19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

374<br />

Hacking For Dummies, 4th Edition<br />

Beaver, Kevin (author)<br />

Hacking Wireless Networks For Dummies,<br />

167, 173, 323<br />

believability, 74<br />

benefits, of ethical hacking, 343<br />

best practices, for minimizing e-mail<br />

security risks, 267–268<br />

Bing (website), 50, 357<br />

BIOS passwords, 113, 363<br />

Bit9’s Parity Suite (website), 151, 355<br />

BitLocker (website), 190, 361, 363, 371<br />

black hat (bad-guy) hackers, 10, 28<br />

Blast (website), 152, 361<br />

blind assessments, 42–43, 48–49<br />

blind ethical hacking, 37<br />

blind SQL injection, 288, 307<br />

Blooover (website), 165, 355<br />

Bluejacking Forums and Community<br />

(website), 355<br />

BlueScanner (website), 165, 355<br />

Bluesnarfer (website), 165, 355<br />

BlueSniper rifle, 165, 356<br />

Bluetooth, 165, 355–356<br />

bootable (live) CDs, 158<br />

bring your own device (BYOD), 191<br />

broadcast mode, 146<br />

brute-force attacks, for cracking<br />

passwords, 103–105<br />

Brutus, 100, 102, 267, 296, 297, 360, 363, 369<br />

BT’s Assure (website), 333<br />

BTScanner for XP (website), 356<br />

buffer-overflow attacks, 243–244, 284–285<br />

built-in Windows programs, 201<br />

business phones, 72<br />

• C •<br />

Cain & Abel<br />

about, 21<br />

for capturing and recording voice traffic,<br />

274–275<br />

cracking IKE “aggressive mode”<br />

pre-shared keys with, 154<br />

using for ARP poisoning, 146–148<br />

website, 99, 100, 111, 126, 140, 146, 265,<br />

306, 360, 361, 364, 368<br />

Camtasia Studio (TechSmith), 42<br />

Canadian Personal Information Protection<br />

and Electronic Documents Act<br />

(PIPEDA), 13<br />

Canary Wireless Digital Hotspotter<br />

(website), 160, 175, 371<br />

candy-security adage, 66<br />

cantenna, 160<br />

capturing traffic, 265–266, 273–275<br />

Car Whisperer (website), 165, 356<br />

Cash, Adam (author)<br />

Psychology For Dummies, 75<br />

Center for Internet Security (website), 328<br />

Center for Internet Security Benchmarks<br />

(website), 118, 323, 367<br />

certifications, 12, 356<br />

Certified Ethical Hacker (C|EH), 12<br />

Certified Ethical Hacker (website), 356<br />

Certified Information Security Manager<br />

(website), 356<br />

Certified Information Systems Security<br />

Professional (website), 356<br />

Certified Systems Security Professional<br />

(CISSP), 12<br />

Certified Wireless Security Professional<br />

(website), 356<br />

Chappell, Laura (authority on network<br />

protocols and analysis), 124<br />

Cheat Sheet (website), 5, 355<br />

Check Point (website), 301<br />

Checkmarx<br />

CxDeveloper, 192, 302–304, 361, 370<br />

CxSuite, 302<br />

website, 302, 367<br />

CheckSum Tool (website), 44<br />

Cheops-ng (website), 330<br />

chkconfig, 238<br />

Chronology of Data Breaches<br />

(website), 342<br />

A Chronology of Data Breaches (Privacy<br />

Rights Clearinghouse), 369<br />

Cisco Global Exploiter tool, 155<br />

Cisco LEAP protocol, 170<br />

civil liberties, 32<br />

clients, 348<br />

cloud service providers, 333

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!