< Day Day Up > |
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] Watchman watchpoints (gdb) web proxies security risks web services web site analysis weird.exe WEP (Wired Equivalent Privacy) cracking data analysis example IV collision wireless sniffing WEPCRACK WHERE modifier command manipulation WHILE loops Whisker whois command 2nd Windows forensic tools honeypots, difficulty in deploying log analysis integration into Unix logging framework reconnaissance tools reverse code engineering examples tools SOAP [See SOAP] Windows 2003 Server EFS (Encrypting File System) enhancements data recovery password reset issue user interaction Kerberos implementation release history third party encryption (EP Hard Disk) Authenti-Check component names, function names, role names installation and updating local and corporate administrator recovery One-Time Password Single Sign-On user configuration options Windows CE architecture contrasted with other Windows OSes cracking techniques NOP sliding predictable system calls strcmp and cmp strlen and wsclen disassembling a program disassembling programs IDA Pro, using GWES kernel memory architecture MVC [See MVC] processes RAM vs. ROM reverse code engineering ARM processors [See ARM] fundamentals scheduler serial.exe [See serial.exe, reverse engineering] supported processors threads Windows client attacks buffer overflow attacks DoS (denial-of-service) help center attacks SMB (Service Message Block) attack UPnP attacks remote assistance vulnerabilities Remote Desktop, vulnerabilitiies Windows NT/2000 Resource Kit Windows Server attacks Active Directory exploitation buffer overflow attacks Kerberos cracking 2nd [See also Kerberos protocol] PKI (Public Key Infrastructure), hacking smart card hacking WinHex automatic file recovery binary editor copying and imaging capabilities disk cataloging disk wiping expert features parallel search facility scripting text filtering WINICE.EXE WinPcap WinTop wiping tools testing wireless security airborne viruses antenna configuration RADIUS (remote authentication dial-in user service) SSL (Secure Sockets Layer) TKIP (Temporal Key Integrity Protocol) VPNs (Virtual Private Networks) WEP [See WEP] wireless sniffing keystream extraction World Wide Web Consortium (W3C) XML Encryption standard wsclen instruction cracking example WU-FTP exploit |
< Day Day Up > |