02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

sequence numbers in packets – smurf attacks 457<br />

sequence numbers in packets, 33, 34<br />

SERP (search engine results page), 89<br />

Serpent algorithm, 62<br />

server administrators in client-server<br />

relationship, 310<br />

server-side technologies<br />

description, 311<br />

SQL injection, 333–334<br />

ServerMask tool, 118<br />

servers<br />

client-server relationship, 310–313<br />

proxy, 120–122<br />

web. See webservers and web applications<br />

Service group, 132<br />

service request floods, 262–263<br />

service set identifiers (SSIDs), 352–353<br />

services<br />

degraded, 277<br />

disabling, 276<br />

enumeration. See enumeration of<br />

services<br />

Windows, 132–133<br />

session fixation attacks, 291–292<br />

session hijacking, 283–284<br />

active and passive attacks, 287–288,<br />

287–288<br />

application-level, 289–290<br />

concepts, 292–294, 292–294<br />

defensive strategies, 302<br />

exam essentials, 303<br />

man-in-the-browser attacks, 290–291<br />

man-in-the-middle attacks, 290, 297–301,<br />

297–301<br />

overview, 284–285, 284<br />

review questions, 304–307<br />

summary, 302–303<br />

TCP/IP, 295–296, 295<br />

UDP, 301<br />

web apps, 288–289<br />

session IDs, 286<br />

predicting, 286<br />

web applications, 288–289, 320<br />

session layer, 32<br />

session management issues in web<br />

applications, 320<br />

session sniffing, 289<br />

session splicing, 384<br />

session tracking component in web<br />

applications, 313<br />

SETI@home project, 162–163<br />

sexual solicitations in social networking, 244<br />

SFind tool, 172<br />

SHA-0 (Secure Hash Algorithm-0), 68<br />

SHA-1 (Secure Hash Algorithm-1), 68<br />

SHA-2 (Secure Hash Algorithm-2), 68<br />

Shamir, Adi, 60<br />

shared key authentication, 355<br />

sharing information in social<br />

networking, 243<br />

sheep-dip systems, 189–190<br />

Shell viruses, 188<br />

shellcode, 270<br />

shopping websites in social networking, 249<br />

shoulder surfing, 97, 246<br />

showmount command, 140<br />

SIDs (security identifiers), 132<br />

Siebel program, 332<br />

signature detection, 376–377<br />

Simple Mail Transfer Protocol (SMTP)<br />

description, 133<br />

enumeration, 143–144<br />

sniffing, 212<br />

Simple Network Management Protocol<br />

(SNMP)<br />

description, 133<br />

enumeration with, 137–139<br />

exploiting, 130<br />

Site Report page, 90<br />

site survey tools, 361<br />

smart cards, 396<br />

smashing stacks, 269, 269<br />

SMB over NetBIOS, 133<br />

SMB over TCP, 133<br />

Smith, David L., 4<br />

SMTP (Simple Mail Transfer Protocol)<br />

description, 133<br />

enumeration, 143–144<br />

sniffing, 212<br />

SMTP Relay service, 145<br />

smurf attacks, 263, 315

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!