List of Tables

Chapter 1: Netcat and Cryptcat

Table 1-1: Netcat6 Options

Chapter 4: Port Scanners

Table 4-1: TCP Connection Flags
Table 4-2: Nmap T Option Summary
Table 4-3: THC-Amap Scan Modes
Table 4-4: Amap Performance- related Options

Chapter 5: Unix Enumeration Tools

Table 5-1: Rpcclient Commands

Chapter 6: Windows Enumeration Tools

Table 6-1: Net Tools Command-line Arguments
Table 6-2: Common NetBIOS Codes
Table 6-3: Winfingerprint-cli Options

Chapter 7: Web Hacking Tools

Table 7-1: Basic Nikto Command-line Options
Table 7-2: Additional Nikto Command-line Options
Table 7-3: Useful LibWhisker Functions
Table 7-4: Useful Web-oriented Curl Options
Table 7-5: Additional stunnel .conf Directives

Chapter 8: Password Cracking / Brute-Force Tools

Table 8-1: Pwdump4 Command-line Options
Table 8-2: Hydra Command-line Options

Chapter 9: Host Hardening

Table 9-1: Clamscan Options
Table 9-2: Msec perm.* Entries
Table 9-3: Msec Password Management Guidelines
Table 9-4: Msec security.conf Settings

Chapter 11: Simple Source Auditing Tools

Table 11-1: Flawfinder Options

Chapter 12: Combination System Auditing Tools

Table 12-1: Nessus Plug-in Categories
Table 12-2: AIDE Rule Switches
Table 12-3: Tripwire Property Masks
Table 12-4: Tripwire Predefined Property Mask Variables
Table 12-5: Tripwire Rule Attributes
Table 12-6: Additional Tripwire Property Masks for NTFS and NTREG Sections
Table 12-7: Tripwire Predefined Property Mask Variables for NTFS and NTREG Sections

Chapter 13: Firewalls

Table 13-1: Ipchains Commands
Table 13-2: Common Command-line Options
Table 13-3: Iptables Options
Table 13-4: IPFW Options
Table 13-5: IPFW Commands
Table 13-6: IPFW Prefix Rules
Table 13-7: IPFW Suffix Rules

Chapter 14: Network Reconnaissance Tools

Table 14-1: DNS Start of Authority Field Descriptions
Table 14-2: Ping Command Comparison
Table 14-3: Traceroute Options
Table 14-4: Traceroute Hop Information

Chapter 16: Sniffers

Table 16-1: Qualifiers
Table 16-2: tcpdump
Table 16-3: Decimal Numbers and Binary Representations
Table 16-4: Snort Rule Options
Table 16-5: Snort Preprocessors
Table 16-6: Snort Output Modules

Chapter 17: Wireless Tools

Table 17-1: NetStumbler Filters
Table 17-2: / user /local/etc/kismet.conf Options That Should Be Modified
Table 17-3: More kismet.conf Settings
Table 17-4: Important kismet_ui.conf Settings
Table 17-5: gpsd Command-line Options

Chapter 18: War Dialers

Table 18-1: Important ToneLoc Screen Commands
Table 18-2: THC-Scan Description Shortcut Keys
Table 18-3: THC-Scan Command Shortcut Keys

Chapter 19: TCP/IP Stack Tools

Table 19-1: Isic Command-line Options
Table 19-2: Common Network Test Scenarios
Table 19-3: Test Scenarios
Table 19-4: Quick Start iptest Options
Table 19-5: Nemesis IP Mode Options
Table 19-6: Nemesis Data Link Options

Chapter 24: Tools to Aid in Internet Activity Reconstruction

Table 24-1: Microsoft Outlook Data Configuration Files and Locations
Table 24-2: Locations of History Files
Table 24-3: Breakdown of File Entries in Windows XP

Chapter 25: Generalized Editors and Viewers

Table 25-1: Often-used Key Commands


Anti-Hacker Tool Kit
Anti-Hacker Tool Kit, Third Edition
ISBN: 0072262877
EAN: 2147483647
Year: 2006
Pages: 175

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net