19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

386<br />

Hacking For Dummies, 4th Edition<br />

7-Zip (website), 106, 361<br />

SFTP, 254<br />

Share Finder tool, 207–208<br />

share permissions, checking, 214–215<br />

ShareEnum (website), 202<br />

share-finder tool, 58<br />

shares, 207–208<br />

shoulder surfing, 93, 98–99<br />

showing value, 345<br />

Sima, Caleb (application security<br />

expert), 279<br />

Simple Mail Transfer Protocol (SMTP)<br />

about, 16<br />

account enumeration, 258–261<br />

capturing traffic, 265–266<br />

e-mail header disclosures, 264–265<br />

malware, 266–267<br />

relay, 261–264<br />

Simple Network Management Protocol<br />

(SNMP), 133–135<br />

Simple Phishing Toolkit (website),<br />

68, 73, 366<br />

sipsak (website), 273, 369<br />

SiteDigger (website), 370<br />

SiVuS, 271–273, 369<br />

Slackware Linux Security Advisories<br />

(website), 365<br />

Slackware Package Tool (pkgtool), 247<br />

SMAC (KLC Consulting), 149–150, 180<br />

SMAC MAC address changer (website), 363<br />

small services, 229<br />

SMB (Server Message Block), 206<br />

S/MIME, 267<br />

SMTP banner, 256–257<br />

SMTP command, 136<br />

smtpscan (website), 257, 361<br />

Smurf (website), 356<br />

Snagit, 48<br />

SNARE (website), 363<br />

sniffdet (website), 112, 145, 363<br />

Sniffer tool, 139<br />

sniffing, defined, 139<br />

SNMPUTIL (website), 134, 363<br />

social engineering<br />

about, 65–66<br />

countermeasures, 77–79<br />

cracking passwords with, 97–98<br />

implementing attacks, 70–77<br />

implications of, 69–70<br />

tests, 66, 68<br />

tools and resources, 366<br />

why attackers use, 68–69<br />

Winkler case study, 67<br />

social engineering attacks, performing<br />

about, 70<br />

building trust, 73–74<br />

exploting relationship, 74–77<br />

seeking information, 70–73<br />

social media, 50<br />

software<br />

for minimizing e-mail security threats, 267<br />

password-cracking, 100–102<br />

unauthorized, 27<br />

SonicWALL (website), 301, 310, 315, 363<br />

source code, analyzing, 302–304, 367<br />

Sourcefire (website), 151, 301–302, 355, 363<br />

SourceForge (website), 229, 360<br />

Special Ops Security, Inc., 308<br />

Spector Pro (SpectorSoft), 110, 359, 364<br />

SPI Dynamics, 279<br />

SPI Labs, 279<br />

SPI Proxy, 286–287<br />

sponsorship, 19<br />

SQL Inject Me (website), 291, 370<br />

SQL injection, 27, 287–291<br />

SQL Power Injector (website), 291, 370<br />

SQL Server Security (Andrews), 308<br />

SQLPing3, 102, 306, 308, 357, 365<br />

SQLSecurity.com (website), 308<br />

SSL (HTTPS), 156<br />

stateful inspection rules, 156<br />

storage of passwords, 102, 110–111, 115<br />

storage overload (e-mail), 253<br />

storage systems<br />

about, 311<br />

choosing tools for testing security, 311<br />

finding on network, 312<br />

finding sensitive text in network files,<br />

312–314<br />

minimizing security risks, 315<br />

tools and resources, 367<br />

Super Cantenna kit (website), 160, 372<br />

support personnel, false, 66

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!