CEH

(Jeff_L) #1

460 Teflon Oil Patch program – unprotected information in web applications


Teflon Oil Patch program, 202
Tel net
banner grabbing with, 117–118, 117 , 382
sniffing, 212
Temporal Key Integrity Protocol (TKIP),
355–356, 358
temporary closures from social
engineering, 240
tension wrenches, 405
Terminal Server User group, 132
terminology of footprinting, 87–88
terrorism in social engineering, 240
testing
firewalls, 387
IDSs, 387–388
penetration. See penetration testing
text2cap tool, 217
TFN (Tribe Flood Network), 273
TFN2K tool, 273
TGSs (ticket-granting servers), 167
THC-SCAN program, 107
3G/4G hot spots, 351
three-way handshake process, 33, 33
open ports, 110 –111, 111
session hijacking, 295, 295
sniffers, 221, 221
throttling, router, 276
ticket-granting servers (TGSs), 167
Tiger hash function, 68
time to live (TTL) in firewalking, 382
TKIP (Temporal Key Integrity Protocol),
355–356, 358
TOEs (Targets of Evaluation), 10
ToneLoc program, 107
top-level domains, 39
topologies, network, 26–29, 27–29
Tor technology, 121–122
Tracert utility, 96
tracking port usage, 197–198, 198
tracks, covering, 170 –172
traffic analysis in wireless networks, 364
training
social engineering, 237
social networking, 245–246
transport layer, 32
Tribe Flood Network (TFN), 273

Trinity Rescue Kit (TRK), 168
Trinoo tool, 273
Triple DES (3DES) algorithm, 61
Tripwire tool, 172, 375
TRK (Trinity Rescue Kit), 168
Trojan Man program, 202
Trojans, 158 , 194–195
description, 183
detecting, 196–198, 198
distributing, 201–203
social engineering, 238
tools, 199
trust
as contract consideration, 19
in social engineering, 237–238
trusted root CAs, 66
tshark tool, 217
TTL (time to live) in firewalking, 382
Tunnel EndPoint screen, 72
tunneling
ACK, 386–387
HTTP, 387
IC M P, 386
reverse SSH, 362
tunneling viruses, 187
Tw it t e r
description, 92
number of users, 242
Twofish algorithm, 62
type mismatches, 342

U
Ubuntu CAM table overflow, 225
UDP Flood tool, 273
UDP protocol
scans, 115–116
services and ports, 133
session hijacking, 301
unauthorized destruction of information, 6
unidirectional antennas, 353–354
uniform resource identifiers (URIs), 312
Unix operating system, 139 –141
unprotected information in web
applications, 320

bindex.indd 460 22-07-2014 11:00:57

Free download pdf