19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

xiv<br />

Hacking For Dummies, 4th Edition<br />

Part V: Hacking Applications .................................... 249<br />

Chapter 13: Communication and Messaging Systems . . . . . . . . . . . .251<br />

Introducing Messaging System Vulnerabilities ........................................251<br />

Recognizing and Countering E-Mail Attacks ............................................252<br />

E-mail bombs ......................................................................................253<br />

Banners ...............................................................................................256<br />

SMTP attacks ......................................................................................257<br />

General best practices for minimizing e-mail security risks ........267<br />

Understanding Voice over IP .....................................................................268<br />

VoIP vulnerabilities ...........................................................................269<br />

Countermeasures against VoIP vulnerabilities ..............................276<br />

Chapter 14: Websites and Applications . . . . . . . . . . . . . . . . . . . . . . . . .277<br />

Choosing Your Web Application Tools ....................................................278<br />

Seeking Web Vulnerabilities .......................................................................280<br />

Directory traversal ............................................................................280<br />

Countermeasures against directory traversals .............................283<br />

Input-filtering attacks ........................................................................283<br />

Countermeasures against input attacks .........................................292<br />

Default script attacks ........................................................................294<br />

Countermeasures against default script attacks ...........................294<br />

Unsecured login mechanisms ..........................................................295<br />

Countermeasures against unsecured login systems .....................298<br />

Performing general security scans for<br />

web application vulnerabilities ....................................................300<br />

Minimizing Web Security Risks ..................................................................300<br />

Practicing security by obscurity ......................................................300<br />

Putting up firewalls ............................................................................301<br />

Analyzing source code ......................................................................302<br />

Chapter 15: Databases and Storage Systems . . . . . . . . . . . . . . . . . . . .305<br />

Diving into Databases .................................................................................305<br />

Choosing tools....................................................................................305<br />

Finding databases on the network...................................................306<br />

Cracking database passwords..........................................................308<br />

Scanning databases for vulnerabilities ...........................................309<br />

Following Best Practices for Minimizing Database Security Risks ........310<br />

Opening Up about Storage Systems ..........................................................311<br />

Choosing tools....................................................................................311<br />

Finding storage systems on the network ........................................312<br />

Rooting out sensitive text in network files .....................................312<br />

Following Best Practices for Minimizing Storage Security Risks ...........315

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!