Hacking ExposedThis one-of-a-kind book provides in-depth expert insight into how hackers infiltrate e-business, and how they can be stopped. |
Contents
CHAPTER 1 Footprinting | 5 |
CHAPTER 2 Scanning | 33 |
CHAPTER 3 Enumeration | 71 |
Copyright | |
21 other sections not shown
Other editions - View all
Hacking Exposed: Network Security Secrets and Solutions Stuart McClure,Joel Scambray,George Kurtz No preview available - 1999 |
Common terms and phrases
9 Impact ActiveX Admin Administrator allow application attackers auditing authentication back doors browser buffer overflow Chapter Cisco client command line configured connection Countermeasure cracking create default detection dial-up disable discussed domain enabled encryption enumeration example execute exploit filtering firewall guessing hackers hacking hash host ICMP installed Internet intruders IP address IPSec kernel L0phtcrack launch Linux listening login malicious Microsoft NetBIOS NetBus netcat NetWare nmap NTRK operating system option output packet password patch pcAnywhere perform ping Popularity port scan privileges protocol query Registry Risk Rating root rootkit router script sendmail server shell Simplicity sniffer SNMP Solaris specific SYSKEY target system TCP/IP techniques telnet TFTP ToneLoc traceroute traffic UNIX user’s username utility vulnerability wardialing web server Win 9x Windows NT zone