19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Cobb, Chey (author)<br />

Network Security For Dummies,<br />

118, 325, 328<br />

code injection, 287–291<br />

commands, disabling, 240<br />

Common Vulnerabilities and Exposures<br />

(website), 58, 320, 369<br />

communication and messaging systems<br />

about, 251<br />

e-mail attacks, 252–268<br />

messaging system vulnerabilities,<br />

251–252<br />

tools and resources, 360–361<br />

Voice over IP (VoIP), 16, 268–276, 368–369<br />

CommView (TamoSoft), 21, 111, 140, 152,<br />

160, 167, 174, 275, 362, 368, 371<br />

Completely Automated Public Turing test<br />

to tell Computers and Humans Apart<br />

(CAPTCHA), 255, 256, 299<br />

compliance, 13, 347<br />

Component Discovery (SiVuS),<br />

271–273, 369<br />

CompTIA Security (website), 356<br />

Computer Fraud and Abuse Act<br />

(website), 359<br />

Computer Underground Digest (website),<br />

358<br />

computers, physical security<br />

vulnerabilities, 88–91<br />

configuration, of null sessions, 210–212<br />

connection attacks, 254–255<br />

content management systems (CMS), 294<br />

COPS (website), 243<br />

copyrighted materials, 32<br />

cost, of being hacked, 342<br />

Counter Mode with Cipher Block Chaining<br />

Message Authentication Code Protocol<br />

(CCMP), 167<br />

countermeasures<br />

account enumeration, 260–261<br />

ARP poisoning, 150<br />

attacks on unneeded services, 236–238<br />

banner attacks, 257<br />

banner-grabbing attacks, 136–137<br />

buffer-overflow attacks, 244<br />

connection attacks, 254–255<br />

Index<br />

default configuration settings<br />

vulnerabilities, 183–184<br />

default script attacks, 294<br />

directory transversals, 283<br />

DoS attacks, 153<br />

e-mail attachment attacks, 253–254<br />

encrypted traffic attacks, 170<br />

file permission hacks, 242–243<br />

firewall rulebase vulnerabilities, 139<br />

general password-cracking, 114–117<br />

header disclosures, 265<br />

input attacks, 292–293<br />

MAC address spoofing attacks, 150<br />

MAC spoofing, 181<br />

missing patch vulnerability exploits, 224<br />

NetBIOS attacks, 208<br />

network protocol vulnerabilities, 145<br />

NFS attacks, 242<br />

null session hacks, 212–213<br />

password cracking, 195<br />

password reset programs, 190–191<br />

physical security attacks, 182, 245–246<br />

ping sweeping, 132–133<br />

port scanning, 132–133<br />

.rhosts and hosts.equiv file attacks,<br />

240–241<br />

rogue wireless devices, 176–177<br />

SMTP relay attacks, 264<br />

SNMP attacks, 135<br />

social engineering, 77–79<br />

system scanning, 205, 233<br />

unsecured login systems, 298–299<br />

VoIP vulnerabilities, 276<br />

vulnerable wireless workstations, 183<br />

wireless network attacks, 163–164, 170,<br />

172, 176–177, 181, 182, 183, 184<br />

WPS PIN flaw, 172<br />

Crack (website), 364<br />

crackers, defined, 10<br />

cracking passwords<br />

about, 97<br />

on databases, 308–309<br />

defined, 93<br />

with high-tech tools, 100–107<br />

keystroke logging, 110<br />

on laptops, 186–191<br />

network analyzer, 111–112<br />

375

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!