C

cable locks, 647
cached web sites, 13-14
CacheDump, 185-186
caching attack, 575, 611
call spoofing, 340
Caller ID (CLID), 298, 340
canonicalization attacks, 519-522, 539-540, 597-598
CAR (Committed Access Rate), 501
Carbonite kernel module, 288
carrier exploitation, 311-313
Carrier Sense Multiple Access/Collision Detection (CSMA/CD), 368
carriers , 294
CBAC (Context Based Access Control), 501
CCNSO (Country Code Domain Name Supporting Organization), 19-20, 22-23
cd00r rootkit, 638
CDE (common desktop environment), 239
CDP (Cisco Discovery Protocol), 379-380, 418
CERT (Computer Emergency Response Team), 213, 250, 253, 505
CERT Advisory, 502
CERT Intruder Detection Checklist, 292
CGI (Common Gateway Interface), 225-226, 543-544
CGI scripts, 225-226, 543-544
Check Point firewalls, 465, 472, 477-479
Check Point NG, 465
Check Promiscuous Mode (cpm), 281
cheops utility, 75-76
.chm extension, 586, 589
CIDR (Classless Inter-Domain Routing) block notation, 57
CIFS (Common Internet File System), 107, 140
CIS (COM Internet Services), 163
Cisco ACLs, 472, 479-480
Cisco card drivers, 410
Cisco config files, 388-390
Cisco Config Viewer, 388-389, 391
Cisco Decryptor, 391-392
Cisco devices
banners, 362, 364-365
encryption, 390-392
passwords, 389-392
SNMP requests , 387-390
syslog logging, 390
VLANs and, 378
Cisco Discovery Protocol (CDP), 379-380, 418
Cisco finger service, 364-365
Cisco Guard product, 499, 505
Cisco IOS
banner grabbing , 364-365
DoS attacks and, 500-501
enumerating, 364-365
firewalls and, 475, 477
OS identification and, 364
spoofed BGP packets, 400-403
cisco-nsp newsgroup, 403
Cisco routers
denial of service attacks and, 501
encryption, 390-392
passwords, 387-392
ports, 360-361, 364-365
restricting packets, 355
spoofing, 379-380
tracerouting and, 355, 357
Cisco Security Agent, 157
Cisco switches, 361, 368
Cisco XRemote service, 361, 365
class ID (CLSID), 575
Classless Inter-Domain Routing (CIDR) block notation, 57
cleartext passwords
cracking, 178, 185
dsniff and, 383-386
RIP and, 394
CLID (Caller ID), 298, 340
Client32 connections, 124
clients
connections, 124
DDoS, 495-497
FTP, 80-81
Internet. See Internet clients
JiGLE, 424-425
LDAP, 118
SBM, 133
web, 564-566
WHOIS, 31
CLSID (class ID), 575
CLSID parameter, 610-611
cmd.exe file, 193
cmd.exe shell, 171, 186-187, 193, 199
CNAME entry, 506
code. See also web applications
ASP, 538-541
attack countermeasures, 522-534
auditing, 530-531
Authenticode, 575-576
buffer overflows, 512-518
bugs , 524, 526-527, 531
common countermeasures, 523-534
common exploits, 512-522
design flaws, 512-518
development team and, 525
hacking, 511-534
HTML. See HTML code
input validation libraries, 532-533
JSP, 539
managed execution environments, 532
PHP, 543
resources, 533-534
review of, 526-531
"safe for scripting" issue, 576-577
Security Development Lifecycle, 524-532
security liaison and, 525, 530
sensitive data in, 170-171
source code disclosure, 539
SSI, 571-572
testing, 528-530
threat modeling, 525-526, 534
code checklists, 526-528
Code Red worm, 536, 543
CodeAssure tool, 527
codebrws.asp, 538-539
CodeSurfer tool, 514
ColdFusion, 538
COM Internet Services (CIS), 163
Committed Access Rate (CAR), 501
common desktop environment (CDE), 239
Common Gateway Interface. See CGI
Common Internet File System (CIFS), 107, 140
companies
annual reports , 12
archived information, 13-14
cached information about, 13-14
contact names , 11, 30
current events, 11-12
disgruntled employees , 14
e-mail addresses, 11, 15, 30
employees. See employees
financial information, 12
footprinting and. See footprinting
location details, 10-11
morale , 11-12
phone numbers , 9, 11, 31-32
related organizations, 10
remote access via browser, 9
security policies, 12
VPN access, 9
web sites, 9
computer crime, 289
Computer Emergency Response Team. See CERT
connections
anonymous, 96-111
client, 124
HTTP, 554-555
HTTPS, 554-555
Internet. See Internet
IPSec, 202-203
laundered, 641
modem, 313
Novell Client32, 124
rogue, 195-196
SSL, 88-90, 556
Context Based Access Control (CBAC), 501
ControlIT program, 484
cookies
countermeasures, 580-581
displaying, 565
editing, 553-554
emailing, 565
grabbing, 551-553
hijacking, 580-581
per session, 580
persistent, 580
SYN, 499, 502
WebProxy tool, 553-554
WebSleuth, 551-553
XSS attacks, 564-566
Cooper, Russ, 594
core files, 270
Courtney program, 49
cp utility, 198, 200
cpm (Check Promiscuous Mode), 281
Crack program, 263-264
cracking passwords. See password cracking
cracklib tool, 217
credit histories, 11
crime, computer, 289
criminal records, 11
cross-domain access, 618
cross-frame/domain vulnerabilities, 582-583
cross-site scripting. See XSS
cross-zone exploit, 595-597
Cryptographic Challenges, 339
cryptographic hashes, 646
CSMA/CD (Carrier Sense Multiple Access/Collision Detection), 368
Cuartango, Juan Carlos Garcia, 589
Cult of the Dead Cow, 84, 105, 577
CyberCop Scanner tool, 147
Cyberpunk, Johnny, 166


Hacking Exposed
Hacking Exposed 5th Edition
ISBN: B0018SYWW0
EAN: N/A
Year: 2003
Pages: 127

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net