19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Virtual Private Network (VPN) services, 56<br />

VirtualBox (website), 55<br />

Visio, 330<br />

VLAN barrier, 271<br />

VMware Player (website), 55<br />

VMware vCenter Protect (website),<br />

328, 366<br />

VMware Workstation (website), 55<br />

VNC (website), 89<br />

Voice over Internet Protocol (VoIP)<br />

about, 16, 268–269<br />

countermeasures against<br />

vulnerabilities, 276<br />

tools and resources, 368–369<br />

vulnerabilities, 269–275<br />

voice traffic, 273–275<br />

VoIP For Dummies (Kelly), 269<br />

VoIP Hopper (website), 271, 369<br />

VoIP Servers, 72<br />

vomit (website), 275, 369<br />

VRFY command, 258–259, 260<br />

vulnerabilities. See also risks<br />

assessing, 58–60<br />

assessing Linux system, 229–233<br />

database, 309–310<br />

eliminating, 352<br />

Linux, 228, 234–235<br />

messaging system, 251–252<br />

of mobile devices, 185–186<br />

of network infrastructure, 125–126,<br />

154–155<br />

password, 94, 96–97<br />

prioritizing, 320–322<br />

responding to, 43–44<br />

SNMP, 133–135<br />

web, 280–300<br />

Windows (Microsoft), 200, 203–208<br />

of wireless networks, 157–158<br />

• W •<br />

Warning! icon, 6<br />

weak BIOS passwords, 113<br />

weak password storage, 110–111<br />

Web 2.0, 299<br />

web access controls, bypassing, 27<br />

Web crawling, 51<br />

Index<br />

Web Proxy, 286<br />

Web search, 50–51<br />

WebGoat (website), 370<br />

WebInspect, 21, 152, 278, 286, 288–289, 291,<br />

300, 370<br />

websites and applications. See also specific<br />

websites<br />

about, 16, 277<br />

cantennas, 160<br />

choosing web application tools, 278<br />

commonly exploited vulnerabilities, 59<br />

default system passwords, 113<br />

dictionary files, 168<br />

for gathering public information, 52<br />

hacker’s viewpoint, 353<br />

live bootable Linux toolkits, 158<br />

minimizing security risks, 300–304<br />

port number listing, 362<br />

port number lookup, 362<br />

rainbow tables, 105, 365<br />

registered port numbers, 57<br />

Sima on hacking web applications, 279<br />

tools and resources, 369–370<br />

vendors and products affected by SNMP<br />

vulnerabilities, 134<br />

vulnerabilities, 280–300<br />

Wellenreiter (website), 158, 372<br />

WEPCrack (website), 166, 372<br />

WhatIsMyIP (website), 358, 363<br />

white hat (good-guy) hackers, 1, 10, 28<br />

Whois, 52–53, 54, 358<br />

WiEye app, 160<br />

WiFi. See wireless LANS (WiFi)<br />

Wi-Fi Protected Access (WPA), 165–169<br />

Wi-Fi Protected Setup (WPS), 170–172<br />

WiFi Scanner app, 160<br />

WiGLE database (website), 161, 372<br />

WildPackets’ OmniPeek (website), 21, 55,<br />

111, 127, 140, 160, 168–169, 174, 275,<br />

362, 369, 372<br />

Wilensky, Marshall (author)<br />

TCP/IP For Dummies, 6th Edition, 123<br />

Wiles, Jack (information<br />

security pioneer), 83<br />

WinAirsnort (website), 372<br />

389

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!