HTTPRat tool – IP addresses 449
HTTPRat tool, 199
humans
hacking, 96–97
social engineering, 238–239
hybrid password attacks, 156
hybrid topologies, 29 , 30
I
ICMP (Internet Control Message Protocol)
backdoor tool, 203
flood attacks, 263
pings, 108
tunneling, 386
IDEA (International Data Encryption
Algorithm), 61
identity theft
indicators, 250
information available online, 251–252
protective measures, 250–251
IDSs. See intrusion detection systems (IDSs)
IEEE 802.11 standards, 352
ifconfig command, 41
IGMP (Internet Group Management
Protocol), 203
ignorance in social engineering, 237
IIS Lockdown tool, 118
IKS Software Keylogger, 204
illegal material, posting and transmitting, 5
IM (instant messaging), 192
IMAP (Internet Message Access
Protocol), 212
incorporation step in viruses, 185
incremental backups, 49
industrial, scientific, and medical (ISM)
band, 353
inference
in security, 95
social networking, 241
information gathering
footprinting. See footprinting
SQL injection, 342
information leakage, 88
information sharing in social networking, 243
ingress filtering, 276
initial sequence numbers (ISNs), 294
initialization vectors (IVs), 357–358
input validation in web applications, 317
insider attacks, 17
inSSIDer network detector, 108, 361
instant messaging (IM), 192
integrity
cryptography for, 59
pen tests, 14
Interactive group, 131
interior controls, 409
International Council of Electronic
Commerce Consultants (EC-Council), 8
International Data Encryption Algorithm
(I DEA), 61
Internet Control Message Protocol (ICMP)
backdoor tool, 203
flood attacks, 263
pings, 108
tunneling, 386
Internet footprinting, 88
Internet Group Management Protocol
(IGMP), 203
Internet in hacking history, 3
Internet Message Access Protocol
(IMAP), 212
Internet Protocol Security (IPSec), 71–73
Internet relay chat (IRC), 192
Internet root servers, 39
Internet service providers (ISPs), 40
interprocess communication (IPC), 135–136
intrusion detection systems (IDSs), 43– 44
vs. denial of service, 383–384
detection methods, 376 –377
inner workings, 375–376
intrusion signs, 377–379
roles, 374 –375
testing, 387–388
types, 375
intrusion prevention systems (IPSs), 43– 44, 377
IP addresses
finding, 86
pinging by, 109
spoofing, 292 , 292 , 385–386
subnetting, 35
website access, 386–387
bindex.indd 449 22-07-2014 11:00:55