Hacking Exposed 5th Edition
Chapter 1: Footprinting
- Table 1-1: Environments and the Critical Information Attackers Can Identify
- Table 1-2: WHOIS Searching Techniques and Data Sources
Chapter 2: Scanning
- Table 2-1: UNIX Host-Based Ping-Detection Tools
- Table 2-2: Popular Scanning Tools and Features
Chapter 3: Enumeration
- Table 3-1: Common NetBIOS Service Codes
- Table 3-2: Anonymous Access Settings on Windows XP/Server 2003 and Windows 2000
- Table 3-3: Permissions on Active Directory User and Group Objects for the Pre-Windows 2000 Compatible Access Group
Chapter 4: Hacking Windows
- Table 4-1: High Probability Username/Password Combinations
- Table 4-2: Selected Windows Intrusion Detection/Prevention Tools
Chapter 5: Hacking UNIX
- Table 5-1: Freeware Tools That Help Protect Against Brute-force Attacks
- Table 5-2: Popular, Freely Available UNIX Sniffer Software
- Table 5-3: Unix Security Resources
Chapter 6: Remote Connectivity and VoIP Hacking
- Table 6-1: Test Voicemail Passwords
Chapter 7: Network Devices
- Table 7-1: Commonly Used Listening Ports
Chapter 8: Wireless Hacking
- Table 8-1: Decibel-to-Volts-to-Watts Conversion Table
Chapter 11: Hacking Code
- Table 11-1: The Different Types of Overlong UTF-8 Characters Possible for / and \
- Table 11-2: Tools for Assessing and Improving Code Security
Chapter 12: Web Hacking
- Table 12-1: Pros and Cons of Nikto
- Table 12-2: Pros and Cons of Whisker 2.0
- Table 12-3: Common XSS Payloads
Chapter 13: Hacking the Internet User
- Table 13-1: Recommended Internet Zone Security Settings (Custom Level Settings Made after Setting Default to High)
- Table 13-2: Microsoft ActiveX Controls That Ship with Windows That Should Have the Kill Bit Set