19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

• A •<br />

aboveboard, 11<br />

Abuse.net SMTP relay checker<br />

(website), 360<br />

access, blocking, 240–241<br />

access control list (ACL), 238, 241<br />

access points (APs), 158<br />

account enumeration, 258–261<br />

Active Directory, 102<br />

Active Server Pages (ASP), 294<br />

Acunetix Web Vulnerability Scanner, 223,<br />

278, 289, 291–292, 297, 300, 369<br />

adaptability, 345<br />

Advanced Access Password Recovery<br />

(website), 356<br />

Advanced Archive Password Recovery<br />

(Elcomsoft), 109, 309, 363<br />

Advanced EFS Data Recovery, 187<br />

Advanced Encryption Standard (AES), 167<br />

Advanced Office Password Recovery<br />

(website), 309<br />

advanced persistent threat (APT), 151<br />

Advanced SQL Password Recovery<br />

(website), 305, 356<br />

Aircrack-ng, 160, 166, 167, 170, 371<br />

AirMagnet WiFi Analyzer (website), 371<br />

airodump, 167<br />

Alert Logic (website), 333<br />

AlgoSec Firewall Analyzer, 138<br />

all-in-one assessment tools, 202<br />

allintitle operator, 282<br />

Amap, 235–236<br />

Amenza Technologies Limited<br />

Secur/Tree, 39<br />

American National Standards Institute<br />

(ANSI), 12<br />

American Standard Code for Information<br />

Interchange (ASCII), 108, 115<br />

analyzers, 126–127<br />

analyzing<br />

network data, 139–145<br />

source code, 302–304, 367<br />

Index<br />

Andrews, Chip (ethical hacker), 307–308<br />

anonymity, maintaining, 34<br />

antenna, external, 160<br />

Apache web server (httpd), 229, 248<br />

APNIC (website), 357<br />

AppContainer (Windows 8), 216<br />

AppDetectivePro (website), 310, 356<br />

applications. See websites and applications<br />

approval, prior, 351<br />

APs (access points), 158<br />

ArcSight Logger (website), 360<br />

ARP spoofing/poisoning, 146–148<br />

Arpwatch (website), 150, 361<br />

Asleap (website), 170, 371<br />

Asterisk (website), 72<br />

Athena Firewall Grader (website), 138<br />

attachments (e-mail), 253–254<br />

attack tree analysis, 39<br />

attacks, 32–34. See also specific topics<br />

auditing, compared with ethical hacking,<br />

12, 348<br />

authentication, 56, 99–100, 117, 225–226<br />

authorization, 19<br />

automated assessments, 59<br />

automated password reset, 117<br />

automating patching, 327–328, 331–332<br />

Awareity MOAT (website), 368<br />

awareness, as countermeasure against<br />

social engineering, 78–79<br />

• B •<br />

background checks, 52<br />

BackTrack (website), 158<br />

BackTrack Linux (website), 155, 228, 259,<br />

359, 360<br />

bad guys, thinking like, 27<br />

bad-guy (black hat) hackers, 10, 28<br />

bandwidth blocking, 253<br />

banner attacks, 256–257<br />

banners, grabbing, 135–137<br />

Bastille Linux Hardening Program<br />

(website), 367

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!