19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

382<br />

Hacking For Dummies, 4th Edition<br />

network analyzer<br />

about, 139–140<br />

countermeasures against<br />

vulnerabilities, 145<br />

cracking passwords with, 111–112<br />

programs, 140–145<br />

Network Basic Input/Output System<br />

(NetBIOS), 201, 206–208, 212<br />

network browsing, UDP ports for, 206<br />

network components, physical security<br />

vulnerabilities, 88–91<br />

network infrastructure<br />

about, 123<br />

attacks, 15–16<br />

Chappell on, 124<br />

choosing tools, 126–127<br />

installing general network defenses,<br />

155–156<br />

performing ethical hacks on, 127–153<br />

vulnerabilities of, 125–126, 154–155<br />

Network Security For Dummies (Cobb), 118,<br />

325, 328<br />

Network Security Toolkit (website),<br />

158, 360<br />

Network Users (website), 371<br />

networks<br />

analyzing data, 139–145<br />

finding databases on, 306, 308<br />

finding storage systems on, 312<br />

mapping, 52–54<br />

segmenting, 156<br />

tools and resources, 361–363<br />

Nexpose (Rapid7), 60, 61, 127, 202, 357,<br />

359, 362, 371<br />

NFS-based Network Attached Storage<br />

(NAS) systems, 311<br />

Nigerian 419 e-mail fraud scheme, 77<br />

Nmap, 55, 127, 130, 131–132, 204, 205, 223,<br />

228, 235, 311, 362<br />

NMapWin (website), 58, 127, 362<br />

NoLmHash registry key, 118<br />

nontechnical attacks, 15<br />

North American Electric Reliability<br />

Corporation (NERC)<br />

CIP requirements, 13<br />

NT hashes, 105<br />

NT Objectives (website), 292<br />

NTAccess (website), 187, 365<br />

NTOSpider (NT Objectives), 292, 300, 370<br />

null sessions, detecting, 208–213<br />

• O •<br />

Objectif Sécurité (website), 95<br />

obscurity, security by, 300–301<br />

Oeschslin, Philippe (researcher), 95<br />

Offensive Security’s Exploits Database<br />

(website), 223, 357<br />

office, physical security in, 84–91<br />

Official Internet Protocol Standards<br />

(website), 123<br />

omnidirectional wireless antenna, 160<br />

OmniPeek (WildPacket), 21, 55, 111, 127,<br />

140, 160, 168–169, 174, 275, 362,<br />

369, 372<br />

Open Group’s Risk Taxonomy (website),<br />

321, 366<br />

open ports, 55–58<br />

Open Source Security Testing Methodology<br />

Manual (website), 61, 366<br />

Open Web Application Security Project<br />

(website), 59, 277<br />

OpenSSH, 248<br />

OpenSSL, 248<br />

operating guidelines, for minimizing e-mail<br />

security threats, 268<br />

operating systems, 16, 118–119<br />

ophcrack, 21, 101, 187–190, 361, 364<br />

ophcrack LiveCD (website), 88<br />

Oracle, 308, 357<br />

organizational password vulnerabilities,<br />

94, 96<br />

OS reload (Windows 8), 216<br />

Outlook Web Access (OWA), 297<br />

outside-in perspective, 56<br />

outsourcing<br />

ethical hacking, 334–335<br />

security monitoring, 333–334<br />

testing, 354<br />

OWASP (website), 366<br />

OWASP WebGoat Project (website), 300<br />

Oxygen Forensic Suite (website),<br />

195, 361, 364

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!