02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

uffer overflows – cookies 443<br />

buffer overflows<br />

heap and stack, 267–271, 268–269<br />

web applications, 314<br />

worms, 190<br />

building exterior, securing, 408–409<br />

bus topology, 26–27, 27<br />

BusinessWire service, 94<br />

bytes, 36<br />

C<br />

Cain & Abel tool<br />

ARP poisoning, 225, 226<br />

IV encryption keys, 358<br />

calculating IDs in session hijacking, 285<br />

CAM (content addressable memory) tables,<br />

224–225<br />

camouflage viruses, 187<br />

CAN-SPAM Act, 183<br />

capinfos tool, 217<br />

cards<br />

contactless, 406<br />

wireless networks, 365<br />

CAs (certification authorities), 64–66<br />

Catch Me If You Can movie, 239<br />

cavity viruses, 187<br />

CCMP (Counter Mode with Cipher Block<br />

Chaining Message Authentication Code<br />

Protocol), 355–356<br />

ceilings, 407<br />

celebrities in social networking, 244<br />

certificates, digital, 64–67<br />

certification authorities (CAs), 64–66<br />

channels, overt and covert, 195, 203–205<br />

Check Point FireWall-1, 382<br />

choke points in firewalls, 379<br />

chosen ciphertext attacks, 70<br />

chosen plaintext attacks, 70<br />

CIA triad, 14<br />

cipher locks, 404, 404<br />

ciphers, 60<br />

ciphertext, 60<br />

ciphertext-only attacks, 70<br />

circuit-level gateways, 381<br />

Cisco IOS MAC flood mitigation, 228<br />

cleartext, 60<br />

client misassociation in wireless networks,<br />

363<br />

client-server relationship in web applications,<br />

310–313<br />

cloaked SSIDs, 353<br />

closures from social engineering, 240<br />

cluster viruses, 187<br />

CNBC for company information, 94<br />

Code of Fair Information Practices, 19<br />

Code Red virus, 191<br />

collision domains, 41<br />

columns in databases, 335<br />

command injection, 286<br />

Communicating With Computers That Do<br />

Not Support IPsec screen, 72<br />

Communications Assistance for Law<br />

Enforcement Act, 19<br />

companion viruses, 187<br />

competitive analysis in footprinting,<br />

94–95<br />

Completing The IP Filter Wizard screen, 72<br />

Completing The IP Security Filter Action<br />

Wizard screen, 72<br />

Completing The IP Security Policy Wizard<br />

screen, 72<br />

Completing The Security Rule Wizard<br />

screen, 72<br />

computer crime laws, 4<br />

Computer Fraud and Abuse Act, 4, 19, 182<br />

computer specific DoS attacks, 262<br />

confidentiality<br />

cryptography for, 59<br />

pen tests, 13<br />

connection-oriented protocols, 33<br />

connections, desynchronizing, 293–294, 294<br />

construction kits for Trojans, 202<br />

contactless cards, 406<br />

content addressable memory (CAM) tables,<br />

224–225<br />

content component in web applications, 313<br />

contracts<br />

considerations, 19<br />

ethical hacking, 8–9<br />

convenience vs. security, 12, 12<br />

cookies, 289, 312, 320

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!