Hacking Exposed 5th Edition

IANA (Internet Assigned Numbers Authority), 19, 22-23, 28

IBSS (Independent BSS), 417

ICANN (Internet Corporation for Assigned Names and Numbers), 19-24, 28

ICF (Internet Connection Firewall). See Windows Firewall

ICMP attack, 496

ICMP ECHO packets, 42, 44, 48-50, 479, 493, 502

ICMP enumeration, 48

ICMP errors, 70

ICMP headers, 479

ICMP messages, 68

ICMP packets

blocking, 202, 500

information gathering with, 50-51

restrictions, 355-356

tracerouting, 38-39, 355

ICMP pings , 42-50, 480

ICMP queries, 50-51

ICMP redirects, 371

ICMP traceroute packets, 355-356

ICMP traffic

amplification and, 493

bandwidth consumption attacks, 491-497

blocked, 45-47, 51, 467

evaluating, 49-50

limiting, 40

ICMP tunneling, 479-480

icmpenum tool, 48

icmpquery tool, 50-51

icmpush tool, 50-51

ICS (Internet Connection Sharing), 205

IDA files, 543

IDA.DLL, 166

ident scanning, 58

identity theft, 340, 597-598, 623-628. See also privacy issues

IDN (International Domain Name ), 585

IDQ files, 543

IDS (intrusion-detection systems), 157, 260, 465, 503

IDS/IPS (intrusion detection/prevention) tools, 643

IE. See Internet Explorer

IE Administration Kit (IEAK), 601

IEEE 802 standard, 457, 460

ifconfig command, 444-445

IFRAME tags, 583, 589, 595-596

IGRP (Interior Gateway Routing Protocol), 397-398

IIS (Internet Information Server)

ASP vulnerabilities, 538-541

banner changing, 90-91

canonicalization issues, 520-522

FrontPage and, 546-547

HTR Chunked Encoding Transfer Heap Overflow, 543

IISHack vulnerability, 543

input validation, 532-533

ISAPI idq.dll buffer overflows, 543

NTLM authentication, 556-557

patches, 168-169

protecting, 168-173

security resources, 166

Translate: f vulnerability, 540-542

version 4.0, 538, 543

version 5.0, 542-543

web applications and, 173

IIS (Internet Information Services)

attacks against, 165-173

buffer overflows, 166-173

directory traversal, 165, 171

Double Decode exploit, 171 +.htr vulnerability, 171

information disclosure, 165

security and, 165

Unicode exploit, 171

IIS Lockdown Tool, 90-91, 166, 172

IISHack vulnerability, 543

IKE (Internet Key Exchange) protocol, 338

ILOVEYOU worm, 590

IM (instant messaging), 591-592

ImageMagick, 423

.inc extension, 171

incident response, 290

include files, 171

Independent BSS (IBSS), 417

Industrial Scientific and Medical (ISM), 456

ingress filters, 168, 500

inheritance rights filter (IRF), 127

Initial Sequence Number (ISN), 70

Initialization Vector (IV), 415

input validation attacks, 518-522

input validation libraries, 532-533

insertion points, 635

instant messaging (IM), 591-592

integer overflows, 226-230

integer underflows, 592-593

in.telnetd environment, 271

interception attacks, 341-345

Interdo tool, 561

Interior Gateway Routing Protocol (IGRP), 397-398

International Domain Name (IDN), 585

Internet, 573-648. See also e-mail; web

Active Scripting exploits, 579-580

ActiveX. See ActiveX

adware, 628-633

America Online, 32, 505, 621

bots. See bots

company presence on, 9

cookies. See cookies

DNS and, 250-252

drop points, 586-587

eBay, 621-622, 624

finding phone numbers, 9, 11, 31-32, 295-296, 303

footprinting and. See footprinting

guidelines for safe use of, 612, 647-648

hacking milestones, 575-579

ICANN Board, 19-24

identity theft, 340, 597-598, 623-628

instant messaging (IM), 591-592

Java abuse, 577-579

JavaScript exploits, 579-580

malware, 503, 634-646

online services, 619-623

Passport vulnerability, 620-621

payloads, 586-587

PayPal, 621-622, 624

phishing, 623-628

physical security, 10, 646-647

precautions , 612

search engines. See search engines

software vulnerabilities, 574-623

spam, 628-633, 641

spyware, 628-633, 643

SSL. See SSL

vulnerabilities, 574-623

web browsers. See web browsers

zombies . See zombies

Internet Assigned Numbers Authority (IANA), 19

Internet clients

Active Scripting exploits, 579-580

ActiveX exploits, 575-577

cookies. See cookies

drop points, 586-587

instant messaging (IM), 591-592

Java abuse, 577-579

JavaScript exploits, 579-580

Microsoft Internet. See Microsoft Internet clients

non-Microsoft clients, 613-619

payloads, 586-587

SSL. See SSL

Internet Connection Firewall (ICF).

See Windows Firewall

Internet Connection Sharing (ICS), 205

Internet Control Messaging Protocol. See ICMP

Internet Corporation for Assigned Names and Numbers (ICANN), 19-24

Internet egress, 168

Internet Exploder, 576

Internet Explorer (IE)

ActiveX controls, 575-577

Add-On Manager, 606-607

Browser Helper Object (BHO), 629-630

cookies and, 580-581

cross-domain issues, 582-583

cross-zone exploits, 595-597

GDI+ JPEG buffer overflows, 592-594

HTML HelpControl attacks, 599-600

IFRAME tags and, 583

improper URL canonicalization, 597-598

pop-up blocker, 607

security zones, 601-610, 614

SSL fraud and, 583-586

using alternate browsers, 613-615

Internet Information Server. See IIS

Internet Key Exchange (IKE) protocol, 338

Internet Protocol. See IP

Internet Protocol Security. See IPSec

Internet Relay Chat. See IRC

Internet Service Providers (ISPs), 352, 403

Internet zone, 601-602

InterNIC, 295-296

Interprocess Communications (IPC), 143

intranet connections, 6-7

Intruder Alert (ITA) tool, 157

intrusion detection/prevention (IDS/IPS) tools, 643

intrusion-detection systems (IDS), 157, 260, 465, 503

IP (Internet Protocol), 381-382

IP addresses

ARIN database, 356

blocking, 402, 499, 505

disabling broadcast functionality, 500-501

DNS names, 354

enumeration and, 91-92

looking up, 28-31, 356

ping sweeps , 42-50

promiscuous mode and, 261

spoofing, 67

tracerouting, 355

unroutable, 42

vs. NetBIOS names, 94

zone transfers and, 32-37

IP BGP path lookups, 358-359

IP forwarding, 371-372, 395

IP headers, 377, 382-383

IP Network Browser, 114-115, 387-388

IP: Next Generation (IPng), 382

IP packets, 37, 114, 116, 377

IP- related searches, 28-31, 356

IP Security Protocol. See IPSec

IPC (Interprocess Communications), 143

ipchains, 221

ipEye scanner, 63, 66

ipf tool, 221

IPng (IP: Next Generation), 382

Ippl program, 49, 466

IPSec (Internet Protocol Security), 148, 202-203, 282, 335-339

IPSec connections, 202-203

IPSec filters, 202-203, 210

ipsecpol utility, 203

IPv4 (Internet Protocol version 4), 381

IPv6 (Internet Protocol version 6), 382

IPX networks, 123, 127

IRC (Internet Relay Chat), 494, 592, 640

IRC bots, 497, 640

IRC scripts, 494

IRF (inheritance rights filter), 127

Irix systems, 261

IRPAS toolset, 366, 379

ISAPI extensions, 169-170

ISAPI filters, 90, 169-170, 172, 542

ISAPI idq.dll buffer overflows, 543

ISM (Industrial Scientific and Medical), 456

ISM.DLL extension, 166, 169

ISN (Initial Sequence Number), 70

isp-routing newsgroup, 403

isp-security newsgroup, 403

ISPs (Internet Service Providers), 352, 499-500, 506

ITA (Intruder Alert) tool, 157

ITS4 tool, 527

IV (Initialization Vector), 415

Ivgi, Rafel, 595

iwconfig interface, 441, 444

Категории