About the Author |
|
xvii | |
About the Technical Reviewer |
|
xix | |
Introduction |
|
xxi | |
Chapter 1 Introduction to Ethical Hacking |
|
1 | (10) |
|
|
1 | (1) |
|
|
2 | (1) |
|
|
3 | (1) |
|
Security vs. Functionality and Ease of Use |
|
|
3 | (1) |
|
|
4 | (2) |
|
|
6 | (1) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
7 | (1) |
|
Ethical Hacking Assignment |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
9 | (2) |
Chapter 2 Footprinting and Reconnaissance/Scanning Networks |
|
11 | (16) |
|
|
12 | (1) |
|
Information Gathering Methodology |
|
|
12 | (1) |
|
|
13 | (11) |
|
|
14 | (1) |
|
|
14 | (1) |
|
Locating the Network Range |
|
|
15 | (1) |
|
Conducting Active and Passive Reconnaissance Against a Target |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
24 | (3) |
Chapter 3 Enumeration |
|
27 | (8) |
|
Steps to Compromise a System |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
30 | (1) |
|
Discovering Hosts with Windows Command Line Tools |
|
|
31 | (1) |
|
Discovering Hosts with Metasploit |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
34 | (1) |
Chapter 4 System Hacking |
|
35 | (14) |
|
Password Attacks: Passive Online Attacks |
|
|
35 | (3) |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
40 | (2) |
|
Password Cracking Countermeasures |
|
|
42 | (1) |
|
|
42 | (1) |
|
|
43 | (1) |
|
|
44 | (1) |
|
|
44 | (1) |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
47 | (2) |
Chapter 5 Trojans, Backdoors, Viruses, and Worms |
|
49 | (22) |
|
|
50 | (1) |
|
Indicators of a Trojan Attack |
|
|
50 | (1) |
|
|
51 | (1) |
|
|
52 | (1) |
|
|
52 | (1) |
|
|
53 | (1) |
|
Tools Used to Create Trojans |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
56 | (1) |
|
|
56 | (1) |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
59 | (1) |
|
|
60 | (1) |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
62 | (1) |
|
Self-Modification Viruses |
|
|
63 | (1) |
|
The Worst Computer Viruses |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
65 | (1) |
|
|
66 | (1) |
|
|
66 | (2) |
|
Exploiting the Connection |
|
|
68 | (1) |
|
|
69 | (2) |
Chapter 6 Sniffers and Social Engineering |
|
71 | (14) |
|
|
72 | (1) |
|
|
72 | (1) |
|
|
73 | (1) |
|
Protocols Vulnerable to Sniffing |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
78 | (1) |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
80 | (1) |
|
Computer-Based Social Engineering |
|
|
81 | (1) |
|
|
82 | (1) |
|
Prevention Recommendations |
|
|
82 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
84 | (1) |
Chapter 7 Denial of Service |
|
85 | (8) |
|
|
85 | (1) |
|
|
86 | (1) |
|
|
86 | (1) |
|
|
87 | (1) |
|
Distributed Denial of Service Attack |
|
|
87 | (2) |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
91 | (2) |
Chapter 8 Session Hijacking |
|
93 | (10) |
|
|
93 | (1) |
|
|
94 | (1) |
|
|
94 | (1) |
|
Steps in Session Hijacking |
|
|
95 | (1) |
|
Types of Session Hijacking |
|
|
96 | (1) |
|
|
96 | (1) |
|
Application-Layer Hijacking |
|
|
97 | (1) |
|
|
98 | (1) |
|
|
98 | (1) |
|
|
99 | (1) |
|
|
100 | (1) |
|
Exploiting the Victim Machine |
|
|
101 | (1) |
|
|
102 | (1) |
Chapter 9 Hacking Webservers |
|
103 | (12) |
|
Web Server Security Vulnerabilities |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
105 | (1) |
|
|
106 | (1) |
|
|
106 | (1) |
|
Web Server Security Checklist |
|
|
106 | (1) |
|
Apache Web Server Security Checklist |
|
|
107 | (1) |
|
Using Armitage to Attack the Network |
|
|
108 | (1) |
|
|
109 | (5) |
|
|
114 | (1) |
Chapter 10 Hacking Web Applications |
|
115 | (10) |
|
|
115 | (1) |
|
Cross-Site Scripting Attack |
|
|
116 | (1) |
|
|
117 | (1) |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
119 | (1) |
|
Error Message Interception |
|
|
120 | (1) |
|
|
120 | (2) |
|
|
122 | (1) |
|
|
123 | (1) |
|
|
124 | (1) |
|
|
124 | (1) |
Chapter 11 SQL Injections |
|
125 | (14) |
|
Web Application Components |
|
|
125 | (1) |
|
SQL Injection Classifications |
|
|
126 | (2) |
|
Web Front End to SQL Server |
|
|
128 | (1) |
|
Manipulating the Input Fields |
|
|
129 | (1) |
|
Failed SQL Injection Attempt |
|
|
129 | (1) |
|
Using Client-Side Validation |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
133 | (2) |
|
|
135 | (1) |
|
|
136 | (1) |
|
Preventing SQL Injection Attacks |
|
|
136 | (1) |
|
|
137 | (2) |
Chapter 12 Hacking Wireless Networks |
|
139 | (14) |
|
Types of Wireless Networks |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
141 | (1) |
|
802.1x Authentication Process |
|
|
141 | (2) |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
144 | (1) |
|
Temporal Key Integrity Protocol |
|
|
144 | (1) |
|
|
145 | (1) |
|
Hacking Wireless Networks |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
147 | (2) |
|
|
149 | (1) |
|
Monitoring an Unsecured WLAN |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
152 | (1) |
Chapter 13 Evading Intrusion Detection Systems, Firewalls, and Honeypots |
|
153 | (12) |
|
Intrusion Detection Techniques |
|
|
154 | (1) |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
155 | (1) |
|
After an IDS Detects an Attack |
|
|
156 | (1) |
|
|
156 | (1) |
|
Intrusion Prevention Systems |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
158 | (1) |
|
|
158 | (1) |
|
|
159 | (1) |
|
|
159 | (1) |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
160 | (1) |
|
|
161 | (1) |
|
Intrusion Detection Tools |
|
|
161 | (1) |
|
|
162 | (1) |
|
|
162 | (1) |
|
Tools to Breach a Firewall |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
164 | (1) |
Chapter 14 Buffer Overflow |
|
165 | (10) |
|
|
165 | (1) |
|
|
166 | (1) |
|
Heap-Based Buffer Overflow |
|
|
166 | (1) |
|
Detecting Buffer Overflow Vulnerabilities |
|
|
166 | (1) |
|
Defense Against Buffer Overflows |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
168 | (1) |
|
|
169 | (1) |
|
Using Metasploit to Fingerprint |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
173 | (2) |
Chapter 15 Cryptography |
|
175 | (14) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
177 | (2) |
|
|
179 | (1) |
|
|
179 | (1) |
|
|
180 | (1) |
|
Cryptography Algorithm Use: Confidentiality |
|
|
180 | (1) |
|
Cryptography Algorithm Use: Digital Signatures |
|
|
181 | (1) |
|
Secure Sockets Layer (SSL) |
|
|
182 | (1) |
|
|
182 | (2) |
|
|
184 | (1) |
|
Cryptographic Applications |
|
|
184 | (2) |
|
Attacks Against Cryptography |
|
|
186 | (1) |
|
|
187 | (1) |
|
|
188 | (1) |
Chapter 16 Penetration Testing |
|
189 | (8) |
|
Penetration Testing Overview |
|
|
189 | (1) |
|
|
190 | (1) |
|
Phases of Penetration Testing |
|
|
191 | (1) |
|
|
192 | (1) |
|
|
193 | (1) |
|
Exploiting a Victim Machine |
|
|
194 | (1) |
|
|
195 | (1) |
|
|
196 | (1) |
Index |
|
197 | |