02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Department of Energy (DoE), attack on, – 802.11i standard 445<br />

targets, 262<br />

tools, 273–275, 274–276<br />

types, 262–266, 265–267<br />

web applications, 315<br />

WEP, 357<br />

wireless networks, 363<br />

Department of Energy (DoE), attack on, 331<br />

DES (Data Encryption Standard), 61<br />

design step in viruses, 185<br />

destination hosts in firewalking, 382<br />

destructive Trojans, 196<br />

desynchronization<br />

connections, 293–294, 294<br />

session hijacking, 286<br />

detection<br />

IDSs. See intrusion detection systems (IDSs)<br />

social engineering, 237<br />

Trojans and viruses, 185, 196–198, 198<br />

DHTML (dynamic HTML), 311<br />

diagrams, network, 119–120, 120<br />

dial-up, 106–107<br />

Dice.com site, 93<br />

dictionary attacks, 155–156<br />

differential backups, 49<br />

Diffie, Whitfield, 62<br />

digital certificates, 64–67<br />

Direct Host service, 133<br />

directional antennas, 353–354<br />

directory services<br />

brute-force attacks, 130<br />

enumeration, 141–142<br />

directory traversal attacks, 321–322<br />

DirecTV network dishes, 355<br />

disabling<br />

auditing, 170–171<br />

unnecessary services, 276<br />

disclosure in CIA triad, 14<br />

Discoverable Bluetooth mode, 366<br />

Dish network dishes, 355<br />

disrupt attacks, 264<br />

disruption in CIA triad, 14<br />

distributed databases, 334<br />

distributed denial-of-service (DDoS) attacks, 6<br />

overview, 271–273, 272<br />

tools, 273–275, 274–276<br />

web applications, 315<br />

distributed network attacks (DNAs), 162<br />

distributing Trojans, 201–203<br />

DMZs (demilitarized zones), 381<br />

DNAs (distributed network attacks), 162<br />

DoE (Department of Energy), attack<br />

on, 331<br />

Domain Name System (DNS), 39<br />

spoofing, 293<br />

zone transfers, 130<br />

doors and mantraps, 402–403<br />

DoS attacks. See denial-of-service (DoS)<br />

attacks<br />

DoSHTTP tool, 273<br />

drawing network diagrams, 119–120, 120<br />

drives<br />

encrypting, 399<br />

mobile devices, 397–400, 400<br />

password theft, 164<br />

wiping, 400<br />

Dsniff tools, 213<br />

dumpcap tool, 217<br />

dumpster diving, 5, 97, 247<br />

dynamic content in man-in-the-browser<br />

attacks, 290–291<br />

dynamic HTML (DHTML), 311<br />

dynamic ports, 37<br />

E<br />

e-commerce, cryptography in, 58<br />

EAP (Extensible Authentication Protocol), 356<br />

eavesdropping, 97, 246<br />

EC-Council (International Council of<br />

Electronic Commerce Consultants), 8<br />

economic loss from social engineering, 239<br />

EDGAR (Electronic Data-Gathering,<br />

Analysis, and Retrieval system), 94<br />

editcap tool, 217<br />

education<br />

social engineering, 237<br />

social networking, 245–246<br />

effectiveness of social engineering, 237–238<br />

egress filtering, 276<br />

Egyptian hieroglyphics, 57–58<br />

802.11i standard, 356

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!