Network Security Tools: Writing, Hacking, and Modifying Security Tools

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] MAC addresses

Mail Transfer Agent (MTA) make_array( ) function

makeRequest subroutine (web application scanner)

match entries (nmap-service-probes file)matching patterns [See regular expressions] max_index( ) function

memory segments and layout, operating system

memory values, little endian

MessageFormat class (Java)

metadata for MnoGoSearch overflow exploit 2nd

Metasploit Framework [See MSF] methods, examining for dynamic SQL

methods, overriding Microsoft Teredo protocol MnoGoSearch overflow, writing module for

     setting up the bug

modulo operator (%)

modulus assignment (%=) operator monitor mode (802.11 wireless networks) MSF (Metasploit Framework)

     introduction to

         main files and directories

     overview of stack buffer overflows

         exploiting a program         how buffers overflow

         importance of stack overflows

         memory segments and layout         shellcode

     writing a module for MnoGoSearch overflow

         setting up the bug         working module, writing

     writing exploits     writing operating system fingerprinting module

         fingerprinting and pOf program

         pOf, setting up and modifying

         pOf_socket module, writing

Msf::Exploit class

     PayloadPrepend( ) method

msfcli command-line interface

msfconsole

msfweb web server interface

MTA (Mail Transfer Agent)

multiplication assignment operator (*=)

multiplication operator (*)

mutate plug-in (Nikto)

Категории