456 Remote Encrypted Callback Unix Backdoor (RECUB) – Senna Spy tool
Remote Encrypted Callback Unix Backdoor
(RECUB), 199
Remote Procedure Call (RPC)
protocol, 140
RemoteExec utility, 170
replay attacks
description, 70,
overview, 157–158
replication step in viruses, 185
reports by ethical hackers, 17
reputation filtering, 277
Requirements screen, 73
researching viruses, 189
Restorator program, 202
Restricted group, 132
restricted websites, 90
retina pattern systems, 406
revenue loss from footprinting, 88
reverse proxies, 276
reverse SSH tunneling, 362
Reverse World Wide Web Tunneling
Shell, 203
revocation of certificates, 66
RFC 3704 filtering, 277
RFID (radio frequency ID), 406
Rijndael algorithm, 62
ring topologies, 27 , 28
RIPE-MD algorithm, 68
Rivest, Ron, 60, 68
rlogin sniffing, 212
rogue access points, 361
root CAs, 66
root directories in traversal attacks, 321
root servers, 39
rootkits, 183
Rosetta Stone, 58
routers
overview, 39– 40
throttling, 276
rows in databases, 335
RPC (Remote Procedure Call) protocol, 140
rpcinfo command, 140
RSA cryptosystem, 60
RST flag, 111, 385
rule-based password attacks, 156
S
salting hashes, 161
SAM (Security Accounts Manager), 165–166
sample scripts in web applications, 319
sanitation methods, 400
SAPs (software-based access points), 351
Saran Wrap program, 201
Sarbanes-Oxley (SOX or SarBox) law, 19
Save As dialog box, 73
save capture function in sniffers, 211
scalar objects, 138
scanf() function, 267
scans. See network scans
scareware, 193–194, 238
Schneier, Bruce, 62
scraping, 405
screened subnets, 380
screensavers, 396 –397
script kiddies, 8
scripting errors in web applications, 319
search engine results page (SERP), 89
search engines in footprinting, 89–90
Search for Extraterrestrial Intelligence
(SETI) project, 162–163
SEC (Securities & Exchange Commission), 94
Secure Hash Algorithm-0 (SHA-0), 68
Secure Hash Algorithm-1 (SHA-1), 68
Secure Hash Algorithm-2 (SHA-2), 68
Secure Sockets Layer (SSL), 74
Securities & Exchange Commission (SEC), 94
security
vs. convenience, 12, 12
network, 44–46, 44 – 45
pen testing, 10
physical. See physical security
Security Accounts Manager (SAM), 165–166
Security Association rule, 73
security film windows, 408
security identifiers (SIDs), 132
security policies in social engineering, 237
SELECT statement in SQL injection,
339–340
Self group, 132
Senna Spy tool, 202
bindex.indd 456 22-07-2014 11:00:56