CEH

(Jeff_L) #1

buffer overflows – cookies 443


buffer overflows
heap and stack, 267–271, 268–269
web applications, 314
worms, 190
building exterior, securing, 408–409
bus topology, 26 –27, 27
BusinessWire service, 94
bytes, 36

C
Cain & Abel tool
ARP poisoning, 225, 226
IV encryption keys, 358
calculating IDs in session hijacking, 285
CAM (content addressable memory) tables,
224–225
camouflage viruses, 187
CAN-SPAM Act, 183
capinfos tool, 217
cards
contactless, 406
wireless networks, 365
CAs (certification authorities), 64–66
Catch Me If You Can movie, 239
cavity viruses, 187
CCMP (Counter Mode with Cipher Block
Chaining Message Authentication Code
Protocol), 355–356
ceilings, 407
celebrities in social networking, 244
certificates, digital, 64–67
certification authorities (CAs), 64–66
channels, overt and covert, 195, 203–205
Check Point FireWall-1, 382
choke points in firewalls, 379
chosen ciphertext attacks, 70
chosen plaintext attacks, 70
CIA triad, 14
cipher locks, 404, 404
ciphers, 60
ciphertext, 60
ciphertext-only attacks, 70
circuit-level gateways, 381
Cisco IOS MAC flood mitigation, 228

cleartext, 60
client misassociation in wireless networks,
363
client-server relationship in web applications,
310 –313
cloaked SSIDs, 353
closures from social engineering, 240
cluster viruses, 187
CNBC for company information, 94
Code of Fair Information Practices, 19
Code Red virus, 191
collision domains, 41
columns in databases, 335
command injection, 286
Communicating With Computers That Do
Not Support IPsec screen, 72
Communications Assistance for Law
Enforcement Act, 19
companion viruses, 187
competitive analysis in footprinting,
94–95
Completing The IP Filter Wizard screen, 72
Completing The IP Security Filter Action
Wizard screen, 72
Completing The IP Security Policy Wizard
screen, 72
Completing The Security Rule Wizard
screen, 72
computer crime laws, 4
Computer Fraud and Abuse Act, 4, 19, 182
computer specific DoS attacks, 262
confidentiality
cryptography for, 59
pen tests, 13
connection-oriented protocols, 33
connections, desynchronizing, 293–294, 294
construction kits for Trojans, 202
contactless cards, 406
content addressable memory (CAM) tables,
224–225
content component in web applications, 313
contracts
considerations, 19
ethical hacking, 8–9
convenience vs. security, 12, 12
cookies, 289, 312, 320

bindex.indd 443 22-07-2014 11:00:55

Free download pdf