02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

458 sniffers – stateful multilayer inspection firewalls<br />

sniffers, 209–210<br />

attack detection, 230<br />

exam essentials, 230<br />

law enforcement issues, 212<br />

overview, 210–212<br />

reading output, 221–224, 221–223<br />

review questions, 231–234<br />

session, 289<br />

session hijacking, 286<br />

summary, 230<br />

switched networks. See switched network<br />

sniffing<br />

TCPdump, 218–221, 218–220<br />

tools, 213<br />

Wireshark, 214–218, 214–218<br />

sniffing packets, 157<br />

SNMP (Simple Network Management<br />

Protocol)<br />

description, 133<br />

enumeration with, 137–139<br />

exploiting, 130<br />

SNMPv1 protocol, 137<br />

SNMPv2 protocol, 138<br />

SNMPv3 protocol, 138<br />

SNScan utility, 139<br />

social engineering, 5, 18, 235–236<br />

cryptography attacks, 70<br />

description, 236–237<br />

effectiveness, 237–238<br />

exam essentials, 252–253<br />

footprinting, 88, 96–97<br />

identity theft, 250–252<br />

impact, 239–240<br />

phases, 239<br />

review questions, 254–257<br />

social networking, 241–246<br />

success, 238–239<br />

summary, 252<br />

targets, 240–241<br />

threats, 246–249<br />

social networking<br />

countermeasures, 245–246<br />

footprinting, 91–92<br />

mistakes, 243–245<br />

overview, 241–242<br />

software<br />

malicious. See malware<br />

piracy, 5<br />

software-based access points (SAPs), 351<br />

software installation, spyware infection in,<br />

193<br />

solar film windows, 408<br />

solid-core doors, 402<br />

Sony Corporation, attack on, 331<br />

source IP reputation filtering, 277<br />

source routing, 293, 293, 385–386<br />

SOX (Sarbanes-Oxley) law, 19<br />

SPAN (Switched Port Analyzers) ports, 227<br />

sparse-infector viruses, 187<br />

Spears, Britney, 242<br />

Spector Pro tool, 204<br />

splicing, session, 384<br />

spoofing<br />

DNS, 293<br />

vs. hijacking, 286<br />

IP, 292, 292, 385–386<br />

MAC, 226, 362<br />

spyware, 158<br />

description, 183<br />

infection methods, 192–193<br />

SQL injection, 329–330<br />

blind, 341<br />

countermeasures, 343–344<br />

data alteration, 339–341<br />

database vulnerabilities, 334–336<br />

evading detection mechanisms, 342–343<br />

exam essentials, 344<br />

information gathering, 342<br />

initiating attacks, 337–339<br />

overview, 330–332<br />

results, 332–333<br />

review questions, 345–347<br />

summary, 344<br />

targets, 336–337<br />

web applications, 333–334<br />

SQL Slammer worm, 190–191<br />

SQLPing 3.0 tool, 335–336<br />

SQLRecon tool, 335<br />

SSH tunneling, reverse, 362<br />

SSIDs (service set identifiers), 352–353<br />

SSL (Secure Sockets Layer), 74<br />

Stacheldraht tool, 273<br />

stack overflows, 267–271, 268–269<br />

standard windows, 408<br />

star layout, 27, 28<br />

stateful multilayer inspection firewalls, 381

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!