wers to Review Questions 357Answers to Review Questions1. C. A penetration test is designed to test the overall security posture of an organization and to see if it responds according to the security policies.2. B, C, D. Security assessments can consist of security audits, vulnerability assessments, or penetration testing.3. C. Manual testing is best, because knowledgeable security professionals can plan, test designs, and do diligent documentation to capture test results.4. B. A penetration test produces a report of findings on the security posture of an organization.5. A. An ethical hacker is trying to determine the security posture of the organization.6. C. The first step of a pen test should always be to have the client sign a scope of work, NDA, and liability release document.7. F. All these tools must be used to discover vulnerabilities in an effective security assessment.8. D, F. Acquiring the target and executing, implanting, and retracting are part of the active reconnaissance preattack phase.9. A, D. The next step after target acquisition is to use tools that will exploit a vulnerability and leave a mark or execute a command on a vulnerable system to communicate to another system on the network and leave a mark.10. A, D. An assessment will include findings of the penetration test and may also include cor- rective suggestions to fix the vulnerability.11. C. Permission from the owner is the difference in hacking and pen testing.12. A, B. A pen tester should have the client sign a liability release, a scope of work, and a non- disclosure agreement prior to beginning the test.13. C. Security audits are another name for pen tests.14. D. An executive summary should be the first part of a pen testing report.15. A. An internal assessment is performed on the network from within the organization, with the tester acting as an employee with some access to the network.16. B. A black-hat penetration test usually involves a higher risk of encountering unexpected problems. The team is advised to make contingency plans in order to effectively utilize time and resources.17. A. You can outsource your penetration test if you don’t have qualified or experienced tes- ters or if you’re required to perform a specific assessment to meet audit requirements such as HIPAA.
Chapter 15 n Performing a Penetration Test18. A. Gathering data from Whois, DNS, and network scanning can help you map a target network and provide valuable information regarding the operating system and applications running on the systems during the preattack phase.19. B. In the scope of work, a service-level agreement (SLA) should be defined to determine any actions that will be taken in the event of a serious service disruption.20. A. ISS Internet Scanner is an application-level vulnerability assessment. Internet Scanner can identify more than 1,300 types of networked devices on the network, including desk- tops, servers, routers/switches, firewalls, security devices, and application routers.
endix About the Companion CD In this appendix: ÛÛWhat you’ll find on the CD ÛÛSystem requirements ÛÛUsing the CD ÛÛTroubleshooting
What You’ll Find on the CDThe following sections are arranged by category and summarize the software and othergoodies you’ll find on the CD. If you need help with installing the items provided on theCD, refer to the installation instructions in the “Using the CD” section of this appendix.Sybex Test EngineFor WindowsThe CD contains the Sybex test engine, which includes two bonus exams located only onthe CD.PDF of Glossary of TermsFor WindowsWe have included an electronic version of the Glossary in .pdf format. You can view theelectronic version of the Glossary with Adobe Reader.Adobe ReaderFor WindowsWe’ve also included a copy of Adobe Reader so you can view PDF files that accompany thebook’s content. For more information on Adobe Reader or to check for a newer version,visit Adobe’s website at www.adobe.com/products/reader/.Electronic FlashcardsFor PCThese handy electronic flashcards are just what they sound like. One side contains a ques-tion or fill-in-the-blank question, and the other side shows the answer.
ubleshooting 361System RequirementsMake sure your computer meets the minimum system requirements shown in the followinglist. If your computer doesn’t match up to most of these requirements, you may have prob-lems using the software and files on the companion CD. For the latest and greatest infor-mation, please refer to the ReadMe file located at the root of the CD-ROM.NN A PC running Microsoft Windows 98, Windows 2000, Windows NT4 (with SP4 or later), Windows Me, Windows XP, Windows Vista, or Windows 7NN An Internet connectionNN A CD-ROM driveUsing the CDTo install the items from the CD to your hard drive, follow these steps:1. Insert the CD into your computer’s CD-ROM drive. The license agreement appears. Windows users: The interface won’t launch if you have Autorun disabled. In that case, click Start Run (for Windows Vista or Windows 7, Start All Programs Accessories Run). In the dialog box that appears, type D:\Start.exe. (Replace D with the proper letter if your CD drive uses a different letter. If you don’t know the letter, see how your CD drive is listed under My Computer.) Click OK.2. Read the license agreement, and then click the Accept button if you want to use the CD. The CD interface appears. The interface allows you to access the content with just oneor two clicks.TroubleshootingWiley has attempted to provide programs that work on most computers with the minimumsystem requirements. Alas, your computer may differ, and some programs may not workproperly for some reason.
Appendix n About the Companion CD The two likeliest problems are that you don’t have enough memory (RAM) for the pro-grams you want to use or you have other programs running that are affecting installationor running of a program. If you get an error message such as “Not enough memory” or“Setup cannot continue,” try one or more of the following suggestions and then try usingthe software again: Turn off any antivirus software running on your computer. Installation programs sometimes mimic virus activity and may make your computer incorrectly believe that it’s being infected by a virus. Close all running programs. The more programs you have running, the less memory is available to other programs. Installation programs typically update files and programs; so if you keep other programs running, installation may not work properly. Have your local computer store add more RAM to your computer. This is, admittedly, a drastic and somewhat expensive step. However, adding more memory can really help the speed of your computer and allow more programs to run at the same time.Customer CareIf you have trouble with the book’s companion CD-ROM, please call the Wiley ProductTechnical Support phone number at (800) 762-2974. Outside the United States, call+1 (317) 572-3994. You can also contact Wiley Product Technical Support at http://sybex.custhelp.com. John Wiley & Sons will provide technical support only for instal-lation and other general quality-control items. For technical support on the applicationsthemselves, consult the program’s vendor or author. To place additional orders or to request information about other Wiley products, pleasecall (877) 762-2974.
ssary
GlossaryAaccess control list (ACL) A table that maintains a detailed list of permissions or accessrights granted to users or groups with respect to file directory, individual file, or networkresource access.access point (AP) A piece of wireless communications hardware that creates a centralpoint of wireless connectivity.active attack An attack that can be detected and is therefore said to leave a footprint.Active Directory (AD) A Windows directory that stores information about resourceson the network and provides a means of centrally organizing, managing, and controllingaccess to those resources.Address Resolution Protocol (ARP) A TCP/IP protocol used to resolve a node’s physicaladdress from a provided IP address.agent A software routine that performs designated functions, such as waiting in the back-ground and performing an action when a specified event occurs.anonymizer A website that allows a user to access other websites undetected by a proxyserver.anonymous Having no known name, identity, or source.anti-Trojan Software specifically designed to help detect and remove Trojans.antivirus A program that attempts to recognize, prevent, and remove computer virusesand other malicious software from the computer.archive A place or collection containing records, documents, or other materials of histori-cal interest.auditing Checking a computer system to verify intended programs and reliable data andto see whether the data is corrupted or displaying inaccurate results.Bbackdoor A gap in the security of a computer system that’s purposely left open to permitaccess. Hackers may create backdoors to a system once it has been compromised.banner grabbing A technique that enables a hacker to identify the type of operatingsystem or application running on a target server. A specific request for the banner is oftenallowed through firewalls because it uses legitimate connection requests such as Telnet.black hat A malicious hacker.
ssary 365black-box testing Testing a system or network without any knowledge of the internalstructure.buffer A portion of memory available to store data.buffer overflow A situation where a program writes data beyond the buffer space allocatedin memory. This can result in other valid memory being overwritten. Buffer overflows canoccur as a consequence of bugs, improper configuration, and lack of bounds checking whenreceiving program input.bug A software or hardware error that triggers the malfunction of a particular program.Ccache A fast storage buffer, such as that found directly on the central processing unit of acomputer.calling procedure A software routine that passes control to a different software routine.When these routines exist on separate computers, the systems often use Remote ProcedureCall (RPC) libraries. Also refers to function calls and subroutines.certificate authority (CA) The organization or program that issues digital certificates.client A system or software process that accesses a remote service on another computer.Common Internet File System/Server Message Block The standard for file sharingused with Microsoft Windows and IBM OS/2 operating systems.countermeasure An action taken to offset another action. Usually a fix for a vulnerabil-ity in a system.covert channel A channel that transfers communication in a nonstandard way, oftensuch that it can’t be easily detected. Too frequently, this form of communication violates thesecurity policy by using a channel in an unintended manner.cross-site scripting A computer security exploit that is used to execute a malicious script.Ddaemon A background program that resides on a computer and services requests.database A collection of data or information that’s organized for easy access and analysis.decryption The process of converting encrypted data to plain text.demilitarized zone (DMZ) A network area that sits between an organization’s internalnetwork and an external network, usually the Internet. Most publicly available servers,such as web and FTP servers, reside in the DMZ.
Glossarydigital certificate Credentials that contain personal information such as a name, a publickey, an expiration date, and the digital signature of the certificate authority that issued thecertificate.digital signature A hash of a message that has been encrypted with an individual’s privatekey. It serves as validation of a message’s authenticity.DNS enumeration Locating DNS records from a DNS server.domain name A unique name that identifies a company or organization on the Internet.Domain Name System (DNS) The name resolution system that translates alphabeticdomain names into numeric IP addresses.Eencryption The process of encoding information in an attempt to make it secure fromunauthorized access.enumeration The creation of a list or inventory of items.Ethernet A frame-based computer networking technology for LANs. It defines wiringand signaling for the physical layer, frame formats, and protocols for the media access con-trol (MAC) and data link layer of the OSI model.exploit A defined procedure or program that takes advantage of a security hole in a com-puter program.Extended Stack Pointer (ESP) A location identifier used to access parameters passed intoa subroutine as arguments.FFiber Distributed Data Interface (FDDI) A standard for data transmission in a LAN.File Allocation Table (FAT) A file system used in DOS, Windows, and OS/2. It keepstrack of where data is stored on disk.firewalking A method to collect information about a remote network protected by a firewall.Firewalking uses trace route–like IP packet analysis to determine whether a data packet canpass through the packet-filtering device/firewall from the attacker’s host to the victim’s host.firewall Rules created to enforce an access control list (ACL) and designed to preventunauthorized access to or from a private network.footprinting Gathering information about a target to identify weaknesses.
ssary 367fragmentation The means of breaking a larger message into smaller chunks for the pur-pose of sending or storing the data more efficiently.FreeBSD A free, open source operating system based on Unix.File Transfer Protocol SSL A secure form of FTP software in which Secure SocketsLayer/Transport Layer Security (SSL/TLS) protocols are used to secure the control anddata connections.Ggateway Software or hardware capable of decision making, which permits or deniesaccess based on general rules. Firewalls are Layer 3 and Layer 4 gateways.GET An HTTP command used to request a file from a web server.gray hat A hacker who uses skills for defensive or offensive purposes as necessary.Hhacktivism Hacking for a cause—for example, hacking to take down a child pornog-raphy site.hash A function that transforms a string of characters into a number known as themessage digest.Hierarchical File System (HFS) A file system used in Mac OS X. It stores data in a top-to-bottom organization structure.honeynet An entire virtual network that is presented as a large honeypot.honeypot A system that is designed to attract probes, attacks, and potential exploits.Because honeypots attract attacks, they can be a liability. However, by having honeypotson the network, you can gain enormous amounts of information about how a malicioushacker, or even a script kiddie, gains access to systems. This information can lead to secu-rity improvements and/or help a security professional track down a hacker.hybrid attack A password attack that combines features of a brute-force attack with adictionary attack. Characteristics of a hybrid attack include using dictionary terms thatsubstitute numbers or special characters for letters or append numbers to words.Hypertext Transfer Protocol (HTTP) A communication protocol that facilitates browsingthe World Wide Web.Hypertext Transport Protocol Secure (HTTPS) A secure version of the HTTP protocolused to access secure web servers.
GlossaryIInstitute of Electrical and Electronics Engineers (IEEE) An organization (sometimesreferred to as the I Triple E) that creates standards that assist with the advancement of society’suse of technology. It includes engineers, scientists, and students.Internet Control Message Protocol (ICMP) An encapsulated IP packet that is used tosend error and control messages. The ping command uses ICMP Echo requests and ICMPEcho responses to verify connectivity.Internet Protocol Security Architecture (IPSec) A Layer 3 protocol that provides securetunneled communication with authentication and encryption over the Internet. It’s oftenused to create a virtual private network (VPN).intrusion detection system (IDS) A mechanism to monitor packets passing through com-puter networks. The IDS can be monitored as a security check on all transactions that takeplace in and out of a system.iris scanner A biometric device containing a small camera that examines the iris of theeye for purposes of authentication.KKerberos A computer network authentication protocol.keylogger A software or hardware device that records information typed by users. Data issaved in a log file, which could be retrieved by a hacker.LLightweight Directory Access Protocol (LDAP) A protocol used to access simple direc-tory structures.local area network (LAN) A network made up of system nodes and peripherals within asmall geographical area.logic bomb A program with a delayed payload that is released only when certain condi-tions are met in the system or program environment.Mmalicious Deliberately harmful.mantrap A secured entrance, normally reserved for high-security facilities. The trap usu-ally involves a series of doors that someone must pass through and in which a trespassercould be detained by locking the doors.
ssary 369Multipurpose Internet Mail Extensions (MIME) A communication protocol that allowsfor the transmission of data in many forms, such as audio, binary, or video, in email messages.NNetBSD The first freely redistributable, open source version of the BSD Unix operatingsystem.Network Address Translation (NAT) A technique of mapping multiple IP addresses to asingle external IP address belonging to the NAT device. This method is frequently used toconnect multiple computers to the Internet.Network Basic Input/Output System (NetBIOS) An interface that provides communica-tion between a PC and the network. It was created by IBM and adopted by Microsoft. Net-BIOS includes a name service, a session service, and a datagram service.network interface card (NIC) A Layer 1 and Layer 2 device that provides upper-layercommunication to a physical medium or medium type. Also known as a network adapter.network scanning Enumerating the available live hosts or IP addresses on a network.NOP A command that tells the processor to do nothing. Almost all processors have aNOP instruction that performs a null operation. In the Intel architecture, the NOP instruc-tion is one byte long and translates to 0x90 in machine code. A long run of NOP instruc-tions is called a NOP slide or sled. The CPU does nothing until it gets back to the mainevent (which precedes the return pointer).NT LAN Manager (NTLM) A challenge/response authentication protocol used in a varietyof Microsoft network protocols for authentication purposes.null session An unauthenticated connection to a network share by an anonymous user onan unidentified system.OOpen Systems Interconnection (OSI) A standard created by the International Organiza-tion for Standards (ISO) that describes seven layers with distinct responsibilities in movingdata as it’s exchanged between two networked devices.OpenBSD An open source Unix-based operating system that has many available securitymeasures.overt channel An obvious and defined communication path within a computer system ornetwork, used for the transfer of data.
GlossaryPpassive attack An attack that violates the security of a system without directly interact-ing with the system.password cracker A program designed to decode passwords.patch A short set of instructions to correct a vulnerability in a computer program.personal identification number (PIN) An alphanumeric value often used as a secondaryform of identification when using two-form authentication.phraselist A list of passphrases that a password-cracking tool uses to attempt to crack apassword.physical security Nondigital methods and mechanisms in place to prevent attackers fromgetting access to a facility, resource, or information stored on physical media. It can be assimple as a locked door or as elaborate as multiple security layers, including armed guards.ping A common connection verification tool that uses ICMP messages to test a target’sresponse. It’s been nicknamed the Packet InterNet Groper.ping sweep A scan of a range of IP addresses that shows which IP addresses are inuse and which aren’t. Ping sweeps may include retrieving the DNS name for each liveIP address.Point-to-Point Protocol (PPP) A protocol used for transporting IP packets over a seriallink between the user and ISP.policy A set of rules and regulations specified by an organization as a basis for behavior,operation, or performance.port scanning Trying to identify the services running on a system by probing ports andviewing the responses from the system. This technique can be used to find services thatindicate a weakness in the computer or network device.POST An HTTP command used to send text to a web server for processing.Post Office Protocol 3 (POP3) A standard interface for retrieving mail by an email clientprogram and from an email server.Pretty Good Privacy (PGP) A software package that provides cryptographic routines foremail and file-storage applications.private key Half of the formula to perform public key cryptography. It’s used to createa digital signature and to decrypt data that has been encrypted with the correspondingpublic key.probing Investigating or examining thoroughly.
ssary 371process An entity that is uniquely identifiable as it executes in memory.protocol A convention or standard that controls and enables communications, connec-tions, and data transfers.proxy server A system that acts on behalf of other systems. Proxy servers are often focalpoints of a network and may contain firewalls.public key Half of the formula to perform public key cryptography. Messages that havebeen encrypted with someone’s public key can only be decrypted by the person’s private key.Rremote access A communication method that allows access to a system or network froma remote location via a telephone line or the Internet.Request for Comments (RFC) A solicitation for professional discussion on a topic ofinterest. RFCs are often released when developing standards for protocols, systems, orp rocedures used by the Internet community.rootkit A collection of tools utilized by an intruder after gaining access to a computersystem. These tools assist the attackers in any number of malicious purposes. Rootkits havebeen developed for all common operating systems, including Linux, Solaris, and Windows,as well as network-connected gaming systems.Sscript A text file containing ordered commands that a user can perform interactively atthe keyboard.Secure Hash Algorithm (SHA) A cryptographic message digest algorithm, similar to themessage digest family of hash functions developed by Ron Rivest.Secure Shell (SSH) Software that produces a secure logon for Windows and Unix usingLayer 7 of the OSI model.Security Accounts Manager (SAM) A database of usernames, passwords, and permis-sions in the Windows architecture.security token A small physical device used in multifactor authentication that can storecryptographic keys and /or biometric data for identity verification.Sendmail An SMTP implementation used in Unix.
GlossarySerial Line IP (SLIP) A communications protocol for dial-up access to TCP/IP networks.It’s commonly used to gain access to the Internet as well as to provide dial-up accessbetween LANs.server A computer system in a network that provides services to client applications and/orcomputers.Server Message Block (SMB) A protocol for sharing files, printers, serial ports, andcommunications abstractions such as named pipes and mail slots between computers.session An active communication between a user and the system or between two comput-ers. It also refers to Layer 5 (the session layer) of the OSI model.sheep dip A stand-alone computer that houses antivirus software and is used understrictly controlled norms to check all media devices before they’re connected to a network.shell A command language interpreter that is an interface between an operating systemkernel and a user.shellcode Assembler code that can interact with the operating system and then exit.Hackers often use shellcode to launch exploits, such as stack-based overflows.shredding The physical destruction of the platters of a hard disk to ensure that the con-tents can never be recovered.Simple Mail Transfer Protocol (SMTP) A network protocol used when sending email.Simple Network Management Protocol (SNMP) An application layer protocol thatfacilitates the set and/or read management information in the Management InformationBase (MIB) of a network device.Simple Object Access Protocol (SOAP) A protocol for exchanging XML-based messagesusing HTTP or SMTP as the transport.smart card A device with an embedded microprocessor and storage space, often usedwith an access code to permit certificate-based authentication.social engineering The art of exploiting weaknesses common in human nature to trick aperson into revealing useful information such as a user ID, password, or other confidentialinformation.spyware Malicious software intended to intervene in or monitor the use of a computerwithout the user’s permission. Spyware doesn’t self-replicate like worms and Trojans.steganography The practice of hiding a message within an image, audio, or video file. It’sa form of a covert channel.System Integrity Verifier (SIV) A program that monitors system file hashes to determinewhether a file has been changed, such as if an intruder altered or overwrote a system file.Tripwire is one of the most popular SIVs.
ssary 373TTCP/IP The protocol suite of definitions for communications at Layers 3 and 4 of the OSImodel. TCP/IP is the standard communication method that computers use to communicateover the Internet.Telnet An application used to create a remote session with a computer.Temporal Key Integrity Protocol (TKIP) An encryption standard defined in IEEE 802.11iand WPA for Wi-Fi networks designed to replace WEP. TKIP was structured to replaceWEP with a more secure solution without replacing legacy hardware.third party A person, group, or business indirectly involved in a transaction or other rela-tionship between principals.threat An intentional or unintentional action that has the capability of causing harm toan information system.time bomb A type of logic bomb, with a delayed payload that is triggered by reachingsome preset time, either once or periodically.time to live (TTL) A field in the IP header that indicates the amount of time a transmittedpacket will be valid. The TTL defines how many router hops a packet can make before itmust be discarded. If a packet is discarded by a router, an ICMP error message is generatedto the sender.timestamp A number that represents the date and time. Recording timestamps is impor-tant for tracking events as they occur on a computer.traceroute A tool to trace a path to a destination system.traffic The data being transferred across the network media.Trojan A program that seems to be useful or harmless but in fact contains hidden codeembedded to take advantage of or damage the computer on which it’s run.tunneling Encapsulating one protocol or session inside the data structure of anotherp rotocol.tunneling virus A virus that attempts to tunnel underneath antivirus software so that it’snot detected.UUniform Resource Locator (URL) The address that defines the route to a file on a webserver (HTTP server).User Datagram Protocol (UDP) The connectionless, unreliable Internet protocol thatfunctions at Layer 4 of the OSI model.
GlossaryVvirus Malicious code written with an intention to damage the user’s computer. Viruses areparasitic and attach to other files or boot sectors. They need the movement of a file to infectother computers.virus hoax A bluff in the name of a virus. Creators attempt to arouse fear, and sometimesencourage the removal of system files.virus signature A unique string of bits that forms a recognizable binary pattern. This pat-tern is a fingerprint that can be used to detect and eradicate viruses.vulnerability A bug or glitch in computer software, an operating system, or architecturethat can be exploited, leading to a system compromise.vulnerability scanning Searching for devices, processes, or configurations on your net-work that have known vulnerabilities.Wwar dialer A malicious application that randomly calls phone numbers while trying todetect the response of a computer modem.warchalking A technique to identify key features of Wi-Fi networks for others by drawingsymbols in public places (where anyone can intrude easily) and encourage open access.web server The computer that delivers web pages to browsers and other files to applica-tions via the HTTP protocol.web spider Scanning web sites for certain information such as email accounts.white-box testing Testing software, a system, or a network with knowledge of the inter-nal structure. Also called glass box testing.Wi-Fi A certification from the Wi-Fi alliance to promote interoperability of wireless equip-ment for 802.11 networks (including 802.11a, 802.11b, 802.11g, and 802.11n). This termwas popularized by the Wi-Fi Alliance.Wired Equivalent Privacy (WEP) A technically obsolete protocol for wireless local areanetworks (WLAN). WEP was proposed to present a level of security similar to that of awired LAN.wiretapping A process by which a third party intervenes in a telephone conversation, usu-ally through a secret medium.worm A malicious software application that is structured to spread through computernetworks. These applications are self-propagating.
exNote to the Reader: Throughout this index boldfaced page numbers indicate primary discus-sions of a topic. Italicized page numbers indicate illustrations.A AirSnort tool, 243, 245 alarm systemsA (Address) records, 46access points (AP) auditing, 273 motion-sensing, 267 finding, 248 alternate data streams, 113 – 114 rogue, 250 – 251 American Registry for Internet NumbersACK bit TCP Headers, 157 (ARIN), 40, 43, 43, 46 three-way handshakes, 74, 74 Angry IP Scanner tool, 76ACK scans, 71 anonymizers, 80, 80AckCmd program, 315 anonymous scanning, 79 – 81, 80active attacks, 13 Anonymouse, 80, 80 password, 98 – 99 anti-honeypot software, 314 – 315 session hijacking, 183 Anti-spector tool, 109 stack fingerprinting, 78 Antichrist virus hoax, 143Active Directory antivirus definitions, 134 DNS servers for, 85 AP Masquerading, 250 – 251 viruses, 142 APNIC (Asia Pacific Network InformationActive Directory Administration Tool (ldp. Centre), 44 exe), 85 application attacks, 221 – 222active reconnaissance phase in hacking, 8active sniffing, 158 buffer overflows. See buffer overflowsAcunetix Web Vulnerability Scanner, 211 – 212, exam essentials, 232 review questions, 233 – 237 211 – 212 SQL injection. See SQL injectionAdditional Restrictions For Anonymous summary, 232 application-level rootkits, 112 Connections option, 85 applicationsAddress (A) records, 46 executing, 111address ranges for networks, 46 exploiting, 11Address Resolution Protocol (ARP) web server bugs, 198 APR (ARP Poison Routing), 165 – 166 attacks, 158 APs (access points) countermeasures, 160, 160 finding, 248 operation, 159 rogue, 250 – 251 poisoning, 159 ARIN (American Registry for Internet spoofing, 164 – 165addresses Numbers), 40, 43, 43, 46 IP. See IP addresses armored viruses, 142 MAC. See MAC (Media Access Control) ARP (Address Resolution Protocol) addresses attacks, 158Admin$ share, 98 countermeasures, 160, 160administrator passwords and usernames, 252 operation, 159ADMmutate tool, 304 poisoning, 159Advanced Encryption Standard (AES), 243 spoofing, 164 – 165Aircrack tool, 243, 245 ARP Poison Routing (APR), 165 – 166
arpspoof tool – cache command in Googlearpspoof tool, 138, 165 black hats, 3art of manipulation, 50 overview, 4Asia Pacific Network Information Centre penetration tests, 345 (APNIC), 44 BlackWidow tool, 200, 200 – 201, 206, 211asymmetric key encryption, 326 – 328 Blindside application, 115Atbash ciphers, 325, 325 block ciphers, 328 – 329, 329attack phase blogs as information source, 40 Blowfish cipher, 336 DDoS attacks, 178 BoSniffer tool, 131 penetration tests, 347 BOTs/BOTNETsattacks, defined, 7attrib command, 113 DDoS attacks, 178, 179Auditpol tool, 117 operation, 179, 180audits, 344 Bourne Again Shell (bash), 283 disabling, 116 – 117 Bourne Shell, 283 physical security, 269 – 273 breaches of physical security, 274authentication brute-force attacks attacks on, 6 cryptography, 337 in CIA triad, 325 description, 100 hijacking, 210 web passwords, 213 Linux, 291 Brutus password cracker, 213 – 214, 214 SQL injection, 225 Bubonic tool, 176 two-factor, 99 Budweiser Frogs virus hoax, 143 web, 212 – 213 buffer overflows, 11, 229 wireless networks, 242 – 245, 244, 251 countermeasures, 231 – 232automated password guessing, 98 – 99 description, 111automated tools exam essentials, 232 network-tracing, 182 IIS attacks, 206 penetration tests, 349 – 350 review questions, 233 – 237 summary, 232B types and detection methods, 229 – 231, 230 web applications, 210backdoors Burp tool, 211 installing, 111 bypassing network security, 301 overview, 125 – 127 exam essentials, 316 rootkits, 112 firewall types and honeypots, 308 – 315,BackOrifice tool, 127, 131 309, 311 – 314BackStealth tool, 81 IDS evasion techniques, 302 – 307, 303backups, securing, 268 review questions, 317 – 322badges for employees and contractors, 268 Snort sniffer, 304 – 307banner grabbing techniques, 77 – 79, 79, summary, 316 201 – 202 Cbash (Bourne Again Shell), 283basic authentication types for web, 212 C$ share, 98Beast Trojan, 132 C:\Windows share, 98biometric authentication, 99, 213 C2MYAZZ program, 105 – 106bit-flipping attacks, 6 cache command in Google, 39black-box testing, 13
Cain & Abel tool – defacing websites 377Cain & Abel tool, 166 control frames in MAC Headers, 241CameraShy tool, 115 cookiescamouflage viruses, 142Canonical Name (CNAME) records, 46 poisoning and snooping, 210Canvas tool, 350 for SYN attacks, 180 – 181case locks, 267 copying websites, 200, 200 – 201cavity viruses, 142 CORE IMPACT tool, 208, 347, 349certificate authorities (CAs), 330 – 331, 330 Cottrell, Lance, 80certificates covering tracks, 10 – 11, 116 – 117 covert channels, 128 – 130 encryption, 328 Covert_TCP program, 315 viewing, 331 – 333, 332 – 333 CPUHog tool, 176 web authentication, 213 crackerschange interval for passwords, 108 defined, 3Checksum field in TCP Headers, 157 overview, 4Cheops management tool, 78 “Crimes and Criminal Procedure” section, 20chosen-cipher text attacks, 337 cross-site scripting, 210chosen-plain text attacks, 337 cryptography, 323CIA triad, 325, 325 algorithms, 335 – 336, 336CIFS (Common Internet File System), 82 – 83 attacks, 337cipher text, 324, 324 encryption, 324 – 329, 324 – 326, 329cipher text-only attacks, 336 exam essentials, 338ciphers key generation, 329 – 335, 330, 332 – 334 block and stream, 328 – 329, 329 review questions, 339 – 342 historical, 325 – 326, 325 – 326 summary, 337clearing logs, 116 – 117 Cyber Security Enhancement Act, 19cleartext, 324, 324 CyberSpy Trojan, 132cloaking websites, 200CNAME (Canonical Name) records, 46 Dcommand injection, 210Common Internet File System (CIFS), 82 – 83 daemons, 177common port numbers, 65 – 66 data extraction in SQL injection, 225community strings, 84 data frames in MAC Headers, 241competitive intelligence, 34 – 37, 35 – 36 Data Offset field in TCP Headers, 157compilation data-sending Trojans, 130 GNU commands, 288 database schema in SQL injection, 225 Linux kernel, 285 – 288, 286, 288 DCOM (Distributed Component Objectcomputer-based social engineering, 50 – 53computer crimes, 19 Mode), 111ComputerSpy Key Logger program, 131 DDoS (distributed denial-of-service) attacksconcealment ciphers, 326conclusion phase of penetration tests, 18 BOTs/BOTNETs, 179, 180conduct security evaluation phase of process, 177 – 178, 178 – 179 decoy systems, 308 – 310, 309 penetration tests, 18 countermeasures, 315confidentiality attacks, 6 finding, 310confidentiality in CIA triad, 325 installing, 310 – 315, 311 – 314contractors, badges for, 268 Deep Throat Trojan, 127Control Bits field in TCP Headers, 157 defacing websites, 202
defaults – eMailTrackerPro tooldefaults Distributed Component Object Mode administrator passwords and (DCOM), 111 usernames, 252 Linux systems, 293 distributed denial-of-service (DDoS) attacks port numbers, 127 BOTs/BOTNETs, 179, 180 SSIDs, 253 process, 177 – 178, 178 – 179 websites, disabling, 199 – 200, 199 Distributed DNS Flooder tool, 166deliverables in penetration tests, 350 – 351, 351 distributions, Linux, 282demilitarized zones (DMZs), 198, DMZs (demilitarized zones), 198, 308 – 309, 345 308 – 309, 345denial-of-service (DoS) attacks, 173 DNS. See domain name system (DNS) dnsspoof tool, 138, 165 countermeasures, 182 DNSstuff tool, 40 – 41, 41 description, 5 Domain controllers, 85 distributed, 177 – 179, 178 – 180 domain name system (DNS) exam essentials, 188 NetBIOS, 107 enumeration, 40 – 45, 41 – 43 overview, 174 – 177 records, 46 review questions, 189 – 194 spoofing, 164 – 166 Smurf and SYN floods, 180 – 181, 181 zone transfer, 85 – 86 SQL injection, 225 Donald Dick Trojan, 131 summary, 187 doors, auditing, 271 Trojans, 130 DoS attacks. See denial-of-service (DoS) wireless, 251Denton, Jeremiah, 129 attacksdeny all users access in Linux, 289 Dskprobe tool, 116Department of Veterans Affairs laptop Dsniff tools, 138, 165 DumpSec tool, 82 theft, 265 dumpster diving, 51, 102DEPLOY.EXE program, 112 dynamic strings in SQL injection, 226 – 228,destination port number in TCP Headers, 157destructive Trojans, 130 227 – 228desynchronizing connections, 183diagrams for networks, 78 Edictionary attacks, 100, 213Dictionary Generator tool, 98 E‑mail Keylogger, 110digest authentication types, 212 EAP (Extensible Authentication Protocol)digital certificates standards, 243 encryption, 328 eavesdropping, 97, 251. See also sniffers viewing, 331 – 333, 332 – 333 eBlaster spyware, 109 web authentication, 213 EDGAR database, 36 – 37, 36digital signatures. See signatures editors in Linux, 282directories in Linux, 283 – 284 802.11 networks, 241 – 244, 241, 244directory-traversal attacks, 205, 210 ELiTeWrap wrapper, 135disabling elsave.exe utility, 117 auditing, 116 – 117 emails default websites, 199 – 200, 199 removable media drives, 268 tracking, 48 virus hoaxes, 143 eMailTrackerPro tool, 48
loyees – fingerprinting techniques 379employees steps, 16 – 18, 17 badges for, 268 summary, 23 impersonating, 50 technologies, 11 terminology, 7 – 8encryption, 323. See also cryptography tests, 13 – 14, 14 algorithms, 325 types, 12 – 13 block ciphers and stream ciphers, vulnerability research and tools, 15 328 – 329, 329 white hats, 4 key generation, 329 – 335, 330, 332 – 334 Event Viewer logs passwords, 97, 102 clearing, 116 – 117 techniques, 324 – 326, 324 – 326 monitoring, 108 – 109 types, 326 – 328 evidence, erasing, 116 – 117 uses, 333 – 335, 334 Evidence Eliminator system, 117 wireless networks, 242 – 243, 251, 253 Evil Twin attacks, 250 exclusive OR (XOR) operation for streamEnum utility, 86enumeration, 81 – 82 ciphers, 329, 329 executing applications, 111 DNS, 40 – 45, 41 – 43 executing, implanting, and retracting phase in exam essentials, 87 – 88 null sessions, 82 – 84 penetration tests, 347 review questions, 89 – 93 exploits, 7 – 8 SNMP, 84 – 85 Extensible Authentication Protocol (EAP) summary, 86 Windows 2000 DNS zone transfer, 85 – 86 standards, 243equipment theft, 263 exterior area audits, 270 – 271erasing evidence, 116 – 117 external assessment tests, 345escalating privileges, 110 – 111 penetration tests, 347 F SQL injection, 226Ethereal tool, 161 fast infectors, 142EtherFlood tool, 165 Fearless Key Logger Trojan, 110Ethernet networks, 240 – 242, 241 Federal Managers Financial Integrity ActEtherPeek sniffer, 161ethical hacking overview, 1 (FMFIA), 20 – 21 actions, 5 files black hats, 4 definition, 2 – 3 hiding, 113 – 116 exam essentials, 23 – 24 Linux, 283, 290 gray hats, 4 – 5 filesnarf tool, 165 hacker goals, 5 – 6 filetype command in Google, 39 hacker skill sets, 6 filtered ports, 70 legal issues, 18 – 23 filters penetration tests, 17 – 18 MAC, 6, 248 – 249, 249 phases, 8 – 11, 8 network-ingress, 182 reports, 16 Wireshark, 161 – 164, 162 – 164 review questions, 25 – 29 FIN scans, 73 – 74 security, functionality, and ease of use Find_ddos tool, 182 fingerprinting techniques triangle, 14 – 15, 14 OS, 77 – 79, 79 SQL injection, 225
Firekiller 2000 tool – host-auditing toolsFirekiller 2000 tool, 132 goals, hacker, 5 – 6firewalls Goodtimes virus, 143 Google ping sweeps, 68 for sniffers, 159 hacking, 211 – 212, 211 – 212 traceroute with, 46 for information gathering, 39 – 40 types, 308 – 315, 309, 311 – 314 Google Groups, 37 wireless settings, 253 Government Paperwork Elimination Actflag types in TCP, 73 – 76, 74, 76floods (GPEA), 22 MAC, 164 – 166 Graffiti game, 135 SYN, 180 – 181, 181 graphic images as hiding places, 115 – 116FMFIA (Federal Managers Financial Integrity gray-box testing, 13 gray hats, 3 – 5 Act), 20 – 21 Group Policy security, 85FMS (Fluhrer, Mantin, and Shamir) guessing passwords, 98 – 99 attacks, 243 HFoIA (Freedom of Information Act), 21footprinting, 33 hacktivism, 18 half-open scanning, 71 targets, 39 handshakes, three-way, 73 – 74, 74, 183 – 184 tools, 38 – 39 Hard Drive Killer Pro programs, 132 traceroute in, 46 – 47, 47 hardening methods, 10FOR command, 99Fport tool, 137 Linux, 289 – 292, 292frames web servers, 208 – 209 capturing. See sniffers Harris Stat management tool, 78 defined, 154 Hashed Message Authentication Code“Fraud and related activity in connection with (HMAC), 336 access devices” section, 20 hashes“Fraud and related activity in connection with dictionary words, 100 computers” section, 20 passwords, 97, 102Freedom of Information Act (FoIA), 21 WinMD5 for, 333 – 335, 334freeware tools, 137 heap in buffer overflows, 229 – 230Friendly Pinger tool, 69 help desks in social engineering attacks, 51FTP Trojans, 130 hiding files, 113 – 116Fyodor penetration tests list, 349 HIDSs (host-based IDSs), 302 hijacking, session. See session hijackingG Hk.exe utility, 110 HMAC (Hashed Message Authenticationgaining access phase in hacking, 10gathering information. See information Code), 336 hoaxes, viruses, 143 – 145 gathering home wireless network security, 252 – 254GCC (GNU Compiler Collection), 288 Honeyd honeypot, 315GetAcct tool, 86 honeypots, 308 – 310, 309GetAdmin.exe program, 110GFI LANguard scanner, 349 countermeasures, 315GirlFriend Trojan, 127 finding, 310Global Catalog service, 85 installing, 310 – 315, 311 – 314GNU Compiler Collection (GCC), 288 host-auditing tools, 182
t-based IDSs (HIDSs) – Internet Protocol Security (IPSec) 381host-based IDSs (HIDSs), 302 IIS (Internet Information Server) hacking,host-to-host network communications, 205 – 206 154 – 157, 155 – 156 IKS (Invisible KeyLogger Stealth) Softwarehping2 tool, 75 Logger, 110HTTP (Hypertext Transfer Protocol) ImageHide program, 115 – 116 authentication, 212 – 213 impersonation, 50 components, 197, 197 information gathering, 9, 31 – 32 tunneling tools, 80 – 81HTTPort tool, 81 enumeration. See enumerationHTTPS (Hypertext Transfer Protocol exam essentials, 55 methodology, 37, 37 Secure), 197HTTrack tool, 78 DNS enumeration, 40 – 45, 41 – 43human-based social engineering, 50 – 51 DNS records, 46Hunt program, 185 email tracking, 48hybrid attacks footprinting, 38 – 39 Google, 39 – 40 description, 100 network address range, 46 web passwords, 213 traceroute, 46 – 47, 47Hyena tool, 82 web spiders, 48Hypertext Transfer Protocol (HTTP) Whois and ARIN lookups, 42 – 45, 42 – 43 authentication, 212 – 213 reconnaissance, 33 – 37, 35 – 36 components, 197, 197 review questions, 56 – 60 tunneling tools, 80 – 81 scanning. See scanningHypertext Transfer Protocol Secure sniffers. See sniffers social engineering, 48 – 54 (HTTPS), 197 summary, 54 information theft, 6I injection packets, 183IANA (Internet Assigned Numbers SQL. See SQL injection Authority), 46 inside attacks, 14, 52, 263 Instant Source tool, 210ICANN (Internet Corporation for Assigned integrity attacks, 6 Names and Numbers), 42 integrity in CIA triad, 325 Inter-Process Communication share (IPC$), 83ICMP (Internet Control Message Protocol) internal assessment tests, 345 scanning, 68 Internet Assigned Numbers Authority shell access, 130 (IANA), 46 for traceroute, 46 Internet Control Message Protocol (ICMP) tunneling, 129 scanning, 68 shell access, 130ICMP Shell program, 315 for traceroute, 46Icmpenum tool, 75 tunneling, 129Icon Converter Plus program, 135 Internet Corporation for Assigned Names andidentity theft, 52 Numbers (ICANN), 42IDLE scans, 73 Internet Information Server (IIS) hacking,IDSs (intrusion detection systems), 66 205 – 206 Internet Protocol Security (IPSec), 186 for DoS attacks, 182 Snort, 161 types, 302 – 303, 303
Internet Server Application Programming Interface (ISAPI) extensions – legal issuesInternet Server Application Programming K Interface (ISAPI) extensions, 205 KerbCrack programs, 103Internet spoofing, 165 Kerberos authentication, 85intitle command in Google, 39 kerbsniff program, 103Intranet spoofing, 165 kernel-level rootkits, 112intrusion detection systems (IDSs), 66 kernels in Linux for DoS attacks, 182 compilation, 285 – 288, 286, 288 Snort, 161 modules, 289 types, 302 – 303, 303 key pairs, 327, 329intrusion phase in DDoS attacks, 178 keys, encryptionintrusion prevention systems (IPSs), 302 generation, 329 – 335, 330, 332 – 334inurl command in Google, 39 – 40 types, 326 – 328Invisible KeyLogger Stealth (IKS) Software keystroke loggers, 109 – 110 KeywordSpy tool, 34 – 35, 35 Logger, 110 KFSensor tool, 310 – 315, 311 – 314invitation virus hoaxes, 144 KingPingicmpenum tool, 75Inzider tool, 137 Kismet tool, 245IP addresses known-plain text attacks, 337 discovering, 9, 40 – 43, 46 – 47 L scanning, 64, 66 spoofing, 81 L0phtCrack tool, 102 – 103, 106 TCP/IP model, 155 LACNIC (Latin American and CaribbeanIP Network Browser tool, 84IP Restrictions Scanner (IRS), 165 Internet Addresses Registry), 44IP Watcher tool, 186 LAN (local area network) hacks, 12IPC$ (Inter-Process Communication share), 83 LAN Manager hash, 103IPEye port scanner, 75 LAND attacks, 176IPSec (Internet Protocol Security), 186 laptop computer security, 265IPSecScan tool, 75 Latin American and Caribbean InternetIPSs (intrusion prevention systems), 302Iris analyzer, 161 Addresses Registry (LACNIC), 44IRS (IP Restrictions Scanner), 165 LC5 tool, 103ISAPI (Internet Server Application LDAP (Lightweight Directory Access Programming Interface) extensions, 205 Protocol), 85ISS Internet Scanner, 349 ldp.exe (Active Directory AdministrationJ Tool), 85 LEAP (Lightweight EAP authentication), 251jdbgmgr.exe virus hoax, 144 least privilege concept, 8job-posting websites, 37 leaving marks, 347John the Ripper tool, 103 legal issues, 18 – 19johnny.ihackstuff.com tool, 211Jolt2 tool, 176 Cyber Security Enhancement Act, 19Juggernaut sniffer, 185 Federal Managers Financial Integrity Act, 20 – 21 Federal Managers Freedom of Information Act, 21 Government Paperwork Elimination Act, 22 other countries, 22
Legion tool – micro blocks 383 penetration tests, 349 M Privacy Act, 22 SPY Act, 19 – 20 MAC (Media Access Control) addresses state laws, 20 flooding, 164 – 166 Title 18, 20 sniffing, 158 – 159 USA PATRIOT Act, 22 spoofing, 6, 166, 248 – 249, 249, 251Legion tool, 102 TCP/IP model, 155LetMeRule! Trojan, 132liability, 19 MAC (Message Authentication Code), 336library-level rootkits, 112 MAC Changer tool, 166Life is beautiful virus hoax, 144 MAC Headers, 241, 241lighting audits, 271 macof tool, 138, 165Lightweight Directory Access Protocol mail delivery, 156 Mail Exchange (MX) records, 46 (LDAP), 85 mailsnarf tool, 165Lightweight EAP authentication (LEAP), 251 MailTracking tool, 48link command in Google, 39 maintaining access phase in hacking, 10Linux Kernel Modules (LKMs), 289 makestrm.exe utility, 114Linux systems, 281 malware (malicious code), 11, 126 basics, 282 – 284 signatures, 137 default, 293 viruses and worms, 141 exam essentials, 294 man-in-the-middle (MITM) attacks GNU compilation commands, 288 description, 98 hardening methods, 289 – 292, 292 SMB relay, 105 – 106, 106 kernel compilation, 285 – 288, 286, 288 management frames in MAC Headers, 241 kernel module installation, 289 Management Information Base (MIB), 84 Netcat distribution, 133, 133 manipulation in social engineering, 50 review questions, 295 – 299 Masquerading, AP, 250 – 251 summary, 293 masters in DDoS attacks, 178, 178listening ports on Linux systems, 292, 292 Master’s Paradise Trojan, 127live CDs, 287 MBSA (Microsoft Baseline SecurityLKMs (Linux Kernel Modules), 289lns.exe tool, 115 Analyzer), 350local administrators group, 110 MD5 (Message Digest 5) hashing algorithmlocal area network (LAN) hacks, 12local exploits, 8 checksum utility, 113local file systems in Linux, 290 for fingerprints, 335local procedure call (LPC) flaws, 110 MD5SUM program, 335lockpicking, 268 – 269 Media Access Control. See MAC (Medialocks case, 267 Access Control) addresses server rooms, 266 Melissa virus, 143loggers, keystroke, 109 – 110 Message Authentication Code (MAC), 336logon redirection, 105 Message Digest 5 (MD5) hashing algorithmlogs clearing, 116 – 117 checksum utility, 113 monitoring, 108 – 109 for fingerprints, 335Loki tool, 130 Metasploit Framework toolLPC (local procedure call) flaws, 110 buffer overflows, 231 description, 208, 350 web server exploits, 202 – 205, 203 – 204 MIB (Management Information Base), 84 micro blocks, 181
Microsoft Baseline Security Analyzer (MBSA) – offline password attacksMicrosoft Baseline Security Analyzer Netcraft website, 78 (MBSA), 350 NetIntercept firewall, 159 NetScan Tools Pro, 75misconfiguration netstat command, 180, 181 exploiting, 11 NetStumbler tool, 245 web servers, 198 network-auditing tools, 182 network-based IDSs (NIDSs), 302 – 303, 303MITM (man-in-the-middle) attacks network-ingress filtering, 182 description, 98 network-tracing tools, 182 SMB relay, 105 – 106, 106 networksmixed mode security, 243 address ranges, 46modem connections for war dialing, 77 diagrams, 78monitoring host-to-host communications, 154 – 157, Event Viewer logs, 108 – 109 155 – 156 Linux, 291 Linux commands, 284 ports, 137 – 138 Linux ports, 292, 292 video surveillance, 267 scanning, 66motion-sensing alarms, 267 security bypassing. See bypassing networkMP3Stego tool, 115MSF Assistant Wizard, 204, 204 securitymsgsnarf tool, 165 VPNs, 76, 187Mstream tool, 177 wireless. See wireless networksmultipartite viruses, 142 newsgroups as information source, 40MX (Mail Exchange) records, 46 Nibbles in TCP Headers, 157 NIDSs (network-based IDSs), 302 – 303, 303N nmap command, 70 – 73 nonelectronic password attacks, 101 – 102N-Stalker Web Application Security NOP (No Operation) instruction, 231 – 232 Scanner, 208 Norton Internet Security, 135 – 137, 136 NS (Name Server) records, 46Name Server (NS) records, 46 nslookup command, 40 – 41, 41, 85names, NetBIOS, 82 – 84 NT LAN Manager (NTLM)National Security Institute, 20 hashing, 103NBName tool, 107 web authentication, 213NBTdeputy tool, 106 NTFSneed to know concept, 8 file streaming, 114 – 115NeoTrace tool, 47 viruses, 142Nessus scanner, 315, 349 NTInfoScan scanner, 102net start _root_ command, 112 Null scans, 71, 73 – 74net stop _root_ command, 112 null sessions, 82 – 84net view tool, 82NetBIOS O DoS attacks, 107 obfuscation, URL, 53 name information, 82 – 84 office security audits, 272 – 273NetBIOS Auditing Tool, 82 Offline NT Password Resetter method, 104NetBus Trojan, 127, 131 offline password attacks, 99 – 100NetBus 2 Trojan, 127Netcat Trojan, 132 – 134, 133Netcraft tool, 78, 206
offsite backups – physical security 385offsite backups, 268 cracking, 102 – 109, 106Olympic Torch virus hoax, 144 countermeasures, 107 – 109Omnipeek tool, 246 – 248, 246 – 247 web-based techniques, 212 – 214, 214one-time pads, 326one-way encryption, 102 creating, 104online password attacks Linux, 289, 291 NetBIOS DoS attacks, 107 active, 98 – 99 nonelectronic attacks, 101 – 102 passive, 97 – 98 offline attacks, 99 – 100online scams, 52 – 53open port state, 70 online attacksopen Wi-Fi networks, 253 active, 98 – 99operating systems passive, 97 – 98 exploiting, 11 fingerprinting techniques, 77 – 79, 79 SMB logon redirection, 105 Linux, 289 – 290 SMB relay MITM attacks, 106, 106 web server bugs, 198 SNMP, 84 – 85operational security, 264 – 265 types, 96 – 97Ophcrack tool, 104 – 105 patch management for web servers, 207OSI model, 154, 155, 241, 241 PATRIOT Act, 22outside attacks, 14overflows, buffer. See buffer overflows penetration testers, 344overt channels, 128 – 130 penetration tests, 343owned systems, 111owning systems, 10 automated tools, 349 – 350 deliverables, 350 – 351, 351P description, 2, 5Packet Crafter tool, 166 exam essentials, 352packets legal issues, 349 overview, 345 capturing. See sniffers permissions for, 346 defined, 154 phases, 17 – 18 injecting, 183 review questions, 353 – 358Pandora’s Box, 135 security assessments, 344PAP (Password Authentication Protocol), 76 steps, 346 – 348, 348parallel ICMP scanning, 68 summary, 352passive attacks, 13 online passwords, 97 – 98 perimeter hardware firewalls, 308, 308 session hijacking, 183 perimeter penetration, 347 sniffing, 158 permissions for penetration tests, 346 stack fingerprinting, 78 phishing attacks, 50, 52passive IDS systems, 302passive reconnaissance phase in hacking, 8 – 9 phone number identification, 77Password Authentication Protocol (PAP), 76passwords, 96 PhoneSweep tool, 77 administrator, 252 physical-entry attacks, 13, 34 change interval, 108 physical security, 261 auditing, 269 – 273 breaches, 274 categories, 264 – 266 components, 262 – 264 countermeasures, 266 – 273 exam essentials, 274 review questions, 275 – 279 summary, 274
Ping of Death attacks – replay attacksPing of Death attacks, 176 public companies, SEC filings for, 36 – 37, 36ping sweep techniques, 68 – 70, 69 public key infrastructure (PKI), 329Pinger tool, 69 public keysPKI (public key infrastructure), 329planting encryption, 326 – 328 generating, 329 – 335, 330, 332 – 334 rogue access points, 251 public parking area security, 269 – 270 rootkits, 112 pwdump2 program, 105Pointer (PTR) records, 46poisoning Q ARP, 159 – 160 cookies, 210 QualysGuard scanner, 350 DNS, 164 – 165 Queensland attacks, 251polymorphic viruses, 142 Queso management tool, 78pop-up windows, 53portable device securing, 267 Rports Linux, 292, 292 RADIUS servers, 243 monitoring tools, 137 – 138 Raina, Kapil, 49 scanning, 64 – 65, 69 – 70 rainbow tables, 100 states, 70 – 73 rate-limiting network traffic, 182 Trojans, 127 RATs (Remote Access Trojans), 128, 130posing attacks, 50 rattling the doorknobs process, 9postattack phase in penetration tests, 347 RC4 algorithmPrcView utility, 137preattack phase in penetration tests, 347 description, 336preparation phase in penetration tests, 18 wireless network encryption, 242 – 243press releases as information source, 40 RC5 algorithm, 336printer security, 268 read community strings, 84Privacy Act of 1974 (5 USC 552a), 22 read/write community strings, 84private keys reconnaissance, 33 encryption, 326 – 328 competitive intelligence, 34 – 37, 35 – 36 generating, 329 – 335, 330, 332 – 334 hacking phase, 8 – 9privilege escalation, 110 – 111 for physical access, 34 penetration tests, 347 redirecting SMB logons, 105 SQL injection, 226 Remote Access Trojans (RATs), 128, 130Progenic Mail Trojan Construction Kit, 135 remote administration of wireless networks,programming code flaws for web servers, 198promiscuous mode, 158 253 – 254proxy servers remote authentication in Linux, 291 chains of, 79 – 80 remote commands in SQL injection, 226 DNS poisoning, 165 remote dial-up network hacks, 12 HTTP, 81 remote exploits, 7proxy Trojans, 130 remote network hacks, 12PsExec program, 111 Remote TCP Session Reset Utility, 186PSH flag, 74 removable media drives, 268PTR (Pointer) records, 46 Remoxec tool, 111public access area security, 272 replay attacks, 98, 337
reports – services 387reports, 5, 16, 350 – 351, 351 TCP communication flag types, 73 – 76,restricted access area security, 270 74, 76Retina scanner, 349reverse-connecting Trojans, 130 war dialing, 76 – 77reverse social engineering, 51 Scrawlr tool, 227 – 228, 227 – 228reverse WWW shells, 314 SEC filings, 36 – 37, 36RID tool, 182 Secure Hash Algorithm (SHA), 335 – 336RIPE NCC registry, 44 Secure Shell (SSH), 187robots.txt file, 48 Secure Sockets Layer (SSL), 187rogue access points, 250 – 251 Securely Protect Yourself Against Cyber_root_.sys device driver, 112root accounts in Linux, 291 Trespass Act (SPY ACT), 19 – 20root directory in IIS, 205 securityrootkits penetration tests. See penetration tests countermeasures, 113 physical. See physical security LKM, 289 vs. usability, 15 planting, 112 wireless networks, 251 – 254 TCP/IP stack, 112 – 113 security, functionality, and ease of use triangle,RPC Locator service, 176RSA Secure ID, 99 14 – 15, 14RST cookies, 180 – 181 Security Accounts Manager (SAM) file,RST flag, 74rules for Snort sniffer, 306 102 – 105 Security Administrator’s Integrated NetworkS Tool (SAINT), 208, 350SAINT (Security Administrator’s Integrated security assessments, 344 Network Tool), 208, 350 Security Auditor’s Research Assistant (SARA)SAM (Security Accounts Manager) file, tool, 182, 350 102 – 105 security software disabler Trojans, 130 Send-Safe Honeypot Hunter tool, 315Sam Spade tool, 40, 47 Senna Spy Generator, 135Samdump program, 105 sequence numbersSARA (Security Auditor’s Research Assistant) session hijacking, 184, 185 tool, 182, 350 TCP Headers, 157scams, 52 – 53 sequence predictionscanning session hijacking, 184 – 185, 185 tools, 185 – 186 anonymous, 79 – 81, 80 Server Message Block (SMB) platforms banner grabbing and OS fingerprinting audits, 82 logon redirection, 105 techniques, 77 – 79, 79 MITM attacks, 106, 106 CEH methodology, 67, 67 server rooms, 266 exam essentials, 87 – 88 service-level agreements (SLAs), 345 hacking phase, 9 – 10 Service (SRV) records, 46 nmap, 70 – 73 Service Set Identifiers (SSIDs) overview, 64 – 65 default, 253 ping sweep techniques, 68 – 70, 69 sniffers, 246 – 248, 246 – 247 review questions, 89 – 93 services summary, 86 adding, 127 identifying, 69 – 70 Linux, 290
session hijacking – spiderssession hijacking, 173 – 174, 183 Sniffdet tests, 159 dangers, 186 sniffers, 9, 102, 153 exam essentials, 188 preventing, 186 – 187 countermeasures, 158 – 159 review questions, 189 – 194 exam essentials, 167 sequence prediction, 184 – 185, 185 host-to-host network communications, summary, 187 154 – 157, 155 – 156sessions MAC flooding and DNS spoofing, 164 – 166 null, 82 – 84 operation, 158 splicing, 303 packet, 302 for passwords, 97SHA (Secure Hash Algorithm), 335 – 336 review questions, 168 – 171Shaft tool, 177 summary, 166shells, Linux, 282 – 283 switch limitations, 159 – 161, 160shoulder surfing, 51, 101 wireless, 246 – 248, 246 – 247, 251shrink-wrap code exploitation, 11 Wireshark filters, 161 – 164, 162 – 164SID2User tool, 86 SNMP enumeration, 84 – 85signatures SNMP Scanner tool, 75 SNMPUtil tool, 84 creating, 336, 336 snooping cookies, 210 IDS, 303 Snort sniffer, 161, 304 malware, 137 configuring, 304 – 306 verifying, 138 – 141, 139 – 141 output, 307 virus, 143 rules, 306sigverif program, 138 – 141, 139 – 141 Snow program, 115Silk Rope 2000 wrapper, 135 SOA (Start of Authority) records, 46single quotes (‘) in SQL injection, 224, 228 Sobek tool, 315site command in Google, 39 social engineeringSiteScope tool, 211 countermeasures, 54skill sets of hackers, 6 description, 12 – 13SLAs (service-level agreements), 345 manipulation, 50slaves in DDoS attacks, 178, 178 overview, 48 – 49slow infectors, 142 passwords, 101SMAC tool, 166, 249 types, 50 – 53small office, home office (SOHO) networking, SocksChain tool, 79 software firewalls, 308 252 – 254 SOHO (small office, home office) networking,smart cards, 99SmartWhois program, 42 252 – 254SMB (Server Message Block) platforms sol.exe game, 204 SolarWinds Toolset, 78, 84 audits, 82 source disclosure attacks, 206 logon redirection, 105 source port number in TCP Headers, 157 MITM attacks, 106, 106 source routing, 81SMB Auditing Tool, 82 space-filler viruses, 142SMBBF tool, 86 sparse infectors, 142SMBDie tool, 106 Specter honeypot system, 315SMBGrind tool, 106 Spector spyware, 109SMBRelay program, 105 spiders, 48SMBRelay2 program, 105Smurf attacks, 180 – 181, 181
icing sessions – targets of evaluation (TOEs) 389splicing sessions, 303 strcpy function, 232spoofing, 183 streadd function, 232 stream ciphers, 328 – 329, 329, 336 AP, 251 string passwords, 107 – 108 ARP, 160, 164 strings DNS, 164 – 166 IP addresses, 81 community, 84 MAC addresses, 6, 166, 248 – 249, 249, 251 dynamic, 226 – 228, 227 – 228SPY ACT (Securely Protect Yourself Against strong passwords, 97 Subroot Trojan, 132 Cyber Trespass Act), 19 – 20 SubSeven Trojan, 131SpyAnywhere tool, 109 substitution ciphers, 325, 325SpyFu tool, 34 – 35, 35 SULFNBK.EXE Warning virus hoax, 144spyware, 109 – 110 surveillance, video, 267SQL injection, 11, 221 – 223 switch limitations, 159 – 161, 160 symmetric key encryption, 326 – 328 countermeasures, 228 – 229 SYN cookies, 180 dynamic strings, 226 – 228, 227 – 228 SYN flag, 74 – 75, 74, 184 exam essentials, 232 SYN flood attacks, 180 – 181, 181 purpose, 225 – 226 SYN stealth scans, 71 – 72, 74 review questions, 233 – 237 synchronize packets, 184 summary, 232 SYSKEY utility, 107 vulnerabilities, 223 – 225 system checking, 138 – 141, 139 – 141 web applications, 210 System File Checker, 141SRV (Service) records, 46 system hacking, 95SSH (Secure Shell), 187 covering tracks and erasing evidence,sshmitm tool, 138, 165SSIDs (Service Set Identifiers) 116 – 117 default, 253 exam essentials, 118 sniffers, 246 – 248, 246 – 247 hiding files, 113 – 115SSL (Secure Sockets Layer), 187 keyloggers, 109 – 110SSPing program, 176 passwords. See passwordsStacheldraht tool, 177 privilege escalation, 110 – 111stack review questions, 119 – 123 buffer overflows, 229 – 230, 230 rootkits, 112 – 113 tweaking, 181 steganography, 115 – 116 web applications, 209, 209 summary, 117Start of Authority (SOA) records, 46 system monitoring in Linux, 291state laws, 20stateful inspections, 70 Tstatements in SQL, 226states, port, 70 – 73 T-Sight tool, 186stealth scans, 71 – 72 tailgaters, 268Stealth tool, 115 Targa program, 176stealth viruses, 142 targetssteganography, 115 – 116Stegdetect tool, 116 information gathering. See informationsTerm telnet client, 165 gatheringstolen-equipment hacks, 12storage area security, 270 penetration tests, 347strcat function, 232 targets of evaluation (TOEs), 7
Search
Read the Text Version
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
- 352
- 353
- 354
- 355
- 356
- 357
- 358
- 359
- 360
- 361
- 362
- 363
- 364
- 365
- 366
- 367
- 368
- 369
- 370
- 371
- 372
- 373
- 374
- 375
- 376
- 377
- 378
- 379
- 380
- 381
- 382
- 383
- 384
- 385
- 386
- 387
- 388
- 389
- 390
- 391
- 392
- 393
- 394
- 395
- 396
- 397
- 398
- 399
- 400
- 401
- 402
- 403
- 404
- 405
- 406
- 407
- 408
- 409
- 410
- 411
- 412
- 413
- 414
- 415
- 416
- 417
- 418
- 419
- 420
- 421
- 422
- 423
- 424
- 425
- 426
- 427
- 428
- 429
- 430
- 431
- 432
- 433
- 434
- 435
- 436
- 437
- 438
- 439