CEH

(Jeff_L) #1

442 ARP (Address Resolution Protocol) – BSSIDs (basic service set identifications)


ARP (Address Resolution Protocol)
man-in-the-middle attacks, 297–301,
297–301
poisoning, 225–226, 226 , 293
requests, 41
arpspoof command, 25, 299
ASP (Active Server Pages), 311
A S P. N E T, 311
ASs (authentication servers), 167
Assange, Julian, 261
associations in wireless networks, 353
asymmetric cryptography, 62–63
authenticating certificates, 65
key owners, 64–65
operation, 63–64
PKI system, 65–67
attachments, e-mail, 192
auditing, disabling, 170 –171
auditpol command, 171
audits, IT, 13
authentication
biometric, 406–407
certificates, 65
cryptography for, 59
Microsoft platforms, 165–169
SN M P, 138
wireless networks, 355–356
Authentication Headers (AHs) in IPSec, 71
Authentication Method dialog box, 72–73
authentication servers (ASs), 167
automatic updates in social networking, 248
availability in pen tests, 14

B
B0CK tool, 203
back-end resources as DoS targets, 262
Back Orifice 2000 (BO2K), 196, 199–201
backdoors
goals, 202–203
planting, 16, 169 –170
BackTrack 5 R3, 359
backups, 49
bandwidth of wireless networks, 353
banner grabbing, 117–118, 117 , 382

banner information in web applications,
315–316
barriers, 408
basic service set identifications (BSSIDs), 353
bastion hosts, 380
Batch group, 131
Beast tool, 199
Biham, Eli, 62
binary vs. hexadecimal, 35–36
biometric authentication, 406–407
bits, 36
black box pen tests, 12–13
black-hat hackers, 8–9
black hole filtering, 277
blacklists in SQL injection attacks, 332, 343
blind hijacking, 292 , 296
blind SQL injection, 341
Blowfish algorithm, 61
Bluejacking, 367
Bluesnarfing, 367
Bluetooth
overview, 365–366
threats, 366–367
BO2K (Back Orifice 2000), 196, 199–201
bollards, 407
boot-sector viruses, 186
Botbyl, Adam, 4
bots and botnets in DDoS attacks
defenses against, 277
role, 271–272
bounds checking, 267
broadcast domains, 41
broadcasts in ARP, 225
browsers
proxies, 121–122
social networking, 247
spyware infection, 192
browsing social networking, 248
brute-force attacks
cryptography, 69–70
directory services, 130
passwords, 156
session IDs, 285
WPA keys, 360
Brutus tool, 318–319
BSSIDs (basic service set identifications), 353

bindex.indd 442 22-07-2014 11:00:54

Free download pdf