2KKUU7ita
2KKUU7ita
2KKUU7ita
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
374<br />
Hacking For Dummies, 4th Edition<br />
Beaver, Kevin (author)<br />
Hacking Wireless Networks For Dummies,<br />
167, 173, 323<br />
believability, 74<br />
benefits, of ethical hacking, 343<br />
best practices, for minimizing e-mail<br />
security risks, 267–268<br />
Bing (website), 50, 357<br />
BIOS passwords, 113, 363<br />
Bit9’s Parity Suite (website), 151, 355<br />
BitLocker (website), 190, 361, 363, 371<br />
black hat (bad-guy) hackers, 10, 28<br />
Blast (website), 152, 361<br />
blind assessments, 42–43, 48–49<br />
blind ethical hacking, 37<br />
blind SQL injection, 288, 307<br />
Blooover (website), 165, 355<br />
Bluejacking Forums and Community<br />
(website), 355<br />
BlueScanner (website), 165, 355<br />
Bluesnarfer (website), 165, 355<br />
BlueSniper rifle, 165, 356<br />
Bluetooth, 165, 355–356<br />
bootable (live) CDs, 158<br />
bring your own device (BYOD), 191<br />
broadcast mode, 146<br />
brute-force attacks, for cracking<br />
passwords, 103–105<br />
Brutus, 100, 102, 267, 296, 297, 360, 363, 369<br />
BT’s Assure (website), 333<br />
BTScanner for XP (website), 356<br />
buffer-overflow attacks, 243–244, 284–285<br />
built-in Windows programs, 201<br />
business phones, 72<br />
• C •<br />
Cain & Abel<br />
about, 21<br />
for capturing and recording voice traffic,<br />
274–275<br />
cracking IKE “aggressive mode”<br />
pre-shared keys with, 154<br />
using for ARP poisoning, 146–148<br />
website, 99, 100, 111, 126, 140, 146, 265,<br />
306, 360, 361, 364, 368<br />
Camtasia Studio (TechSmith), 42<br />
Canadian Personal Information Protection<br />
and Electronic Documents Act<br />
(PIPEDA), 13<br />
Canary Wireless Digital Hotspotter<br />
(website), 160, 175, 371<br />
candy-security adage, 66<br />
cantenna, 160<br />
capturing traffic, 265–266, 273–275<br />
Car Whisperer (website), 165, 356<br />
Cash, Adam (author)<br />
Psychology For Dummies, 75<br />
Center for Internet Security (website), 328<br />
Center for Internet Security Benchmarks<br />
(website), 118, 323, 367<br />
certifications, 12, 356<br />
Certified Ethical Hacker (C|EH), 12<br />
Certified Ethical Hacker (website), 356<br />
Certified Information Security Manager<br />
(website), 356<br />
Certified Information Systems Security<br />
Professional (website), 356<br />
Certified Systems Security Professional<br />
(CISSP), 12<br />
Certified Wireless Security Professional<br />
(website), 356<br />
Chappell, Laura (authority on network<br />
protocols and analysis), 124<br />
Cheat Sheet (website), 5, 355<br />
Check Point (website), 301<br />
Checkmarx<br />
CxDeveloper, 192, 302–304, 361, 370<br />
CxSuite, 302<br />
website, 302, 367<br />
CheckSum Tool (website), 44<br />
Cheops-ng (website), 330<br />
chkconfig, 238<br />
Chronology of Data Breaches<br />
(website), 342<br />
A Chronology of Data Breaches (Privacy<br />
Rights Clearinghouse), 369<br />
Cisco Global Exploiter tool, 155<br />
Cisco LEAP protocol, 170<br />
civil liberties, 32<br />
clients, 348<br />
cloud service providers, 333