Inside Network Perimeter Security (2nd Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]

hackers [See also adversarial reviews]     attacks, approach to (network security design)     discovery process (network security design)

Hackers Choice THC-Scan

     wardialinghardening

    routers         auditing via RAT 2nd         auto securing 2nd         Cisco TCP Keepalives services

         console ports 2nd         disabling CDP         disabling Finger services 2nd

         disabling PAD services

         disabling proxy-ARP 2nd

         disabling small services 2nd

         disabling source routing         FTP

         ICMP blocking

         ICMP blocking, directed broadcasts         ICMP blocking, redirects

         ICMP blocking, unreachables 2nd 3rd         IOS updates

         NTP configuration/authentication 2nd 3rd         RFP

         router logging 2nd 3rd 4th

         security advisories

         SNMP 2nd 3rd

         SNMP, authentication/passwords 2nd 3rd 4th

         SNMP, disabling servers 2nd

         spoofing attacks

         SSH 2nd 3rd

         Telnet 2nd 3rd

         TFTP 2nd

hardening (host)

     account passwords 2nd 3rd 4th

    administrative accounts, protecting

         UNIX root accounts 2nd

         Windows Administrator accounts 2nd     application installation, guidelines for

     automating 2nd     checklists 2nd     costs of

     defining

    file permissions, restricting

         UNIX 2nd

         Windows

         Windows, NTFS     group account memberships, controlling 2nd     network services, controlling         deactivating services

         deactivating services, remote access services 2nd 3rd 4th

         deactivating services, resource-sharing services 2nd         deactivating SNMP 2nd

         disabling NetBIOS protocol 2nd         editing Unix files         listing ports 2nd         null sessions 2nd

     patches, applying 2nd 3rd     process overview     reasons for 2nd

    Registry permissions, restricting

         Windows 2nd

    removing/disabling

         OS components     SANS Top 20 Vulnerabilities list

     security logs

         auditing UNIX logs 2nd 3rd         auditing Windows logs 2nd

     security versus functionality    software, removing

         Add/Remove Programs applet (Windows)         UNIX operating systems 2nd

     unattended user accounts, managing 2nd

hardening AP

     bridges, disabling

     firmware, updating

     MAC addresses, locking 2nd 3rd

     passwords

     SSID broadcasts, disabling 2nd 3rd 4th

     Web management, disabling

     wired management, locking 2nd

hardware accelerators

    accelerator cards

         performance bottlenecks

     network performance 2nd

hash algorithms     defining

     MD5     SHA-1 hashes

hiding

     network structures 2nd

HIDS (host-based intrusion detection systems)

     defining 2nd

HIPS (host-based intrusion prevention systems)     advantages of     application behavior, monitoring     challenges of

     custom application dynamic rule creation 2nd

    deployment recommendations         attacks 2nd

         document requirements/testing procedures         role in defense-in-depth architectures         software update installation         update control policies

     false positives     file integrity, monitoring     OS shims

     real-world experience of

     system call interception

HogWash

HoneyNet Project     incident handling

Honeynet project website

honeypots     DTK 2nd

     Honeynet project website hopping attacks (VLAN) 2nd

host attacks, detecting (IDS) 2ndhost command (SSH)

     router hardening

host defenses

     wireless networks

host hardening

     account passwords 2nd 3rd 4th

    administrative accounts, protecting

         UNIX root accounts 2nd

         Windows Administrator accounts 2nd

     application installation, guidelines for

     automating 2nd

     checklists 2nd

     costs of

     defining 2nd 3rd

    file permissions, restricting         UNIX 2nd

         Windows         Windows, NTFS     group account memberships, controlling 2nd

     network services, controlling

         deactivating services

         deactivating services, remote access services 2nd 3rd 4th

         deactivating services, resource-sharing services 2nd

         deactivating SNMP 2nd         disabling NetBIOS protocol 2nd         editing Unix files         listing ports 2nd

         null sessions 2nd

     patches, applying 2nd 3rd     process overview

     reasons for 2nd    Registry permissions, restricting         Windows 2nd    removing/disabling

         OS components     SANS Top 20 Vulnerabilities list     security logs

         auditing UNIX logs 2nd 3rd

         auditing Windows logs 2nd

     security versus functionality

    software, removing         Add/Remove Programs applet (Windows)

         UNIX operating systems 2nd

     unattended user accounts, managing 2nd host routing tables, displaying

host security logs    auditing

         UNIX 2nd 3rd         Windows 2nd

host-based firewalls

     IDS logs 2nd

host-based IDS (intrusion detection systems)

     file integrity checkers

     log analyzers

host-centric firewalls [See personal firewalls]

     internal network defense, role in 2nd 3rd

host-to-gateway IPSec architectures

     VPN

host-to-host IPSec architectures

     VPN

hosts

    compromised

         usage of defense components in    defense components

         managing         updating     firewalls 2nd 3rd

         servers, IPSec packet-filtering 2nd

         servers, PF 2nd 3rd 4th

         servers, versus workstation firewalls 2nd

         workstations

         workstations, configuring 2nd         workstations, Norton Personal Firewalls 2nd 3rd         workstations, versus server firewalls 2nd         workstations, websites

         workstations, ZoneAlarm Pro 2nd

     IDS 2nd 3rd         deploying 2nd

         file integrity checkers 2nd         file integrity checkers, AIDE         file integrity checkers, Samhain         file integrity checkers, Tripwire

         file integrity checkers, Tripwire Manager         file integrity checkers, Winalysis         log file monitoring utilities, Logcheck 2nd

         network connection monitoring utilities, BlackICE 2nd

         network connection monitoring utilities, PortSentry 2nd

         versus network IDS 2nd

    servers         dedicating

         firewalls, IPSec packet-filtering 2nd

         firewalls, PF 2nd 3rd 4th         firewalls, versus workstation firewalls 2nd

         multiuser         sensitivity to attacks

     workstations         firewalls

         firewalls, configuring 2nd

         firewalls, Norton Personal Firewalls 2nd 3rd

         firewalls, versus server firewalls 2nd

         firewalls, websites

         firewalls, ZoneAlarm Pro 2nd

         maintaining 2nd

         MBSA

Hosts/Networks screen (PDM)

HP OpenView system/network monitoring software 2nd

HP Virtual Vault Servers

    adversarial reviews

         determining attacker access 2nd 3rd

         determining impact of misconfigurations/vulnerabilities 2nd

     mkacct command hping utility 2nd 3rd 4th

HTTP (Hypertext Transfer Protocol)     interapplication communication    state

         tracking 2nd

HTTP PUT attacks 2nd

HTTP tunneling 2nd

     IDS 2nd

HTTrackHuman Resources handbooks     security policies, writinghypothesis (troubleshooting process)

     forming 2nd

     testing         analyzing results

Категории