Security Warrior

 <  Day Day Up  >    

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

salt  

Samspade.org  

SAN Dshield.org  

Sanfilippo, Salvatore  

SANS

       six-step incident response methodology  

       "The Twenty Most Critical Internet Security Vulnerabilities"  

scheduler, Windows CE  

screensaver attacks  

search engines  

section tables  

sections  

sectors  

secure wiping utilities  

security

       event  

       event correlation  

       incident  

       response  

segment regeneration  

SELECT command  

sendmail  

       access control  

sequential disassemblers  

sequential port scans  

serial number cracking   2nd   [See also serial.exe, reverse engineering]

serial.exe, reverse engineering   2nd   [See also Windows CE]

       debugging  

       loading to a disassembler  

       step-through investigation  

setfacl command (Solaris 8)  

SGI machines, security risks  

SGID (Set Group ID)  

SGID bit  

Shadow Password Suite  

Shaft  

shifting operations opcodes  

shoulder surfing  

shred tool  

shroud tool  

SI (source) register  

signal drift , reducing  

signature collisions  

signature matchers  

SIGSTOP  

SIM (Security Information Management) tools  

Sklyarov, Dmitry  

slack space  

smart cards  

       hacking  

               reverse engineering  

SMB (Service Message Block) attack  

SMB (Service Message Block) protocol  

SMB network services, security risks  

SMB_COM_TRANSACTION command  

smbnuke  

SMS (short messaging service) vulnerabilities  

SMTP protocol server, security risks  

sniffers   2nd  

Snort  

       case study  

               machine and OS requirements  

               system setup  

       configuration for a honeypot  

SOAP (Simple Object Access Protocol)  

       web services security  

               Xenc (XML Encryption)  

social engineering  

       action plans  

       attacks, passive and active  

       contact chains  

       definitions  

       information collection template  

       methodologies  

       risk analysis  

       subroutines or shortcuts  

       targeting  

SOCKS proxy port, security risks  

SoftICE  

       breakpoints  

       commands

               advanced  

               backtrace commands  

               basic  

               customization  

               mode control  

               special operators  

               symbol/source commands  

               Window commands  

               Window control  

software development

       programmming languages, choosing  

Song, Dug  

source routing  

SP (stack pointer) address  

Spitzner, Lance  

spoofing  

SQL  

       ANSI standards  

       commands  

       modifier commands  

SQL injection attacks  

       attack types  

               authentication bypass  

               database modification  

               unauthorized data access  

       basic attack strings  

       defenses  

               coding defenses  

               external defenses (application blocking)  

               filters  

               obfuscation  

       PHP-Nuke application  

               defense examples  

               example attacks  

               installing  

       prevention  

       SQL injection  

Squid web proxies, security risks  

SS (stack segment)  

sscan  

SSDP (Simple Service Discovery Protocol)  

SSH (Secure Shell)   2nd  

       access control  

       securing from abuse  

       security risks  

ssh covert channel  

SSL (Secure Sockets Layer)  

Stacheldraht  

stack  

static linking and disassembly  

stealth interface  

sterilize tools  

strcmp (string comparison) instruction  

strict anomaly detection  

strlen (string length) comparison  

su command  

subroutines  

SucKit  

SUID (Set User ID)  

       attacks using  

       bit  

       root vulnerability  

swap files  

swatch  

SWITCH statements  

Symantec DeepSight Analyzer  

SYN cookie  

SYN-ACK timeout and regeneration cycles, OS fingerprinting with  

sys_ptrace  

SysInternals  

syslog

       daemon  

       output  

       problems  

       security risks  

syslog-ng  

syslog.conf  

systat service, security risks  

system hardening  

system logging   2nd   [See also logfiles]

system logs, attack evidence in  

system monitors  

system records, sanitizing   2nd   [See also logfiles, sanitizing]

System Time system call  

 <  Day Day Up  >    

Категории