CEH

(Jeff_L) #1

448 Google Hacking Database (GHDB) – HTTP


Google Hacking Database (GHDB), 95
Google Maps utility, 91
gray box pen tests, 12–13
gray-hat hackers, 8–9
Green, Julian, 195
grouping error messages, 342
groups in Windows, 131–132
growth of hacking, 6–7
GSM (Global System for Mobile
Communications), 353
guessing passwords, 158 , 164
guidelines for contracts, 19

H
habits in social networking, 248
hack values, 10
hackers
ethical, 7–9
term, 2
hacking methodologies, 15–18, 15
hacktivism, 9, 261
half-open scans, 112–113, 113
hand geometry systems, 406
handlers in DDoS, 271
handshake process, 33, 33
open ports, 110 –111, 111
session hijacking, 295, 295
sniffers, 221, 221
HAPs (hardware-based access points), 351
hard-disk killer tool, 199
hard drives. See drives
hardware-based access points (HAPs), 351
hash injection attacks, 158
hashes
cryptography, 68– 69
extracting, 159
passwords, 159
precomputed, 159–162
signatures, 64
HAVAL hash function, 68
HAVING command, 342
Health Insurance and Portability
Accountability Act (HIPAA), 19
heap overflows, 267–271, 268–269

Hellman, Martin, 62
help desk personnel in social engineering, 240
hexadecimal vs. binary, 35–36
HFS (Hierarchical File System), 172
hidden fields in web apps, 288
hiding
data, 171
file extensions, 118
HIDSs (host-based intrusion detection
systems), 375
Hierarchical File System (HFS), 172
hieroglyphics, 57–58
high-interaction honeypots, 383
hijacking
session. See session hijacking
vs. spoofing, 286
Hilton, Paris, 4, 251
HIPAA (Health Insurance and Portability
Accountability Act), 19
history, 2
cryptography, 57–58
current developments, 3–4
early days of hacking, 2–3
evolution and growth of hacking, 6–7
famous hacks, 4–6
hive-like mentality, 7
hoaxes
description, 188
social networking, 245
hobo marks, 361
Home Depot, 243
honeynets, 383
honeypots, 383
honeyspot attacks, 363–364
horizontal privilege escalation, 168
host-based intrusion detection systems
(HIDSs), 375
host system intrusions, 378
hosts in firewalking, 382
hot spots, 351, 353
HPING2 utility, 112
HPING3 utility, 112, 264–266
HTTP
header responses, 292
sniffing, 212
tunneling, 387

bindex.indd 448 22-07-2014 11:00:55

Free download pdf