Post Office Protocol (POP) – Remote Authentication Dial-In User Service (RADIUS) 455
scanning, 105
TCP/IP, 37–39
usage tracking, 197–198, 198
Windows, 132–133
Post Office Protocol (POP), 212
posting illegal material, 5
precomputed hashes, 159–162
predicting session information, 286,
289–290
presentation layer, 32 , 311
Pretty Good Privacy (PGP), 73 –74
privacy
and footprinting, 88
SN M P, 138
social engineering, 240
Privacy Act, 19
private browsing in social networking, 248
private keys, 62
privilege escalation, 16, 167–169
process-hiding backdoors, 203
Profile screen, 73
promiscuous clients in wireless networks, 363
promiscuous sniffing mode, 210
protocol anomaly detection, 377
Protocol Port screen, 72
proxies, 42
application, 43
network scans, 120–122
reverse, 276
Trojans, 196
proxy-based firewalls, 381
pseudonymous footprinting, 88
PSH f lag, 111
pspv.exe utility, 164–165
PsTools suite, 137 , 169
psychological deterrents, 401
public figures in social networking, 244
public key cryptography, 62–63
authenticating certificates, 65
key owners, 64–65
operation, 63–64
PKI system, 65–67
public-key infrastructure (PKI)
system, 65–67
public networks and places in social
networking, 248
public websites, 90
pushing stacks, 268
pwdump tool, 159
Q
questionable scripts in web applications, 319
quizzes in social networking, 244
R
radio frequency ID (RFID), 406
RADIUS (Remote Authentication Dial-In
User Service), 356
rainbow tables, 159–162
RAs (Registration Authorities), 67
Raspberry Pi computer, 362
RATs (remote access Trojans), 196
RC2 algorithm, 62
RC4 algorithm, 62
RC5 algorithm, 62
RC6 algorithm, 62
RCPT TO command, 144 –145
rcrack_gui.exe tool, 161
read community strings, 139
read/write community strings, 139
reading sniffer output, 221–224, 221–223
reaper viruses, 184
Reaver tool, 359
receptionists in social engineering, 240
reconnaissance. See footprinting
records in databases, 335
RECUB (Remote Encrypted Callback Unix
Backdoor), 199
redirection of ports, 204
reflected XSS Attacks, 291
registered ports, 37–38
Registration Authorities (RAs), 67
relational databases, 334
religious laws, 18
remote access Trojans (RATs), 196
Remote Authentication Dial-In User Service
(RADIUS), 356
bindex.indd 455 22-07-2014 11:00:56