index_S

 <  Day Day Up  >    

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

salt  
Samspade.org  
SAN Dshield.org  
Sanfilippo, Salvatore  
SANS
       six-step incident response methodology  
       "The Twenty Most Critical Internet Security Vulnerabilities"  
scheduler, Windows CE  
screensaver attacks  
search engines  
section tables  
sections  
sectors  
secure wiping utilities  
security
       event  
       event correlation  
       incident  
       response  
segment regeneration  
SELECT command  
sendmail  
       access control  
sequential disassemblers  
sequential port scans  
serial number cracking   2nd   [See also serial.exe, reverse engineering]
serial.exe, reverse engineering   2nd   [See also Windows CE]
       debugging  
       loading to a disassembler  
       step-through investigation  
setfacl command (Solaris 8)  
SGI machines, security risks  
SGID (Set Group ID)  
SGID bit  
Shadow Password Suite  
Shaft  
shifting operations opcodes  
shoulder surfing  
shred tool  
shroud tool  
SI (source) register  
signal drift , reducing  
signature collisions  
signature matchers  
SIGSTOP  
SIM (Security Information Management) tools  
Sklyarov, Dmitry  
slack space  
smart cards  
       hacking  
               reverse engineering  
SMB (Service Message Block) attack  
SMB (Service Message Block) protocol  
SMB network services, security risks  
SMB_COM_TRANSACTION command  
smbnuke  
SMS (short messaging service) vulnerabilities  
SMTP protocol server, security risks  
sniffers   2nd  
Snort  
       case study  
               machine and OS requirements  
               system setup  
       configuration for a honeypot  
SOAP (Simple Object Access Protocol)  
       web services security  
               Xenc (XML Encryption)  
social engineering  
       action plans  
       attacks, passive and active  
       contact chains  
       definitions  
       information collection template  
       methodologies  
       risk analysis  
       subroutines or shortcuts  
       targeting  
SOCKS proxy port, security risks  
SoftICE  
       breakpoints  
       commands
               advanced  
               backtrace commands  
               basic  
               customization  
               mode control  
               special operators  
               symbol/source commands  
               Window commands  
               Window control  
software development
       programmming languages, choosing  
Song, Dug  
source routing  
SP (stack pointer) address  
Spitzner, Lance  
spoofing  
SQL  
       ANSI standards  
       commands  
       modifier commands  
SQL injection attacks  
       attack types  
               authentication bypass  
               database modification  
               unauthorized data access  
       basic attack strings  
       defenses  
               coding defenses  
               external defenses (application blocking)  
               filters  
               obfuscation  
       PHP-Nuke application  
               defense examples  
               example attacks  
               installing  
       prevention  
       SQL injection  
Squid web proxies, security risks  
SS (stack segment)  
sscan  
SSDP (Simple Service Discovery Protocol)  
SSH (Secure Shell)   2nd  
       access control  
       securing from abuse  
       security risks  
ssh covert channel  
SSL (Secure Sockets Layer)  
Stacheldraht  
stack  
static linking and disassembly  
stealth interface  
sterilize tools  
strcmp (string comparison) instruction  
strict anomaly detection  
strlen (string length) comparison  
su command  
subroutines  
SucKit  
SUID (Set User ID)  
       attacks using  
       bit  
       root vulnerability  
swap files  
swatch  
SWITCH statements  
Symantec DeepSight Analyzer  
SYN cookie  
SYN-ACK timeout and regeneration cycles, OS fingerprinting with  
sys_ptrace  
SysInternals  
syslog
       daemon  
       output  
       problems  
       security risks  
syslog-ng  
syslog.conf  
systat service, security risks  
system hardening  
system logging   2nd   [See also logfiles]
system logs, attack evidence in  
system monitors  
system records, sanitizing   2nd   [See also logfiles, sanitizing]
System Time system call  

 <  Day Day Up  >    


Security Warrior
Security Warrior
ISBN: 0596005458
EAN: 2147483647
Year: 2004
Pages: 211

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net