19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

malware, 151, 266–267, 355<br />

Managing an Information Security and<br />

Privacy Awareness and Training<br />

Program (Herold), 368<br />

man-in-the-middle (MITM) attacks, 146<br />

manual assessments, 59<br />

mapping<br />

networks, 52–54<br />

null sessions, 209<br />

maxsize variable, 284<br />

media access control (MAC), 146<br />

messaging. See communication and<br />

messaging systems<br />

Metasploit<br />

about, 21, 278<br />

exploiting missing patches, 216–224<br />

website, 61, 202, 218, 244, 267, 357<br />

methodology<br />

assessing vulnerabilities, 58–60<br />

footprinting, 49–54<br />

open ports, 56–58<br />

penetrating the system, 60–61<br />

scanning systems, 54–56<br />

testing, 47–49<br />

Microsoft Baseline Security Analyzer<br />

(MBSA), 201, 226, 328, 371<br />

Microsoft Knowledge Base<br />

Article 246261, 213<br />

Microsoft Security Compliance Manager<br />

(website), 311, 367<br />

Microsoft SQL Server 2008 Management<br />

Studio Express (website), 309<br />

Microsoft SQL Server Management Studio<br />

Express (website), 357<br />

Microsoft SQL Server systems, 306<br />

Microsoft TechNet Security Center<br />

(website), 365<br />

Microsoft tools, 201<br />

military resources, 53<br />

minimizing<br />

database security risks, 310–311<br />

storage system security risks, 315<br />

web security risks, 300–304<br />

minimum necessary mentality, 153<br />

mirroring, 278<br />

missing patches, exploiting, 216–224<br />

mistakes, 351–354<br />

Mitnick, Kevin (hacker), 27, 29<br />

mobile device management (MDM), 191<br />

mobile devices<br />

about, 185<br />

apps, 192<br />

cracking laptop passwords, 186–191<br />

cracking phones and tablets, 191–195<br />

tools and resources, 361<br />

vulnerabilities of, 185–186<br />

monitor mode, 142<br />

monitoring malicious use, 332–334<br />

multi-platform update managers, 248<br />

mxtoolbox (website), 53<br />

MySQL, 248<br />

• N •<br />

Index<br />

National Institute of Standards and<br />

Technology (NIST), 58, 118, 276, 328,<br />

365, 369<br />

National Vulnerability Database (website),<br />

97, 234, 320, 323, 369<br />

nbtstat (NetBIOS over TCP/IP Statistics),<br />

201, 206–207<br />

Nessus (website), 229, 362<br />

net use command, 209<br />

net view command, 210<br />

NetBIOS Auditing Tool (website), 365<br />

NetBIOS over TCP/IP Statistics (nbstat),<br />

201, 206–207<br />

Netcat (website), 137–138, 362<br />

Netcraft search utility, 57<br />

Netcraft’s What’s that site running?<br />

(website), 358<br />

netfilter/iptables (website), 362<br />

NetResident (TamoSoft), 143–145, 265, 362<br />

NetScanTools Pro, 55, 126, 132, 134, 152,<br />

202–204, 228–230, 232–233, 261, 362<br />

netstat command, 236<br />

NetStumbler, 162–163, 172–173,<br />

177–181, 372<br />

NetUsers tool (website), 212<br />

Network Address Translation (NAT), 156<br />

381

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!