Hacking Exposed 5th Edition

L0pht advisory, 282

L0phtcrack (LC) tool

password cracking, 179-183

password hashes, 178-183

Windows family, 158-161

L2F (Layer 2 Forwarding), 335

L2TP (Layer 2 Tunneling Protocol), 335

LACNIC organization, 20

LAN Manager, 158, 160, 178, 183

LAN Rovers, 312

Land attaack, 490

LanMan authentication, 160-161, 182-183

LanManager (LM) hash, 158-159, 182-183, 337-338

laptop computers, 647

Larholm, Thor, 592

Last Stage of Delirium (LSD) Research Group, 161

LaTierra attaack, 490

Lauritsen, Jesper, 94, 197

Layer 2 Forwarding (L2F), 335

Layer 2 Tunneling Protocol (L2TP), 335

lc_cli.exe tool, 181

.lcs extension, 179-180

LDAP (Lightweight Directory Access Protocol), 118-122

LDAP clients , 118

LDAP system, 541

LEAP wireless technology, 453-456

Legion tool, 98-99, 146-147

Lembke, Holger, 497

LHF (low hanging fruit), 314-315, 652

libpng buffer overflow, 615-618

Libradiate, 447, 457

libraries

input validation, 532-533

shared, 270-271

Libsafe tool, 220, 515

LIDS (Linux Intrusion Detection System), 288-289

lidsadm tool, 288

LifeChanges worm, 587

Lightweight Directory Access Protocol. See LDAP

link-state advertisements (LSAs), 398

linsniff program, 281

Linux Administrator's Security Guide (LASG), 291

Linux HostAP-driver, 441

Linux Intrusion Detection System (LIDS), 288-289

Linux kernel

flaws, 271-272

rootkits, 285-289

Linux platform

Carbonite kernel module, 288

DoS attacks, 493, 495, 502-504

enumeration, 86-88

firewalls, 466-467, 485

FreeSWAN project, 282

Openwall Linux, 221

passwords, 384

pingd daemon, 50

RPM format, 278

security resources, 290-292

St. Michael tool, 289

SUID files and, 275

wireless attacks, 410, 427, 436-437, 448, 461

Linux wireless cards, 427-429

Linux WLAN package, 427

Lipner, Steve, 524

LIRs (Local Internet Registries), 20

listening ports, 51-52, 361

listening service, 215

Litchfield, David, 106, 128, 132

Liu Die Yu, 592, 599

LiveScript, 579

LKM (loadable kernel module), 222, 285, 288-289

LM (LanManager) hash, 158-159, 182-183, 337-338

LMZ (Local Machine Zone), 583, 599, 608-610

LMZ lockdown feature, 583, 608-610

loadable kernel module (LKM), 222, 285, 288-289

local accounts, 144-145

Local Intranet zone, 601

local Machine Zone (LMZ), 583, 608-610

Local Procedure Call (LPC), 173-174

local resource access exploit, 595-597

Local Security Authority. See LSA Local Security Authority Subsystem (LSASS), 163-165, 177

local tool, 106

localhost, 480-484

lockouts, 153

log files

ELM Log Manager, 156

event logs, 155-156, 172, 197-198

port scans and, 67

Psionic Logcheck, 67

resources, 292

scanlogd utility, 49, 67

security logs, 28, 154-156

syslog, 282-285

Logcheck, 67

logging

threshhold, 67

Windows family, 154-156, 172

login program, 277

logons , interactive, 174-175, 188, 210

loki program, 49, 479

lokid program, 479

Long, Johnny, 15

lookups

ARIN database, 356

Autonomous System, 356-358

DNS, 478

IP addresses, 28-31, 356

IP BGP path , 358-359

reverse DNS, 355, 358, 392

loopback floods, 490

low hanging fruit (LHF), 314-315, 652

LPC (Local Procedure Call), 173-174

LPC port requests , 173-174

ls option, 33

LSA (Local Security Authority), 179-185

LSA Secrets, 179-185

LSADump utility, 184-185

lsadump2 utility, 184-185

LSAs (link-state advertisements), 398

LSASS (Local Security Authority Subsystem), 163-165, 177

lsass.exe process, 165, 177

LSD (Last Stage of Delirium) Research Group, 161

lsof tool, 282

Категории