Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] Hacker Emergency Response Team (HERT) handlers, non-returning signal handlers, signals 2nd handles, Windows NT objects handling signals strings, C programming language hard links UNIX files 2nd Windows NT files hardware device drivers Hart, Johnson M. hash functions hash payloads, ISAKMP (Internet Security Association and Key Management Protocol) hash tables, auditing 2nd hash-based message authentication code (HMAC) hashing algorithms headers DNS (Domain Name System) HTTP (Hypertext Transport Protocol) fields parsing IP (Internet Protocol), validation ISAKMP (Internet Security Association and Key Management Protocol) certificate payloads delete payloads hash payloads identification payloads key exchange payloads 2nd nonce payloads notification payloads proposal payloads security association payloads signature payloads transform payloads vendor ID payloads TCP headers validation UDP headers, validation headers (HTTP), Referer heap hardening heap overflows, buffer overflows heap protection, operational vulnerabilities, preventing Henriksen, Inge HERT (Hacker Emergency Response Team) Hex-encoded Pathname Vulnerability listing (8-27) hexadecimal encoding, pathnames, vunerabilities hidden fields, auditing high-level attack vectors, OpenSSH, code auditing HKEY_CLASSES_ROOT key HMAC (hash-based message authentication code) Hoglund, Greg /home directory (UNIX) home directories, UNIX users HOME environment variable (UNIX) homographic attacks Unicode Host header field (HTTP) host-based firewalls host-based IDSs (intrusion detection systems) host-based IPSs (intrusion prevention systems) host-based measures, operational vulnerabilities antimnalware applications change monitoring choot jails enhanced kernel protections file system persmissions host-based firewalls host-based IDSs (intrusion detection systems) host-based IPSs (intrusion prevention systems) object system persmissions restricted accounts system virtualization How to Survive a Robot Uprising Howard, Michael 2nd 3rd HPUX HTML (Hypertext Markup Language) encoding HTTP (Hypertext Transport Protocol) 2nd 3rd authentication 2nd cookies embedded path information forms headers fields parsing methods CONNECT DELETE GET 2nd OPTIONS parameter encoding POST PUT SPACEJUMP TEXTSEARCH TRACE WebDAV (Web Distributed Authoring and Versioning) methods overview of posting data query strings requests 2nd resource access responses sessions 2nd security vulnerabilities session management session tokens state maintenance client IP addresses cookies embedding state in HTML and URLs HTTP authentication 2nd Referer request headers sessions 2nd 3rd utility functions versions HTTP request methods hybrid approach, application review Hypertext Markup Language (HTML) [See HTML (Hypertext Markup Language).] Hypertext Transfer Protocol (HTTP) [See HTTP (Hypertext Transport Protocol).] hypothesis testing, DG (design generalization) strategy |