U

UCE ( unsolicited commercial e-mail), 628. See also spam
UDP ( User Datagram Protocol), 53
UDP floods, 492-493
UDP packets, 38-39, 492-493, 500
UDP port number, 38-39
UDP ports
enumeration and, 87-88
listed, 651-656
network devices, 360-361
port 69, 86, 392-393
port 79, 87-88
port 111, 128-129
port 137, 92-96
port 161, 111-115
port 513, 130
port 520, 394
port 1434, 131-133
port 2049, 133
port 27444, 496
port 32771, 128-129
port 34555, 496
UDP scans , 51-68
UDP services, 53-59
UDP traceroute packets, 355
UDP traffic, 40
UDP tunneling, 479-480
udpflood tool, 492-493
Udp_scan tool, 66
udp_scan utility, 55
ulimit command, 270
UltraEdit, 154
Unicast Reverse Path Forwarding (RPF), 500
Unicode exploit, 171, 519
UNIX platform
back doors, 277, 290
brute force attacks, 216-218, 261-262
buffer overflow attacks, 218-230, 241-242, 265-266
core -file manipulation, 270
covering tracks, 282-285
dangerous services, 221
data-driven attacks, 218-230
disabling unnecessary services on, 221
DNS and, 250-252
DoS attacks, 490, 493, 495, 503-504
DOSEMU for Unix, 274, 305
enumeration, 87, 128-129
firewalls, 215, 231, 234-235, 466-467, 480
footprinting functions, 35
format string attacks, 222-224
FTP and, 235-237
hacking, 211-292
history, 212
kernel flaws, 271-272
listening service, 215
local access, 213-214, 261-276
Mac OS X and, 136-138
metacharacters, 226
Network File System (NFS), 242-247
passwords, 216-218, 261-265
permissions and, 273-276
port scanning, 52-59, 66
race conditions, 268-269
remote access, 213-261
root access, 212-213
rootkits, 277
routing and, 215
RPC services, 128-129, 238-241
security and, 212-213, 290-292
sendmail, 83-84, 237-238
shared libraries, 270-271
shell access, 230-235
signals, 269
sniffers, 279-282
system misconfiguration, 272-276
traceroute program, 37-40, 354-356
Trojans, 277-279
user execute commands and, 215
vulnerability mapping, 212-213
X Window System, 232, 248-250
UNIX shell. See shell
UPC ports, 161
UrlActions, 608-609
URLs
improper URL canonicalization, 597-598
malicious links to, 597-598
remote access to companies via, 9
URLScan tool, 90-91, 172, 522, 533
US-CERT, 613
Usenet forums, 15-16
user accounts. See also users
company, 11
global, 144
guest, 144-145
local, 144-145
low hanging fruit, 314-315
obtaining, 11
passwords, 143-157
User Datagram Protocol. See UDP
user2sid tool, 102-103, 143
UserDump tool, 103, 109
UserInfo tool, 108
users. See also employees ; user accounts
credit histories, 11
criminal records, 11
disgruntled employees, 14
e-mail addresses, 11, 15, 30
enumerating, 101-105
groups, 175
hiding, 638
home addresses, 11
identity theft, 340, 597-598, 623-628
location details, 10-11
morale , 11-12
names , 143
online resume, 15-18
password guessing, 143-157
phone numbers , 11
physical security, 10, 646-647
privacy of. See privacy issues
publicly available information, 8-18
social engineering. See social engineering
social security numbers, 11
source code hacking and, 523-524
Usenet forums, 15-16
usrstat tool, 106
UTF-8 escapes , 519-521


Hacking Exposed
Hacking Exposed 5th Edition
ISBN: B0018SYWW0
EAN: N/A
Year: 2003
Pages: 127

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net