458 sniffers – stateful multilayer inspection firewalls
sniffers, 209–210
attack detection, 230
exam essentials, 230
law enforcement issues, 212
overview, 210 –212
reading output, 221–224, 221–223
review questions, 231–234
session, 289
session hijacking, 286
summary, 230
switched networks. See switched network
sniffing
TCPdump, 218 –221, 218 –220
tools, 213
Wireshark, 214 –218, 214–218
sniffing packets, 157
SNMP (Simple Network Management
Protocol)
description, 133
enumeration with, 137–139
exploiting, 130
SNMPv1 protocol, 137
SNMPv2 protocol, 138
SNMPv3 protocol, 138
SNScan utility, 139
social engineering, 5, 18, 235–236
cryptography attacks, 70
description, 236–237
effectiveness, 237–238
exam essentials, 252–253
footprinting, 88, 96–97
identity theft, 250–252
impact, 239–240
phases, 239
review questions, 254–257
social networking, 241–246
success, 238–239
summary, 252
targets, 240–241
threats, 246–249
social networking
countermeasures, 245–246
footprinting, 91–92
mistakes, 243–245
overview, 241–242
software
malicious. See malware
piracy, 5
software-based access points (SAPs), 351
software installation, spyware infection in,
193
solar film windows, 408
solid-core doors, 402
Sony Corporation, attack on, 331
source IP reputation filtering, 277
source routing, 293 , 293 , 385–386
SOX (Sarbanes-Oxley) law, 19
SPAN (Switched Port Analyzers) ports, 227
sparse-infector viruses, 187
Spears, Britney, 242
Spector Pro tool, 204
splicing, session, 384
spoofing
DNS, 293
vs. hijacking, 286
I P, 292 , 292 , 385–386
M AC , 226 , 362
spyware, 158
description, 183
infection methods, 192–193
SQL injection, 329–330
blind, 341
countermeasures, 343–344
data alteration, 339–341
database vulnerabilities, 334 –336
evading detection mechanisms, 342–343
exam essentials, 344
information gathering, 342
initiating attacks, 337–339
overview, 330 –332
results, 332–333
review questions, 345–347
summary, 344
targets, 336 –337
web applications, 333–334
SQL Slammer worm, 190–191
SQLPing 3.0 tool, 335–336
SQLRecon tool, 335
SSH tunneling, reverse, 362
SSIDs (service set identifiers), 352–353
SSL (Secure Sockets Layer), 74
Stacheldraht tool, 273
stack overflows, 267–271, 268–269
standard windows, 408
star layout, 27 , 28
stateful multilayer inspection firewalls, 381
bindex.indd 458 22-07-2014 11:00:57