Penetration Testing and Network Defense

 < Day Day Up >   

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

rainbow tables

RainbowCrack RAT tools, Tini

RDBMSs (Relational Database Management Systems)

     Microsoft SQL Server

         authentication

         guest accounts         network libraries         ports

         Public Role         querying         sample databases         Service Accounts

         structure of     MySQL     Oracle     vulnerabilities, testing         brute force attacks         connection strings         SQL injection

         system stored procedures

reassessment principle reciprocation-based persuasion reconnaissance attacks

    active host reconnaissance

         NSLookup/Whois lookups

         SamSpade

         Visual Route     footprinting

registers     ESP registers

     general-purpose     special-purpose application regression testing regulatory laws remote access to networks, case study 2nd

remote administration Trojans, Beast

     client configuration 2nd

     server settings

remote port monitoring

remote shell utilities

     NetCat

     shoveling

remote-access policies

remote-access Trojans, Donald Dick 2nd

remote-administration trojans, detecting

required topics in security policies

Results Analysis

Revelation

rights (Novell NetWare) RIP Route Generator

risk analysis

risk assessment, performing

     company acceptance, gaining

     cost of protecting assets, calculating     threats to assets, identifying rogue APs, detecting on wireless networks

root access, obtaining on Linux-based machines     irix-login.c exploit     rpc.statd exploit     stack-smashing exploit

root user permissions, assigning rootkits 2nd     case study     for Microsoft Windows routers    CDP         disabling

         testing for vulnerabilities

    HTTP service         disabling         testing for vulnerabilities

    passwords

         securing

         testing for vulnerabilities

     routing protocols, testing for vulnerabilities     securing

routing protocols, testing for vulnerabilities rpc.statd exploit

RSE (reverse social engineering) Russinvoch, Mark

 < Day Day Up >   

Категории