B

back channels, 233-235
back doors
described, 634
netcat utility, 176-187
overview, 636-639
remote control, 176-187
Solaris, 285
UNIX, 277, 290
Windows, 176-190
Back Orifice (BO), 84
backslash (\), 519, 521
backup domain controllers (BDCs), 94
bandwidth consumption attacks, 491-497
banner grabbing
basics, 79-81, 469
Cisco IOS, 364-365
countermeasures, 83
described, 79
firewalls, 468-469
manual techniques, 79-81
OS detection, 69
strobe utility, 54-55, 59
banners
changing, 90
Cisco devices, 362, 364-365
HTTP enumeration and, 90-91
Barto, Brian, 453
Base-64 encoding, 496
Basic Input Output System. See BIOS; NetBIOS
Bastille utility, 275
Bay routers, 361
BDCs (backup domain controllers), 94
BEA Weblogic servers, 539
beacons , 439
Bellovin, Steven M., 339
Benham, Mike, 584
Berkeley Internet Name Domain. See BIND
Berkeley Wireless Research Center (BWRC), 460
Bezroutchko, Alla, 96
BGP (Border Gateway Protocol), 116-118, 356-358, 501
BGP AS numbers , 29-30
BGP flapping, 401-402
BGP-hardening, 401-402
BGP IP lookups, 358-359
BGP packet injection, 400-403
BGP routers, 399-400
BGPv4 (Border Gateway Protocol version 4), 399
BHOs (Browser Helper Objects), 629-630, 638
bin, 246-247
BIND (Berkeley Internet Name Domain)
djbdns as alternative to, 254
DNS attacks, 36, 250, 253-254
BIOS passwords, 210
Bissell, John, 593
BlackICE, 157
blacklists , 631
Blaster worm, 162-163, 503
Blaze, Matt, 438
Bluetooth, 408
BMP exploits, 593
BO. See Back Orifice
Bogons list, 402
Border Gateway Protocol. See BGP
border routers, 466
bot armies, 488-489, 494
bots. See also zombies
Agobot attacks, 497
described, 634, 640-641
DoS, 494-497, 503-504, 507, 641
Gaobot attacks, 497
IRC, 497, 640
Phatbot attacks, 497
secondary virus infections via, 641
spam and, 641
Spybot Search & Destroy tool, 631-632
types of, 641
brconfig tool, 380
Bridge Protocol Data Units (BPDUs), 380
Brightmail, 631
Broadcast Probe Request, 417
broadcast sniffing, 373-376
Broadcast SSID, 438
Brown Orifice, 84
Browser Helper Objects (BHOs), 629-630, 638
browsers. See web browsers
brute-force attacks
brute-force scripting, 313-325
cookie grabbing, 551-553
dial-up hacking, 315-325
NTLM authentication, 556-557
passwords, 179, 261-262
SNMP, 400
SSH, 399
Telnet, 399
UNIX, 216-218, 261-262
voicemail, 330-335
vs. password cracking, 261
war-dialing. See war-dialing
WASAT tool, 556
web administration, 399
WebSleuth tool, 551-553
Brutus tool, 216
BSD-Airtools, 420, 430
BSD tools, 410-411
BSS data overflow, 515-516
BSS network, 417
BSSID, 431-432, 439
BSSID field, 441
BubbleBoy worm, 590
buffer overflows
BSS, 515-516
code, 512-518
DNS TSIG, 253-254
format string attacks, 516-517
GDI+ JPEG, 592-594
heap-based, 515-516, 542-543
HTR Chunked Encoding Transfer Heap Overflow, 543
IIS, 166-173
integer overflows, 226-230
ISAPI idq.dll, 543
jill exploit, 166-173
libpng, 615-618
LSASS, 163-165
off-by-one errors, 514, 518
OpenSSL overflow attacks, 257-258
PCT, 166-168
printer, 169-170
SNMP, 241-242, 404-405
Snort RPC decoding, 260
stack-based, 221-222, 513-515, 542-543
tcpdump program, 259-261
UDP port 1434 and, 131-133
UNIX, 218-222, 241-242, 265-266
web servers, 542-544
bugs , 524, 526-527, 531
Bugscan tool, 527
Bugtraq mailing list, 184, 210, 218
Butler, Jamie, 636-637
BWRC (Berkeley Wireless Research Center), 460


Hacking Exposed
Hacking Exposed 5th Edition
ISBN: B0018SYWW0
EAN: N/A
Year: 2003
Pages: 127

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net