Decompilation Wiki

website address for links related to decompilation, 357

decompilers

mixed results from for malicious code disassemble, 338

default delay policy

for firewalls, 51

default folder locations

rejecting for honeypot software or applications, 103

default template

creating in Honeyd, 156

defined, 134

defense-in-depth security paradigm

importance of in procting a network, 8

deleted files and formatted disks

recovering after hackers exploit a system, 315

demilitarized zone (DMZ)

defined, 5

Developer.com Windows API Tutorial

website address, 343

DiamondCS forensic utilities

website address, 283

DiamondCS’s Open Ports utility

website address, 276

DiamondCS’s Port Explorer utility

for listing active listening ports, 276

Digital Detective’s hashing tool

website address, 312

Directory Snoop

disk viewer program, 314

disassemblers

free, 356–357

importance of in malware code analysis, 353–357

disassembly

defined, 337

disassembly environment

importance of choice you make for, 360

disassembly practice

steps for code behavior analysis before disassembly, 360–361

disk viewers

programs, 313–314

using to search your entire hard drive, 313–314

disk-cloning software tools

for making copies of a hard drive, 306

shareware and commercial, 308

virtual machine options, 308–309

disk-copying tools. See disk-cloning software tools

DMZ. See demilitarized zone (DMZ)

DMZ placement

of honeypots, 57–58

DNS resolver

use of in TCP/IP communication session, 230

domain controller ports

list of common Windows 2000, 69–70

DOS Attack setting dialog box

in KFSensor honeypot, 211

DOS ATTRIB command

for locating hidden, system, and read-only files, 313

DOS DIR command

for listing all hidden files and folders, 313

Download Sites dialog box

in Cygwin Setup dialog box, 143

DPORT

memory variable useful in scripts, 171

DRA. See EFS data recovery agent

dynamic linking

function of, 342

progress indicator progress indicatorprogress indicator progress indicator


Honeypots for Windows
Honeypots for Windows (Books for Professionals by Professionals)
ISBN: 1590593359
EAN: 2147483647
Year: 2006
Pages: 119

Similar book on Amazon
Honeypots: Tracking Hackers
Honeypots: Tracking Hackers
Know Your Enemy: Learning about Security Threats (2nd Edition)
Know Your Enemy: Learning about Security Threats (2nd Edition)
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net