2KKUU7ita
2KKUU7ita
2KKUU7ita
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
• A •<br />
aboveboard, 11<br />
Abuse.net SMTP relay checker<br />
(website), 360<br />
access, blocking, 240–241<br />
access control list (ACL), 238, 241<br />
access points (APs), 158<br />
account enumeration, 258–261<br />
Active Directory, 102<br />
Active Server Pages (ASP), 294<br />
Acunetix Web Vulnerability Scanner, 223,<br />
278, 289, 291–292, 297, 300, 369<br />
adaptability, 345<br />
Advanced Access Password Recovery<br />
(website), 356<br />
Advanced Archive Password Recovery<br />
(Elcomsoft), 109, 309, 363<br />
Advanced EFS Data Recovery, 187<br />
Advanced Encryption Standard (AES), 167<br />
Advanced Office Password Recovery<br />
(website), 309<br />
advanced persistent threat (APT), 151<br />
Advanced SQL Password Recovery<br />
(website), 305, 356<br />
Aircrack-ng, 160, 166, 167, 170, 371<br />
AirMagnet WiFi Analyzer (website), 371<br />
airodump, 167<br />
Alert Logic (website), 333<br />
AlgoSec Firewall Analyzer, 138<br />
all-in-one assessment tools, 202<br />
allintitle operator, 282<br />
Amap, 235–236<br />
Amenza Technologies Limited<br />
Secur/Tree, 39<br />
American National Standards Institute<br />
(ANSI), 12<br />
American Standard Code for Information<br />
Interchange (ASCII), 108, 115<br />
analyzers, 126–127<br />
analyzing<br />
network data, 139–145<br />
source code, 302–304, 367<br />
Index<br />
Andrews, Chip (ethical hacker), 307–308<br />
anonymity, maintaining, 34<br />
antenna, external, 160<br />
Apache web server (httpd), 229, 248<br />
APNIC (website), 357<br />
AppContainer (Windows 8), 216<br />
AppDetectivePro (website), 310, 356<br />
applications. See websites and applications<br />
approval, prior, 351<br />
APs (access points), 158<br />
ArcSight Logger (website), 360<br />
ARP spoofing/poisoning, 146–148<br />
Arpwatch (website), 150, 361<br />
Asleap (website), 170, 371<br />
Asterisk (website), 72<br />
Athena Firewall Grader (website), 138<br />
attachments (e-mail), 253–254<br />
attack tree analysis, 39<br />
attacks, 32–34. See also specific topics<br />
auditing, compared with ethical hacking,<br />
12, 348<br />
authentication, 56, 99–100, 117, 225–226<br />
authorization, 19<br />
automated assessments, 59<br />
automated password reset, 117<br />
automating patching, 327–328, 331–332<br />
Awareity MOAT (website), 368<br />
awareness, as countermeasure against<br />
social engineering, 78–79<br />
• B •<br />
background checks, 52<br />
BackTrack (website), 158<br />
BackTrack Linux (website), 155, 228, 259,<br />
359, 360<br />
bad guys, thinking like, 27<br />
bad-guy (black hat) hackers, 10, 28<br />
bandwidth blocking, 253<br />
banner attacks, 256–257<br />
banners, grabbing, 135–137<br />
Bastille Linux Hardening Program<br />
(website), 367