19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

390<br />

Hacking For Dummies, 4th Edition<br />

Windows (Microsoft)<br />

about, 199–200<br />

assessing vulnerabilities, 203–208<br />

checking share permissions, 214–215<br />

choosing tools, 201–203<br />

cracking passwords with pwdump3 and<br />

John the Ripper, 105–106<br />

detecting null sessions, 208–213<br />

exploiting missing patches, 216–224<br />

MAC address spoofing in, 149–150<br />

password vulnerabilities, 95<br />

running authenticated scans, 225–226<br />

securing, 118<br />

security, 216<br />

storage locations for passwords, 102<br />

tools and resources, 371<br />

vulnerabilities, 200<br />

Windows 7, 208, 213, 214<br />

Windows 8, 208, 216<br />

Windows 2000/NT, 213, 214<br />

Windows Firewall, 205, 208<br />

Windows Registry, 149–150<br />

Windows Server 2003 SPI, 203<br />

Windows Server 2008/R2, 208, 213, 214<br />

Windows Server Update Services (WSUS),<br />

224, 328, 366<br />

Windows Update, 328<br />

Windows Virtual PC (website), 55<br />

Windows XP, 208, 214<br />

Winfo (website), 202, 210, 371<br />

WinHex (website), 116, 293, 365<br />

Winkler, Ira (professional<br />

social engineer), 67<br />

WinMagic (website), 90, 245, 368<br />

WinNuke, 151<br />

WinZip (website), 106, 361<br />

Wired Equivalent Privacy (WEP), 165–169<br />

wireless LANs (WiFi)<br />

about, 157<br />

attacks and countermeasures, 163–184<br />

choosing tools, 158, 160<br />

discovering, 161–163<br />

implications of vulnerabilities, 157–158<br />

Wright on hacking, 159<br />

wireless networks, tools and resources,<br />

371–372<br />

Wireless Networks For Dummies (Davis and<br />

Lewis), 177, 182<br />

Wireless Security Auditor (Elcomsoft), 160,<br />

168, 170, 371<br />

Wireless Vulnerabilities and Exploits<br />

(website), 369<br />

wireless workstations, 182–183<br />

Wireshark (website), 55, 111, 127, 140, 363<br />

Wotsit’s Format (website), 358<br />

Wright, Joshua (senior<br />

security analyst), 159<br />

WSDigger (website), 299, 370<br />

WSFuzzer (website), 299, 370<br />

• X •<br />

xinetd program, 236–237<br />

• Y •<br />

Yahoo! Finance (website), 71, 358<br />

YouTube (website), 50<br />

• Z •<br />

ZabaSearch (website), 52, 358<br />

zombies, 77

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!