E

E e-commerce, 507, 570-571
e-mail
Active Scripting and, 580, 591
attachments. See attachments
hacking, 15, 587-591
Hotmail, 581, 620-621
HTML mail, 590
mailsnarf utility, 384-385
MIME and, 589
Outlook/Outlook Express (OE), 588, 590-591
phishing scams, 598, 623-628
plaintext, 590, 600, 610, 626-627
Postfix, 238
precautions , 612
qmail, 238
Restricted Sites zone, 591, 604-605
"safe for scripting" attacks, 576
search engines and, 15
sendmail, 83-84, 237-238
sensitive information in, 612, 622-623, 641
spam, 628-633, 641
worms. See worms
e-mail addresses
obtaining addresses for given domain, 11
obtaining from Usenet, 15
Earthlink ScamBlocker, 626-627
eBay, 621-622, 624
ECHO packets, 38, 42, 48-50, 479, 493
EDGAR database, 12
eEye Digital Security, 163, 165-166
EFS (Encrypting File System), 205-206
eggs, 219-220
EGP (Exterior Gateway Protocol), 399
egress filtering, 168, 500
ELM Log Manager, 156
elsave utility, 197-198
employees . See also users
contact names , 11, 30
disgruntled , 14
e-mail addresses, 11, 15, 30
home addresses, 11
location details, 10-11
phone numbers , 11
social engineering, 11-12, 15-16, 30
Usenet forums, 15-16
enable password command, 391
enable secret command, 392
Encase tool, 643
Encrypting File System (EFS), 205-206
encryption
Cisco devices, 390-392
Encrypting File System, 205-206
PGP (Pretty Good Privacy), 623
resources, 438
sniffers and, 280-282, 383
VoIP and, 345
XOR, 391, 447
encryption keys, 205-206
endpoint mapper, 91-92
Entercept tool, 157, 516, 643
enum tool, 104-105, 122
enumeration, 77-134
Active Directory, 118-122
BGP, 116-118
Cisco banner, 364-365
common network services, 81-133
countermeasures, 83
described, 78
DNS, 18-32
DNS zone transfers, 84-86
domain controllers, 94
domain- related searches, 24-27
domains, 93-94, 101, 104-105, 110
file shares, 97-99
finger utility, 87-88
firewalls and, 134
FTP, 79-81
HTTP, 79-80, 88-91
ICMP, 48
Linux, 86-88
named pipes and, 110
NetBIOS, 154
NetBIOS Name Service, 92-96
NetBIOS sessions, 96-111
NFS, 133
NIS, 130-131
Novell NetWare, 123-127
null sessions, 96-111, 150-151
password policies, 104-105
RPC, 91-92, 128-129
rusers program, 130
rwho program, 130
SMB, 97, 104-111, 133
SMTP, 79-80, 83-84
SNMP, 111-115, 134
SQL Resolution Service, 131-133
TFTP, 86
trusted domains, 101, 104-105, 110
UNIX, 86-88, 128-129
users, 101-105
web servers, 88-91
WHOIS, 18-32
Windows NT, 92-94
Windows NT Registry, 99-101, 106-111, 115
Windows Workgroups, 93-94
wireless, 425-437
escapes , 519-521
Ethereal program, 281, 427, 432-434
Ethernet networks, 280, 433
Ethernet technology, 367-368
eTrust Intrusion Detection tool, 157
Ettercap program, 386
Evanchik, Michael, 599
Evens, Chris, 615-616
event logs, 155-156, 172, 197-198
Event Viewer, 197
EventCombWindows tool, 156
Excel, 586
Exchange Server, 84, 92
executables, 195
EXPN command, 83-84, 237
Expression Evaluator issue, 538-539
Extended Data Encryption Standard (DESX), 205-206
extensions
.asp, 171
.htr, 169-171
.inc, 171
ISAPI, 169-170
ISM.DLL, 166, 169
.lcs, 179-180
server, 540-542
Exterior Gateway Protocol (EGP), 399
external data representation (XDR), 229-230, 238
extranet connections, 6-7
Eyedog.OCX control, 576


Hacking Exposed
Hacking Exposed 5th Edition
ISBN: B0018SYWW0
EAN: N/A
Year: 2003
Pages: 127

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net