CEH

(Jeff_L) #1

462 webservers and web applications – http://www.cvedetails.com site


webservers and web applications
(continued)
input validation, 317
review questions, 324 –327
scripting errors, 319
session hijacking, 288–289
session management issues, 320
SQL injection attacks, 333–334
summary, 323
vulnerabilities, 313 –316
website spyware infection, 193
wefi tool, 364
Welcome To The Create IP Security Rule
Wizard screen, 72
well-known ports, 37–38
WEP (Wired Equivalent Privacy), 355
breaking, 357–358
overview, 356 –357
problems and vulnerabilities, 357
risk mitigation, 360
Whirlpool algorithm, 68
white box pen tests, 12–13
white-hat hackers, 8–9
whitelists in SQL injection attacks,
332, 343
Whois utility, 96
WhoReadMe utility, 93
Wi-Fi Protected Access. See WPA (Wi-Fi
Protected Access)
Wi-Fi standard, 351
WikiLeaks, 261
windows, 408
Windows Firewall, 47, 73
Windows operating system,
46 – 47, 130
exploited services, 133–135
groups, 131–132
NULL sessions, 135–136
PsTools suite, 137
services and ports, 132–133
SIDs, 132
SuperScan, 136
users, 130–131
Windump tool, 213
winpass tool, 168

winrt-gen tool, 160 –161
WinSSLMiM program, 321
wire reinforced windows, 408
Wired Equivalent Privacy (WEP), 355
breaking, 357–358
overview, 356 –357
problems and vulnerabilities, 357
risk mitigation, 360
wireless networks, 350
antennas, 353–355, 354
authentication modes, 355
Bluetooth hacking, 365–367
cards, 365
encryption mechanisms, 355–359
environments, 351–352
exam essentials, 368
locating, 364–365
overview, 350 –351
review questions, 369–371
service set identifiers, 352–353
social networking, 248
standards, 352
summary, 367–368
threats, 360–364
vocabulary, 353
Wireshark sniffer, 213–218, 214–218
wiretapping, 212
worms, 190
description, 183
functions, 191–192
WPA (Wi-Fi Protected Access), 355
brute-force keys, 360
cracking, 359
deauthentication attacks, 359
offline attacks, 359
overview, 358
risk mitigation, 360
WPA2, 355–356, 359
deauthentication attacks, 359
offline attacks, 359
WPA2-Enterprise mode, 356, 359
WPA2-Personal mode, 359
wrappers for Trojans, 201–202
wrenches, tension, 405
http://www.cvedetails.com site, 47

bindex.indd 462 22-07-2014 11:00:57

Free download pdf