02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

462 webservers and web applications – www.cvedetails.com site<br />

webservers and web applications<br />

(continued)<br />

input validation, 317<br />

review questions, 324–327<br />

scripting errors, 319<br />

session hijacking, 288–289<br />

session management issues, 320<br />

SQL injection attacks, 333–334<br />

summary, 323<br />

vulnerabilities, 313–316<br />

website spyware infection, 193<br />

wefi tool, 364<br />

Welcome To The Create IP Security Rule<br />

Wizard screen, 72<br />

well-known ports, 37–38<br />

WEP (Wired Equivalent Privacy), 355<br />

breaking, 357–358<br />

overview, 356–357<br />

problems and vulnerabilities, 357<br />

risk mitigation, 360<br />

Whirlpool algorithm, 68<br />

white box pen tests, 12–13<br />

white-hat hackers, 8–9<br />

whitelists in SQL injection attacks,<br />

332, 343<br />

Whois utility, 96<br />

WhoReadMe utility, 93<br />

Wi-Fi Protected Access. See WPA (Wi-Fi<br />

Protected Access)<br />

Wi-Fi standard, 351<br />

WikiLeaks, 261<br />

windows, 408<br />

Windows Firewall, 47, 73<br />

Windows operating system,<br />

46–47, 130<br />

exploited services, 133–135<br />

groups, 131–132<br />

NULL sessions, 135–136<br />

PsTools suite, 137<br />

services and ports, 132–133<br />

SIDs, 132<br />

SuperScan, 136<br />

users, 130–131<br />

Windump tool, 213<br />

winpass tool, 168<br />

winrt-gen tool, 160–161<br />

WinSSLMiM program, 321<br />

wire reinforced windows, 408<br />

Wired Equivalent Privacy (WEP), 355<br />

breaking, 357–358<br />

overview, 356–357<br />

problems and vulnerabilities, 357<br />

risk mitigation, 360<br />

wireless networks, 350<br />

antennas, 353–355, 354<br />

authentication modes, 355<br />

Bluetooth hacking, 365–367<br />

cards, 365<br />

encryption mechanisms, 355–359<br />

environments, 351–352<br />

exam essentials, 368<br />

locating, 364–365<br />

overview, 350–351<br />

review questions, 369–371<br />

service set identifiers, 352–353<br />

social networking, 248<br />

standards, 352<br />

summary, 367–368<br />

threats, 360–364<br />

vocabulary, 353<br />

Wireshark sniffer, 213–218, 214–218<br />

wiretapping, 212<br />

worms, 190<br />

description, 183<br />

functions, 191–192<br />

WPA (Wi-Fi Protected Access), 355<br />

brute-force keys, 360<br />

cracking, 359<br />

deauthentication attacks, 359<br />

offline attacks, 359<br />

overview, 358<br />

risk mitigation, 360<br />

WPA2, 355–356, 359<br />

deauthentication attacks, 359<br />

offline attacks, 359<br />

WPA2-Enterprise mode, 356, 359<br />

WPA2-Personal mode, 359<br />

wrappers for Trojans, 201–202<br />

wrenches, tension, 405<br />

www.cvedetails.com site, 47

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!