index_D

 < Day Day Up >   


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

D.A.D. (disclosure, alteration, and destruction) attacks
D.I.S.C. profile
data dictionary
database attacks
     detecting
     tools for performing
databases
     Microsoft SQL Server
         querying
         structure of
     MySQL
     Oracle
     protecting against attacks
     RDBMSs
         vulnerabilities, testing
     susceptibility to attacks
Datapool
DAWN Security Systems, fictitious penetration test of LCN
     covering tracks
     follow-up
     gaining access 2nd 3rd
     information gathering 2nd
     maintaining access
     planning the attack
     sample report
     scanning and enumeration
DDoS (Distributed Denial of Service) attacks
DDoSPing tool
default SSIDs as security risk
defending against social engineering attacks
defining scope of testing 2nd
detecting
     backdoor applications
     brute force attacks 2nd
     database attacks
     directory traversals
     DoS attacks
         with appliance firewalls
         with host-based IDSs
         with signature-based network IDSs 2nd
     password-cracking attacks
         from physical access
         within system log files
     scans
     server attacks
     session hijacking
         with Cisco IDS 4200 series sensors 2nd
         with packet sniffers
     Trojans applications
     web attacks
         directory traversals
     Whisker attacks
    wireless network attacks
         DoS attacks
         MAC address spoofing
         on unprotected WLANs
         rogue APs
         unallocated MAC addresses
devices 2nd
     routers, testing for vulnerabilities
     switches
         testing for vulnerabilities
DHTML (Dynamic HTML)
DilDog
dipole antennas
directory traversals, detecting
disabling unnecessary router services
disaster recovery policies
discovering firewall configurations
     through firewalking
     with ACK scan
DMZ (demilitarized zone), securing network architecture
documentation
     Appendixes
     Executive Summary 2nd
         sample
     Project Scope
     Results Analysis
domain model
dominant behavior classification (D.I.S.C.)
Donald Dick
DoS (denial of service) attacks 2nd
     case study
     DDoS
     detecting
         with appliance firewalls
         with host-based IDSs
         with signature-based network IDSs
     detecting on wireless networks
     Fraggle attacks
     LAND attacks
     Ping of Death
     preventing
         through application hardening
         through network hardening
     protocol exceptions
     Smurf attacks
     SYN floods
     tools for executing 2nd
         Datapool
         Hgod
         Jolt2
downloading websites for offline viewing
DSSS (Direct Sequence Spread Spectrum)
DStumbler
DTD (Document Type Definition)
dumb scans
dumpster diving
     obtaining company information

 < Day Day Up >   


Penetration Testing and Network Defense
Penetration Testing and Network Defense
ISBN: 1587052083
EAN: 2147483647
Year: 2005
Pages: 209

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net