Index
A
ACK scan
Active attacks
Add-on virus
Address resolution protocol (ARP)
Aircrack–ng
Aireplay-ng command
Airodump-ng command
Anna Kournikova computer worm
Antivirus software
Apache web servers
Application-layer hijacking
brute force
misdirected trust
sniffing
ARP method
Asymmetric algorithms
Asymmetric cryptography
Asymmetric encryption
Attack classes
Attack phases
covering tracks
gaining access
maintaining access
reconnaissance
scanning
Attacks types
active
inside
outside
passive
Attack trees
Authentication hijacking
B
Backdoor tools
BitLocker
Black hats
Blind hijacking
Bootable CD-ROM viruses
Botnets
Brute force attacks
Buffer overflow
defensive actions
defined
heap-based
hyper-v service pack 1
metasploit
metasploit auxiliary scanning
meterpreter
nmap
OS fingerprint
RHOSTS
stack
TCP scan
vulnerabilities
C
Cain
Camouflage viruses
Cavity viruses
Command-line command
Command line tools
Companion virus
Computer crime
Concealment tools
Cookies
Crafting/modifying packets
Cryptanalysis attacks
Cryptographic interception
Cryptography
algorithms
asymmetric
symmetric
applications
attacks
confidentiality
digital signature
encryption
asymmetric
symmetric
encrypt messages
hash algorithms
hashing functions
SSH
SSL handshake process
D
Damage, virus
ethical/legal
psychological
technical
Dark Comet
Data-sending trojans
Decoy method
Denial-of-service attack
botnets
command used
countermeasures
packets
Tcpdump
types
Destructive trojans
Dictionary attacks
Directory traversal
Distributed denial-of-service (DDoS) attack
attack classes
definition
IRC-based
objective
DMZ protocol attacks
E
Egress filtering
Electronic surveillance
Encrypting File System (EFS)
Enumeration
Cain
command-line command
compromising a system
definition
metasploit
NetBIOS
null user
SNMP
windows hosts
Ethical hacking
assignment
assumptions
attack phases
attacks
challenge
hacker attacks types
hackers
hacktivism
information
security vs. functionality and ease of use
solution
vulnerability
websites
Extension to a wired network
F
Fault tree
File Transfer Protocol (FTP)
FIN scan
Firewalls
breeching
defined
identification
types
Footprinting
crafting/modifying packets
firewall
information gathering
network scanning
nmap
non-intrusive process
port scans
preattack phases
process of scanning
public records
scanning countermeasures
TCP flags
three-way handshake
tools used
traceroute tools
websites
web spiders
WHOIS utility
zenmap
FreeOTFE
FTP trojans
G
Gap analysis
Gnu Privacy Guard (GnuPG)
Google Chrome
Gray hats
H
Hacker attacks types
application level
misconfiguration
operating system
shrink-wrap code
Hacktivism
Hash algorithms
Hashing functions
Heap-based buffer overflow
Honeypots
defined
open source formats
types
Hypertext Transfer Protocol (HTTP)
Hyper-V Service Pack 1
I, J
ICMP tunneling
Ingress filtering
Inside attacks
Instruction detection systems (IDS)
Internet Control Message Protocol (ICMP)
Internet Explorer
Internet Information Service (IIS)
Internet Message Access Protocol (IMAP)
Internet Protocol security (IPSec)
Intrusion detection system (IDS)
attacks
defensive policies
defined
indicators
information flow
placement
tools
types
Intrusion detection system (IDS), tools
breach a firewall
to evade
packet generator
for testing
Intrusion prevention systems
defined
information flow
types
Intrusive virus
IP spoofing
Iwconfig command
K
Kerberos operation
Keyloggers
L
LAN-to-LAN wireless network
Latency method
Log File Monitor (LFM)
Logging
Log tampering
M
Macro viruses
Melissa virus
Metasploit
Metasploit auxiliary scan
Meterpreter
Mozilla Firefox
Multipartite viruses
Multiple access points
N
NetBIOS
Netstat command
Network access attacks
Network-based IDS (NIDS)
Network-layer hijacking methods
blind
IP spoofing
man-in-the-middle
RST
TCP/IP
UDP
Network News Transfer Protocol (NNTP)
Network viruses
New Technology LAN Manager (NTLM)
Nimda
Nmap
NULL scan
Null sessions
Null user
O
OS fingerprint
Outside attacks
Overt channel
P, Q
Packet generator tools
Passive attacks
Password attacks types
active
nontechnical
offline
passive
Password cracking countermeasures
Peer-to-peer network
Penetration/pen testing
payloads
phases
reports
security assessments
victim machine
Penetration/pen testing phases
attack
planning
post-attack
preattack
Penetration testers
Ping method
Poison Ivy
Polymorphic viruses
Port scans
Post Office Protocol (POP)
Pretty Good Privacy (PGP)
Program viruses
Proxy trojans
Public key encryption
R
Reconnaissance
Remote access tools
Remote access trojans
Reverse DNS Method
RHOSTS
Rootkits
RST hijacking
S
Safari
Scanning countermeasures
Script mapping
Secure shell (SSH)
Secure Sockets Layer (SSL)
defined
handshake
Security management exploits
Security testers
Session hijacking
application-layer hijacking
browsers
configuration settings
countermeasures
network-layer hijacking
spear phish attack
steps
TCP stack
three-way handshake
types
victim machine
Shark remote administration tool
Shell and tunneling tools
Shell virus
Simple Network Management Protocol
Simple Network Protocol (SNMP)
Sniffers
Sniffing
application
auditing access
countermeasures
credentials
defense measures
detection methods
shark
social engineering
spearfish attack
switched networks
types
vulnerable protocols
Wget
Social engineering
authority
computer-based techniques
consistency
cycle
human-based techniques
liking
reciprocation
scarcity
social validation
Source code viruses
Source-route method
Spear phish attack
SQL injection
SQL slammer
SSL handshake process
Stack buffer overflow
Stealth viruses
Steganography
Structured query language (SQL) injection
advantages
attacks
attempt
classifications
client-side validation
countermeasures
input field manipulation
login
results
stored procedure
username
web front end
Suicide hackers
Symmetric algorithms
Symmetric encryption
System hacking
authentication protocol
escalating privileges
files hiding
kerberos operation
keyloggers
null sessions
password cracking countermeasures
password cracking ways
passwords attack
rootkit detection
steganography
System Integrity Verifier (SIV)
T
TCP flags
TCP fragmentation
TCP/IP hijacking
TCP scan
Temporal Key Integrity Protocol (TKIP)
Terminate-and-stay resident virus
Three-way handshake
Tools, trojans
concealment
remote access
shell and tunneling
Traceroute tools
Transient virus
Transmission control protocol (TCP)
Trojans attack
anti-Trojan software
backdoor countermeasures
countermeasures
defined
detecting tools
ICMP tunneling
malware applications
Netstat command
poison ivy
ports used
process monitor
symptoms
tools used
types
TrueCrypt
Tunneling viruses
Types of sniffing
active
passive
U
UDP hijacking
UDP scan
User Datagram Protocol (UDP)
V
Virus
Anna Kournikova computer worm
antivirus software
classification, infect
countermeasures
damage
Dark Comet connection
file extension
ILOVEYOU worm
infection phase
malware programs
melissa virus
Nimda
self-modification viruses
SQL slammer
stages
symptoms
types
Vulnerability
W
Wayback Machine
Web application
attacks
buffer overflow
cookies
countermeasures
cross-site scripting attack
error messages
ncat
nmap
parameters
session establishment
SQL injection
Web application components
Web server security
apache web servers
attacks
auditing and logging
compromised machines
IIS
components
logging
WEBDAV attack
meterpreter
patches and updates
protocols
risks types
script mapping
services
vulnerabilities
zenmap
Web spiders
White hats
Wi-Fi Protected Access 2 (WPA2)
Wired equivalent privacy
Wireless local area network (WLAN)
Wireless networks
aircrack–ng
airodump-ng command
authentication process
four-way handshake
hacking
aireplay-ng command
iwconfig command
rogue access points
SSID
standards
TKIP
types
unsecured network
vulnerabilities
Wi-Fi protected access 2
wired equivalent privacy
Worm
X, Y
XMAS scan
Z
Zenmap
Zero day attacks
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset