19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

376<br />

Hacking For Dummies, 4th Edition<br />

cracking passwords (continued)<br />

old-fashioned way, 97–100<br />

password-protected files, 108–109<br />

phones and tablets, 191–195<br />

statistics, 108<br />

weak BIOS passwords, 113<br />

weak password storage, 110–111<br />

weak passwords in limbo, 113–114<br />

crashing systems, 18<br />

crawlers, 280–281<br />

credibility, establishing, 344<br />

criminal hackers, 28<br />

cross-site scripting (XSS), 291–292<br />

CWE/SANS Top 25 Most Dangerous<br />

Programming Errors (website), 369<br />

CxDeveloper (Checkmarx), 192, 302–304,<br />

361, 370<br />

cyberterrorists, 29<br />

• D •<br />

daemons, 229. See also Linux<br />

Damballa Failsafe (website), 151, 355<br />

data leakage prevention (DLP) system, 332<br />

databases<br />

about, 305<br />

Andrews on, 307–308<br />

choosing tools for testing security,<br />

305–306<br />

cracking passwords, 308–309<br />

finding on network, 306, 308<br />

minimizing security risks, 310–311<br />

tools and resources, 356–357<br />

vulnerabilities, 309–310<br />

Davis, Peter T. (author)<br />

Hacking Wireless Networks For Dummies,<br />

167, 173, 323<br />

Wireless Networks For Dummies, 177, 182<br />

Debian Linux Security Alerts (website), 365<br />

Debian Package System (dpkg), 247<br />

deceit<br />

through technology, 76–77<br />

through words and actions, 74–75<br />

Deep Freeze Enterprise (website), 110, 367<br />

default configuration settings,<br />

vulnerabilities with, 183–184<br />

default script attacks, 294<br />

default share permission (Windows), 214<br />

Default vendor passwords (website), 364<br />

defense in-depth perspective, 330<br />

Dell SecureWorks (website), 333<br />

de-militarized zone (DMZ) segment, 312<br />

denial of service (DoS) attacks, 16, 131,<br />

150–153<br />

dictionary attacks, for<br />

cracking passwords, 103<br />

Digital Hotspotter (Canary Wireless), 160,<br />

175, 371<br />

dipoles, 160<br />

directional wireless antenna, 160<br />

directory harvest attack (DHA), 258<br />

directory transversal, 280–283<br />

disabling<br />

commands, 240<br />

File and Printer Sharing for Microsoft<br />

Networks, 213<br />

NetBIOS, 208<br />

unneeded services, 236–238<br />

distributed DoS (DDoS) attacks, 151–152<br />

Distributed Password Recovery<br />

(Elcomsoft), 100, 308–309, 356, 364<br />

distribution updates, 247–248<br />

DNS Tools (website), 357<br />

DNSstuff.com (website), 53, 357, 360<br />

Dogwood Management Partners Security<br />

Posters (website), 368<br />

dollar sign ($), 208<br />

dpkg (Debian Package System), 247<br />

Draper, John (hacker), 27<br />

drop ceilings, 85<br />

dsniff (website), 146, 265, 362<br />

DumpSec (website), 58, 117, 210, 371<br />

dumpster diving, for social engineering<br />

attacks, 71–72<br />

• E •<br />

eBlaster (website), 110, 364<br />

EC-Council (website), 12<br />

Ecora Patch Manager (website), 328, 365<br />

Effective File Search (website), 312, 367<br />

effectiveness, of ethical hacking, 347–350<br />

EICAR, 266, 360

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!