E



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

EBP (extended base pointer)
edit( ) function
EDITOR environment variable (UNIX)
effective groups, UNIX 2nd
effective users, UNIX 2nd
EH (exception handling)
Einstein, Albert
elements, lists, duplicate elements
Embedded Delimiter Example listing (8-8)
embedded delimiters, metacharacters
embedded path information (HTTP)
embedding state in HTML and URLs
Empty List Vulnerabilities listing (7-12)
empty lists, vunerabilities
encapsulation, packets
EncodePointer( ) function
EncodeSystemPointer( ) function
encoding
     entities
     HTML encoding
     multiple encoding layers
     parameters
     UTF-16 encoding
     UTF-8 encoding
     XML encoding
encryption 2nd
     algorithms
     asymmetric encryption
     block ciphers
     common vunerabilities
     Digital Encryption Standard (DES) encryption
     ISAKMP (Internet Security Association and Key Management Protocol), vunerabilities
     IV (initialization vector)
     key exchange algorithms
     stream ciphers
     symmetric encryption
end user license agreements (EULAs)
endpoint mappers
endpoints, RPC servers, binding to
enforcing policies
enhanced kernel protections
enterprise firewalls, layer 7 inspection
entities (encoded data)
entries, UNIX directories
entry points
ENV environment variable (UNIX)
environment arrays, UNIX file descriptors
environment strings, Linux
environment subsystems
environment variables
     PATH_INFO
     UNIX
environmental attacks
equality operators
err( ) function
error checking branches, code paths
error domains
error messages, overly verbose error messages, Web-based applications
errors
     lists, pointer updates
     loops
escape_sql( ) function
escaping metacharacters
ESP (extended stack pointer)
Esser, Stefan
establishing TCP connections
ETag header field (HTTP)
/etc directory (UNIX)
EULAs (end user license agreements)
eval( ) function
     Perl
     PHP
evasion, metacharacter evasion
event objects, Windows NT
Example of Bad Counting with Structure Padding listing (6-34)
Example of Dangerous Program Use listing (8-19)
Example of Structure Padding Double Free listing (6-33)
exception handling (EH), C++
exceptional conditions
execl( ) function
Execute( ) function, ASP
execve( ) function 2nd 3rd 4th
ExpandEnvironmentStrings( ) function
Expect header field (HTTP)
expectations, security
Expert C Programming
Expires header field (HTTP)
explicit allow filters (white lists), metacharacters
explicit deny filters (black lists), metacharacters
explicit type conversions
Exploiting Software
exploiting transitive trusts
export function tables
extended base pointer (EBP)
extended stack pointer (ESP)
Extensible Stylesheet Language Transformations (XSLT) 2nd
extensions, UNIX privileges
external application invocation, OpenSSH
external entities
external flow sensitivity, code navigation
external trust levels
external trusted sources, spoofing attacks, firewalls
extraneaous dilimiters
extraneous filename characters, Windows NT
extraneous input thinning, test cases, code audits




The Art of Software Security Assessment. Identifying and Preventing Software Vulnerabilities
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
ISBN: 0321444426
EAN: 2147483647
Year: 2004
Pages: 194

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net