List of Tables

Chapter 1: Footprinting

Table 1-1: Environments and the Critical Information Attackers Can Identify
Table 1-2: WHOIS Searching Techniques and Data Sources

Chapter 2: Scanning

Table 2-1: UNIX Host-Based Ping-Detection Tools
Table 2-2: Popular Scanning Tools and Features

Chapter 3: Enumeration

Table 3-1: Common NetBIOS Service Codes
Table 3-2: Anonymous Access Settings on Windows XP/Server 2003 and Windows 2000
Table 3-3: Permissions on Active Directory User and Group Objects for the Pre-Windows 2000 Compatible Access Group

Chapter 4: Hacking Windows

Table 4-1: High Probability Username/Password Combinations
Table 4-2: Selected Windows Intrusion Detection/Prevention Tools

Chapter 5: Hacking UNIX

Table 5-1: Freeware Tools That Help Protect Against Brute-force Attacks
Table 5-2: Popular, Freely Available UNIX Sniffer Software
Table 5-3: Unix Security Resources

Chapter 6: Remote Connectivity and VoIP Hacking

Table 6-1: Test Voicemail Passwords

Chapter 7: Network Devices

Table 7-1: Commonly Used Listening Ports

Chapter 8: Wireless Hacking

Table 8-1: Decibel-to-Volts-to-Watts Conversion Table

Chapter 11: Hacking Code

Table 11-1: The Different Types of Overlong UTF-8 Characters Possible for / and \
Table 11-2: Tools for Assessing and Improving Code Security

Chapter 12: Web Hacking

Table 12-1: Pros and Cons of Nikto
Table 12-2: Pros and Cons of Whisker 2.0
Table 12-3: Common XSS Payloads

Chapter 13: Hacking the Internet User

Table 13-1: Recommended Internet Zone Security Settings (Custom Level Settings Made after Setting Default to High)
Table 13-2: Microsoft ActiveX Controls That Ship with Windows That Should Have the Kill Bit Set


Hacking Exposed
Hacking Exposed 5th Edition
ISBN: B0018SYWW0
EAN: N/A
Year: 2003
Pages: 127

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net