< Day Day Up > |
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] packers packets analysis format, IPv4 fragmentation 2nd exploitation of Nmap, using variables keys sniffing splitting page files Palm OS viruses Liberty Crack Trojan Phage virus 2nd passive attacks passive fingerprinting passive reconnaissance tools password attacks password crackers TSCrack program password shadowing password-guessing attacks passwords BIOS passwords path abuse payloads byte overload reversal PE (Portable Executable) file format sections PE header PE loader penetration testing permanent data reservoir (RAM) personal firewalls Phage virus phf exploit PHP PHP-Nuke application defense examples example attacks installation web site framework physical sector copies ping command PINs (smart cards) PKI (Public Key Infrastructure) PKINIT platform attacks platters Pocket PC, vulnerability to viruses pOf (passive OS fingerprinting tool) POP3 (Post Office Protocol Version 3), security risks Portable Executable (PE) file format Portmapper, security risks ports, security aspects of most- attacked Unix ports TCP UDP postattack cleanup power consumption analysis prevention-detection-response principals printer daemon, security risks prism-getIV.pl ProcDump process accounting 2nd process audit records process control instructions (gdb) processors ARM processor [See ARM] assembly language and Windows CE, supported by production honeypots program control flow programming languages buffer overflows programming languages, choice of protocol mutation Provos, Niels ps command pseudorandom generation algorithm ptrace breakpoints and debug registers, implementing functions hostile binaries and process monitoring PTRACE_PEEKUSER and PTRACE_POKEUSER PTRACE_SYSCALL wrapping with kernel modules public Internet terminals public web proxies pwconv command |
< Day Day Up > |