Network Security Tools: Writing, Hacking, and Modifying Security Tools

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] EBNF grammar reference

EBP (extended base pointer) CPU register ec.h and ec_plugins.h files

ec_hook.h file

egrep( ) function 2nd EHLO command 2nd     sending to server with hydra_send( )

EIP (extended instruction pointer) CPU register

     examining in MnoGoSearch overflow

     return

     saved EIP (sEIP), overwritten

elements (XML), PMD rulesets empty string ""

encoding (Base64), usernames and passwords encoding, username and password (Base64) end_denial( ) function

ENDIF_FIRST_PACKET_FROM_SERVER( )

environment system (MSF)

environment, web applications     HTTP     Perl and LWP

     SSL

epilog Assembly instructions 2nd

equals operator (==)

ereg( ) function ereg_replace( ) function

eregmatch( ) function

error attributes and associated values (SQL injection) error messages, Oracle and SQL Server

error-based SQL injection 2nd

     generic errors     testing routines

error-handling functions (libpcap) escape characters, NASL strings

Ethernet II networks

Ethernet Media Access Control (MAC) addresses

Ethernet packet header, creating with libnet

Ettercap

     installing and using

     plug-in, writing

         find_tcp_conn

         find_tcp_conn.c

     web site

     writing a dissector

         FTP authentication

         FTP password dissector

exec( ) EXECUTE (SQL injection exploit) exploit development

     MSF, introduction to         main files and directories

     overview of stack buffer overflows

         exploiting a program         how buffers overflow         importance of stack overflows

         memory segments and layout

         shellcode

     writing a module for MnoGoSearch overflow

         setting up the bug

         working module, writing     writing exploits for MSF

     writing operating system fingerprinting module for MSF         fingerprinting and pOf program         pOf, setting up and modifying

         pOf_socket module, writing

Exploit modules, methods that can be overridden

exploit tools, automated     SQL injection exploits         categories of

         exploit techniques

     SQL injection scanner

         exploit logic

         extendedScanner.pl script         parameter-based testing

         sqlBlindColumnTest subroutine

         sqlBlindDataTypeTest subroutine         sqlColumnTest subroutine

         sqlDataTypeTest subroutine

         sqlOrTest subroutine         sqlTest routine

         sqlUnionTest subroutine         using extendedScanner.pl

Exploit( ) method

exponentiation operator (**)

extended base pointer (EBP) CPU register

extended instruction pointer [See EIP CPU register]

Extended Simple Mail Transfer Protocol (ESMTP)

extended stack pointer (ESP) CPU register 2nd

extendedScanner.pl script

     using

Категории