Penetration Testing and Network Defense

 < Day Day Up >   

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

MAC address spoofing, detecting on wireless networks

MAC filtering on wireless networksMAC table flooding attacks

     hardening switches against

     testing switches for vulnerabilities

MACOF

maintaining access stage of attacks malware 2ndmarkup languages

     CFML     DHTML     HTML     XHTML

     XML master database MBSA (Microsoft Baseline Security Analyzer) MD5 checksums Melissa virus memory consumption DoS attacksmemory, buffers

     heap buffers

     stacksMicrosoft     AD model

     domain model

     password hashing

         LANMAN hashing

         Windows hashing     SQL Server

         authentication, sysxlogins         guest accounts

         network libraries         ports         Public role         querying         sample databases

         service accounts

         structure of

    Windows

         elevation techniques

         rootkits

mirror technique for gaining employee trust

misuse detection systems

MITM (man-in-the-middle) attacks

     preventing on wireless networks

    session hijacking

         blind spoofing

         case study 2nd

         nonblind spoofing

         TCP sequence prediction Mitnick, Kevin 2nd

     session hijacking of Tsutomu Shimomura's computer 2nd

modifying password settings

monitoring

     ports 2nd     session hijacking with packet sniffer morphing attacks

mutating attacks MyDoom worm MySQL     databases structure

     INFORMATION_SCHEMA views     structure of

 < Day Day Up >   

Категории