19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Health Insurance Portability and<br />

Accountability Act (HIPAA), 13, 359<br />

Herold, Rebecca (author)<br />

Managing an Information Security and<br />

Privacy Awareness and Training<br />

Program, 368<br />

hidden field manipulation, 286–287<br />

hidden shares, 208<br />

high-tech tools, cracking password with,<br />

100–107<br />

hiring reformed hackers, 335<br />

Homebrew WiFi antenna (website), 371<br />

Honeypots: Tracking Hackers<br />

(website), 358<br />

Hoovers (website), 52, 71, 358<br />

hosts, 55<br />

hosts.equiv file, 238–241<br />

HP ArcSight Logger (website), 333<br />

HTTP command, 136<br />

httpd (Apache web server), 229, 248<br />

HTTPS (SSL), 156<br />

HTTrack Website Copier, 51, 278,<br />

280–281, 370<br />

Hypertext Preprocessor (PHP), 294<br />

Hypertext Transfer Protocol (HTTP),<br />

16, 254, 280. See also websites and<br />

applications<br />

• I •<br />

IBM Tivoli Endpoint Manager (website),<br />

328<br />

icons, explained, 6<br />

idappcom’s Traffic IQ Professional<br />

(website), 152, 363<br />

Identity Finder, 110–111, 311, 314, 367<br />

Idera (website), 310, 356<br />

IETF RFCs (website), 362<br />

ifconfig command, 177<br />

IKECrack tool (website), 154, 362<br />

IMAP e-mail services, 257<br />

impact of exploitation, 321<br />

impersonating employees, 75<br />

Imperva (website), 367<br />

implications, of social engineering, 69–70<br />

inetd.conf, 236–237<br />

Index<br />

inference, cracking passwords with, 99<br />

information, seeking in social engineering<br />

attacks, 70–73<br />

information gathering, from null sessions,<br />

210–212<br />

InGuardians, Inc., 159<br />

input-filtering attacks, 283–293<br />

(IN)SECURE Magazine, 33<br />

insurance, 36<br />

interfaces, unsecured, 154<br />

internal hosts, scanning, 54–55<br />

Internet, using for social engineering<br />

attacks, 71<br />

Internet Key Exchange (IKE) protocol,<br />

154–155<br />

Internet Password Breaker<br />

(Elcomsoft), 187<br />

Internet Relay Chat (IRC), 33<br />

Internet Security Systems, 279<br />

Interpact, Inc. Awareness Resources<br />

(website), 368<br />

interprocess communication<br />

(IPC$), 208, 214<br />

intruder lockout, 117<br />

intrusion detection systems (IDSs),<br />

49, 332, 333<br />

intrusion prevention system, 27<br />

inurl operator, 282<br />

Invisible KeyLogger Stealth (website), 110,<br />

359, 364<br />

iOS Forensic Toolkit (Elcomsoft),<br />

192–195, 361<br />

iOS passwords, cracking, 192–195<br />

IP Personality (website), 301<br />

IPSec support, 170<br />

iptables firewall, 233<br />

iSCSI Storage Area Networks (SANs), 311<br />

• J •<br />

Japan’s Personal Information Protection<br />

Act (JPIPA), 13<br />

The Jargon File (website), 358<br />

John the Ripper (website), 101, 105–106,<br />

107, 364<br />

379

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!