New Connection Security Rule Wizard – passive sniffing 453
Windows services, 131
wireless. See wireless networks
New Connection Security Rule Wizard, 73
nibbles, 36
NICs (network interface cards), 40
NIDS (network IDS), 375
Nmap tool, 109 , 115, 196
NNTP (Network News Transfer
Protocol), 212
non-electronic password attacks, 156
Nondiscoverable Bluetooth mode, 366
nonpairing Bluetooth mode, 366
nonrepudiation, cryptography for, 59
nonspecific signs of intrusion, 378
nontechnical password attacks, 156
NOP sleds, 270
NT LAN Manager (NTLM) Authentication,
166 –167
NTP (Network Time Protocol), 142 –143
NULL scans, 114 –115, 114
NULL sessions in Windows, 135–136
nursingjobs.com site, 247O
Obama, Barack, 242
obfuscating, 384
object identifiers (OIDs) in SNMP, 138
object-oriented programming
databases, 334
offline attacks, 159–162
passwords, 156
WPA and WPA2, 359
OIDs (object identifiers) in SNMP, 138
omnidirectional antennas, 354 , 354
Omnipeek tool, 213
one-way hash functions, 64
Onion Router, 121
online attacks
active, 158
passive, 157–158
online habits in social networking, 248
open ports, 110 –112, 197
open source information gathering, 87
open source operating system, 48open system authentication, 355
Open Systems Interconnection (OSI) model,
30 –33, 31
OpenSignal app, 364
OpenSSL tool, 321
operating systems, 46
fingerprinting, 116
footprinting, 86
Linux, 48
Mac OS, 47– 48
Windows, 46 – 47
Ophcrack tool, 166
OSI (Open Systems Interconnection) model,
30 –33, 31
outside the box thinking, 6
outsider attacks, 17
overflows
CAM tables, 225
heap and stack, 267–271, 268–269
web applications, 314
worms, 190
overt channels, 195, 203–205
OWASP guide for web applications, 321
owners of keys, 64–65P
p0f tool, 118
P2P (peer-to-peer networks), 192
pack mentality, 7
packet analysis, 222–223, 222–223
packet crafters, 112
packet filtering firewalls, 43, 381
packet sniffing, 157
PageXchanger tool, 118
pairing Bluetooth mode, 366
Palin, Sarah, 251
palm scan systems, 406
parabolic grid antennas, 354 , 354
passive attacks
online, 156–158
session hijacking, 287–288, 288
passive fingerprinting, 116
passive information gathering, 87
passive sniffing, 210bindex.indd 453 22-07-2014 11:00:56