P



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

packet sniffers
packet subsystem, SSH server, code audits
packet-filtering firewalls
     proxy firewalls, compared
     stateful firewalls
         directionality
         fragmentation
         stateful inspection firewalls
         TCP (Transport Control Protocol)
         UDP (User Datagram Protocol)
     stateless firewalls
         fragmentation
         FTP (File Transfer Protocol)
         TCP (Transmission Control Protocol)
         UDP (User Datagram Protocol)
packets
     DNS (Domain Name System)
     encapsulation
     IP packets
     packet sniffers
     source routing
     TCP packets, scanning
padding bits, unsigned integer types
page flow
Paget, Chris
parameterized queries
parameters, transmitting to Web applications
     embedded path information
     forms
     GET method 2nd
     parameter encoding
     POST method
     query strings
parent directories, UNIX
parent functions, vunerabilities
parroted request variables
parse_rrecord( ) function
parsing HTTP headers
passive FTP
password files, UNIX
PATH environment variable (UNIX)
path information (HTTP)
path metacharcters
     file canonicalization
     Windows registry
path traversal
PATH_INFO environment variable 2nd
PATH_TRANSLATED environment variable
pathnames
     hexadecimal encoding
     UNIX
pathological code paths
pathological fragment sets, IP (Internet Protocol)
paths
     files, UNIX
     path traversal
Payloads, ISAKMP (Internet Security Association and Key Management Protocol)
     certificate payloads
     certificate request payloads
     delete payloads
     hash payloads
     identification payloads
     key exchange payloads 2nd
     nonce payloads
     notification payloads
     proposal payloads
     SA (security association) payloads
     signature payloads
     transform payloads
     vendor ID payloads
PCI (Payment Card Industry) 1.0 Data Security Requirement
peer reviews, application review
PER (Packed Encoding Rules), ASN.1 (Abstract Syntax Notation)
Perl
     cross-site scripting
     file access
     file inclusion
     inline evaluation
     open( ) function
     shell invocation
     SQL injection queries
     taint mode
permission bitmasks
permissions
     DCOM (Distributed Component Object Model), subsystem access permissions
     Directories, UNIX
     file access, Windows NT 2nd
     file systems
     files, UNIX
     mailsots
     object systems
     registry keys, Windows NT
     UNIX files, race conditions
     Windows NT pipes
personal user files, UNIX
phishing
PHP (PHP Hypertext Preprocessor) 2nd
     configuration settings
     cross-site scripting
     file access
     file inclusion
     inline evaluation
     shell invocation 2nd
     SQL injection queries
php_error_docref( ) function
phrack magazine
physical layer, network segmentation
PIDs (process IDs), UNIX
pipe squatting, Windows NT
pipe( ) system call
pipes
     UNIX, 612, named pipes
    Windows NT
         anonymous pipes
         creating
         impersonation
         IPC (interprocess communications)
         named pipes
         permissions
         pipe squatting
PKI (Public Key Infrastructure)
point-of-sale (PoS) system
Pointer Arithmetic Vulnerability Example listing (6-29)
pointer updates, lists, errors
pointers
     arithmetic
     C programming language
     EBP (extended base pointer)
     ESP (extended stack pointer)
     function pointers, obfuscation
     outdated pointers 2nd
         ProFTPD
     text strings, incrementing incorrectly
     vunerabilities
Pol, Joost
policies (security)
     access control policy
     breaches
     enforcing
pop( ) function
popen( ) function 2nd
Portable Operating System Interface for UNIX (POSIX)
PoS (point-of-sale) system
positive decimal integers, binary notation, converting to
positive numbers, decimal conversion from binary notation
POSIX (Portable Operating System Interface for UNIX) 2nd
     signals, handling
POST method
Postincrement Loop Vulnerability listing (7-21)
posting data, HTTP (Hypertext Transfer Protocol) 2nd 3rd
posttest loops, pretest loops, compared
Practical Cryptography
Pragma header field (HTTP)
preassessment phase, code review
     application access
     information collection
     scoping
precedence, C programming language
precision, integer types
predefined registry keys, Windows NT
prepared statements
preprocessors, C programming language
Prescan Sign Extension Vulnerability in Sendmail listing (6-13)
prescan( ) function 2nd
presentation layer, network segmentation
presentation logic
preshared keys (PSKs), discovery of
Pretest Loop Vulnerability listing (7-22)
pretest loops, posttest loops, compared
primary groups, UNIX
printf( ) function 2nd
Privilege Misuse in XFree86 SVGA Server listing (9-1)
privilege separation, SSH server, code audits
privileges
     UNIX
         capabilities
         directory permissions
         dropping permanently 2nd
         dropping temporarily
         extensions
         file IDs
         file permissions
         file security
         files
         group ID functions
         management code audits
         programs
         user ID functions
         vunerabilities
     Windows NT sessions, access tokens
     XF86_SVGA servers, misuse of
problem domain logic
Problems with 64-bit Systems listing (7-42)
proc file system (UNIX)
procedures, stored
Process Explorer
process memory layout, buffer overflows
process outline, code review
process_file( ) function
process_login( ) function
process_string( ) function
process_tcp_packet( ) function
process_token_string( ) function
processes
     multiple process, shared memory
     process synchronization
         interprocess synchronization
         lock matching
         synchronization object scoreboard
         System V synchronization
         Windows NT
     signals
         asynchronous-safe function 2nd 3rd
         default actions
         handling
         interruptions 2nd
         jump locations
         non-returning signal handlers 2nd
         repetition
         sending
         signal handler scoreboard
         signal masks
         vunerabilities 2nd
     UNIX 2nd
         attributes
         child processes
         children
         creating
         environment arrays
         fork( ) system call
         groups
         interprocess communication
         open( ) function
         program invocation
         RPCs (Remote Procedure Calls
         sessions
         system file table
         terminals
         termination
     Windows NT
         DLL loading
         IPC (interprocess communications)
         loading
         services
         ShellExecute( ) function
         ShellExecuteEx( ) function
processing
     IP fragmentation
     TCP (Transmission Control Protocol)
         options
         sequence number boundary condition
         sequence number representation
         state processing
         URG pointer processing
         window scale option
processJob( )
processNetwork( ) function
processThread( ) function
profiling source code
ProFTPD, outdated pointers
program configuration files, UNIX
program files, UNIX
program invocation, UNIX
     direct invocation
     indirect invocation
programmatic SSI
programming interfaces, Windows NT, security descriptors
programming languages
     C
         arithmetic boundary conditions
         binary encoding
         bit fields
         bitwise shift operators
         byte order
         character types
         data storage
         floating types
         format strings
         function invocations
         implementation definied behavior
         integer types
         macros
         objects
         operators
         order of evaluation
         pointers
         precedence
         preprocessor
         signed integer boundaries
         standards
         stdio file interface
         structure padding
         switch statements
         type conversion vunerabilities
         type conversions
         types
         typos
         unary + operator
         unary - operator
         unary operator
         undefinied behavior
         unsigned integer boundaries
     Perl, open( ) function
Programming Windows Security
programs, UNIX, privileged programs
promotions, integers
PROPFIND method
ProPolice, stack cookies
proposal payloads, ISAKMP (Internet Security Association and Key Management Protocol)
PROPPATCH method
proprietary state mechanisms, RPCs (Remote Procedure Calls)
protocol quirks
protocol state
protocols
     application protocols
         ASN.1 (Abstract Syntax Notation)
         auditing 2nd
         DNS (Domain Name System) 2nd 3rd
         HTTP (Hypertext Transfer Protocol) 2nd 3rd 4th
         ISAKMP (Internet Security Association and Key Management Protocol) 2nd
     binary protocols, data type matching 2nd
     FTP (File Transfer Protocol)
     HTTP (Hypertext Transport Protocol)
         authentication 2nd
         cookies
         embedded path information
         forms
         headers
         methods 2nd
         overview of
         parameter encoding
         query strings
         requests
         responses
         sessions 2nd
         state maintenance
         versions
     network protocols
         IP (Internet Protocol)
         TCP (Transmission Control Protocol)
         TCP/IP
         UDP (User Datagram Protocol)
     REST (Representational State Transfer)
     SOAP (Simple Object Access Protocol)
     SSL/TLS (Secure Sockets Layer/Transport Layer Security)
     text-based protocols, data type matching
proxies, COM (Component Object Model)
proxy firewalls
     packet-filtering firewalls, compared
Proxy-Authorization header field (HTTP)
pseudo-objects, Windows NT
PSKs (preshared keys), discovery of
PThreads API
     condition variables
     mutexes
public directories, UNIX
Public header field (HTTP)
public key encryption
Public Key Infrastructure (PKI)
public-facing administrative interfaces, Web-based applications
punctuation errors, loops
punycode
Purczynski, Wojciech
push( ) function
PUT method
putenv( ) function 2nd
pw_lock( ) function




The Art of Software Security Assessment. Identifying and Preventing Software Vulnerabilities
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
ISBN: 0321444426
EAN: 2147483647
Year: 2004
Pages: 194

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net