19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

388<br />

Hacking For Dummies, 4th Edition<br />

tools and resources (continued)<br />

log analysis, 360<br />

messaging, 360–361<br />

Microsoft, 201<br />

miscellaneous, 361<br />

mobile, 361<br />

networks, 361–363<br />

password cracking, 363–365<br />

patch management, 365–366<br />

port scanning, 130–132<br />

security education and learning<br />

resources, 366<br />

security methods and models, 366<br />

selecting, 20–22<br />

social engineering, 366<br />

source code analysis, 367<br />

storage, 367<br />

system hardening, 367–368<br />

task-specific, 202–203<br />

for testing database security, 305–306<br />

for testing Linux systems, 228–229<br />

for testing storage system security, 311<br />

user awareness and training, 368<br />

using the right, 354<br />

Voice over IP, 368–369<br />

vulnerability databases, 369<br />

for web applications, 278<br />

websites and applications, 369–370<br />

Windows, 371<br />

for Windows hacking and testing, 201–203<br />

wireless networks, 371–372<br />

for WLAN security, 158, 160<br />

top talkers, 143<br />

traffic, capturing, 265–266, 273–275<br />

Traffic IQ Professional (idappcom),<br />

152, 363<br />

training, as countermeasure against social<br />

engineering, 78–79<br />

Transmission Control Protocol (TCP), 56,<br />

128, 206<br />

Tripwire, 243<br />

TrueCrypt (website), 245, 368<br />

trust, building in social engineering<br />

attacks, 73–74<br />

trustworthiness, 17<br />

Twitter (website), 21, 50<br />

2600-The Hacker Quarterly (magazine), 33,<br />

353, 358<br />

• U •<br />

UDPFlood (website), 152, 363<br />

unauthenticated enumeration, 206–207<br />

unauthorized software, 27<br />

Unified Extensible Firmware Interface<br />

(UEFI), 216<br />

unified threat management<br />

(UTM) systems, 49<br />

United States Patent and Trademark Office<br />

(website), 358<br />

United States state breach notification laws<br />

(website), 359<br />

UNIX variants<br />

cracking passwords with<br />

John the Ripper, 107<br />

securing, 119<br />

storage locations for passwords, 102<br />

UNIX-based systems, MAC address<br />

spoofing in, 149<br />

unlimited attack, 20<br />

unsecured interfaces, 154<br />

unsecured login mechanisms, 295–298<br />

up2date, 247<br />

upper management buy-in, 341–345<br />

URL manipulation, 285–286<br />

U.S. Department of Defense’s Password<br />

Management Guideline document<br />

(website), 104<br />

US Search.com (website), 358<br />

U.S. Securities and Exchange Commission<br />

(website), 52, 71, 358<br />

US-CERT Vulnerability Notes Database<br />

(website), 58, 369<br />

user awareness and training, 368<br />

User Datagram Protocol (UDP), 128, 206<br />

user ID, 94<br />

user password vulnerabilities, 94, 96<br />

utilities, physical security vulnerabilities<br />

of, 85–86<br />

• V •<br />

value, showing, 345<br />

vendors, false, 66<br />

Veracode (website), 302, 361, 367, 370<br />

Verizon Data Breach Investigations<br />

Report, 93

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!