452 mirrors, port – networks
mirrors, port, 227
misassociation attacks, 363
misconfiguration of wireless networks, 363
Missile Defense Agency, attack on, 331
misuse detection, 376
MITM (man-in-the-middle) attacks
description, 70
online, 157
session hijacking, 290 , 297–301,
297–301
Mitnick, Kevin, 296–297
MMC (Microsoft Management
Console), 73
mobile technologies
cryptography, 58
issues, 397– 400, 400
Mocmex virus, 186
modems, 106 –107
monitoring session hijacking, 286
Monster.com site, 93
moral obligation in social engineering, 237
Morris, Robert T., Jr., 4
MSN Sniffer, 213
multihomed firewalls, 381–382
multipartite viruses
description, 188
first appearance, 186N
NASA, attack on, 331
NAT (Network Address Translation), 40
National Information Infrastructure
Protection Act, 19
NBNS (NetBIOS Name Service), 132
nbtstat utility, 134–135
negotiation policies in IPSec, 71–72
Nessus Vulnerability Scanner tool, 321
NetBIOS API, 134
NetBIOS Name Service (NBNS), 132
NetBIOS over TCP/IP, 134
NetBIOS Session Service, 133
Netcat tool, 204
Netcraft tools, 90, 118
Netgear for MAC flood mitigation, 229netstat tool, 197
NetStumbler network detector,
108, 361
NetWitness NextGen tool, 213
Network Address Translation
(NAT), 40
network administrators in client-server
relationship, 310
Network group, 132
network IDS (NIDS), 375
network interface cards (NICs), 40
network layer, 32
Network News Transfer Protocol
(NNTP), 212
network scans, 103–104
banner grabbing, 117–118, 117
countermeasures, 118
description, 16 , 83
exam essentials, 122
for live systems, 106 –110
network diagrams, 119 –120, 120
open ports, 110 –112
OS fingerprinting, 116
overview, 104 –106
proxies, 120–122
review, 128–129, 153
review questions, 123–126
summary, 122
types, 112–116, 113–114
vulnerability scanning, 119
network session hijacking, 294
man-in-the-middle attacks, 297–301,
297–301
TCP/IP sessions, 295–296, 295
UDP sessions, 301
Network Time Protocol (NTP), 142 –143
Network Type screen, 72
networks
devices, 39– 41
diagrams, 119 –120, 120
DoS attacks, 262
footprinting, 85–86, 88, 96
intrusions, 5, 378
securit y, 44–46, 44 – 45
social. See social networking
topologies, 27–29bindex.indd 452 22-07-2014 11:00:56