02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

460 Teflon Oil Patch program – unprotected information in web applications<br />

Teflon Oil Patch program, 202<br />

Telnet<br />

banner grabbing with, 117–118, 117, 382<br />

sniffing, 212<br />

Temporal Key Integrity Protocol (TKIP),<br />

355–356, 358<br />

temporary closures from social<br />

engineering, 240<br />

tension wrenches, 405<br />

Terminal Server User group, 132<br />

terminology of footprinting, 87–88<br />

terrorism in social engineering, 240<br />

testing<br />

firewalls, 387<br />

IDSs, 387–388<br />

penetration. See penetration testing<br />

text2cap tool, 217<br />

TFN (Tribe Flood Network), 273<br />

TFN2K tool, 273<br />

TGSs (ticket-granting servers), 167<br />

THC-SCAN program, 107<br />

3G/4G hot spots, 351<br />

three-way handshake process, 33, 33<br />

open ports, 110–111, 111<br />

session hijacking, 295, 295<br />

sniffers, 221, 221<br />

throttling, router, 276<br />

ticket-granting servers (TGSs), 167<br />

Tiger hash function, 68<br />

time to live (TTL) in firewalking, 382<br />

TKIP (Temporal Key Integrity Protocol),<br />

355–356, 358<br />

TOEs (Targets of Evaluation), 10<br />

ToneLoc program, 107<br />

top-level domains, 39<br />

topologies, network, 26–29, 27–29<br />

Tor technology, 121–122<br />

Tracert utility, 96<br />

tracking port usage, 197–198, 198<br />

tracks, covering, 170–172<br />

traffic analysis in wireless networks, 364<br />

training<br />

social engineering, 237<br />

social networking, 245–246<br />

transport layer, 32<br />

Tribe Flood Network (TFN), 273<br />

Trinity Rescue Kit (TRK), 168<br />

Trinoo tool, 273<br />

Triple DES (3DES) algorithm, 61<br />

Tripwire tool, 172, 375<br />

TRK (Trinity Rescue Kit), 168<br />

Trojan Man program, 202<br />

Trojans, 158, 194–195<br />

description, 183<br />

detecting, 196–198, 198<br />

distributing, 201–203<br />

social engineering, 238<br />

tools, 199<br />

trust<br />

as contract consideration, 19<br />

in social engineering, 237–238<br />

trusted root CAs, 66<br />

tshark tool, 217<br />

TTL (time to live) in firewalking, 382<br />

Tunnel EndPoint screen, 72<br />

tunneling<br />

ACK, 386–387<br />

HTTP, 387<br />

ICMP, 386<br />

reverse SSH, 362<br />

tunneling viruses, 187<br />

Twitter<br />

description, 92<br />

number of users, 242<br />

Twofish algorithm, 62<br />

type mismatches, 342<br />

U<br />

Ubuntu CAM table overflow, 225<br />

UDP Flood tool, 273<br />

UDP protocol<br />

scans, 115–116<br />

services and ports, 133<br />

session hijacking, 301<br />

unauthorized destruction of information, 6<br />

unidirectional antennas, 353–354<br />

uniform resource identifiers (URIs), 312<br />

Unix operating system, 139–141<br />

unprotected information in web<br />

applications, 320

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!