Network Security Tools: Writing, Hacking, and Modifying Security Tools

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] p0f program

     operating system fingerprinting and     setting up and modifying

p0f-query.c file

packet-capture functions (libpcap) 2nd packet-capture options (libpcap) packet-injection tools, writing

     AirJack

         installing

         using

     getting started with libnet

         building protocol blocks         cleaning up

         "I am" tool source code         initializing the session         sending the packet

         writing "I am" tool

     introduction to libnet

     libnet functions, advanced         accessing raw packet data         context queues

     libnet, combining with libpcap

         capturing responses

         overview of SYNplescan

         SYN packet, creating         SYNplescan source code

     reinject tool source code

packet_object structure 2nd packets (network), forging in teardrop attack

parameter-based testing 2nd

     HTTP requests with parameter data     SQL injection exploit scanner

     sqlTest subroutine     xssTest subroutine

parse_csv( ) routine 2nd

parse_tcp( ) function 2nd 3rd

parseLog.pl script

     complete source code

PASS string

passive profiling

passwd.inc file (Nessus plug-in example)

password sniffers

passwords

     Base64 encoding

     FTP password dissector (Ettercap)

     nikto_passfiles plug-in

     sending to SMTP server     sniffing with Ettercap     testing for weak username/password combinations

PASV command, sending to FTP serverpattern matching [See regular expressions]

pattern-matching technology, static source code analysis tools

PatternCreate( ) patternOffset.pl MSF tool PayloadPrepend( ) method (Msf::Exploit class)

payloads, MSF exploits 2nd 3rd

pcap.h header file

pcap_breakloop function

pcap_compile function

pcap_dispatch function 2nd pcap_lookupnet function

pcap_loop function pcap_next function pcap_next_ex function

pcap_open_live function

     read timeouts

pcap_setfilter functionPerl     libpcap and

         Arpsniff in Perl

     LWP and

     Object-Oriented Perl (OOP)

     parseLog.pl script     regular expressions

         representing Java symptom code

     simpleScanner.pl script Perl interpreter for Nikto

PF_PACKET interface

PID (Process ID)     hiding

     obtaining for sshd PLAIN authentication method

plug-ins

     Ettercap, writing

         find_tcp_conn

         find_tcp_conn.c

     Nessus

         CGI vulnerabilities, scanning for

         Knowledge Base, defining items in

         NASL functions describing

         NASL script categories

         NASL scripts for Nessus scanner

         NASL vs. C language

         packet forgery, using in teardrop attack

         probing for anonymous FTP access         reporting functions         selecting

         VNC servers, scanning for         writing and installing

     Nikto

         database entries, custom         existing         standalone, to attack Lotus Domino

     Nikto plug-in interface

     NTLM, for brute-force testing

plugin_load( ) function 2nd

plugin_ops structure

plugin_register( ) function PMD 2nd

     extending         code walkthrough         objectives

     installing and running

     rulesets

pOf_socket module, writing pointers influencing program flow pointers, TCP session

     use by FTP dissector

pop (stack operator)

popserver_detect.nasl plug-in

port scans [See also Nmap]     Nessus optimization of

     SYN port scan on network, detecting

ports     nmap-service-probes file

     SMTP, run normally and over SSL

POST method (HTTP)     example request with data

     parsing requests in proxy log file presentation layer, web applications

PrintOneTemplate( ) function 2nd

PrintOption( )

printReport subroutine (web application scanner)

Prism monitor mode header

probe entry (nmap-service-probes file)

probe( ) function

process_packet function

processes

     hiding with LKM-based rootkit

     user and kernel mode

profiling a networking stack for known signature comparison

program flow, redirection with shellcode

programming languages for web applications prolog Assembly instructions     identifying new stack frame creation

protocol addresses, mapping to hardware addresses protocol blocks

     building

protocol tagsprotocols     adding to Hydra

     supported by Hydra

     supported by libnet

proxy servers

     Burp

     crawling an application     logging of HTTP requests

     recording web application requests in a log file proxy_setup( ) function ps tool

push (stack operator)

PUT method (HTTP)

     dirPut subroutine

Категории