F

F FAT partitions, 171
Ferguson, Niels, 338-339
file encryption key (FEK), 205-206
file handles, 242
file servers, 150
file shares, 97-99, 143-144
file sharing, Windows, 151
file system, 140, 198, 205
File Transfer Protocol. See FTP
file2air tool, 445
filenames, 193
files. See also specific files
attachments. See attachments
batch, 302-304
browsing, 484
hiding, 198-199, 637-638
include, 171
names , 193
sample, 537-539
world-writable, 275-276
filtered ports, 470-471
filters
egress, 168, 500
ingress, 168, 500
IPSec, 202-203, 210
ISAPI, 90, 169-170, 172, 542
network traffic, 202-203, 505
rate limits, 501
TCP/IP, 202
TFTP access, 393
FIN packets, 53, 69
final security review, 530-531
financial information, 12
Find Computer tool, 144
find_ddos, 504
finger utility, 87-88, 364-365
fingerprinting, 69-72
firedaemon.exe file, 193
Firefox browser, 614-615
Firewalk tool, 474-475
Firewall-1 for UNIX, 466
firewall rulesets, 53
firewalls, 463-485
access control lists, 477
application proxy vulnerabilities, 480-484
banner grabbing , 468-469
Check Point, 465, 472, 477-479
deep packet inspection, 485
DNS security, 36
enumeration and, 134
Firewalk tool, 474-475
ICMP tunneling, 479-480
identifying, 465-472
Linux, 466-467, 485
Mac systems, 138
nmap utility, 470-472
packet-filtering, 477-480
port scanning, 465-467, 472, 475-476
proxy, 234-235, 480-484
raw packet transmissions, 473-474
route tracing, 467-468
scanning through, 472-476
search engine hacking and, 15-18
SMB services and, 148-149
types of, 464
UDP and, 39, 479-480
UNIX, 466-467, 480
UNIX platform, 215, 231, 234-235
VoIP and, 345
Windows Firewall, 148-149, 203, 205, 207, 600
WinGate, 482-484
ZoneAlarm, 636
FixedOrbit tool, 359
flags, TCP, 70
Flawfinder tool, 527
Fleeman, Anderson, and Bird Corporation, 412
floppy disk drives , 210
footprinting, 5-40
authorization for, 8
basic steps, 6-33
critical information, 7
described, 6, 42
DNS enumeration, 18-32
domain- related searches, 24-27
extranets, 6-7
Internet footprinting, 8-40
intranets , 7
IP-related searches, 28-31
need for, 6-7
phone numbers , 9, 11, 31-32, 295-296, 303
publicly available information, 8-18
remote access, 6-7
scope of activity, 8
search engines and, 14-18
WHOIS enumeration, 18-32
wireless networks, 408-425
Forensic toolkit, 290
Form Scalpel tool, 554-555
format string attacks, 222-224, 516-517
FormatGuard for Linux, 224
FoToZ exploit, 593
fpexedl.dll filter, 170
fping utility, 43
fpipe tool, 191-193
fpipe.exe file, 193
fport utility, 196
Fraggle attacks, 493-494
fragmentation, 70, 490
fragrouter , 395
FreeBSD systems, 136, 291-292, 503
freemp3.doc file, 588
FreeSWAN project, 282
FrontPage application, 546-547
FrontPage Server Extensions, 170
FSMax tool, 555-556
FTP (File Transfer Protocol)
anonymous, 235-237
enumeration, 79-81
UNIX platform and, 235-237
Windows and, 165-166, 172
FTP bounce scanning, 58-59
FTP clients , 80-81
FTP data channel, 475-476
FTP servers
signal handling problems, 269
UNIX and, 235-237
FTP sites
Offline Explorer Pro, 548
retrieving information about, 547
FTPD, 235-237, 269
FU Rootkit (fuzen_op), 640
fuzen_op (FU Rootkit), 640
fuzzing, 528-529, 556
FXCop tool, 527
Fyodor, 52


Hacking Exposed
Hacking Exposed 5th Edition
ISBN: B0018SYWW0
EAN: N/A
Year: 2003
Pages: 127

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net