Sie sind auf Seite 1von 82

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

M o d u le 01: Introduction to Ethical Hacking 1. Zero-day attacks are meaner, more ram pant than w e ever thought, from http://arstechnica.com/security/ 2 0 1 2 / 10 /zero-day-attacks-are-meaner-and-more-plentiful-thanthought/. 2. SECURITY POLICY: TARGET, CONTENT, & LINKS, from http://csrc.nist.gov/nissc/1998/proceedings/paperG4.pdf. 3. Anatom y of the Hack - Hands-on Security, from http://www.slideshare.net/NewBU/anatomy-of-thehack-handson-security-information-assurance-dub. 4. 5.
6.

Hacker methodology, from http://w w w.hackersecuritym easures.com /. Ethical Hacking, from w w w .secured eath.co m . C. C. Palmer, Ethical hacking from http://researchweb.watson.ibm .com /journal/sj/403/palm er.htm l. An O verview of Com puter Security, from www.cc.gatech.edu/classes/AY2005/cs4803cns_fall/security_overview.ppt.

7.

8.

Dr. Death, (2006), Ethical Hacking, from http://w w w .securedeath.com . Ethical Hacking, from http://neworder.box.sk/news/921. How are Penetrating Testing conducted?, from w w w .corsaire.co m . Ethical Hacking: The Security Justification Redux, from http://www.sosresearch.org/publications/ISTAS02ethicalhack.PDF.

9. 10. 11.

12. 13. 14. 15. 16.

Ethical Hacking, from w ww.sosresearch.org/publications. Ethical Hacking, from w w w .research.ibm .com . Covering Tracks, from http://rootprom pt.org. Attack, from http://www.linuxsecurity.com /content/view/17/70/. Security Issues in W ireless M A G N ET at Networj Layer, from http://csce.unl.edu/~jaljaroo/publications/TR02-10-07.pdf.

17.

Glossary of Security and Internet terms, from http://wssg.berkeley.edu/Securitylnfrastructure/glossary.htm l.

18.

Glossary of Vulnerability Testing Terminology, from http://www.ee.oulu.fi/research/ouspg/sage/glossary/.

19. 20. 21. 22. 23. 24.

Information about Information about

hackers, from http://w w w .antionline.com /. hackers, from http://w2.eff.org/Net_culture/Hackers/.

LEX LUTHOR, information about hackers, from http://bak.spc.org/dms/archive/britphrk.txt. Information about Information about Information about hackers, from http://directory.google.com/Top/Computers/Hacking/. hackers, from http://directory.google.com/Top/Computers/Security/Hackers/. hackers, from http://bak.spc.org/dms/archive/profile.html.

References Page 2976

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

25.

Information about hackers, from http://dir.yahoo.com /Com puters_and_lnternet/Security_and_Encryption/Hacking/.

M o d u le 02: Footprinting and Reconnaissance 26. 27. Search Operators, from http://w w w.googleguide.com /advanced_operators.htm l. The Complete W indow s Trojans Paper, from http://w w w .w indow security.com /w hitepapers/trojans/The_C om plete_W indow s_Trojans_Paper.htm l. 28. Naples, (2008), Information Gathering Tools, Available from http://it.toolbox.com /wiki/index.php/lnform ation_Gathering_Tools. 29. 30. Extract W ebsite Information from archive.org, Available from w w w .archive.org . Footprinting, from http://www.ethicalhacker.net/com ponent/option,com _sm f/ltem id,49/topic,228.m sg672. 31. Simson Garfinkel and David Cox, (2009), Finding and Archiving the Internet Footprint, http://simson.net/clips/academic/2009.BL.lnternetFootprint.pdf. 32. 33. CHAPTER 2 [FOOTPRINTING], from http://www.ecqurity.com /wp/footprinting-encored.pdf. Donna F. Cavallini and Sabrina 1 . PACIFICI, Got COM PETITIVE INTELLIGENCE, http://www.llrx.com /features/gotci.ppt. 34. Spam m ers & hackers: using the APNIC W hois Database to find in their network, from http://www.apnic.net/info/faq/abuse/using_whois.htm l. 35. P. Mockapetris, (1987), DOM AIN N A M ES - CONCEPTS AND FACILITIES, from htt p ://w w w .ie tf.0 rg/ rf c/ rf c 1034. txt. 36. M anic Velocity, Footprinting And The Basics Of Hacking, from http://web.textfiles.com/hacking/footprinting.txt. 37. Dean, (2001), W indow s 2000 Command Prom pt Troubleshooting Tools, from http://www.pcm ech.com /show/troubleshoot/192/. 38. nslookup Command, from http://publib. boulder. ibm.com/infocenter/pseries/v5r3/index.jsp?topic=/com.ibm.aix.doc/cmds/aixcmd s4/nslookup.htm. 39. 40. The nslookup M anual Page, from http://www.stopspam .org/usenet/m m f/m an/nslookup.htm l. Bob Hillery, (2001), Neohapsis Archives - Incidents list - Re: Finding out w ho owns ..., from http://archives.neohapsis.com/archives/incidents/2001-01/0032.html. 41. Ryan Spangler, (2003), Analysis of Rem ote Active Operating System Fingerprinting Tools, from http://w w w.packetw atch.net/docum ents/papers/osdetection.pdf. 42. Ryan Spangler, (2003), Analysis of Rem ote Active Operating System Fingerprinting Tools, from http://w w w.securiteam .com /securityreviews/5ZP010UAAI.htm l. 43. Fingerprint methodology: IPID sampling, from http://www.insecure.org/nmap/nmap-fingerprintingold.html. 44. Fyodor, (1998), Rem ote OS detection via TCP/IP Stack Fingerprinting, from http://www.donkboy.com /htm l/fingerprt.htm . 45. 46. 47. 48. 49. Rem ote OS Detection, from http://nmap.org/book/osdetect.html. Regional Internet Registry, from http://en.wikipedia.org/wiki/Regional_lnternet_Registry. Boy Scouts, Fingerprinting from http://onin.eom/fp/fpmeritbdg.html#top. The Hacker's Choice, from http://freeworld.thc.org/welcom e/. THC Fuzzy Fingerprint, from http://freeworld.thc.org/thc-ffp/.

References Page 2977

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

50. 51.

Katherine Knickerbocker, CJ625 Student Paper, from http://all.net/CID/Attack/papers/Spoofing.html. Arik R. Johnson, W h a t is com petitive intelligence? How does com petitive ..., from http://aurorawdc.com /whatisci.htm .

52.

Guangliang (Benny), (2006), Spamming and hacking, from http://www.apnic.net/info/faq/abuse/using_whois.htm l.

53.

Dhillon, (2006), Footprinting: The Basics of Hacking: Hack In The Box, from http://www.hackinthebox.org/modules.php?op=modload&name=News&file=article&sid=5359&mode=t hread&order= 0 &thold= 0 .

54.

Roshen, (2006), Paladion - Customers - Success Stories - Penetration Testing, from http://paladion.net/pentration_testing.php.

55.

Paul Thompson, (2006), Cognitive Hacking and Digital Governm ent: Digital Identity, from http://www.ists.dartm outh.edu/library/chd0803.pdf.

56.

Greg Sandoval, (2006), M PA A accused of hiring a hacker, from http://news.com.com/MPAA+accused+of+hiring+a+hacker/2100-1030_3-6076665.html.

57.

Kurt Seifried, (2005), Closet20001213 Backdoors, Back Channels and HTTP(S), from http://www.seif ried.org/security/index.php/Closet20001213_Backdoors,_Back_Channels_and_HTTP(S).

58. 59. 60. 61. 62.

Happy Browser, (2005), from http://www.hotscripts.com /Detailed/39030.htm l. Client-server architecture, from http://w w w.netw orkintrusion.co.uk/N_scan.htm . Elegant architecture: NASI, from http://www.nessus.org/features/. The Signatures, from http://www.honeynet.org/papers/finger/. Ryan Spangler, (2003), Analysis of Rem ote Active Operating System Fingerprinting Tools, Nmap t o o l: technique, from http://w w w.securiteam .com /securityreviews/5ZP010UAAI.htm l.

63.

Bew are!: W a r dialing, Sandstorm Sandtrap 1.5 W ard ia le r Detector Plus 16 and Basic Detectors, from http://w w w .data-connect.com /Santstorm _PhoneSw eep.htm .

64.

Appendix A - Glossary of Terms: IPSEC, from http://www.im sglobal.org/gws/gwsvlpO/im sgws_securityProfvlpO .htm l.

65.

Def. and info. Vulnerability scanning, from http://www.webencanto.com /com puter_glossary/Com m unications/Ethics/vulnerability_scanning.htm l.

66.

Footprinting, from http://books.mcgrawhill. com/downloads/products//0072193816/0072193816_ch01. pdf].

67.

P. Mockapetris, Zvon - RFC 1034 [DO M AIN N A M ES - CONCEPTS AND FACILITIES] - DOMAIN..., from http://www.zvon.org/tmRFC/RFC1034/Output/chapter3.html.

68.

Gaurav, (2006), The Domain Name System (DNS), from http://people.csa.iisc.ernet.in/gaurav/np/rfcs/dns.html.

69.

Using the Internet for Com petitive Intelligence, from http://www.cio.com /CIO/arch_0695_cicolum n.htm l.

70.

Reporting network abuse: Spamming and hacking, from http://www.apnic.net/info/faq/abuse/using_whois.htm l.

71.

Bastian Ballmann, (2011), Information gathering tools, from http://www2.packetstormsecurity.org/cgibin/search/search.cgi?searchvalue=information+gathering&type=archives&[search].x= 0 &[search].y= 0 .

72. 73. 74. 75.

Google Earth, from http://www.google.com /earth/index.htm l. pipl,from https://pipl.com/. spokeo, from http://w w w.spokeo.com . Zaba Search, from http://w w w.zabasearch.com .

References Page 2978

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

76. 77. 78. 79. 80. 81. 82. 83. 84. 85.
86.

123 People Search, from http://w w w.123people.com . Zoomlnfo, from http://w w w.zoom info.com . PeekYou, from http://w w w .peekyou.com . W in k People Search, from http://wink.com . Intelius, from http://w w w.intelius.com . A n yW ho , from http://w w w .anyw ho.com . PeopleSm art, from http://w w w .peoplesm art.com . People Lookup, from https://w ww .peoplelookup.com . W hitePages, from http://w w w .w hitepages.com . Facebook, from https://w ww .facebook.com /. Linkedln, from http://w w w.linkedin.com . Google+, from https://plus.google.com. Twitter, from http://twitter.com . Google Finance, from http://finance.google.com /finance. Yahoo Finance, from http://finance.yahoo.com . Zaproxy, from https://code.google.eom/p/zaproxy/downloads/list. Burp Suite, from http://portswigger.net/burp/download.htm l. Firebug, from https://getfirebug.com/downloads/. HTTrack W eb site Copier, from http://w w w.httrack.c 0 m/page/ 2 /. BlackW idow , from http://softbytelabs.com /us/downloads.htm l. W ebripper, from http://w w w.calluna-software.com /W ebripper. SurfOffline, from http://w w w.surfoffline.com /. W ebsite Ripper Copier, from http://w w w.tensons.com /products/w ebsiterippercopier/. PageNest, from http://w w w .pagenest.com . Teleport Pro, from http://w w w.tenm ax.com /teleport/pro/download.htm . Backstreet Browser, from http://www.spadixbd.com /backstreet/. Portable Offline Browser, from http://w w w .m etaproducts.com /Portable_O ffline_Brow ser.htm . Offline Explorer Enterprise, from http://w w w .m etaproducts.com /offline_explorer_enterprise.htm . Proxy Offline Browser, from http://www.proxy-offline-browser.com/. GNU W get, from ftp://ftp.gnu.org/gnu/wget/. iMiser, from http://internetresearchtool.com . Hooeey W ebprint, from http://www.hooeeywebprint.com.s3-website-us-eastl.am azonaws.com /dow nload.htm l.

87.
88.

89. 90. 91. 92. 93. 94. 95. 96. 97. 98. 99.
100. 101. 102.

103. 104. 105. 106. 107.

108. 109.
110. 111. 112.

W ayback M achine, from http://archive.org/web/web.php. W ebSite-W atcher, from http://aignes.com /download.htm . eM ailTrackerPro, from http://w w w .em ailtrackerpro.com . PoliteM ail, from http://w w w .politem ail.com . Email Lookup - Free Email Tracker, from http://w w w.ipaddresslocation.org. Read Notify, from http://w w w .readnotify.com . Pointofmail, from http://w w w .pointofm ail.com .

113. 114.

References Page 2979

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

115. 116. 117. 118. 119.


120. 121. 122.

DidTheyReadlt, from http://w w w .didtheyreadit.com . Super Email M arketing Softw are, from http://www.bulk-email-marketing-software.net. Trace Email, from http://whatismyipaddress.com/trace-email. W h o R e a d M e , from http://w horeadm e.com . MSGTAG, from http://www.m sgtag.com /download/free/. GetNotify, from http://w w w .getnotify.com . Zendio, from http://w w w.zendio.com /download. G-Lock Analytics, from http://glockanalytics.com. EDGAR Database, from http://w w w .sec.gov/edgar.shtm l. Hoovers, from http://w w w .hoovers.com . LexisNexis, from http://www.lexisnexis.com . Business W ire , from http://w w w.businesswire.com . M arket W atch, from http://w w w .m arketw atch.com . The W all Street T ra n scrip t, from http://w w w .tw st.com . Upper M arketplace, from http://w w w .lipperm arketplace.com . Eurom onitor, from http://w w w .eurom onitor.com . Fagan Finder, from http://w w w.faganfinder.com . SEC Info, from http://w w w .secinfo.com . The Search Monitor, from http://w w w .thesearchm onitor.com . Compete PRO, from http://w w w .com pete.com . Copernic Tracker, from http://w w w.copernic.com . ABI/IN FO RM Global, from http://w w w .proquest.com . SEM Rush, from http://w w w.sem rush.com . AttentionM eter, from http://w w w .attentionm eter.com . Jobitorial, from http://w w w .jobitorial.com . Google Hacking Database, from http://w w w.hackersforcharity.org. M etaGoofil, from http://www.edge-security.com . Google Hack Honeypot, from http://ghh.sourceforge.net. Goolink Scanner, from http://w w w.ghacks.net. GM apCatcher, from http://code.google.com. SiteDigger, from http://w w w .m cafee.com . SearchDiggity, from http://w w w.stachliu.com . Google Hacks, from http://code.google.com. Google HACK DB, from http://w w w .secpoint.com . BiLE Suite, from http://w w w.sensepost.com . Gooscan, from http://w w w.darknet.org.uk. W H O IS Lookup at DomainTools.com, from http://whois.dom aintools.com /. Domain Dossier, from http://centralops.net/co. Sm artW hois, from http://www.tam os.com /download/m ain/index.php. CountryW hois, from http://www.tam os.com /products/countrywhois/.

123. 124. 125. 126. 127. 128. 129. 130. 131. 132. 133. 134. 135. 136. 137. 138. 139. 140. 141. 142. 143. 144. 145. 146. 147. 148. 149. 150. 151. 152. 153. 154.

References Page 2980

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

155. 156. 157. 158. 159. 160. 161. 162. 163. 164. 165. 166. 167. 168. 169. 170. 171. 172. 173. 174. 175. 176. 177. 178. 179. 180. 181. 182. 183. 184. 185. 186. 187. 188. 189. 190. 191. 192. 193. 194.

W h o is Analyzer Pro, from http://w w w.whoisanalyzer.com /dow nload.opp. LanWhols, from http://lantricks.com/download/. HotW hois, from http://w w w.tialsoft.com /download/?url=http://ww w .tialsoft.com /hwhois.exe. Batch IP Converter, from http://w w w .netw orkm ost.com /dow nload.htm . W hois 2010 Pro, from http://lapshins.com/. CallerIP, from http://w w w.callerippro.com /dow nload.htm l. ActiveW hois, from http://w w w.johnru.com /. W h o is Lookup M ultiple Addresses, from http://www.sobolsoft.com /. WhoisThisDom ain, from http://w w w.nirsoft.net/utils/w hois_this_dom ain.htm l. Sm artW hois, from http://sm artwhois.com . W hois, from http://tools.whois.net. Better W hois, from http://w w w .betterw hois.com . DNSstuff, from http://w w w.dnsstuff.com . W hois Source, from http://www.whois.se. N etw ork Solutions Whois, from http://w w w.netw orksolutions.com . W e b Wiz, from http://www.webwiz.co.uk/domain-tools/whois-lookup.htm. W ebToolHub, from http://www.webtoolhub.com/tn561381-whois-lookup.aspx. Network-Tools.com, from http://network-tools.com. Ultra Tools, from https://w ww .ultratools.com /w hois/hom e. dnsstuff, from http://w w w.dnsstuff.com /. network-tools, from http://network-tools.com/. DNS Queries, from http://www.dnsqueries.com /en/. DIG, from http://www.kloth.net/services/dig.php. myDNSTools, from http://www.m ydnstools.info/nslookup. DN SW atch, from http://w w w .dnsw atch.info. DomainTools, from http://w w w.dom aintools.com . Professional Toolset, from http://www.dnsstuff.com /tools. DNS, from http://e-dns.org. DNS Records, from http://network-tools.com. DNS Lookup Tool, from http://www.webwiz.co.uk/domain-tools/dns-records.htm. DNSData View, from http://w w w .nirsoft.net. DNS Query Utility, from http://w w w.webm aster-toolkit.com . W H O IS-RW S, from http://whois.arin.net/ui. Netcraft, from http://searchdns.netcraft.com /Phost. Shodan, from http://w w w.shodanhq.com /. Path Analyzer Pro, from http://w w w.pathanalyzer.com /dow nload.opp. VisualRoute 2010, from http://w w w .visualroute.com /dow nload.htm l. N etw ork Pinger, from http://w w w.netw orkpinger.eom /en/dow nloads/#dow nload. Magic NetTrace, from http://w w w.tialsoft.com /download/?url=http://ww w .tialsoft.com /m NTr.exe. GEO Spider, from http://oreware.com /viewprogram .php?prog=22.

References Page 2981

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

195. 196. 197.

3D Traceroute, from http://w w w .d3tr.de/dow nload.htm l. vTrace, from http://vtrace.pl/download.htm l. AnalogX HyperTrace, from http://w w w.analogx.com /contents/dow nload/N etwork/htrace/Freeware.htm .

198.

Trout, from http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/freetools/trout.aspx.

199.
200. 201. 202.

N etw ork Systems Traceroute, from http://w w w .net.princeton.edu/traceroute.htm l. Roadkil's Trace Route, from http://www.roadkil.net/program .php/P27/Trace%20Route Ping Plotter, from http://w w w .pingplotter.com . myiptest, from http://www.myiptest.com/staticpages/index.php/how-about-you. Maltego, from http://w w w.paterva.com /web6/products/download4.php. Domain Name Analyzer Pro, from http://www.domainpunch.com/domain-name-analyzerpro/download.php.

203. 204.

205. 206. 207. 208. 209.


210. 211. 212.

W e b Data Extractor, from http://w w w .w ebextractor.com . Prefix W hois, from http://pwhois.org. Netmask (IRPAS), from http://w w w.phenoelit.org/irpas/dow nload.htm l. Binging, from http://w w w.blueinfy.com /tools.htm l. Tctrace (IRPAS), from http://w w w.phenoelit.org/irpas/dow nload.htm l. Spiderzilla, from http://spiderzilla.mozdev.org/installation.html. Autonom ous System Scanner (ASS) (IRPAS), from http://w w w.phenoelit.org/irpas/dow nload.htm l. Sam Spade, from http://w w w.m ajorgeeks.com /Sam _Spade_d594.htm l. DNS DIGGER, from http://www.dnsdigger.com . Robtex, from http://w w w.robtex.com . Dig W e b Interface, from http://w w w.digw ebinterface.com SpiderFoot, from http://sourceforge.net/projects/spiderfoot/?so.urce=dlp. Domain Research Tool, from http://w w w .dom ainresearchtool.com . CallerIP, from http://w w w.callerippro.com /dow nload.htm l. ActiveW hois, from http://w w w .johnru.com . Zaba Search, from http://www.zabasearch.com /. yoNam e, from http://yonam e.com . GeoTrace, from http://www.nabber.org/projects/geotrace/. Ping-Probe, from http://www.ping-probe.com/Ping-Probe/index.html. DomainHostingView, from http://w w w .nirsoft.net.

213. 214. 215. 216. 217. 218. 219.


220. 221. 222.

223. 224.

M o d u le 03: Scanning N etw orks 225. 226. Explanation of the Three-W ay Handshake via TCP/IP, from http://support.microsoft.com/kb/172983. Appendix G. Lists of reserved ports, ICM P types and codes, and Internet protocols, from http://www.ingate.com /files/422/fwm anual-en/xal0285.htm l. 227. 228. The Art of Port Scanning - by Fyodor, from http://nm ap.org/nm ap_doc.htm l. M ethods of IP N etw ork Scanning - Stealth TCP Scanning Methods, from http://w w w .c 0 dewalkers.c 0 m/c/a/Server-Administrati0 n /M eth 0 ds-0 f-IP-Netw 0 rk-Scanning/ 3 /.

References Page 2982

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

229.

W h a t is Port Scanning and Types of Port Scanning, from http://www.hackillusion.com/what-is-portscanning-and-types-of-port-scanning/.

230. 231. 232.

UDP Scan, from http://www.networkuptim e.com /nm ap/page3-10.shtm l. Hacking Exposed, from http://www.scribd.com/doc/62708034/Hacking-Exposed-Book. N etw ork Security Assessment, from https://w w w .trustm atta.com /dow nloads/pdf/M atta_IP_N etw ork_Scanning.pdf.

233. 234. 235.

Quick-Tip: SSH Tunneling M ade Easy, from http://www.revsys.com/writings/quicktips/ssh-tunnel.html. Detecting Spoofed Packets, from http://seclab.cs.ucdavis.edu/papers/DetectingSpoofed-DISCEX.pdf. Scanning modes: FIN, Xmas, Null, from http://www.openxtra.co.uk/support/howto/nmap-scanmodes.php.

236. 237. 238.

Port scanning techniq:sW (W in d o w scan), from http://www.paulisageek.com /nm ap/index.htm l. Prabhaker M ateti, UDP Scanning, from http://www.cs.wright.edu/~pmateti/Courses/499/Probing/. FTP server bounce attack, TCP Fragmenting, Intrusion detection systems use signature-based mechanisms, from http://www.in-f-or.it/informatica/docs/portscan.pdf.

239.

Laura Chappell, (2003), OS Fingerprinting W ith ICM P: ICM P echo, from http://www.securitypronews.com /it/security/spn-23-200309290SFingerprintingwithlCMP.htm l.

240. 241.

Scan Type-sF -sX -sN, from http://content.ix2.net/arc/t-4370.html. Unixo3/introduction to Nmap, from http://www.sam hart.com /cgi bin/classnotes/wiki.pl?UNIX03/lntroduction_To_Nm ap.

242.

Fyodor, (2006), Art of port scanning: Features, Ideal scanning and related IPID games, Nmap: discription, Fingerprint methadology: IPID samplingBounce attacks worked, Techniqe: TCP reverse ident scanning, from http://w w w.insecure.org/nm ap/nm ap_doc.htm l.

243.

Antirez, hping2(8) - Linux man page: Discription, Hping2 Commands, from http://www.hping.org/m anpage.htm l.

244.

Chris McNab, (2008), Third Party IP N etw ork Scanning Methods, Available from http://w w w .c 0 dewalkers.c 0 m/c/a/Server-Administrati0 n/Third-Party-IP-Netw 0 rk-Scanning-Meth 0 ds/.

245.

Thierry Lagarde , AutoScan Network, Available from http://autoscannetwork.com/index. php?option=com_content&task=view&id=48&ltemid=32.

246. 247.

Onion Routing, Available from http://dictionary.zdnet.com/definition/onion+routing.html. Van Geelkerken F.W .J, (2006), Digital Mixing (M IX nets), Available from http://www.iusm entis.com /society/privacy/rem ailers/onionrouting/.

248.

Keith J. Jones, M ike Shema, & Bradley C. Johnson, Vulnerability Scanners, from w ww.foundstone.com /pdf/books/AntiHackerSam ple.pdf.

249.

Examining Port Scan Methods- Analysing Audible Techniques, from http://www.in-for.it/informatica/docs/portscan.pdf.

250.

IM S General W e b Services Security Profile, http://w w w.im sglobal.org/gws/gw svlpO/im sgw s_securityProfvlpO .htm l.

251. 252.

Bew are!: W a r dialing, from http://w w w.castlecops.com /al361-W ar_dialing.htm l. Simson L. Garfinkel, Autom atic Parity Detection, from http://archive.cert.unistuttgart.de/archive/bugtraq/1998/12/msg00215.html.

253.

Lance M ueller, CREATE A REVERSE SSH TUNNEL, http ://w w w .lancem ueller.com /blog/C reate%20Reverse%20SSH %20to%20reach%20servlet%20inside%2 Ofirewall.pdf.

References Page 2983

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

254.

Avi Kak, (2010), Port Scanning, Vulnerability Scanning, Packet Sniffing, and Intrusion Detection, http://cobweb.ecn.purdue.edu/~kak/com psec/NewLectures/Lecture23.pdf.

255.

Renaud Deraison, Ron Gula, and Todd Hayton, (2009), Passive Vulnerability Scanning Introduction, http://nessus.org/whitepapers/passive_scanning_tenable.pdf.

256.

Cheng Guang, TCP Analysis Based on Flags, http://www.nordu.net/development/2nd-cnnw/tcp-analysisbased-on-flags.pdf.

257.

Cheng Tang & Jonathan Gossels, (1999), Wardialing: Practical Advice to Understand Your Exposure, http://www.system experts.com /assets/tutors/wardial0299.pdf.

258.

N etw ork Security Library, from http://w w w.window security.com /w hitepapers/m isc/Exam ining_port_scan_m ethods__ Analyzing_Audibl e_Te.

259. 260.

Lance Cottrell, Anonym izer Limitations: Logs, from http://www.livinginternet.eom /i/is_anon.htm . Michel Leconte, (2006), N etw ork security consulting, from http://www.activsupport.com/SmallBusiness-Network-Security-Soluti.

261. 262.

Angry IP Scanner, from http://angryip. 0 rg/w/D 0 w n l 0 a d . SolarW inds Engineer's Toolset, from http://downloads.solarwinds.com/solarwinds/Release/Toolset/ZPToolset/ZP-Toolset-Ol.html.

263. 264.

Colasoft Ping Tool, from http://w w w.colasoft.com /dow nload/products/dow nload_ping_tool.php. PacketTrap M SP, from http://www.packettrap.com/download?hsCtaTracking=e95ec5b5-069f-4cd5962c-9c0e6e32a6da%7C072dfe23-353f-46c2-9ab0-la27d39c01fl.

265. 266.

Visual Ping Tester - Standard, from http://w w w .pingtester.net. Ping Sw eep (Integrated into W hatsupG old), from http://www.whatsupgold.com /products/download/network_m anagem ent.aspx?k_id=ping-sweep-tool.

267. 268. 269. 270. 271. 272. 273.

Ping Scanner Pro, from http://www.digilextechnologies.com . N etw ork Ping, from http://www.greenline-soft.com /product_network_ping/index.aspx. Ultra Ping Pro, from http://ultraping.webs.com /downloads.htm . Ping Monitor, from http://w w w.niliand.com . PinglnfoView, from http://w w w.nirsoft.net/utils/m ultiple_ping_tool.htm l. Pinkie, from http://w w w.ipuptim e.net/category/download/. Colasoft Packet Builder, from http://w w w.colasoft.com /dow nload/products/dow nload_packet_builder.php.

274. 275. 276.

NetScanTools Pro, from http://w w w.netscantools.com /nstprodem orequestform .htm l. PRTG N etw ork M onitor, from http://w w w.paessler.com /dow nload/prtg. Global Network Inventory Scanner, from http://w w w .m agnetosoft.com /products/global_network_inventory/gni_features.htm .

277. 278. 279. 280. 281. 282. 283.

Net Tools, from http://m absoft.com /nettools.htm . SoftPerfect Netw ork Scanner, from http://w w w.softperfect.com /products/netw orkscanner/. IP Tools, from http://www.ks-soft.net/ip-tools.eng/downpage.htm. Advanced Port Scanner, from http://www.radm in.com /dow nload/previousversions/portscanner.php. MegaPing, from http://www.m agnetosoft.com /products/m egaping/m egaping_features.htm . Netifera, from http://netifera.com . N etw ork Inventory Explorer, from http://www.10strike.com /networkinventoryexplorer/download.shtm l.

References Page 2984

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

284.

Free Port Scanner, from http://w w w .nsauditor.eom /netw ork_tools/free_port_scanner.htm l#.U W JRvqLzvrw .

285. 286. 287. 288. 289. 290. 291. 292. 293.

ID Serve, from http://w w w.grc.com . Netcraft, from http://toolbar.netcraft.com . Netcat, from http://sourceforge.net/projects/netcat/files/latest/download?source=files. GFI LanGuard, from http://www.gfi.com/downloads/mirrors.aspx?pid=lanss. SAINT, from http://w w w.saintcorporation.com /products/software/saintScanner.htm l. Retina CS, from http://www.beyondtrust.com/Landers/TY-Page-RetinaCSCommunity/index.html. OpenVAS, from http://w w w .openvas.org. Core Impact Professional, from http://w w w .coresecurity.com . Security M anager Plus, from http://www.manageengine.com/products/securitymanager/download, html.

294. 295. 296. 297.

Nexpose, from http://www.rapid7.com /products/nexpose/com pare-downloads.jsp. Shadow Security Scanner, from http://www.safety-lab.com /en/download.htm . QualysGuard, from http://w w w.qualys.com . Nsauditor Netw ork Security Auditor, from http://w w w.nsaudit 0 r.c 0 m /netw 0 rk_security/netw 0 rk_security_audit 0 r.htm l#.UW KEx 6 Lzvrw.

298. 299.

Security Auditor's Research Assistant (SARA), from http://www-arc.com /sara/. LANsurveyor, from http://www.solarwinds.com/register/MoreSoftware.aspx?External=false&Program=17592&c=70150000 OOOPjNE.

300. 301. 302. 303. 304.

OpM anager, from http://www.m anageengine.com /network-m onitoring/download.htm l. N etw orkView , from http://w w w .netw orkview .com /htm l/dow nload.htm l. The Dude, from http://w w w.m ikrotik.com /thedude. LANState, from http://www.10-strike.com /lanstate/download.shtm l. HP Network Node M anager i software, from http://w w w 8 .hp.com/us/en/softwaresolutions/software. html?compURI=1170657#.

305. 306. 307. 308. 309. 310. 311. 312.

FriendlyPinger, from http://www.kilievich.com /fpinger/download.htm . N etM apper, from http://w w w .opnet.com . Ipsonar, from http://w w w.lum eta.com /product/product.htm l. NetBrain Enterprise Suite, from http://www.netbraintech.com /instant-trial/. CartoReso, from http://cartoreso.cam pus.ecp.fr. Spiceworks-Network M apper, from http://w w w.spicew orks.com /dow nload/. Switch Center Enterprise, from http://www.lan-secure.c 0 m/d 0 w n l 0 ads.htrn#netw 0 rk. NetCrunch, from http://www.adrem soft.com /dem o/downloadproduct. php?product=nc7&file=NCServer7Premium. exe.

313. 314. 315. 316. 317.

Proxy W orkbench, from http://proxyworkbench.com/. Proxifier, from http://w w w.proxifier.com /dow nload.htm . Proxy Switcher, from http://w w w.proxysw itcher.com /. SocksChain, from http://ufasoft.com/socks/. TOR (The Onion Routing), from https://w ww .torproject.org/download/dow nload.

References Page 2985

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

318. 319. 320. 321. 322. 323. 324. 325. 326. 327. 328. 329. 330. 331. 332. 333. 334. 335. 336. 337. 338. 339. 340. 341. 342. 343. 344. 345. 346. 347. 348. 349. 350. 351. 352. 353.

Proxy, from http://www.analogx.com /conter 1 ts/download/N etw ork/proxy/Freeware.htm . Proxy Commander, from http://www.dlao.com /proxycm d/. Protoport Proxy Chain, from http://w w w .protoport.com . Proxy Tool W indow s App, from http://webproxylist.com/proxy-tool-windows-app/. Proxy+, from http://www.proxyplus.cz/. Gproxy, from http://gpassl.com /gproxy.php. FastProxySwitch, from http://www.affinity-tools.com/fps/. Fiddler, from http://www.fiddler2.com /fiddler2/version.asp. ProxyFinder Enterprise, from http://www.proxy-tool.com . Socks Proxy Scanner, from http://w w w .m ylanview er.com . ezProxy, from https://w ww . 0 clc.0 rg/ezpr0 xy/d 0 w n l 0 ad.en.h.tm l. Charles, from http://www.charlesproxy.com /. JA P Anonym ity and Privacy, from http://anon.inf.tu-dresden.de/win/download_en.htm l. UltraSurf, from http://w w w.ultrasurf.us. CC Proxy Server, from http://www.youngzsoft.net/ccproxy/proxy-server-download.htm. W ideCap, from http://w idecap.ru. FoxyProxy Standard, from https://addons.mozilla.org. ProxyCap, from http://w w w.proxycap.com . Super N etw ork Tunnel, from http://w w w .netw orktunnel.net. HTTP-Tunnel, from http://www.http-tunnel.com . Bitvise, from http://w w w .bitvise.com . Psiphon, from http://psiphon.ca. Your-Freedom, from http://w w w.your-freedom .net. Just Ping, from http://www.just-ping.com. W ebSitePulse, from http://w w w .w ebsitepulse.com . G-Zapper, from http://w w w.dum m ysoftw are.com /gzapper.htm l. M ow ser, from http://w w w .m ow ser.com . Spotflux, from http://w w w.spotflux.com . Anonym ous W e b Surfing Tool, from http://www.anonym ous-surfing.com . U-Surf, from http://ultim ate-anonym ity.com . Hide Your IP Address, from http://w w w .hideyouripaddress.net. W arpProxy, from http://silent-surf.com. Anonymizer Universal, from http://w w w.anonym izer.com . Hope Proxy, from http://w w w.hopeproxy.com . Guardster, from http://w w w.guardster.com . Hide M y IP, from http://www.privacy-pro.com /features.htm l.

M o d u le 04: Enum eration 354. 355. rpcinfo, from http://www.usoft.spb.ru/com m ands/rpcinfo/. RPCCLIENT, from http://w w w .sarata.com /m anpages/m anl/rpcclient.htm l.

References Page 2986

Ethical Hacking and Countermeasures Copyright by EC-C0l1nCil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

356. 357.

Enum eration, from http://w w w.edenofire.com /tutes/hack.php. smtp-user-enum User Docum entation, from http://pentestmonkey.net/tools/user-enumeration/smtpuser-enum.

358.

Chris Gates, (2006), W indow s Enum eration: USER2SID & SID2USER, from http://w w w.window security.com /w hitepaper/W indow s-Enum eration-USER2SID-SID2USER.htm l.

359. 360. 361. 362.

W h a t is S N M P ?, from http://www.wtcs.org/snm p4tpc/snm p.htm . SN M P, from http://w w w.cisc 0 .c0 m/univercd/cc/td/d 0 c/cisintwk/it 0 _ d 0 c/snmp.htm#xt 0 cid 5 . SN M PForDum m ies, from http://w iki.outboundindex.net/SNM PForDum m ies. Jan van Oorschot, Jeroen W orte lb o e r and Dirk W isse, (2001), S N M P - The Mission Statem ent, http://www.securityfocus.com/infocus/1301.

363. 364. 365.

rp c in fo (lM ), from http://docs.hp.com /en/B2355-90692/rpcinfo.lM.htm l. GRAPE- INFO- DOT- COM, from http://www.grape-info.com . Joris Evers, (2006), AT&T hack exposes 19,000 identities, from http://news.cnet.com/2100-1029_36110765.html.

366. 367.

S N M P from http://w w w .iss.net/security_center/advice/Reference/N etw orking/SN M P/default.htm . Simple Netw ork M anagem ent Protocol (SN M P), from http://www.cisco.com /en/US/docs/internetworking/technology/handbook/SNM P.htm l.

368. 369.

Linux / Unix finger command, from http://www.com puterhope.com /unix/ufinger.htm . Chris Gates, (2006), W in d o w s Enum eration: USER2SID & SID2USER http://w w w.window security.com /w hitepapers/W indows-Enum eration-USER2SID-SID2USER.htm l.

370. 371. 372. 373. 374. 375. 376.

SuperScan, from http://www.m cafee.com /us/downloads/free-tools/superscan.aspx. Hyena, from http://w w w.system tools.com /hyena/trial_dow nload.htm . Winfingerprint, from http://w w w.winfingerprint.com . N etBIO S Enum erator, from http://nbtenum .sourceforge.net/. PsTools, from http://technet.microsoft.com/en-us/sysinternals/bb897553.aspx. OpUtils, from http://www.m anageengine.com /products/oputils/download.htm l. SolarW ind 's IP Netw ork Browser, from http://www.solarwinds.com/engineers-toolset/ip-networkbrowser, aspx.

377. 378. 379. 380. 381. 382. 383. 384.

Getif, from http://www.wtcs.org/snm p4tpc/getif.htm . O iD ViEW S N M P M IB Browser, from http://w w w .oidview .com /m ibbrow ser.htm l. iReasoning M IB Browser, from http://ireasoning.com /m ibbrowser.shtm l. SNScan, from http://www.mcafee.com/us/downloads/free-tools/snscan.aspx. S N M P Scanner, from http://www.secure-bytes.com /SNM P+Scanner.php. S N M P Informant, from http://www.snm p-inform ant.com /. Net-SNMP, from http://net-snm p.sourceforge.net/download.htm l. Nsauditor Netw ork Security Auditor, from http://w w w.nsaudit 0 r.c 0 m /netw 0 rk_security/netw 0 rk_security_audit 0 r.htm l#.UV 7 LH 5 NHLZ 4 .

385. 386. 387. 388. 389.

Spiceworks, from http://www.spiceworks.com/free-snmp-network-management-software/. Enum4linux, from http://labs.portcullis.co.uk/application/enum4linux/. Softerra LDAP Administrator, from http://w w w.ldapadm inistrator.com /. JXplorer, from http://www.jxplorer.org/. LDAP Admin Tool, from http://w w w.ldapsoft.com /ldapbrowser/ldapadm intool.htm l.

References Page 2987

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

390. 391. 392. 393. 394. 395. 396.

LDAP Account M anager, from https://www.ldap-account-manager.org/lamcms/. LEX - The LDAP Explorer, from http://w w w.ldapexplorer.com /. LDAP Admin, from http://www.ldapadm in.org/. Active Directory Explorer, from http://technet.microsoft.com/en-us/sysinternals/bb963907.aspx. LDAP Administration Tool, from http://sourceforge.net/projects/ldap-at/. LDAP Search, from http://securityxploded.com/ldapsearch.php. Active Directory Domain Services M anagem ent Pack, from http://www.microsoft.com/enus/download/details.aspx?id=21357.

397. 398.

LDAP Browser/Editor, from http://www.novell.com /coolsolutions/tools/13765.htm l. NSLookup, from http://www.kloth.net/services/nslookup.php.

M o d u le 05: System Hacking 399. W h y Keyloggers are extrem ely dangerous?, from http://gamecreator.hubpages.com/hub/WhyKeyloggers-are-extremely-dangerous. 400. 401. 402. 403. Steganography in Depth, from http://www.crcnetbase.com/doi/abs/10.1201/9780203504765.ch4. Detecting spoofed packets, from http://ieeexplore.ieee.0rg/xpl/articleDetails.jsp?arnumber=1194882. NTLM Authentication in Java, from http://www.luigidragone.com/software/ntlm-authentication-in-java/. A Tutorial Review on Steganography, from http://www.jiit.ac.in/jiit/ic3/IC3_2008/IC32008/APP2_21.pdf. 404. 405. network scanning, from http://searchm idm arketsecurity.techtarget.com /definition/network-scanning. Ricky M. Magalhaes, (2004), Using passwords as a defense mechanism to improve W indow s security, from w w w .w ind ow security.com /artid es/Passw ord s_lm p rove_W ind ow s_Security_Part2 .htm l. 406. Piazza & Peter, (2002), Hybrid threats have rosy future: attacks that combine virus ..., http://findartides.com /p/articles/m i_hb6380/is_200207/ai_n25618875?tag=content;coll. 407. 408. Andreas W estfeld and Andreas Pfitzmann, Attacks on Steganographic Systems, citeseerx.ist.psu.edu/. DaijiSanai and HidenobuSeki, (2004), Optimized Attack for NTLM2 Session Response http://www.blackhat.com/presentations/bh-asia-04/bh-jp-04-pdfs/bh-jp-04-seki.pdf. 409. Zhi W ang, Xuxian Jiang, W eidong Cui, and Xinyuan W ang, Countering Persistent Kernel Rootkits Through System atic Hook Discovery, http://research.microsoft.com/en-us/um/people/wdcui/papers/hookmapraid08.pdf. 410. Elia Florio, W hen M alw are M eets Rootkits, http://w w w .sym antec.com /avcenter/reference/w hen.m alw are.m eets.rootkits.pdf. 411. 412. Peter Piazza, (2002), SM O : Tech Talk, from http://www.securitym anagem ent.com /library/001272.htm l. Brute force attack - Wikipedia, the free encyclopedia, from http://en.wikipedia.org/w iki/Brute_force_attack. 413. 414. Talk:Brute force attack - Bvio, from http://bvio.ngic.re.kr/Bvio/index.php/Talk:Brute_force_attack. Passwords, from http://searchsecurity.techtarget.com /searchSecurity/downloads/HackingforDum m iesCh07.pdf. 415. 416. 417. Authernative, Inc. | Products | FAQs, from http://w w w.authernative.com /faqs.shtm l. CIAC Notes, from http://www.ciac.org/ciac/notes/Notes03a.shtm l. Path: new shost.uw o.caluw ovax.uw o.calm neville From: m neville@ uw ovax ..., from http://w w w.uwo.ca/its/doc/newsletters/lnTouch/voll-9495/w inl8.txt. 418. The Hack FAQ: Password Basics, from http://www.nmrc.org/pub/faq/hackfaq/hackfaq-04.html.

References Page 2988

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

419. 420.

Luigi Dragone, NTLM Authentication in Java, from http://www.luigidragone.com /networking/ntlm .htm l. Hardening the Base W indow s 2000 Server, from http://www.m icrosoft.com /technet/security/prodtech/windows2000/secwin2k/swin2k06.m spx.

421. 422.

Bill W all, Sunbelt TECH BRIEFIN G, from http://w w w.stratvantage.com /security/ntpass.htm . Security Options, from http://www.microsoft.com/technet/security/topics/serversecurity/tcg/tcgch05n.mspx.

423.

Technical Explanation of N etw ork S M B Capture, from http://ebook.coolersky.com /hack/lc5.04_doc/sm b_capture.htm l.

424.

Detecting Alternate Data Streams, from http://www.windowsitpro.com /Article/ArtidelD/16189/16189.htm l.

425.

Bojan Smojver, Linux Today - ZDNet Australia: Threats M ove Beyond Linux to W indow s, http://www.linuxtoday.com/security/2002121100426SCSVNT.

426.

Neohapsis Archives - NTBugtraq - Proposal for protection from ..., from http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0245.html.

427.

Russell Kay, (2006), Sidebar: A Simple Rootkit Example, http://www.computerworld.eom/securitytopics/security/hacking/story/0,10801,108116,00.html?from=s tory_package.

428.

Russell Kay, (2006), Rootkits offer the lure of total control, from http://www.tech world. com/security/features/index.cfm?featureid=2219.

429. 430.

Paladion Networks, from http://www.paladion.net/m edia/insights/ihfaq.htm . NTFS Stream s - Everything you need to know (demos and tests included), from http://www.diam ondcs.com .au/stream s/stream s.htm .

431.

H. Carvey, (2002), The Dark Side of NTFS (M icrosoft's Scarlet Letter), from http://www.infosecwriters.com /texts.php?op=display&id=53.

432.

Stegonography (a secretly hidden coding that dates back to a n c ie n t...), from http://www.wordinfo.info/words/index/info/view_unit/3403/?letter=S&spage=9.

433.

Ravindranath AV, Steganography: Hiding Data in Images, from http://www.asptoday.com /Content.aspx?id=2347.

434.

Paul Robertson, (2005), CS 450 Hom ework 4, from http://www.cs.umb.edu/~paulr/CS450/assignments/ass4.html.

435. 436.

NBTdeputy (v 1.0.1), from http://w w w.securityfriday.com /Topics/w inxpl.htm l. Sir Dystic, (2002), N BN am e, from http://www.securityfocus.com/comments/tools/1670/12751/threaded.

437. 438.

Fred B. Schneider, Authentication, from http://www.cs.cornell.edu/Courses/cs513/2000sp/NL10.html. CS513: System Security - Topic Outline, from http://www.cs.cornell.edu/courses/cs513/2005fa/02.outline.html.

439.

Security Options from http://www.microsoft.com/technet/security/guidance/serversecurity/tcg/tcgch05n.mspx.

440.

Hardening the Base W in d o w s 2000 Server, http://technet.microsoft.com/hi-in/library/cc751216(enus).aspx.

441. 442.

Brute force attack, from http://w w w .reference.com /brow se/w iki/Brute_force_attack. W h a t is pwdump2, from http://w w w.bindview.com /Services/razor/Utilities/W indow s/pwdum p2_readm e.cfm .

443.

Derogee, Steganography and Steganalysis, from http://www.liacs.nl/hom e/tm oerlan/privtech.pdf.

References Page 2989

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

444.

Techworld.com - Rootkits offer the lure of total control, from http://www.tech world. com /websecurity/features/index.cfm ?featureid=2219&pagtype=sam ecatsam ech an.

445. 446.

Dasmith, Softw are Analysis, from http://www.unc.edu/~sm ithdr/inlsl87/sr.htm l. Hacking Windows-Specific Services, from http://awkwardalliteration.com/ebooks/Computers/Hacking%20Exposed%20W indow s% 202003%20Chapter%205.pdf.

447.

Ricky M. Magalhaes, (2003), Using passwords as a defense mechanism to improve W indow s security, from http ://w w w .w indow security.com /articles/Passw ords_lm prove_W indow s_Security_Part2.htm l.

448. 449. 450. 451. 452. 453. 454. 455. 456. 457. 458. 459. 460. 461. 462. 463. 464. 465. 466. 467. 468. 469. 470. 471. 472. 473. 474. 475. 476. 477. 478. 479.

W inrtgen, from http://www.oxid.it/projects.htm l. RainbowCrack, from http://pr 0 ject-rainb 0 w crack.c 0 m/index.htm#d 0 w n l 0 a d . Elcomsoft Distributed Password Recovery, from http://w w w.elcom soft.com /edpr.htm l. Securityoverride, from http://securityoverride.org/default-password-list. Cirt, from http://cirt.net. Default-password, from http://default-password.info. Defaultpassword, from http://w w w.defaultpassw ord.us. Passwordsdatabase, from http://w w w.passwordsdatabase.com . W 3dt, from https://w3dt.net/tools/defaultpasswords/. Virus, from http://w w w.virus.org/default_passw ds. Open-sez.me, from http://open-sez.me/passwd.htm. Routerpasswords, from http://w w w.routerpasswords.com /. Fortypoundhead, from http://w w w .fortypoundhead.com /tools_dpw .asp. pwdump7, from http://www.tarasco.org/security/pwdum p_7/. fgdump, from http://www.foofus.net/~fizzgig/fgdump/. LOphtCrack, from http://www.IOphtcrack.com /download.htm l. Ophcrack, from http://ophcrack.sourceforge.net/download.php. RainbowCrack, from http://pr 0 ject-rainb 0 w crack.c 0 m/index.htm#d 0 w n l 0 a d . Password Unlocker Bundle, from http://www.passwordunlocker.com /password-recovery-bundle.htm l. Proactive System Password Recovery, from http://w w w.elcom soft.com /pspr.htm l. John the Ripper, from http://w w w.openwall.com /john/. W indow s Password Cracker, from http://www.windows-password-cracker.com /download.htm l. W inPassw ord, from http://lastbit.com /ntpsw/default.asp. Passware Kit Enterprise, from http://www.lostpassword.com /kit-enterprise.htm . PasswordsPro, from http://www.insidepro.com /eng/passwordspro.shtm l. LSASecretsView, from http://w w w.nirsoft.net/utils/lsa_secrets_view.htm l. LCP, from http://www.lcpsoft.com /english/download.htm . Password Cracker, from http://www.am lpages.com /pwdcrack.shtm l. Kon-Boot, from http://w w w.thelead82.com /kon-boot/konbootW IN.htm l. W indow s Password Recovery Tool, from http://w w w .w indow spassw ordsrecovery.com /. Hash Suite, from http://hashsuite.openw all.net/download. SAM Inside, from http://www.insidepro.com /eng/sam inside.shtm l.

References Page 2990

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

480. 481. 482. 483.

W indow s Password Recovery, from http://w w w .passcape.com /w indow s_passw ord_recovery. Password Recovery Bundle, from http://www.top-password.com/password-recovery-bundle.html. krbpwguess, from http://www.cqure.net/wp/tools/password-recovery/krbpwguess/. W indow s Password Breaker Enterprise, from http://www.recoverw indowspassw ord.com /window spassword-breaker.html.

484.

Rekeysoft W indow s Password Recovery Enterprise, from http://www.rekeysoft.com/reset-windowspassword.html.

485. 486. 487. 488. 489. 490.

Active( Password Changer, from http://www.password-changer.com /. Offline NT Password & Registry Editor, from http://pogostick.net/~pnh/ntpasswd/. W indow s Password Reset Kit, from http://www.reset-windows-password.net/. W indow s Password Recovery Tool, from http://w w w .w indow spassw ordsrecovery.com /. ElcomSoft System Recovery, from http://www.elcom soft.eom /esr.htm l#forgot adm inistrator password. Trinity Rescue Kit, from http://trinityhom e.org/Hom e/index.php?content=TRINITY_RESCUE_KIT_DOW NLOAD&front_id=12&lang =en&locale=en.

491.

W indow s Password Recovery Bootdisk, from http://www.rixler.com/windows-password-recoverybootdisk.htm.

492. 493. 494. 495.

PasswordLastic, from http://www.passwordlastic.com/windows-password-recovery-lastic. Stellar Phoenix Password Recovery, from http://www.stellarinfo.com /password-recovery.htm . W indow s Password Recovery Personal, from http://w w w.window s-passw ordrecovery.com /. W indow s Adm inistrator Password Reset, from http://www.systoolsgroup.com/windows-adminstratorpassword-reset.html.

496. 497. 498. 499. 500. 501. 502. 503. 504. 505. 506. 507. 508. 509. 510. 511. 512. 513. 514.

RemoteExec, from http://www.isdecisions.com /products/rem oteexec. PDQ Deploy, from http://www.adm inarsenal.com /download-pdq. D am eW are NT Utilities, from http://w w w .dam ew are.ru/nt_utilities.htm l. Spytech SpyAgent, from http://www.spytech-web.com /spyagent.shtm l. All In One Keylogger, from http://w w w .relytec.com /. Ultim ate Keylogger, from http://w w w.ultim atekeylogger.com /dow nload/. Advanced Keylogger, from http://www.m ykeylogger.com /perfect-keylogger. The Best Keylogger, from http://w w w.thebestkeylogger.com /. SoftActivity Keylogger, from http://www.softactivity.com /download-al.asp. Elite Keylogger, from http://www.widestep.com/elite-keystroke-recorder-info. Pow ered Keylogger, from http://www.m ykeylogger.com /undetectable-keylogger/. StaffCop Standard, from http://w w w.staffcop.com /dow nload/. iM onitorPC, from http://w w w.im onitorpc.com /. PC Activity M onitor Standard, from http://w w w .pcacm e.com /dow nload.htm l. KeyProw ler, from http://keyprowler.com /download.aspx. Keylogger Spy Monitor, from http://ematrixsoft.com/download.php?p=keylogger-spy-monitor-software. REFOG Personal M onitor, from http://www.refog.com /personal-m onitor.htm l. Actual Keylogger, from http://www.actualkeylogger.com/download-free-key-logger.html. Spytector, from http://w w w.spytector.com /download.htm l.

References Page 2991

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

515. 516. 517. 518. 519. 520. 521. 522. 523. 524. 525. 526. 527. 528. 529. 530. 531. 532. 533. 534. 535. 536. 537.

KidLogger, from http://kidlogger.net/download.htm l. PC Spy Keylogger, from http://www.pc-spy-keylogger.com. Revealer Keylogger, from http://www.logixoft.com/free-keylogger-download. Spy Keylogger, from http://www.spy-key-logger.com/download.html. Actual Spy, from http://w w w.actualspy.com /download.htm l. SpyBuddy 2013, from http://www.exploreanywhere.com /products/spybuddy/. Amac Keylogger, from http://w w w.am ackeylogger.com /. Aobo M ac OS X KeyLogger, from http://www.keylogger-mac.com/. Perfect Keylogger for Mac, from http://www.blazingtools.com . Award Keylogger for Mac, from http://www.award-soft.com /content/view/275/136. M ac Keylogger, from http://w w w.award-soft.com /M ac_Keylogger/. REFOG Keylogger for MAC, from http://www.refog.com /m ac-keylogger.htm l. KidLogger for MAC, from http://kidlogger.net/download.htm l. MAC Log Manager, from http://www.keylogger.in/keylogger/m adogm anager.htm l. logkext, from https://c 0 de.g 0 0 gle.c 0 m/p/l0 gkext/. Keyboard Spy, from http://alphaom ega.softw are.free.fr/keyboardspy/Keyboard%20Spy.htm l. FreeMacKeylogger, from http://www.hwsuite.com/free-mac-keylogger/. KeyGrabber, from http://w w w .keydem on.com . KeyGhost, from http://w w w.keyghost.com . Activity Monitor, from http://w w w.softactivity.com /download.asp. Rem ote Desktop Spy, from http://www.global-spy-software.com /download.php. SSPro, from http://www.gpsoftdev.com /download-m onitoring-software/. RecoveryFix Em ployee Activity M onitor, from http://www.recoveryfix.com /download-em ployeemonitoring.html.

538.

Em ployee Desktop Live View er, from http://www.nucleustechnologies.com /download-em ployeedesktop-live-viewer.php.

539. 540. 541. 542. 543. 544. 545. 546.

NetVizor, from http://w w w .netvizor.net/dow nload.htm . Net Spy Pro, from http://www.net-m onitoring-software.com /windows/trial.htm l. REFOG Em ployee M onitor, from http://www.refog.com /em ployee-com puter-m onitoring-software.htm l. OsMonitor, from http://www.os-m onitor.com /download.htm . LANVisor, from http://w w w.lanvisor.com /download.htm . W o rk Examiner Standard, from http://w w w.workexam iner.com /dow nload.htm l. Pow er Spy, from http://ematrixsoft.com/index.php. eBLASTER, from http://www.spectorsoft.com /products/eBlaster_Windows/index.asp?source=nav-hseBwin.

547. 548. 549. 550. 551.

!m onitor Em ployee Activity M onitor, from http://www.em ployee-m onitoring-software.ee/. Em ployee Monitoring, from http://w w w .em ployeem onitoring.net/dow nload.asp. OsMonitor, from http://www.os-m onitor.com /download.htm . Ascendant N FM , from http://www.ascendant-security.com /download.shtm l. Spylab W ebSpy, from http://w w w.spylab.org/dow nload.htm .

References Page 2992

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

552. 553. 554. 555. 556.

Personal Inspector, from http://www.spyarsenal.com /personal-inspector/. CyberSpy, from http://w w w .cyberspysoftw are.com /dow nload.htm l. AceSpy, from http://w w w.acespy.com /features.htm l. EmailObserver, from http://w w w .softsecurity.com /prod_D 7_m ore.htm l. Net Nanny Home Suite, from http://w w w.netnanny.com /products/netnanny_hom e_suite/detail/technical.

557. 558. 559. 560. 561. 562. 563. 564. 565. 566. 567. 568. 569. 570.

Aobo Filter for PC, from http://www.aobo-porn-filter.com /downloads. CyberSieve, from http://www.softforyou.com /cs-download.php. Child Control, from http://salfeld.com/download/child-control/index.html. SentryPC, from http://w w w.sentrypc.com /trial.htm . iProtectYou Pro, from http://www.softforyou.com /ip-index.htm l. K9 W e b Protection, from http://w w w l.k9w ebprotection.com /getk9/dow nload-softw are. Verity Parental Control Softw are, from http://www.nchsoftware.com /childm onitoring/index.htm l. Profil Parental Filter, from http://www.profiltechnology.com /en/hom e/profil-parental-filter. PC Pandora, from http://w w w.pcpandora.com /download/. KidsWatch, from http://w w w.kidswatch.com /. SoftActivity TS Monitor, from http://w w w.softactivity.com /downloadtsm .aspx. Desktop Spy, from http://w w w.spyarsenal.com /dow nload.htm l. IcyScreen, from http://www.16software.com /icyscreen/screenshots.php. Spector Pro, from http://www.spectorsoft.com /products/SpectorPro_Windows/index.asp?source=navhs-ProWin.

571. 572. 573. 574. 575. 576. 577. 578. 579. 580. 581. 582. 583. 584. 585. 586.

PC Tattletale, from http://w w w .pctattletale.com /. Computer Screen Spy Monitor, from http://w w w.m ysuperspy.com /dow nload.htm . PC Screen Spy M onitor, from http://ematrixsoft.com/download.php?p=pc-screen-spy-monitor-software. Kahlown Screen Spy Monitor, from http://w w w.lesoftrejion.com /. Guardbay Rem ote Com puter Monitoring Softw are, from http://w w w.guardbay.com . HT Em ployee Monitor, from http://w w w.hidetools.com /em ployee-m onitor.htm l. Spy Em ployee Monitor, from http://www.spysw.com /em ployee-m onitor-software.htm . USBSpy, from http://www.everstrike.com /usb-m onitor/. USB Monitor, from http://www.hhdsoftware.com /usb-m onitor. USB Grabber, from http://usbgrabber.sourceforge.net/. USBTrace, from http://w w w .sysnudeus.com /usbtrace_dow nload.htm l. USBD eview , from http://w w w.nirsoft.net/utils/usb_devices_view.htm l. Advanced USB Port Monitor, from http://www.aggsoft.com/usb-port-monitor.htm. USB M onitor Pro, from http://www.usb-monitor.com/. USB Activity Monitoring Softw are, from http://www.datadoctor.org/partition-recovery/downloads.htm l. Stealth iBot Com puter Spy, from http://www.brickhousesecurity.com/product/stealth+ibot+computer+spy.do.

587. 588.

KeyCarbon USB Hardware Keylogger, from http://www.spywaredirect.net/keycarbon-usb.htm l. USB 2GB Keylogger, from http://diij.com/KL2-Keylogger-2GB-USB-Hardware-keelog/prod_24.html.

References Page 2993

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

589. 590. 591. 592. 593. 594. 595. 596. 597. 598. 599. 600. 601. 602. 603. 604. 605. 606. 607. 608. 609. 610. 611. 612. 613. 614. 615. 616. 617. 618. 619. 620. 621. 622. 623. 624. 625. 626. 627. 628.

Spy Voice Recorder, from http://w w w.m ysuperspy.com /recorder.htm . Sound Snooper, from http://www.sound-snooper.com /en/download.php. W ebC am Recorder, from http://w ebcam recorder.com /. W ebcam M agic, from http://w w w.robom agic.com /w ebcam m agic.htm . M yW eb cam Broadcaster, from http://w w w.eyespyfx.com /broadcast.php. I-Can-See-You, from http://w w w .internetsafetysoftw are.com . Digi-Watcher, from http://www.digi-watcher.com /. NET Video Spy, from http://w w w.sarbash.com /download.shtm l. Eyeline Video Surveillance Softw are, from http://w w w.nchsoftware.com /surveillance/index.htm l. Capturix VideoSpy, from http://www.capturix.com /default.asp?target=consum er&product=cvs. W ebC am Looker, from http://felenasoft.com /webcam looker/en/. SecuritySpy, from http://w w w.bensoftware.com /securityspy/download.htm l. iSpy, from http://www.ispyconnect.com /download.aspx. Printer Activity Monitor, from http://www.redline-software.com /eng/products/pam /. Print M onitor Pro, from http://www.spyarsenal.com/printer-monitoring-software/print-monitor-pro/. Accurate Printer Monitor, from http://www.aggsoft.com /printer-m onitor.htm . Print Censor Professional, from http://usefuls 0 ft.c 0 m/print-cens 0 r/ # .U W P W 8 JNH LZ 4 . All-Spy Print, from http://www.all-spy.com/all-spy-print.html. O &K Print W atch, from http://w w w .prnw atch.com /okpw .htm l. Print Job Monitor, from http://www.imonitorsoft.com/product-print-job-monitor.htm. PrintTrak, from http://www.lygil.com /printtrak/printtrak.htm . Printer Admin - Copier Tracking System, from http://w w w.printeradm in.com /copy-m anagem ent.htm . Print Inspector, from http://www.softperfect.com /products/pinspector/. Print365, from http://krawasoft.com /index.htm l. M obile Spy, from http://w w w .phonespysoftw are.com /. VRS Recording System, from http://www.nch.com .au/vrs/index.htm l. M odem Spy, from http://w w w.m odem spy.com /en/dow nload.php. M obiStealth Cell Phone Spy, from http://www.mobistealth.com/mobile-phone-spy-software. SPYPhone GOLD, from http://spyera.com/products/spyphone-gold-internet. SpyPhoneTap, from http://w w w.spyphonetap.com /. FlexiSPY O M N I, from http://www.flexispy.com/en/flexispy-omni-spy-app-cell-phone.htm. SpyBubble, from http://www.spybubble.com/cell-phone-spy.php. M O BILE SPY, from http://www.m obile-spy.com /. StealthGenie, from http://w w w.stealthgenie.com /. CellSPYExpert, from http://www.cellspyexpert.com /. SPYPhone, from http://spyera.com/products/spy-phone-basic-internet. EasyGPS, from http://www.easygps.com /. FlexiSPY PRO-X, from http://www.flexispy.com/spyphone-call-interceptor-gps-tracker-symbian.htm. GPS TrackM aker Professional, from http://w w w.trackm aker.com /dwlpage.php. M O BILE SPY, from http://www.m obile-spy.com /.

References Page 2994

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

629. 630. 631. 632. 633. 634. 635. 636. 637.

World-Tracker, from http://www.world-tracker.com /v4/. ALL-in-ONE Spy, from http://w w w.thespyphone.com /allinone.htm l. Trackstick, from http://w w w.trackstick.com /download.htm l. M obiStealth Pro, from http://w w w .m obistealth.com . mSpy, from http://w w w.buym spy.com /. GPS Retriever, from http://w w w.m obilebugstore.com /Blackberry_gps_retriver.aspx. Zemana AntiLogger, from http://www.zem ana.com /Download.aspx. Anti-Keylogger, from http://www.anti-keyloggers.com/. PrivacyKeyboard, from http://www.antikeylogger.eom /products/privacykeyboard/overview.htm l#download.

638. 639. 640. 641. 642.

DefenseW all HIPS, from http://www.softsphere.com /program s/. KeyScrambler, from http://w w w.qfxsoftw are.com /dow nload.htm . 1 Hate Keyloggers, from http://dewasoft.com/privacy/i-hate-keyloggers.htm. SpyShelter STOP-LOGGER, from http://www.spyshelter.com /download-spyshelter. DataGuard AntiKeylogger Ultim ate, from http://www.maxsecuritylab.com/dataguard-antikeylogger/download-anti-keyloger.php.

643. 644. 645. 646. 647. 648. 649. 650. 651. 652. 653.

PrivacyKeyboard, from http://www.privacykeyboard.com /privacy-keyboard.htm l. Elite Anti Keylogger, from http://www.elite-antikeylogger.com /free-download.htm l. CoDefender, from https://www.encassa.com /downloads/default.aspx. PC Tools Spyw are Doctor, from http://www.pctools.com /spyware-doctor/. SU PERAntiSpyw are, from http://superantispyware.com /index.htm l. Spyw are Term inator 2012, from http://w w w.pcrx.com /spywareterm inator/. Ad-Aware Free Antivirus+, from http://w w w .lavasoft.com /products/ad_aw are_free.php. Norton Internet Security, from http://in.norton.com/downloads-trial-norton-internet-security. SpyHunter, from http://w w w.enigm asoftw are.com /products/. Kaspersky Internet Security 2013, from http://www.kaspersky.com/internet-security-free-trial. SecureA nyw here Complete 2012, from http://www.webroot.com /En_US/consum er-productssecureanywhere-com plete.htm l.

654. 655. 656. 657. 658. 659.

MacScan, from http://m acscan.securem ac.com /. Spybot - Search & Destroy, from http://www.safer-networking.org/dl/. M alw arebytes Anti-M alw are PRO, from http://w w w.m alwarebytes.org/products/m alw arebytes_pro/. Fu, from http://www.f-secure.com/v-descs/fu.shtml. KBeast, from http://core.ipsecs.com/rootkit/kernel-rootkit/kbeast-vl/. Hacker Defender HxDef Rootkit, from http://vishnuvalentino.com/hacking-tutorial/hacker-defenderhxdef-rootkit-tutorial-in-1 0 -steps-nostalgia/.

660. 661. 662. 663. 664. 665.

Stinger, from http://www.mcafee.com/us/downloads/free-tools/how-to-use-stinger.aspx. UnHackM e, from http://w w w.greatis.com /unhackm e/dow nload.htm . Virus Removal Tool, from http://www.sophos.com/en-us/products/free-tools/virus-removal-tool.aspx. Hypersight Rootkit Detector, from http://northsecuritylabs.com /. Avira Free Antivirus, from http://www.avira.com /en/avira-free-antivirus. SanityCheck, from http://w w w.resplendence.com /downloads.

References Page 2995

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

666.

G M ER , from http://w w w.gm er.net/. Rootkit Buster, from http://dow nloadcenter.trendm icro.com/index. php?regs=NABU&dk=result_page&dkval=drop_list&catid =6&prodid=155.

667.

668.

Rootkit Razor, from http://www.tizersecure.com /. Rem oveAny, from http://www.free-anti-spy.com/en/index.php. TDSSKiller, from http://support.kaspersky.com/5350?el=88446. Prevx, from http://w w w.prevx.com /freescan.asp. Stream Arm or, from http://securityxploded.com /stream arm or.php. ADS Spy, from http://www.m erijn.nu/program s.php#adsspy. ADS M anager, from http://dm itrybrant.com /adsm anager. Streams, from http://technet.microsoft.com/en-us/sysinternals/bb897440.aspx. AlternateStream View , from http://w w w .nirsoft.net/utils/alternate_data_stream s.htm l. NTFS-Streams: ADS manipulation tool, from http://sourceforge.net/projects/ntfs-ads/. Stream Explorer, from http://w w w.rekenw onder.eom /stream explorer.htm #Stream s. ADS Scanner, from http://www.pointstone.com /products/ADS-Scanner/. RKDetector, from http://w w w.rkdetector.com /. G M ER , from http://w w w.gm er.net/. HijackThis, from http://www.trendm icro.com /us/security/products/index.htm l. SN O W , from http://www.darkside.com .au/snow/index.htm l. QuickStego, from http://quickcrypto.com/free-steganography-software.html. Hide In Picture, from http://sourceforge.net/projects/hide-in-picture/. gifshuffle, from http://www.darkside.com .au/gifshuffle/index.htm l. CryptaPix, from http://www.briggsoft.com /cpix.htm . BM PSecrets, from http://bmpsecrets.com/. OpenPuff, from http://em beddedsw .net/O penPuff_Steganography_H om e.htm l. OpenStego, from http://openstego.sourceforge.net/. PHP-Class Stream Steganography, from http://www.phpclasses.org/package/6027-PHP-Store-andhidden-information-in-PNG-images.html.

669. 670. 671. 672. 673. 674. 675. 676. 677. 678. 679. 680. 681. 682. 683. 684. 685.
686.

687.
688.

689. 690. 691.

692. 693. 694. 695. 696. 697. 698. 699. 700. 701. 702.

Red JPEG , from http://www.totalcm d.net/plugring/redjpeg.htm l. Steganography Studio , from http://stegstudio.sourceforge.net/.

Virtual Steganographic Laboratory (VSL), from http://vsl.sourceforge.net/. wbStego, from http://wbstego.wbailer.com /. Merge Streams, from http://w w w.ntkernel.com /w&p.php?id=23. Office XML, from http://www.irongeek.com/i.php?page=security/ms-office-stego-code. Data Stash, from http://w w w.skyjuicesoftware.com /software/ds_info.htm l. FoxHole, from http://foxhole.sourceforge.net. Xidie Security Suite, from http://w w w .stegano.ro. StegParty, from http://w w w.fasterlight.com . Hydan, from http://www.crazyboy.com /hydan/.

References Page 2996

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

703. 704. 705. 706. 707. 708. 709. 710. 711. 712. 713. 714. 715. 716. 717. 718. 719. 720. 721. 722. 723. 724. 725. 726.

StegJ, from http://sourceforge.net/projects/stegj/files/. StegoStick, from http://stegostick.sourceforge.net/. SN O W , from http://www.darkside.com .au/snow/index.htm l. OmniHide PRO, from http://om nihide.com /. Our Secret, from http://w w w.securekit.net/oursecret.htm . RT Steganography, from http://rtstegvideo.sourceforge.net/. Masker, from http://www.softpuls.com /m asker/. Max File Encryption, from http://www.softeza.com /fileencryption/. M SU StegoVideo, from http://w w w.com pression.ru/video/stego_video/index_en.htm l. BDV DataHider, from http://www.bdvnotepad.com /products/bdv-datahider/. StegoStick, from http://stegostick.sourceforge.net/. OpenPuff, from http://em beddedsw .net/O penPuff_Steganography_H om e.htm l. Stegsecret, from http://stegsecret.sourceforge.net/. PSM Encryptor, from http://dem o.powersoftm akers.com /psm e.zip. DeepSound, from http://jpinsoft.net/DeepSound/Download.aspx. Mp3stegz, from http://mp3stegz.sourceforge.net/. M AXA Security Tools, from http://www.maxa-tools.com/mst.php?lang=en. BitCrypt, from http://bitcrypt.moshe-szweizer.com/. MP3Stego, from http://www.petitcolas.net/fabien/steganography/m p3stego/. Hide4PGP, from http://www.heinz-repp.onlinehom e.de/. CHAOS Universal, from http://safechaos.com/cu.htm. SilentEye, from http://w w w.silenteye.org/. QuickCrypto, from http://w w w.quickcrypto.com /dow nload.htm l. CryptArkan, from http://www.kuskov.com /com ponent/option,com _rem ository/ltem id,30/func,fileinfo/id,l/.

727. 728. 729. 730. 731. 732. 733. 734. 735. 736. 737. 738. 739. 740. 741.

StegoStick, from http://stegostick.sourceforge.net/. Invisible Secrets 4, from http://www.invisiblesecrets.com /. Folder Lock, from http://w w w .new softw ares.net/folderlock/. A+ Folder Locker, from http://www.giantmatrix.com/products/aplus-folder-locker/. Toolwiz BSafe, from http://www.toolwiz.com/products/toolwiz-bsafe/. Hide Folders 2012, from http://fspro.net/hide-folders/. GiliSoft File Lock Pro, from http://www.gilisoft.com/product-file-lock-pro.htm. Universal Shield, from http://w w w.everstrike.com /shield.htm . W in M e n d Folder Hidden, from http://www.winm end.com /folder-hidden/. Encrypted Magic Folders , from http://www.pc-magic.c 0 m /des.htm #em f. QuickCrypto, from http://w w w.quickcrypto.com /dow nload.htm l. Max Folder Secure, from http://w w w.m axfoldersecure.com /. Spam Mimic, from http://www.spam m im ic.com /. Sams Big G Play M aker, from http://www.scram disk.clara.net/. Gargoyle Investigator Forensic Pro, from http://w etst 0 netech.c 0 m/pr 0 duct/ 2 /d 0 w n l 0 ads.

References Page 2997

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

742. 743. 744. 745. 746. 747. 748. 749. 750. 751. 752. 753. 754. 755. 756. 757. 758. 759. 760. 761. 762. 763. 764.

XStegsecret, from http://stegsecret.sourceforge.net/. Stego Suite, from http ://w w w .w etst 0 netech.c 0 m/pr 0 d u ct/l/d 0 w n l 0 ads. StegAlyzerAS, from http://www.sarc-wv.com/products/stegalyzeras/. StegAlyzerRTS, from http://www.sarc-wv.com/products/stegalyzerrts/. StegSpy, from http://www.spy-hunter.com /stegspy. Steg A lyzerSS, from http://www.sarc-wv.com/products/stegalyzerss/. Steg M arkSD K , from http://www.datam ark.com .sg/downloads-sdk.htm . Steganography Studio, from http://stegstudio.sourceforge.net/. Virtual Steganographic Laboratory (VSL), from http://vsl.sourceforge.net/. Stegdetect, from http://w w w.outguess.org/detection.php. Auditpol, from http://technet.microsoft.com/en-us/library/cc755264(v=ws.l0).aspx. CCIeaner, from http://w w w .piriform .com /dow nload. MRU-Blaster, from http://w w w.brightfort.com /m rublaster.htm l. W ipe, from http://privacyroot.com /softw are/w ww /en/wipe.php. Tracks Eraser Pro, from http://w w w .acesoft.net/features.htm . BleachBit, from http://bleachbit.sourceforge.net/news/bleachbit-093. AbsoluteShield Internet Eraser Pro, from http://www.internet-track-eraser.com /ineteraser.php. Clear M y History, from http://www.hide-my-ip.com/clearmyhistory.shtml. EvidenceEraser, from http://w w w .evidenceeraser.com /. W inTools.net Professional, from http://w w w .w intools.net/. RealTime Cookie & Cache Cleaner (R tC 3 ), from http://www.kleinsoft.co.za/buy.htm l. AdvaHist Eraser, from http://w w w.advacrypt.cjb.net/. Free Internet W in d o w W asher, from h ttp ://w w w .eusing .com /W indow _W ash er/W indow _W asher.htm .

M od ule 06: Trojans and Backdoors 765. Placing Backdoors through Firewalls, from http://www.cyberwarzone.com /cyberwarfare/placingbackdoors-through-firewalls. 766. A Deep Look into Netcat - The TCP/IP Swiss Arm y Knife, from http://www.linux-support.com/cms/adeep-look-into-netcat-the-tcpip-swiss-army-knife/. 767. Trojans Revealed: Hackers Center: Internet Security Archive ..., http://www.hackerscenter.com /archive/view.asp?id=24717. 768. Dancho Danchev, The Com plete W indow s Trojans Paper, from http://www.fram e4.com /content/pubs/com p_trojans.txt. 769. The corporate threat posed by email Trojans, from http://www.gfisoftware.de/whitepapers/networkprotection-against-trojans.pdf. 770. Trojan Horses, from http://www-i4.informatik.rwth-aachen.de/lufg/teaching/ss2004/dependabilitysem inar/paper/final 8 .pdf. 771. Trojans - and how to protect your network against them, from http://w w w .w indow security.com /w hitepapers/trojans_protect_your_netw ork.htm l. 772. Fausi Qattan & Fredrik Thernelius, (2004), M aster's Thesis, from http://www.dsv.su.se/research/seclab/pages/pdf-files/04-34.pdf. 773. Malicious Intrusion Techniques, http://www.telecom worx.com /Adobe/Files39087.pdf.

References Page 2998

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

774.

Increased use of Trojan Horse Programs, from http://www.niscc.gov.uk/niscc/docs/tn-2004021600080.html?lang=en.

775.

Anti Trojan source - How to protect your network against trojans ..., from http://news.myinstall.com/news/45/.

776.

Dancho Danchev, Trojan W h ite Paper, from http://www.anti-trojan-software-reviews.com/trojan-whitepaper-p 2 .htm.

777. 778.

Trojans, from http://w w w.em ailprivacy.info/trojans. Rem ote Access Trojan FAQ and Port List Com puter Security - N etw ork ..., from http://www.infosyssec.com /infosyssec/trojanportlist.htm l.

779.

W IN SN O RT.com : Intrusion Detection, from http://www.winsnort.com /m odules.php?op=m odload&nam e=FAQ&file=index&m yfaq=yes&id_cat=13.

780. 781.

Trojan Horse Com puter Infection Symptoms, from http://hacker-elim inator.com /trojansym ptom s.htm l. LockDown M illennium Advanced Online Help, from http://lockdowncorp.com /m anual/TrojanlnfectionSym ptom s.htm .

782.

Commodon Communications - Threats to your Security on the Internet, from http://w w w.com m odon.com /threat/threat-detect.htm .

783.

Van Hauser/THC, Placing Backdoors Through Firewalls, from http://www.cgisecurity.com /lib/placing_backdoors_through_firewalls.txt.

784.

Mikejc, (2004), Tech-Recipes.com - Use System File Checker to Solve Problems, from http://www.techrecipes.com /windows_tips602.htm l.

785. 786. 787.

Exploring the Explodable, from http://www.guninski.com /browsers.htm l. David W ells, (1996), W rappers, from http://w w w.objs.com /survey/wrap.htm . Milly, Steve A., Stan, Ojatex, Gordon, Darius and Buzz, (2000), W ord Pad , from www.pchelp.org/security/scrap.htm.

788. 789. 790. 791.

Trojans F A Q http://www.windowsecurity.com /faqs/Trojans/. Information on Com puter Viruses, from http://www-rohan.sdsu.edu/viruses.htm l. Advanced Netw ork Configuration and Troubleshooting, from http://snow.nl/dist/xhtmlc/ch05s02.html. Tom Armstrong, (2001), N etcat - The TCP/IP Swiss Arm y Knife, from http://rn.nu/program/util/netcat/netcat.html.

792.

Microsoft - W indow s File, from Protection, from http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/enus/system _file_protection.m spx?m fr=true.

793.

Scott W . Hotaling's, Placing Backdoors Through Firewalls, from http://masc2279.no-ip.org/gadgetstoys/internet/placing-backdoors-through-firewalls.

794.

How to block ICM P tunneling?, from https://listserv.icsalabs.com/pipermail/firewall-wizards/1999July/006060.html.

795. 796.

Newbie: Security, from http://www.unixgeeks.org/security/newbie/security/firewall.htm l. Phrack Magazine 0 0 . Volum e Seven, Issue Forty-Nine File 06 o f ..., from http://www.phrack.org/phrack/49/P49-06.

797.

Dancho Danchev dancho, The Complete W indow s Trojans Paper, from http://www.astalavista.com /index.php?section=directory&linkid=640.

798.

Declan McCullagh, (2006), Case 2:00-cr-00170-WHA-VPM, from http://www.politechbot.com /docs/feds.trojan.hacking.brief.082406.pdf.

799.

TCPView, from http://technet.microsoft.com/en-us/sysinternals/bb897437.aspx.

References Page 2999

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

800. 801. 802. 803. 804. 805. 806. 807. 808. 809. 810. 811. 812. 813. 814. 815. 816. 817. 818. 819. 820. 821. 822. 823. 824. 825. 826. 827. 828. 829. 830. 831. 832. 833. 834. 835. 836.

CurrPorts, from http://www.nirsoft.net/utils/cports.htm l. Process Monitor, from http://technet.microsoft.com/en-in/sysinternals/bb896645.aspx. W h a t's Running, from http://w w w.whatsrunning.net/. PrcView, from http://w w w .team cti.com . W insonar, from http://w w w .few byte.com /w insonar.htm l. HiddenFinder, from http://w w w .w enpoint.com /dow nload/. Autoruns for W indow s, from http://technet.microsoft.com/en-us/sysinternals/bb963902.aspx. KillProcess, from http://orangelam psoftware.com /products_killprocess.php. Security Task Manager, from http://w w w.neuber.com /taskm anager/. Yet Another (rem ote) Process Monitor, from http://yaprocm on.sourceforge.net/. MONIT, from http://m m onit.com /m onit/. OpM anager, from http://www.m anageengine.com /network-m onitoring/process-m onitoring.htm l. j v l 6 Pow er Tools 2012, from http://www.m acecraft.com /jvl6-powertools-2012/. PC Tools Registry Mechanic, from http://www.pctools.com /registry-m echanic/. Reg Organizer, from http://w w w.chem table.com /organizer.htm . Registry Shower, from http://w w w.registryshower.com /download.htm . Comodo Cloud Scanner, from http://www.com odo.com /hom e/internet-security/cloud-scanner.php. Buster Sandbox Analyzer, from http://bsa.isoftware.nl/. All-Seeing Eyes, from http://w w w.fortego.com /en/ase.htm l. M J Registry W atcher, from http://w w w.jac 0 bsm.c 0 m/mjs 0 ft.htm #rgw tchr. Active Registry Monitor, from http://w w w.devicelock.com /arm /. SpyM e Tools, from http://www.lcibrossolutions.com /spym e_tools.htm . Regshot, from http://regshot.sourceforge.net/. Registry Live W atch , from http://leelusoft.blogspot.in/2009/ll/registry-live-watch-10.html. DriverView, from http://w w w.nirsoft.net/utils/driverview.htm l. Driver Detective, from http://w w w.drivershq.com /. Unknown Device Identifier, from http://www.zhangduo.com /udi.htm l. DriverGuide Toolkit, from http://w w w.driverguidetoolkit.com /. DriverMax, from http://www.innovative-sol.com /driverm ax/index.htm . Driver Magician, from http://www.driverm agician.com /. Driver Reviver, from http://www.reviversoft.com /driver-reviver/. DriverScanner, from http://w w w.uniblue.com /software/driverscanner/. Double Driver, from http://www.boozet.org/dd.htm . M y Drivers, from http://www.zhangduo.com /driverbackup.htm l. DriverEasy, from http://w w w.drivereasy.com /. W indow s Service M anager (SrvM an), from http://tools.sysprogs.org/srvman/. SM A R T Utility, from http://www.thewindowsclub.com/smart-a-utility-for-tweaking-windows-7-vista-xpservices.

837. 838.

Netwrix Service Monitor, from http://w w w .netw rix.com /w indow s_services_m onitoring_freew are.htm l. Vista Services Optimizer, from http://www.sm artpcutilities.com /servicesoptim izer.htm l.

References Page 3000

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

839. 840. 841. 842. 843.

ServiW in, from http://w w w.nirsoft.net/utils/serviwin.htm l. W indow s Service M anager Tray, from http://winservicem anager.codeplex.com /. AnVirTask M anager, from http://w w w .anvir.com /dow nload.htm . Process Hacker, from http://processhacker.sourceforge.net/downloads.php. Free W indow s Service M onitor Tool, from http://www.manageengine.com/free-windows-servicemonitor/free-windows-service-monitor-index.html.

844. 845. 846. 847. 848. 849. 850. 851. 852. 853. 854. 855. 856. 857. 858.

O verseer Netw ork M onitor, from http://www.overseer-network-m onitor.com /Download.aspx. Total N etw ork M onitor, from http://www.softinventive.com /products/total-network-m onitor/. Starter, from http://codestuff.tripod.com /products_starter.htm l. Security AutoRun, from http://tcpmonitor.altervista.org/startup-manager/. Absolute Startup manager, from http://w w w.absolutestartup.com /. ActiveStartup, from http://w w w.hexilesoft.com /activestartup.htm l. StartEd Lite, from http://w w w.outertech.com /en/w indows-startup. Startup Inspector, from http://w w w .window sstartup.com /startupinspector.php. Program Starter, from http://www.ab-tools.com /de/software/program m starter/. Disable Startup, from http://w w w.disablestartup.com /. StartupM onitor, from http://w w w .m lin.net/StartupM onitor.shtm l. Chameleon Startup Manager, from http://www.cham eleon-m anagers.com /downloads.php. Startup Booster, from http://w w w.sm artpctools.com /startup_booster/. FCIV, from http://www.microsoft.com/en-us/download/details.aspx?id=11533. Tripwire, from http://www.tripwire.com/it-security-software/security-configurationmanagement/fileintegrity-monitoring/.

859. 860. 861. 862. 863. 864. 865.

FastSum, from http://w w w.fastsum .com /download.php. W in M D 5 , from http://w w w .blisstonia.eom /softw are/W inM D5/#dow nload. Advanced Checksum Verifier (ACSV), from http://w w w.irnis.net/. Fsum Fronted, from http://fsum fe.sourceforge.net/. Verisys, from http://www.ionx.co.uk/products/verisys. AFICK (Another File Integrity Checker), from http://afick.sourceforge.net/. File Integrity Monitoring, from http://www.ncircle.com/index.php?s=products_ccm _file-integritymonitoring.

866.

Attribute M anager, from http://www.m iklsoft.com /attrm an/index.htm l. PA File Sight, from http://www.poweradmin.com/file-sight/index3.aspx. CSP File Integrity Checker, from http://w w w.tandem security.com /solution_14.php. ExactFile, from http://www.exactfile.com /downloads/. OSSEC, from http://www.ossec.net/?page_id= 19. W indow s Defender, from http://www.microsoft.com/en-in/download/details.aspx?id=17. M cAfee AntiVirus Plus, from http://home.mcafee.com/store/free-antivirus-trials. Norton AntiVirus, from http://us.norton.com/downloads-trial-nortonantivirus?inid= us_hho_topnav_dow nload_detail_nav.

867.
868.

869. 870. 871. 872. 873.

874.

Trojan Horse Construction Kit, from http://www.pestpatrol.eom /zks/pestinfo/t/trojan_horse_construction_kit.asp.

References Page 3001

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

875.

Progenic Mail Trojan Construction Kit - PMT, from http://www.sim ovits.com /trojans/tr_data/y2630.htm l.

876. 877. 878. 879. 880. 881. 882. 883. 884. 885.
886.

Pandora's Box, from http://greece.mrdonn.org/greekgods/pandora.html. TrojanHunter, from http://w w w.trojanhunter.com /trojanhunter/. Emsisoft Anti-Malware, from http://w w w.em sisoft.in/en/software/antim alw are/. Anti-Trojan Shield (ATS), from http://w w w.atshield.com /?r=dow nload. Spyw are Doctor, from http://www.pctools.com /spyware-doctor/download/?src=lp_sd. Anti M alw are BOCIean, from http://www.com odo.com /hom e/internet-security/anti-m alware.php. Anti Hacker, from http://www.hide-my-ip.com/antihacker.shtml. XoftSpySE, from http://www.paretologic.com/xoftspy/se/newlp/xray/. SPYW AREfighter, from http://w w w.spam fighter.com /SPYW AREfighter/. Anti Trojan Elite, from http://w w w.rem ove-trojan.com /index_ate.php. SU PERAntiSpyw are, from http://w w w.superantispyw are.com /index.htm l. Trojan Rem over, from http://w w w.sim plysup.com /trem over/download.htm l. Twister Antivirus, from http://www.filseclab.com/en-us/.

887.
888.

M od ule 07: Viruses and W o rm s 889. Types of Virus, from http://w w w .m indpride.net/root/Extras/Viruses/virus_protection_and_rem oval_ii.htm . 890. Vulnerabilities in N etw ork Infrastructures and Prevention/Containm ent Measures, from http://proceedings.informingscience.org/lnSITE2012/lnSITE12p053-067Awodele0012.pdf. 891. 892. Terminology, from http://www.f-secure.com/en/web/labs_global/terminology-f. Virus Protection, from http://w w w .m indpride.net/root/Extras/Viruses/virus_protection_and_rem oval_iii.htm . 893. Paul Boutin, (2003), An inside view of the w orm that crashed the Internet in 15 minutes, founder from http://w w w .w ired.com /w ired/archive/ll.07/slam m er.htm l. 894. Case Study: Microsoft N etw ork Hacked by QAZ Trojan, from http://www.msnbc.com/msn/482011.asp Oct. 29, 2000. 895. M ark Russinovich, (2008), TCPView for W in d o w s v2.53, from http://www.sysinternals.com /Utilities/TcpView.htm l. 896. M ark Russinowich and Bryce Cogswell, (2008), Autoruns for w indows (v 9.32), from http://www.sysinternals.com /Utilities/Autoruns.htm l. 897. Merijn, (2005), Hijack This (System Checker) (v 1.99.1), from http://www.m ajorgeeks.com /download.php?det=3155. 898. 899. Norman Book on Com puter Viruses, from http://download.norm an.no/m anuals/eng/BOOKON.PDF. Carey Nachenberg, Understanding and Managing Polym orphic Viruses from http://w w w.sym antec.com /avcenter/reference/striker.pdf. 900. The Spread of the Sapphire/Slam m er W orm , from http://www.caida.org/publications/papers/2003/sapphire/sapphire.html. 901. Mike Gunderloy, (2003), Microsoft Certified Professional Magazine Online | N ewsletters, vol 2 # 8 , from http://mcpmag.com /newsletter/article. asp?EditorialslD=153. 902. R. A. Hettinga, (2003), Random Scanning W orm s and Sapphire/Slam m er's PRNG, from http://www.mailarchive.com /cryptography@ wasabisystems.com/msg03503.html.

References Page 3002

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

903. 904. 905. 906.

Information on a virus on campus, http://security.uwo.ca/antivirus/infoHistory.htm l. Virus History The Senior M ost Virus!!, from www.optusnet.com .au/learning/em ail/virus. Computer Knowledge Virus Tutorial, from www .m pl.org.eg/doc/eBOO Ks/vtutor.pdf. Dr. Alan Solomon and Robert M. Slade, 1990 - VX BBS & Little Black Book (AT&T Attack), 1991 - Tequila, 2001 - Gnuman, W inux Windows/Linux Virus, 2004 - Trojan.Xombe, Randex, Bizex, W itty, from w w w .cknow.com /vtutor/HistoryofViruses.htm l.

907. 908. 909. 910.

Michelangelo, DAME, & VCL, from http://library.thinkquest.org/04oct/00460/malwareHistory.html. Honeypots, Honeynets, and Intrusion Detection, from http://w w w.honeypots.net/. Featured Files, from http://packetstormsecurity.org/. BinText, from http://www.mcafee.com/apps/free-tools/termsofuse.aspxPurh/us/downloads/freetools/bintext.aspx.

911. 912. 913. 914. 915. 916. 917. 918. 919. 920. 921. 922. 923. 924. 925. 926. 927. 928. 929. 930. 931. 932. 933.

UPX, from http://upx.sourceforge.net/#downloadupx. Process Explorer, from http://technet.microsoft.com/en-in/sysinternals/bb896653.aspx. RegShot, from http://regshot.sourceforge.net/. OllyDbg, from http://www.ollydbg.de/. ProcDump, from http://technet.microsoft.com/en-us/sysinternals/dd996900.aspx. IDA Pro, from https://www.hex-rays.com /products/ida/support/download_dem o.shtm l. VirusTotal, from https://w ww .virustotal.com /en/. Anubis: Analyzing Unknown Binaries, from http://anubis.iseclab.org. Avast! Online Scanner, from http://onlinescan.avast.com . M alw are Protection Center, from http://www.m icrosoft.com /security/portal/. ThreatExpert, from http://w w w .threatexpert.com . Dr. W e b Online Scanners, from http://vm s.drweb.com . Metascan Online, from http://www.m etascan-online.com /. Bitdefender QuickScan, from http://w w w.bitdefender.com /scanner/online/free.htm l. GFI SandBox, from http://www.gfi.com/malware-analysis-tool. UploadM alw are.com , from U ploadM alw are.com . Fortinet, from http://www.fortiguard.com /antivirus/virus_scanner.htm l. Immunet, from http://w w w.im m unet.com /free/index.htm l. AVG Antivirus, from http://free.avg.com/in-en/homepage. BitDefender, from http://w w w.bitdefender.com /Dow nloads/. Kaspersky Anti-Virus, from http://www.kaspersky.com /trials. Trend M icro Internet Security Pro, from http://apac.trendm icro.com . Norton AntiVirus, from http://us.norton.com/downloads-trial-nortonantivirus?inid= us_hho_topnav_dow nload_detail_nav.

934. 935. 936. 937. 938.

F-Secure Anti-Virus, from http://www.f-secure.com/en/web/home_global/anti-virus. Avast Pro Antivirus, from http://www.avast.com /pro-antivirus. M cAfee AntiVirus Plus 2013, from http://home.mcafee.com/store/free-antivirus-trials. ESET Sm art Security 6 , from http://www.eset.eom /download/hom e/detail/fam ily/5/. Total Defense Internet Security Suite, from http://www.totaldefense.com /shop/total-defense-internetsecurity-suite.aspx.

References Page 3003

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

939. 940. 941. 942. 943. 944. 945. 946.

W h a t's Running, from http://w w w.whatsrunning.net/. W insonar, from http://w w w .few byte.com /w insonar.htm l. Reg Organizer, from http://w w w.chem table.com /organizer.htm . W indow s Service M anager (SrvM an), from http://tools.sysprogs.org/srvman/. ServiW in, from http://w w w.nirsoft.net/utils/serviwin.htm l. Starter, from http://codestuff.tripod.com /products_starter.htm l. Security AutoRun, from http://tcpmonitor.altervista.org/startup-manager/. FCIV, from http://www.microsoft.com/en-us/download/details.aspx?id=11533.

M od ule 08: Sniffing 947. W h a t is Sniffer and how to detect sniffing in com puter network, from http://www.aboutonlinetips.com/sniffer-types-and-protecting-against-sniffing/. 948. Anatom y of an ARP Poisoning Attack, from http://www.unitedsystemsok.com/anatomy-of-an-arppoisoning-attack. 949. 950. W h a t is AR P?, from http://w w w.antiarp.com /english_94.htm l. Modeling and Analysis of W ireless LAN Traffic, from http://www.dm clab.hanyang.ac.kr/files/publication/journals/international/200911_08.pdf. 951. 952. Dynamic ARP Inspection (DAI), from http://daxm.net/ccienotes/20100131/dynamic-arp-inspection-dai. O verview of Layer 2 Switched Networks and Communication, from http://www.sakunsharma.in/2011/07/overview-layer-2-switched-networks-communication/. 953. Application Protocol IPv 6 , from http://www.ciscoexpo.ru/dub/sites/default/files/sem inar_attachm ents/ipv 6 .pdf. 954. 955. Dynamic Host Configuration Protocol, from http://www.ietf.org/rfc/rfc2131.txt. Understanding,Preventing,Defending Against Layer 2 Attacks, from http://www.sanog.org/resources/sanogl5/sanogl5-yusuf-l2-security.pdf. 956. A N ew Schem e to Check ARP Spoofing: Prevention of MAN-IN-THE-MIDDLE Attack, from http://www.ijcsit.com/docs/Volume%202/vol2issue4/ijcsit2011020420.pdf. 957. LAYER 2 ATTACKS & MITIGATION TECHNIQUES, from http://www.sanog.org/resources/sanog7/yusuf-L2attack-mitigation.pdf. 958. Chris M artin, W h a t is Sniffer and how to detect Sniffing in com puter network, Available from http://74.125.153.132/search?q=cache:Tu6yfsiaY3AJ:www.aboutonlinetips.com/sniffer-types-andprotecting-against-sniffing/+wire+sniffing+techniques&cd=25&hl=en&ct=clnk&gl=in&client=fi refox-a. 959. Adam Barth, Secure content sniffing for W e b browsers or How to stop papers from reviewing them selves, Available from http://www.adambarth.com/papers/2009/barth-caballero-song.pdf. 960. Undetectable sniffing on Ethernet, Available from http://www.askapache.com/security/sniffing-onethernet-undetected.htm l. 961. Suhas A Desai, (2007), Techniques for Preventing Sniffing, Packet Sniffing: Sniffing Tools Detection Prevention Methods, Available from http://e-articles.info/e/a/title/Packet-Sniffing:-Sniffing-ToolsDetection-Prevention-Methods/. 962. Suhas A Desai, (2007), Tool to Detect Sniffers, Packet Sniffing: Sniffing Tools Detection Prevention Methods, Available from http://e-articles.info/e/a/title/Packet-Sniffing:-Sniffing-Tools-DetectionPrevention-Methods/. 963. Identifying Nonessential Services and Attacks > Attacks, from http://www.informit.com/articles/article.asp?p=98121&seqNum=2.

References Page 3004

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

964. 965.

ARP cache poisoning /ARP spoofing, from http://su2.info/doc/arpspoof.php. N etw ork m anagement, network discovery, SN M P, M IB and W M I browsers, from w w w .netw orkview .com /htm l/features.htm l.

966. 967.

Address Resolution Protocol (ARP), from www.erg.abdn.ac.uk/users/gorry/course/inet-pages/arp.html. Angela D. Orebaugh, (2004), Top Ten Ethereal Tips and Tricks, from http://www.onlamp.eom/pub/a/security/2004/05/13/etherealtips.html.

968. 969. 970. 971. 972. 973.

Packages, from http://packages.debian.org/. N etw ork Protocol Analysis, from http://w w w .m aatec.com /. The Hacker's Ethic, from http://web.textfiles.com/ezines/HWA/hwa-hn34.txt. Jarom il, Dyne:ll GNU/Linux User's Guide, from http://dynebolic.org/dynebolic-man.pdf. Address Resolution Protocol (arp), from www.erg.abdn.ac.uk/users/gorry/course/inet-pages/arp.html. Adam Barth, Juan Caballero and Dawn Song, Secure Content Sniffing for W e b Browsers, or How to Stop Papers from Reviewing Themselves, http://www.adambarth.com/papers/2009/barth-caballerosong.pdf.

974.

Alberto Ornaghi and M arco Valleri, M an in the middle attacks, http://www.blackhat.com/presentations/bh-europe-03/bh-europe-03-valleri.pdf.

975.

Tom Olzak, (2006), DNS Cache Poisoning: Definition and Prevention, http://adventuresinsecurity.com /Papers/DNS_Cache_Poisoning.pdf.

976.

Sean W halen, (2001), An Introduction to Arp Spoofing, http://w w w.rootsecure.net/content/dow nloads/pdf/arp_spoofing_intro.pdf.

977.

Daiji Sanai, (2001), Detection of Promiscuous Nodes using ARP packets, http://w w w.securityfriday.com /prom iscuous_detection_ 0 1 .pdf.

978.

N etw ork m anagement, network discovery, SN M P, M IB and W M I browsers, from w w w .netw orkview .com /htm l/w hat_s_new .htm l.

979.

Source Address Spoofing, from http://www.networkcom puting.com /shared/article/showArticle.jhtm l?articleld=8702815&dassroom .

980.

Keith Brown, (1999), Security Briefs, from http://www.microsoft.com/msj/0299/security/security0299.aspx.

981.

Corey Nachreiner, (2005), Anatom y of an ARP Poisoning Attack, from http://www.watchguard.com /infocenter/editorial/135324.asp.

982. 983. 984. 985. 986. 987. 988. 989. 990. 991.

macof, from http://w w w .m onkey.org. Yersinia, from http://w w w .yersinia.net/dow nload.htm . Dhcpstarv, from http://dhcpstarv.sourceforge.net/. Gobbler, from http://gobbler.sourceforge.net/. Cain & Abel, from http://www.oxid.it/cain.htm l. W inArpAttacker, from http://www.xfocus.org/index.html. Ufasoft Snif, from http://ufasoft.com/sniffer/. XArp, from http://www.chrism c.de/developm ent/xarp/index.htm l. SMAC, from http://www.klcconsulting.net/sm ac/index.htm l#download. Cascade Pilot, from http://www.riverbed.com/products-solutions/products/performancemanagement/network-infrastructure/High-Speed-Packet-Analysis.html.

992. 993.

Tcpdump, from http://w w w.tcpdum p.org/. W inDum p, from http://w w w.winpcap.org/w indum p/default.htm .

References Page 3005

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

994. 995.

Capsa N etw ork Analyzer, from http://w w w.colasoft.com /dow nload/products/capsa_free.php. O m niPeek Netw ork Analyzer, from http://w w w.wildpackets.com /products/om nipeek_network_analyzer.

996. 997. 998. 999.


1000. 1001. 1002.

Observer, from http://www.networkinstrum ents.com /products/observer/index.php?tab=download. Sniff-O-Matic, from http://w w w.kw akkelflap.com /sniffer.htm l. JitB it Netw ork Sniffer, from http://w w w.jitbit.com /networksniffer/. M SN Sniffer 2, from http://www.m snsniffer.com /download/index.htm . Ace Password Sniffer, from http://w w w.effetech.com /aps/. RSA N etW itness Investigator, from http://w w w .em c.c 0 m /security/rsa-netwitness.htm #lfreew are. Big-Mother, from http://w w w .tupsoft.com /dow nload.htm . EtherD etect Packet Sniffer, from http ://w w w .etherdetect.com /dow nload.htm . dsniff, from http://monkey.org/~dugsong/dsniff/. EffeTech HTTP Sniffer, from http://w w w .effetech.com /dow nload/. Ntop, from http://www.ntop.org/products/ntop/. Ettercap, from http://ettercap.sourceforge.net/dow nloads.htm l. SmartSniff, from http://www.nirsoft.net/utils/sm sniff.htm l. EtherApe, from http://etherape.sourceforge.net/. N etw ork Probe, from http://w w w.objectplanet.com /probe/. Snort, from http://w w w.snort.org/. Sn iffem , from http://www.sniff-em .com /download.shtm l. MaaTec N etw ork Analyzer, from http://w w w .m aatec.com /m tna/dow nload.htm l. Alchem y N etw ork Monitor, from http://w w w.m ishelpers.com /netw ork_m onitor/index.htm l. Com m View, from http://www.tam os.com /download/m ain/index.php. NetResident, from http://ww w.tam os.com /products/netresident/. AIM Sniffer, from http://www.effetech.com /aim -sniffer/index.htm . Netstumbler, from http://w w w.netstum bler.com /downloads/. IE HTTP Analyzer, from http://w w w.ieinspector.com /httpanalyzer/. MiniStum bler, from http://w w w .netstum bler.com /dow nloads. PacketM on, from http://w w w.analogx.com /contents/dow nload/Network/pm on/Freew are.htm . NADetector, from http://w w w .nsauditor.com /netw ork_m onitoring/nadetector_traffic_analyzer.htm l. Microsoft Network Monitor, from http://www.microsoft.com/en-us/download/details.aspx?id=4865. N etw orkM iner, from http://w w w .netresec.com /?page= N etw orkM iner. N etw ork Security Toolkit, from http://www.networksecuritytoolkit.org/nst/index.htm l. Ethereal, from http://w w w .ethereal.com /. KSniffer, from http://ksniffer.sourceforge.net/index.php?section=download. IPgrab, from http://ipgrab.sourceforge.net/. W ebSiteSniffer, from http://w w w.nirsoft.net/utils/w eb_site_sniffer.htm l. ICQ Sniffer, from http://w w w.etherboss.com /icq/download.htm . URL Helper, from http://w w w.urlhelper.com /index.htm . W ebCookiesSniffer, from http://w w w.nirsoft.net/utils/w eb_cookies_sniffer.htm l.

1003. 1004. 1005. 1006. 1007. 1008. 1009.


1010. 1011. 1012.

1013. 1014. 1015. 1016. 1017. 1018. 1019.


1020. 1021. 1022.

1023. 1024. 1025. 1026. 1027. 1028. 1029. 1030. 1031. 1032.

References Page 3006

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

1033. 1034. 1035. 1036. 1037. 1038.

York, from http://thesz.diecru.eu/content/york.php. IP Traffic Spy, from http://w w w .netw orkdls.com /Softw are/View /IP_Traffic_Spy/. SniffPass, from http://w w w.nirsoft.net/utils/passw ord_sniffer.htm l. Cocoa Packet Analyzer, from http://w w w.tastycocoabytes.com /cpa/. vxSniffer, from http://www.cam bridgevx.com /vxsniffer.htm l. Prom qryUI, from http://www.microsoft.com/en-us/download/details.aspx?id=16883.

M od ule 09: Social Engineering 1039. The use of Detailed Explanation of the the the the the working principle of of the port scanning tool and the the N M A P, from http://www.boxueshe.org/read.php?tid=36 1040. Sarah Granger, (2002), Social Engineering Fundamentals, Available from www.securityfocus.com /infocus/1533. 1041. Mika Tolvanen, (2006), F-Secure Trojan Information Pages, Available from http://www.f-secure.com/vdescs/redbrowser_a.shtm l. 1042. Dancho Danchev, (2009), Social Engineering by a fake S M S spying tool, Available from http://blogs.zdnet.com/security/?p=3162. 1043. Growth on Use of Social Networking Sites, Available from http://w w w.pewinternet.0rg/~/m edia/Files/Reports/2009/PIP_Adult_social_netw orking_data_m em o_FI NAL.pdf.pdf. 1044. 1045. Linkedln, Available from http://www.linkedin.com /. Micha Pekrul, (2009), Rogue Linkedln Profiles Lead To M alw are, Available from http://www.avertlabs.com/research/blog/index.php/2009/01/06/rogue-linkedin-profiles-lead-tomalware/. 1046. Bogdan Dumitru,(2009), Risks of Social Networking and the Corporate Network, Available from http://www.itbusinessedge.com/cm/community/features/guestopinions/blog/the-risks-of-socialnetworking-and-the-corporate-network/?cs=33877. 1047. Terry Turner, Social Engineering - Can Organizations W in the Battle?, from http://w w w.infosecw riters.com /text_resources/pdf/Social_Engineering_Can_O rganizations_W in.pdf. 1048. Bruce Schneier, (2005), Schneier on Security: W eakest Link Security, from http://www.schneier.com /blog/archives/2005/12/weakest_link_se.htm l. 1049. Sharon Gaudin, Social Engineering: The Human Side Of Hacking, from http://www.crimeresearch.org/library/Sharon2.htm. 1050. Social Engineering Hackers-LAN Times 11/6/95, from http://www.security-protocols.com/textfiles/socialengineering/soc_eng 2 .html. 1051. Psychology of Social Engineering, from http://cybercrim es.net/Property/Hacking/Social%20Engineering/PsychSocEng/PsySocEng.htm l. 1052. 1053. Michael L. Snider, Articles, from http://staff.rio.edu/msnider/?cat=7. W y lie W ong, (2000), Oracle chief defends Microsoft snooping | CNET News.com, from http://news.com.com/Oracle+chief+defends+Microsoft+snooping/2100-1001_3-242560.html. 1054. Engineering Hackers-LAN, from http://www.security-protocols.com/textfiles/socialengineering/soc_eng 2 .html. 1055. 1056. Examples of Phishing Emails, from http://www.banksafeonline.org.uk/phishing_exam ples.htm l. Anti-Phishing Resources, from http://www.antiphishing.org/resources.htm l.

References Page 3007

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

1057. 1058. 1059. 1060.

Netcraft Toolbar, from http://toolbar.netcraft.com /install. PhishTank, from http://www.phishtank.com /. ReadNotify, from http://w w w.readnotify.com /. Social Engineering Toolkit (SET), from https://www.trustedsec.com/downloads/social-engineer-toolkit/.

M od ule 10: Denial-of-Service 1061. Distributed Denial of Service:Taxonomies of Attacks, Tools and Countermeasures, from http://palm s.ee.princeton.edu/PALM Sopen/DD oS%20Final%20PDCS%20Paper.pdf. 1062. Denial of Service Attack Detection Techniques, from https://www.evernote.com/shard/s9/note/blla8c31-8651-4d74-acf9Ifblb3c0f090/wishi/crazylazy#st=p&n=blla8c31-8651-4d74-acf9-lfblb3c0f090. 1063. W elcom e to the new IP reality, from http://lukasz.bromirski.net/docs/prezos/confidence2008/new_ip_reality_bp.pdf. 1064. W h a t Happened to Blue Security, from http://slashdot.org/story/06/05/08/142229/what-happened-toblue-security. 1065. Rem otely Triggered Black Hole Filtering in IP Version 6 for Cisco IOS, Cisco IOS XE, and Cisco IOS XR Softw are, from 1066. http://www.cisco.com /web/about/security/intelligence/ipv 6 _rtb h .h tm l.

Frank Kargl, Jorn Maier, Stefan Schlott, and M ichael W e b e r , Protecting W e b Servers from Distrubuted Denial of Service Attacks, from http://wwwl0.org/cdrom /papers/409/.

1067. 1068.

Denial of Service Attacks, from http://w w w .cert.org/tech_tips/denial_of_service.htm l. Craig A. Huegen, (2000), Sm urf Attack Information, from http://www.pentics.net/denial-ofservice/white-papers/smurf.cgi.

1069.

Denial of service, from http://searchappsecurity.techtarget.c0m/sDefinition/0,290660,sid92_gci213591,00.htm l.

1070.

Solucom, VPN (Virtual Private Network) and Internet F ire w a ll..., from http://w w w.solucom .com /define.htm .

1071.

Vladim ir Golubev, (2005), DoS attacks: crime w ithout penalty, http://www.crimeresearch.org/artides/1049/.

1072.

Gunter Ollmann, (2009), The Botnet vs. M alw are Relationship, http://w w w.dam balla.com /dow nloads/d_pubs/W P%20M any-tom any%20Botnet%20Relationships%20%282009-05-21%29.pdf.

1073.

Gunter Ollmann, (2009), Botnet Communication Topologies, http://w w w .dam balla.com /dow nloads/r_pubs/W P%20Botnet%20C om m unications%20Prim er%20%2820 09-06-04%29.pdf.

1074.

Kasey Efaw, Installing Snort 2.8 .5.2 on W indow s 7, http://www.sn0rt.0rg/assets/135/lnstalling_Sn0rt_2.8.5.2_0n_W ind0ws_7.pdf.

1075.

Renaud BIDOU, Fighting the Botnet Ecosystem, http://www.iv2technologies.com /FightingBotnetEcosystem .pdf.

1076. 1077.

Ping of death, from http://searchsecurity.techtarget.com/sDefinition/0 sidl4_gci822096,00.htm l. Apostates of Islam :: View topic - FFI down again, from http://www.apostatesofislam.com/forum/viewtopic.php?t=189&postdays=0&postorder=asc&start=225 &sid=0e55c35186bbe87c48bdfe6f62e0e4a5.

1078.

Jason Anderson, An Analysis of Fragm entation Attacks, from http://wwwsrc.lip 6 .fr/homepages/Fabrice.Legond-Aubry/w ww .ouah.org/fragm a.htm l.

References Page 3008

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

1079.

[PDF] IEEE P1615/D2 Draft Recom m ended Practice for N etw ork ..., http://grouper.ieee.org/groups/sub/wgc3/C3TFl%20Docum ents/drafts/P1615_draft2.pdf.

1080.

[DOC] Abstract, from http://www.bridgeport.edu/sed/projects/cs597/Spring_2004/juilan/JuiLan_N etw ork%20Security%20-%20A nalysis%20of%20Attack%20and%20D efense%20Strategies.doc.

1081.

Mariusz Burdach, (2003), Hardening the TCP/IP stack to SYN attacks, from http://www.securityfocus.com/infocus/1729.

1082.

Citations: TCP SYN Flooding and IP Spoofing Attacks (Researchlndex), from http://citeseer.ist.psu.edu/context/141856/0-

1083.

Lasse Huovinen and Jani Hursti, from Denial of Service Attacks: Teardrop and Land, http://users.tkk.fi/~lhuovine/study/hacker98/dos.html.

1084. 1085.

Underground security systems research, from http://w w w.ussrback.com /W in/. Stephen Specht & Ruby Lee, (2003), from Taxonomies of Distributed Denial of Service Networks, Attacks ..., from http://www.princeton.edu/~rblee/ELE572Papers/Fall04Readings/DDoSSurveyPaper_20030516_Final.pdf

1086.

David Dittrich, (1999), The DoS Project's "trinoo" distributed denial of service attack tool from http://www.donkboy.com /htm l/stuff.htm .

1087.

Anti Online's Fight- Back! Com puter Security..., from http://www.antionline.com/fightback/W hat_Are_D DO S_Attacks.php.

1088.

Sven Dietrich, Analysis of the Shaft distributed Denial of Service tool, from http://w w w.securiteam .com /securitynews/5AP0F000IM .htm l.

1089.

Analyzing Distributed Denial Of Service Tools: The Shaft Case, from http://www.ece.cmu.edu/~adrian/630-f03/readings/shaft.pdf.

1090.

Distributed Denial of Service Tools, from http://www.fz-juelich.de/jsc/net/security/infos/DDoS/IN-9907.html.

1091.

David M oore Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford, and Nicholas, (2003), W e a v e r Inside the Slam m er W orm , from http://csdl2.com puter. org/persagen/DLAbsToc.jsp?resourcePath=/dl/mags/sp/&toc=comp/mags/sp/20 03/04/j4toc.xml&DOI=10.1109/MSECP.2003.1219056.

1092.

RudhraKumar Venkatesan and ShashidharLakkavalli, TCP/IP Vulnerabilities, from http://islab.oregonstate.edu/koc/ece478/00Report/LV.pdf.

1093. 1094. 1095. 1096.

Dave Dittrich, Bugtraq: Analysis of trinOO, from http://seclists.org/lists/bugtraq/1999/Dec/0093.html Fravia denial of service attack tools, from w w w .searchlores.org /d odl.htm . David Dittrich, (1999), Trinoo Analysis, from http://staff.washington.edu/dittrich/misc/trinoo.analysis. John Michalski, Carrie Price, Eric Stanton, Erik Lee, CHUA, Kuan Seah, W ong, Yip Heng and TAN, and Chung Pheng, (2002), DYNAT TECHNOLOGIES A SSESSM EN T REPORT, from http://www.sandia.gov/iorta/docs/SAND%202002-3613%20DYNAT.pdf.

1097. 1098.

<...... A.VERY..THING..IS..POSSIBLE..TO ..ZEROGEEK........>, from http://m ifwarz.blogspot.com/. Jason Barlow and W o o d y Thrower, (2000), TFN2K - An Analysis Jason Barlow and W o o d y Throw er AXENT Security..., from http://packetst 0 rm security. 0 rg/distributed/TFN 2 k_Analysis-l. 3 .txt.

1099.

Jason Barlow and W o o d y Thrower, (2000), TFN2K - An Analysis (Revision : 1.3), from http://w w w.sym antec.com /avcenter/security/Content/2000_02_10_a.htm l.

1100.

Gary C. Kessler, (2000), Distributed Denial-Of-Service, from http://www.garykessler.net/library/ddos.htm l.

References Page 3009

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

1101.

David Dittrich, (1999), Stacheldraht Analysis, http://staff.washington.edu/dittrich/misc/stacheldraht.analysis.

1102.

Bugtraq: Analysis of the Shaft distributed denial of service tool, from http://seclists.org/lists/bugtraq/2000/Mar/0215.html.

1103.

Sven Dietrich, Neil Long, & David Dittrich, Analyzing Distributed Denial Of Service Tools: The Shaft Case, from http://www.usenix.org/event/lisa 2 0 0 0 /full_papers/dietrich/dietrich_htm l/.

1104.

IP: new DoS attack, from http://www.interesting-people.org/archives/interestingpeople/200009/msg00006.html.

1105.

Dave Farber, (2000), IP: new DoS attack, from http://w w w .princeton.edu/~rblee/D D oS%20Survey%20Paper_v7final.doc.

1106.

David Dittrich, George W e a ve r, Sven Dietrich, and Neil Long, The mstream distributed denial of service attack tool, from http://www.linuxsecurity.c0m/content/view/107513/2/.

1107. 1108.

The Distributed Reflection DoS Attack, from http://www.grc.com /dos/drdos.htm . Steve Gibson, (2002), Distributed Reflection Denial of Service Bandwidth Consumption, from http://cswww.cs.yale.edu/homes/arvind/cs425/doc/drdos.pdf.

1109.
1110.

SYN Attack, from w w w .ieee.o rg . Hang Chau, (2004), N etw ork Security - Defense Against D0 S/DD 0 S Attacks, from http://www.securitydocs.com /library/2576.

1111.

Aaron Sullivan, 2001, An Audit of Active Directory Security, from http://www.securityfocus.com/infocus/1293.

1112.

Xatrix Security, from http://www.xatrix.org/download.php?id=28&r=l. Denail of Service, from http://w w w.m ycert.org.m y/network_abuse/dos.htm l. Denial of Service Attack in N etBIO S Services, from http://www.kb.cert.org/vuls/id/32650. Jam es M iddleton, (2001), Cloaking system poses new security threat, from http://www.iwr.co.uk/vnunet/news/2114991/cloaking-system-poses-security-threat.

1113. 1114. 1115.

1116. 1117. 1118.

NFR DDOS problems, from http://www.shmoo.com/mail/ids/may01/msg00038.shtml. Latest W indow s Security Articles, from http://w w w .w indow security.com /. Gregg Keizer, (2006), Massive DoS Attacks Against ISPs On The Rise, from http://w w w.inform ationw eek.com /story/showArtide.jhtm l?articlelD =192701817&cid=RSSfeed_IW K_Ne ws.

1119.

Jason Barlow and W o o d y Thrower, AXENT Security, from http://packetst 0 rm security. 0 rg/distributed/TFN 2 k_Analysis-l. 3 .txt.

1120.

Fabrice LEGOND-AUBRY, An Analysis of Fragm entation Attacks, from http://wwwsrc.lip 6 .fr/homepages/Fabrice.Legond-Aubry.

1121.

Jui-Lan Lai, Netw ork Security-- Analysis of Attack and Defense, from http://www.bridgeport.edu/sed/projects/cs597/Spring_2004/juilan/Jui-Lan_Network%20Security%20%20Analysis% 20of%20Attack%20and%20D efense%20Strategies.doc Strategies.

1122.

Targa: [PDF] security, from https://www.cis.strath.ac.uk/~gw/52507/security.pdf. W O R M _M Y D O O M .B , Description and solution, from http://w w w .trendm icro.com /vinfo/virusencyclo/default5.asp?VN am e= W O RM _M YD O O .M .B.

1123.

1124. 1125. 1126.

Information on a virus on campus, from http://security.uwo.ca/antivirus/infoHistory.htm l. [PDF] Microsoft Pow erPoint - ISi_M alw are.ppt, from http://www-t.zhwin.ch/it/isi/v/ISi_M alware.pdf. R. A. Hettinga, (2003), Random Scanning W orm s and Sapphire/Slam m er's PRNG..., from http://www.m ail-archive.c0m /cryptography@ wasabisystem s.com /m sg03503.htm l.

References Page 3010

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

1127.

Mike Gunderloy, (2003), Microsoft Certified Professional Magazine Online | N ew sletters ..., from http://m cpm ag.com /new sletter/artide.asp?EditorialslD=153.

1128.

The Spread of the Sapphire/Slam m er W orm , from http://www.caida.org/publications/papers/2003/sapphire/sapphire.html.

1129. 1130.

Norman Book on Com puter Viruses, from http://download.norm an.no/m anuals/eng/BOOKON.PDF. IT Architect | Strategies & Issues: Honeypots - Sticking It to, from http://www.itarchitect.com /article/NMG20030403S0005.

1131.

Roger A. Grimes, (2005), Honeypots for W indow s, from http://www.gtpcc.org/gtpcc/honeypotsforwindows.htm .

1132. 1133.

Honeypots [lnfosecwriters.com ], from http://www.infosecwriters.com /texts.php?op=display&id=80. J.A. Hamilton, Reflection of the Exploit, from http://www.eng.auburn.edu/users/ham ilton/security/SE2/Directed_Reflection_DO S_Ham ilton.pdf.

1134.

Distributed Reflection Denial of Service Bandwidth Consumption ..., from http://www.grc.com/files/drdos.pdf.

1135.

Kevin Houle & Chad Dougherty, (2000), CERT Incident Note IN-99-07: Distributed Denial of Service Tools, from http://www.cert.org/incident_notes/IN-2000-05.html.

1136. 1137.

DDoS Resources, from http://www.anm l.iu.edu/ddos/tools.htm l. Jason Barlow and W o o d y Thrower, (2000), AXENT : SW A T : TFN2K - An Analysis, from http://w w w.sym antec.com /avcenter/security/Content/2000_02_10_a.htm l.

1138. 1139.

David Dittrich, (1999), Trinoo Analysis, from http://staff.washington.edu/dittrich/misc/trinoo.analysis. CERT warns of networked denial of service attacks - Com puterworld, from http://www.com puterworld.com /action/pages.do?com m and=viewPage&pagePath=/404.

1140.

Internet security, from http://www.fsa.ulaval.ca/personnel/vernag/EH/F/m anif/lectures/internet_security.htm .

1141.

Solucom VPN (Virtual Private Netw ork) and Internet F ire w a ll..., from http://w w w.solucom .com /define.htm .

1142.

Library Com puter and Netw ork Security: Library Security Principles ..., from http://www.infopeople.org/resources/security/basics/threats_vulnerabilities.htm l.

1143.

W ireless DoS, from http://www.cisco.c0m /en/US/docs/wireless/technology/wips/deploym ent/guide/wipsdep.htm l#wpl50 481.

1144.

Gary C. Kessler, (2000), "Defenses Against Distributed Denial of Service Attacks", from http://www.garykessler.net/library/ddos.htm l.

1145.

Abhishek Singh, (2005), Demystifying Denial-Of-Service attacks, part one, from http://www.symantec.com/connect/articles/demystifying-denial-service-attacks-part-one.

1146. 1147.

Denial-of-service attack, from http://en.wikipedia. 0 rg/wiki/Denial- 0 f-service_attack#lncidents. Kevin Poulsen, (2010), New: Cyberattack Against WikiLeaks W a s W eak, from http://w w w .w ired.com /threatlevel/ 2 0 1 0 /ll/w ikileaks-attack/.

1148. 1149. 1150. 1151. 1152. 1153.

PlugBot, from http://theplugbot.com . Illusion Bot and N etBot Attacker, from . DoS HTTP, from http://socketsoft.net/products.asp?p=doshttp. KFSensor, from http://www.keyfocus.net/kfsensor/download/. FortiDDoS-300A, from http://www.fortinet.com /products/fortiddos/300A.htm l. DDoS Protector, from http://www.checkpoint.com /products/ddos-protector/.

References Page 3011

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

1154.

Cisco Guard XT 5650, from http://www.cisco.com/en/US/prod/collateral/vpndevc/ps5879/ps6264/ps5888/product_data_sheet090 0aecd800fa55e.html.

1155. 1156. 1157. 1158. 1159. 1160.

Arbor Pravail: Availability Protection System, from http://w w w.arbornetworks.com /products/pravail. D-Guard Anti-DDoS Firewall, from http://www.d-guard.com/. N etFlow Analyzer, from http://w w w.m anageengine.com /products/netflow/download.htm l. FortiDDoS, from http://www.fortinet.com /products/fortiddos/. SDL Regex Fuzzer, from http://www.m icrosoft.com /en-us/download/confirm ation.aspx?id=20095. DefensePro, from http://w w w .radw are.com /Products/ApplicationN etw orkSecurity/DDoS_Attack_Protection.aspx.

1161. 1162. 1163.

W A N G uard Sensor, from https://www.andrisoft.com /store/evaluation-request. DOSarrest, from http://w w w.dosarrest.com . NetScaler Application Firewall, from http://www.citrix.com/products/netscaler-application-deliverycontroller/try. htm l?ntref=header_try.

1164. 1165. 1166. 1167. 1168. 1169. 1170. 1171. 1172.

Anti DDoS Guardian, from http://w w w.beethink.com /antiddos.htm . FortGuard DDoS Firewall, from http://w w w.fortguard.com /ddosm onitor.htm l. DDoSDefend, from http://ddosdefend.com/ddos-protection.html. W e b serve r Stress Tool, from http://w w w.paessler.com /dow nload/w ebstress. W e b Stress Tester, from http://w w w.fastream .com /w ebstresstester.php. JM e te r, from http://jm eter.apache.org/dow nloadJm eter.cgi. DoS HTTP, from http://socketsoft.net/products.asp?p=doshttp. Mail Bom ber, from http://w w w.getfreefile.com /bom ber.htm l. Advanced Mail Bom ber, from http://w w w.softheap.com /abom ber.htm l.

M od ule 11: Session Hijacking 1173. Steps in Session Hijacking, from hijacking.html. 1174. 1175. 1176. 1177. Session Hijacking, from http://www.im perva.com /resources/glossary/session_hijacking.htm l. IP Hijack, from http://dokfleed.net/duh/modules.php?name=News&file=article&sid=3. Spoofing Vs Hijacking, from http://www.hackguide4u.com/2010/03/spoofing-vs-hijacking.html. Lee Lawson, (2005), Session Hijacking Packet Analysis, Available from http://www.securitydocs.com /library/3479. 1178. 1179. 1180. Dave Dittrich, Session hijack script, Available from http://blinky-lights.org/script.html. Session hijacking attack, Available from http://www.owasp.org/index.php/Session_hijacking_attack. Shray Kapoor, Session Hijacking Exploiting TCP, UDP and HTTP Sessions, http://www.infosecwriters.com /text_resources/pdf/SKapoor_SessionHijacking.pdf. 1181. David Endler, (2001), Brute-Force Exploitation of W e b Application Session IDs, http://www.cgisecurity.com/lib/SessionlDs.pdf. 1182. Robert Auger, Credential and Session Prediction, Available from http://projects.webappsec.org/Credential-and-Session-Prediction. 1183. Trojan horse, Available from http://searchsecurity.techtarget.com/sDefinition/0 sidl4_gci213221,00.htm l. http://www.hackguide4u.com/2010/03/steps-in-session-

References Page 3012

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1184. 1185. 1186. 1187. 1188. 1189. 1190.

Jamie.riden, (2008), CLIENT-SIDE ATTACKS, Available from http://www.honeynet.org/node/157. Lee Lawson, (2005), Session Hijacking Packet Analysis, Available from http://www.securitydocs.com/library/3479. Addison Wesley, (2007), Fibre Channel and IP session hijacking assessment exercise, Available from http://searchstoragechannel.techtarget.com/generic/0,295582,sid98_gcil250226,00.html. Prevention from Session Hijacking, Available from http://hydtechie.blogspot.com/2008/08/preventionfrom-session-hijacking.html. Session Hijacking, Available from http://www.cs.binghamton.edu/~steflik/cs455/sessionhijacking.htm. Hackerthreads.org security: View topic - Network Session Hijacking, from www.hackerthreads.org/phpbb/viewtopic.php?t=745. OpenSSH - SwiK swik.net/OpenSSH MOM 2005: IP Security (IPSec), from www.microsoft.com/technet/prodtechnol/mom/mom2005/Library/39cb2734-506c-4101-887cc2d2146621c0.mspx. Microsoft Security Bulletin (MS99-046): Frequently Asked Questions, from www.microsoft.com/technet/security/bulletin/fq99-046.mspx. Laurent Joncheray, Simple Active Attack Against TCP Sequence Number Prediction, from http://www.cert.org/advisories/CA-2001-09.html. Term: S/key, from www.webopedia.com. Attacks against IIS, from http://www.microsoft.eom/technet/prodtechnol/WindowsServer2003/Library/IIS/0al99196-4ae9-41ebb8cl-572251f9f550.mspx?mfr=true. Joe Jenkins, (2000), Internet Security and Your Business - Knowing the Risks, from http://www.securityfocus.com/infocus/1194. Webapplication Attacks - Intro, from www.netprotect.ch/downloads/webguide.pdf. Alexia Tsotsis, (2010), How To Protect Your Login Information From Firesheep, from http://techcrunch.com/2010/10/25/firesheep/. zaproxy, from https://code.google.eom/p/zaproxy/downloads/list. JHijack, from http://sourceforge.net/projects/jhijack/files/latest/download?source=files.

1191. 1192. 1193. 1194.

1195. 1196. 1197. 1198. 1199.

1200 . Hamster, from http://erratasec.blogspot.in/2009/03/hamster-20-and-ferret-20.html. 120 1 . Ferret, from http://erratasec.blogspot.in/2009/03/hamster-20-and-ferret-20.html. 1202 . Surf Jack, from https://code.google.com/p/surfjack/downloads/detail?name=surfjack0.2b.zip.
1203. 1204. 1205. 1206. 1207. 1208. 1209. PerJack, from http://packetstormsecurity.org. Ettercap, from http://sourceforge.net/projects/ettercap/files/latest/download?source=dlp. WhatsUp Gold Engineer's Toolkit, from http://www.whatsupgold.com/products/download/network_management.aspx?k_id=ping-sweep-tool. Hunt, from http://packetstormsecurity.com/files/download/21968/hunt-l.5bin.tgz. Juggernaut, from http://www.securiteam.com. TamperlE, from http://www.bayden.com/TamperlE/. Cookie Cadger, from https://www.cookiecadger.com/?page_id=19.

Module 12: Hacking Webservers

1210 . Web Parameter Tampering, from https://www.owasp.org/index.php/Web_Parameter_Tampering.

References Page 3013

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1 2 1 1 . Web Server Security and Database Server Security, from http://www.itura.net/trainir1g/19-web-serversecurity-and-database-server-security.pdf.

12 12 . Configuring and organizing server security information, from


http://www.freepatentsonline.com/7712137.html. 1213. 1214. 1215. 1216. 1217. 1218. Internet Security, from http://wiki.winf.at/184216 . Securing applications, from http://www.slideshare.net/florinc/application-security-1831714. About Securing Applications, from http://docs.oracle.com/cd/E16348_01/books/SecurHarden/SecurHarden_AppSecur2.html. Insecure Configuration Management, from http://www.upenn.edu/computing/security/swat/SWAT_Top_Ten_A10.php . Server Misconfiguration, from http://pr0jects.webappsec.0rg/w/page/13246959/Server%20Misc0nfigurati0n. Repairing system after following directions in attempt to clean virus, from http://forum.hijackthis.de/archiv/18982-repairing-system-after-following-directions-attempt-cleanvirus.html. Header Manipulation, from http://www.hpenterprisesecurity.com/vulncat/en/vulncat/sql/header_manipulation.html.

1219.

1220 . Cache Poisoning, from https://www.owasp.org/index.php/Cache_Poisoning . 12 2 1 . Improving Web Application Security: Threats and Countermeasures, from
http://msdn.microsoft.com/en-us/library/aa302418.aspx.

1222 . Best Practices for Applying Service Packs, Hotfixes and Security Patches, from
http://technet.microsoft.com/en-us/library/cc750077.aspx . 1223. 1224. 1225. Securing Your Web Server, from http://msdn.microsoft.com/en-us/library/ff648653.aspx . Web Server Security and Database Server Security, from http://www.acunetix.com/websitesecurity/webserver-security. Windows IIS Server hardening checklist, from http://media.techtarget.com/searchSecurity/downloads/Windows_IIS_Server_hardening_checklist.pdf7t rack=LlAP . IIS Web Server Security, from http://www.acunetix.com/websitesecurity/iis-security. WEB SERVER SECURITY AND DATABASE SERVER SECURITY, from http://www.itura.net/training/19-webserver-security-and-database-server-security.html. Checklist: Securing Your Web Server, from http://msdn.microsoft.com/en-us/library/ff648198.aspx . HTTP Response Splitting, Web Cache Poisoning Attacks, and Related Topics, from http://www.ouah.org/whitepaper_httpresponse.pdf. Hacking Web Servers, from http://www.scribd.com/doc/35607686/hacking-Module-ll. Terms used by Microsoft to describe the various software updates released by it, from http://www.thewindowsclub.com/terms-used-by-microsoft-to-describe-the-various-software-updatesreleased-by-it. Patch Management Best Practices, from http://www.oracle.com/technetwork/systems/articles/patchmanagement-jsp-135385.html. Directory Traversal Attacks, from http://www.acunetix.com/websitesecurity/directory-traversal. Jason Chan, (2004), Essentials of Patch Management Policy and Practice, from http://www.patchmanagement.org/pmessentials.asp.

1226. 1227. 1228. 1229. 1230. 1231.

1232. 1233. 1234.

References Page 3014

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1235.

Managing Web Server Security, from www.microsoft.com/technet/prodtechnol/windows2000serv/technologies/iis/maintain/featusability/c0 5iis.mspx. There are basically three overlapping types of risk:, from http://www.rduonline.com/webpolicy.mgi. Frank Kargl, Jorn Maier, Stefan Schlott, Michael Weber, Protecting Web Servers from Distributed Denial of Service Attacks, from http://wwwl0.org/cdrom/papers/409/. TCPflow (Analyzing Tool), from http://www.circlemud.org/. Radu State, (2008), Hacking Web2, http://www.aims-conference.org/issnsm-2008/01-WebHacking.pdf. Jeremiah Grossman, (2010), 10th Website Security Statistics Report, http://www.whitehatsec.com/home/assets/presentations/10PPT/PPT_stats0910.pdf. Reto E. Haeni, (1997), Firewall Penetration Testing, http://bandwidthco.com/whitepapers/netforensics/penetration/Firewall%20Penetration%20Testing.pdf A M Jahangiri, Google Hacking, http://www.alijahangiri.org/publication/Google-Hacking-by-AliJahangiri.pdf. Networking the networks, from http://www.terena.org/activities/tf-csirt/iodef/docs/itaxonomy_terms.ht. Network Computing, from http://www.networkcomputing.com/shared/article/showArticle.jhtml?articleld=8702815&c. Barry Wheelbarger, Apache Security, from http://www.cs.uwf.edu/~wilde/StuPres200301/Apache_Security.ppt. Security issues affecting Apache httpd 2.0.40, from http://www.apacheweek.com/features/securityV2.0.40. Apache Web Server for Windows Lets Remote Users Crash the Web Server Application, from http://www.securitytracker.com/alerts/2001/0ct/1002543.html. The World Wide Web Security FAQ, from http://www.zentek-international.com/mirrors/www-securityfaq/wwwsfl.html. HNS Newsletter, from http://www.net-security.org/dl/newsletter/txt/issue066.txt. Ethel the Blog, from http://stommel.tamu.edu/~baum/ethel/2000_12_03_ethel-archive.html. Survey and Analysis of Available Tools, from http://www.securecoding.org/authors/artides/may202003/section7.php. Information Security Products, from http://www935.ibm.com/services/us/index.wss/offerfamily/iss/a 1029097. Family of Load Balancers, from http://www.redhillnetworks.com/products/webmux/load-balancer.htm. Advanced Defect Tracking Web Edition, from http://www.borderwave.com/. Internet Security and Warfare (ISAW), from http://technews-isaw.blogspot.com/. Experimental Computer System lab, from http://www.ecsl.cs.sunysb.edu/. An Internet Encyclopedia, from http://www.freesoft.org/CIE/Topics/ssl-draft/3-SPEC.HTM. Apache httpd 2.0 vulnerabilities, from http://httpd.apache.org/security/vulnerabilities_20.html. Apache httpd 1.3 vulnerabilities, from http://httpd.apache.org/security/vulnerabilities_13.html. Web Hosting, E-commerce, and Domain Registration..., from http://www.sidetrips.com/. Computers, Networking, and Security, from http://www.cromwell-intl.com/. Tony Bradley, (2006), Secure Internet and Network Security, from http://www.s3kur3.com/.

1236. 1237. 1238. 1239. 1240. 1241.

1242. 1243. 1244. 1245. 1246. 1247. 1248. 1249. 1250. 1251. 1252. 1253. 1254. 1255. 1256. 1257. 1258. 1259. 1260. 1261. 1262.

References Page 3015

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1263. 1264.

Saumil Shah, (2003), One-way Web Hacking, from http://netsquare.com/papers/one_way/one_way.html. (2010), Case Study: Congressional Web Site Defacements Follow the State of the Union, from http://praetorianprefect.eom/archives/2010 /01 /congressional-web-site-defacements-follow-the-stateof-the-union/. Definition: WEB-SITES DEFACEMENT, from http://www.freepatentsonline.com/y2010/0107247.html. Bodvoc, (2010), An Overview of a Web Server, from http://bodvoc.wordpress.com/2010/07/02/anoverview-of-a-web-server/. (2009), IIS 7.0 Architecture, from http://www.gandhipritesh.com/2009/05/iis-70-architecture.html. (2001), Defaced Websites, from http://attrition.org/mirror/attrition/. Robert Auger, Server Misconfiguration, from http://pr0jects.webappsec.0rg/w/page/13246959/Server Misconfiguration. Insecure Configuration Management, from http://www.owasp.org/index.php/lnsecure_Configuration_Management. (2009), hostmap 0.2 - Automatic Hostname & Virtual Hosts Discovery Tool, from http://www.darknet.org.uk/tag/web-server-hacking/. (2009), reDuh - TCP Redirection over HTTP, from http://www.darknet.org.uk/tag/web-server-hacking/. httprecon - Advanced Web Server Fingerprinting http://www.darknet.org.uk/tag/web-server-hacking/. Robert Auger, HTTP Response Splitting http://pr0jects.webappsec.0rg/w/page/13246931/HTTP Response-Splitting. HTTP Response Splitting, from http://www.owasp.org/index.php/HTTP_Response_Splitting. Introduction to HTTP Response Splitting, from http://www.securiteam.com/securityreviews/5WP0E2KFGK.html. Tunneling protocol, from http://en.wikipedia.org/wiki/Tunneling_protocol. Whois, from http://tools.whois.net. Traceroute, from http://whatismyipaddress.com/traceroute-tool. ActiveWhois, from http://www.johnru.com/. Netcraft, from http://searchdns.netcraft.com/7host. httprecon, from http://www.computec.ch/projekte/httprecon/?s=download. ID Serve, from http://www.grc.com. HTTrack Website Copier, from http://www.httrack.c0m/page/2/. WebCopier Pro, from http://www.maximumsoft.com/products/wc_pro/overview.html. BlackWidow, from http://softbytelabs.com/us/downloads.html. Hamster, from http://erratasec.blogspot.in/2009/03/hamster-20-and-ferret-20.html. Firesheep, from http://codebutler.github.io/firesheep/. Brutus, from http://www.hoobie.net/brutus/brutus-download.html. Metasploit, from http://www.metasploit.com/download/. WFetch, from http://d0wnl0ad.micr0s0ft.c0m/d0wnl0ad/d/e/5/de5351d6-4463-4cc3-a27c 3e2274263c43/wfetch.exe (http://www.microsoft.com/downloads/details.aspx?FamilylD=56fc92eea71a-4c73-b628-ade629c89499&DisplayLang=en). Brutus, from http://www.hoobie.net/brutus/brutus-download.html. Internet Password Recovery Toolbox, from http://www.rixler.com/password_recovery_toolbox.htm.

1265. 1266. 1267. 1268. 1269. 1270. 1271. 1272. 1273. 1274. 1275. 1276. 1277. 1278. 1279. 1280. 1281. 1282. 1283. 1284. 1285. 1286. 1287. 1288. 1289. 1290. 1291.

1292. 1293.

References Page 3016

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1294. 1295. 1296. 1297. 1298. 1299. 1300. 1301. 1302. 1303. 1304. 1305. 1306. 1307. 1308. 1309. 1310. 1311. 1312. 1313. 1314. 1315. 1316. 1317. 1318. 1319. 1320. 1321.

Microsoft Baseline Security Analyzer (MBSA), from http://www.microsoft.com/enus/download/details. aspx?id=7558. Altiris Client Management Suite, from http://www.symantec.com/client-management-suite/trialware. Prism Patch Manager, from http://www.newboundary.com/products/prism-patch-manager/trial. MaaS360 Patch Analyzer Tool, from http://www.maas360.com/tools-and-trials/downloads/. Kaseya Security Patch Management, from http://www.kaseya.c0m/features/patch-management.aspx#. Secunia CSI, from http://secunia.com/products/corporate/csi/. ZENworks Patch Management, from http://www.novell.com. Lumension Patch and Remediation, from http://www.lumension.com. Security Manager Plus, from http://www.manageengine.com/products/securitymanager/download, html. VMware vCenter Protect, from http://www.shavlik.com/downloads.aspx. Syhunt Dynamic, from http://www.syhunt.com/?n=Syhunt.Dynamic. N-Stalker Web Application Security Scanner, from http://www.nstalker.com/products/editions/free/. Wikto, from http://www.sensepost.com. Acunetix Web Vulnerability Scanner, from http://www.acunetix.com/vulnerabilityscanner/down load.htm. HackAlert, from http://www.armorize.com/index.php?link_id=register. QualysGuard Malware Detection, from http://www.qualys.com/forms/trials/stopmalware/. Retina CS, from http://www.beyondtrust.com/Landers/TY-Page-RetinaCSCommunity/index.html. Nscan, from http://nscan.hypermart.net. NetlQ Secure ConfigurationManager, from https://www.netiq.com/products/secure-configurationmanager/. SAINT, from http://www.saintcorporation.com/products/software/saintScanner.html. HP Weblnspect, from https://download.hpsmartupdate.com/webinspect/. Arirang, from http://www.monkey.org/~pilot/arirang/. N-Stalker Web Application Security Scanner, from http://www.nstalker.com/products/editions/free/. Infiltrator, from http://www.infiltration-systems.com/download.shtml. WebCruiser, from http://sec4app.com/download.htm. dotDefender, from http://www.applicure.com/Products/. Core Impact Professional, from http://www.coresecurity.com. Immunity CANVAS, from http://www.immunitysec.com/downloads.shtml.

Module 13: Hacking Web Applications 1322. 1323. 1324. 1325. 1326. 1327. Parameter Tampering, from http://www.imperva.com/resources/glossary/parameter_tampering.html. Connection String Injection Attacks, from http://msdn.microsoft.com/en-us/library/ms254947.aspx. A6 2004 Injection Flaws, from https://www.owasp.org/index.php/A6_2004_lnjection_Flaws. Connection String Parameter Pollution Attacks, from http://blackhat.com/presentations/bh-dc10/Alonso_Chema/Blackhat-DC-2010-Alonso-Connection-String-Parameter-Pollution-wp.pdf. Session Prediction, from https://www.owasp.org/index.php?title=Session_Prediction&setlang=en. Buffer Overflow, from http://pr0jects.webappsec.0rg/w/page/13246916/Buffer-0verfl0w.

References Page 3017

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1328. 1329. 1330. 1331. 1332. 1333. 1334. 1335. 1336. 1337. 1338. 1339. 1340. 1341. 1342. 1343. 1344. 1345. 1346. 1347. 1348. 1349. 1350. 1351. 1352. 1353. 1354. 1355.

Managed Application Firewall, from http://www.secureworks.com/resources/articles/other_artides/2010 -waf. Do you write secure code?, from http://www.slideshare.net/yuvalgo/do-you-write-secure-code-by-erezmetula. Web Parameter Tampering, from https://www.owasp.org/index.php/Web_Parameter_Tampering. Path Traversal, from https://www.owasp.org/index.php/Path_traversal. Top 10 2010-A6-Security Misconfiguration, from https://www.owasp.org/index.php/Top_10_2010-A6Security_Misconfiguration. Common Security Mistakes in Web Applications, from http://roobon.net/2011/06/01/common-securitymistakes-in-web-applications. LDAP Injection & BLIND LDAP Injection, from http://www.blackhat.com/presentations/bh-europe08/Alonso-Parada/Whitepaper/bh-eu-08-alonso-parada-WP.pdf. Parameter Manipulation, from http://www.cgisecurity.com/owasp/html/chlls04.html. Cross-site Scripting (XSS), from https://www.owasp.org/index.php/Cross-site_Scripting_(XSS). XSS Filter Evasion Cheat Sheet, from https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet. Cross-Site Request Forgery (CSRF) Attack Lab, from http://www.cis.syr.edu/~wedu/seed/Labs/Attacks_CSRF/CSRF.pdf. Cross-Site Request Forgeries, from http://www.shiflett.org/articles/cross-site-request-forgeries. Webapplication Attack : DOS and DDOS attack, from http://funwhichuwant.blogspot.in/2012 /10 /webapplication-attack-dos-and-ddos.html. Buffer Overflow, from http://pr0jects.webappsec.0rg/w/page/13246916/Buffer%200verfl0w. Cookie Poisoning, from http://www.imperva.com/resources/glossary/cookie_poisoning.html . Wen Application Vulnerabilities, from http://www.slideshare.net/technoplex/web-applicationvulnerabilities . Attacking XML Security Message Oriented Madness, XML Worms and Web Service Security Sanity, from http://www.slideshare.net/yusufmotiwala/attacking-xml-security. Managing Web Services, from http://docs.oracle.com/cd/E19316-01/820-4335/gbbjk/index.html. Web Services Hacking And Hardening, from http://www.slideshare.net/rnewton/web-services-hackingand-hardening. Advanced Web Services Hacking, from http://www.slideshare.net/shreeraj/advanced-web-serviceshacking . Hacking Web 2.0 - Defending Ajax and Web Service, from http://www.slideshare.net/shreeraj/hackingweb-20-defending-ajax-and-web-services-hitb-2007-dubai. All-Purpose Tools, from http://www.securnet.biz/tools.htm. Error executing child request for Chartlmg.axd, from http://social.msdn.microsoft.com/Forums/enUS/MSWinWebChart/thread/115d7f31-e4a8-4c09-b558-4db2cfle83e7. Session Prediction, from https://www.owasp.org/index.php?title=Session_Prediction&setlang=en. Building Connection Strings, from http://msdn.microsoft.com/en-us/library/ms254947(v=vs.80).aspx . DOS ATTACKS USING SQL WILDCARDS, from http://hax.tor.hu/read/MSSQL_DoS/wildcard_attacks.pdf. Understanding Web Services Attacks, from http://www.datacorn.cz/files_datacom/understanding_webservicesattacks_0.pdf. Spheon JSOAP - InterOp: MS SOAP ToolKit 3.0 (typed), from http://soap.fmui.de/interop/interop2OOlMSSOAPToolKitTyped.html.
Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

References Page 3018

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1356. 1357. 1358. 1359.

Web Services Attacks & Countermeasures, from http://www.interop.com/lasvegas/2004/presentations/downloads/sc04_c_sima.pdf. Testing for HTTP Splitting/Smuggling (OWASP-DV-OI6), from https://www.owasp.org/index.php/Testing_for_HTTP_Exploit. Testing for SQL Wildcard Attacks (OWASP-DS-OOl), from https://www.owasp.org/index.php/Testing_for_SQL_Wildcard_Attacks_(OWASP-DS-001) . Testing for DoS User Specified Object Allocation (OWASP-DS-004), from https://www.owasp.org/index.php/Testing_for_DoS_User_Specified_Object_Allocation_(OWASP-DS004). Testing for Storing too Much Data in Session (OWASP-DS-OO8), from https://www.owasp.org/index.php/Testing_for_Storing_too_Much_Data_in_Session_(OWASP-DS-008). Testing for Naughty SOAP Attachments, from http://nilminus.wordpress.com/web-applicationpenetration-testing/web-services-testing/testing-for-naughty-soap-attachments. Testing for AJAX (OWASP-AJ-002), from https://www.owasp.org/index.php?title=Testing_for_AJAX_(OWASP-AJ-002)&setlang=es. Common Web-Based Applications Attacks, Available from http://www.applicure.c0m/C0mm0n_Web_Based_Applicati0ns_Attacks#2._lnjecti0n_Flaws. Bart Puype, WGET for Windows (Win32), version 1.11.4, Available from http://users.ugent.be/~bpuype/wget/. Andres Riancho, Web Application Attack and Audit Framework, Available from http://w3af.sourceforge.net/. Market Leading Protection for Web Applications, Available from http://www.imperva.com/products/web-application-firewall.html. Vulnerability, from http://www.citi.umich.edu/projects/itss/lectures/lecture-20.pdf. DATA IIS Vulnerability, from http://www.ciac.org/ciac/bulletins/k-068.shtml. RPC DCOM Vulnerability, from http://seclists.org/bugtraq/2003/0ct/0151.html. ASN Exploits, from www.itworldcanada.com. [PDF] Introduction to Web Applications and Security, from http://books.mcgrawhill.com/downloads/products//007222438X/007222438X_ch01.pdf. The behaviors and tools of today's hacker, from www.symantec.com/symadvantage/014/hacker.html. Paper - Cross Site Scripting, from www.technicalinfo.net/papers/CSS.html. Host Vulnerability, from http://www.cit.cornell.edu/security/scanning/sample.html. Joseph Seaman, (2003), Web Application Security from www.itsa.ufl.edu/slide_shows/2003/WebAppSec.ppt. Vulnerability Management Commitment and Disclosure Policy, from http://www.symantec.com/security/. Bug Tracking Software Links, from http://www.bug-track.com/main/links.jsp. Mike Benham, (2002), Internet Explorer SSL Vulnerability, from http://www.securiteam.com/windowsntfocus/5JP0E0081M.html. The 21 Primary Classes of Web Application Threats, from www.netcontinuum.com/securityCentral/TopThreatTypes/index.cfm. Paper: HTML Code Injection and Cross-site scripting, from http://www.technicalinfo.net/papers/CSS.html. IS YOUR WEBSITE HACKABLE?, from www.acunetix.com/vulnerability-scanner/wvsbrochure.pdf.

1360. 1361. 1362. 1363. 1364. 1365. 1366. 1367. 1368. 1369. 1370. 1371. 1372. 1373. 1374. 1375. 1376. 1377. 1378. 1379. 1380. 1381.

References Page 3019

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1382. 1383. 1384. 1385. 1386. 1387. 1388. 1389. 1390. 1391. 1392. 1393. 1394. 1395. 1396. 1397. 1398. 1399.

Regular Expressions: curl Simplifies Web Retrieval, from http://www.unixreview.com/documents/s=1820/unil011713175619/0201i.htm. FWSM URL Filtering Solution TCP ACL Bypass Vulnerability, from www.cisco.com. Zero Day Exploits: The Holy Grail, from www.netsecurity.about.com. What is parameter tampering?, from www.imperva.com. AFITC 2001, from www.whitehatsec.com. Toelichting aanvalstechnieken, from www.nedsecure.nl. Cross-Site Scripting, Injection Flaws, OWASP Web Application Security Top Ten List and Buffer Overflow, from www.owasp.org. Hacker Protection from SQL Injection - SPI Dynamics, from www.spidynamics.com. Changing Your Password, How Hackers Get Hold of Passwords, from www.lockdown.co.uk/?pg=password_guide. George Shaffer, Modus Operandi of an Attacker Using a Password Cracker, from http://geodsoft.com/howto/password/cracking_passwords.htm. Robert J. Shimonski, (2002), Hacking techniques, from www.ibm.com/developerworks/library/s-crack. Mark Curphey, Query String, from www.cgisecurity.com/owasp/html/chlls04.html. Edward Skoudis, Authforce, from (2005), http://searchsecurity.techtarget.com/searchSecurity/downloads/Skoudis_ch07.pdf. Sarah Granger, (2002), A Guide To Better Password Practices, from www.securityfocus.com/infocus/1537. Bad Password Examples, from http://www.spy-hill.com/~myers/help/Passwords.html. Microsoft Password Checker, from http://www.microsoft.com/athome/security/privacy/password_checker.mspx. Mehdi Mousavi, What an ISAPI extension is?, from http://www.codeproject.com/KB/ISAPI/isapi_extensions.aspx. Maximum Security -Chapter 10 - Password Crackers, from http://www.windowsecurity.com/whitepapers/Maximum_Security__Chapter_10__Password_Crackers_. html. Patch improves the TCP Initial Sequence Number Randomness, from http://www.securiteam.com/windowsntfocus/3V5QBQKPPU.html. Mark Russinovich, (2008), TCP View for Windows, from http://technet.microsoft.com/hiin/sysinternals/bb897437(en-us).aspx. Admin Knowledge Base section, from http://www.windowsnetworking.com/kbase/WindowsTips/WindowsTips/WindowsNT/AdminTips/Utiliti es/TCPViewe. Web Application Security, from http://www.securityfocus.com/archive/107/223386/2001-10-28/20011102/0. Nikola Strahija, (2002), Introduction to password cracking, from http://www.xatrix.org/article.php?s=1758. Password cracking, http://www-128.ibm.com/developerworks/security/library/scrack/password_cracking.html. Password cracker, from http://searchfinancialsecurity.techtarget.com/sDefinition/0sidl85_gci536994,00.html.

1400. 1401. 1402.

1403. 1404. 1405. 1406.

References Page 3020

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1407. 1408. 1409. 1410. 1411. 1412. 1413. 1414. 1415. 1416. 1417. 1418. 1419. 1420. 1421. 1422. 1423. 1424.

David P. Kormann and Aviel D. Rubin, Risks of the Passport Single Signon Protocol, from http://www.cs.jhu.edu/~rubin/courses/sp03/papers/passport.pdf. Abel Banda, (2003), ASP.NET Forms Authentication, from http://www.ondotnet.eom/pub/a/dotnet/2003/01/06/formsauthpl.html. Erika, (2006), Microsoft Security Bulletin MS02-048, from http://www.microsoft.com/technet/security/Bulletin/MS02-048.mspx. Jeff Williams, (2006), Cross-Site Scripting, Injection Flaws, OWASP Web Application Security Top Ten List and Buffer Overflow, from http://www.owasp.org/. Sarah Granger, (2002), A Guide To Better Password Practices, from http://www.securityfocus.com/infocus/1537. Gaining Access Using Application and Operating System Attacks, from http://searchsecurity.techtarget.com/searchSecurity/downloads/Skoudis_ch07.pdf. Rob Shimonski, (2002), Hacking techniques, from http://www-128.ibm.com/developerworks/library/scrack/. Password Guidelines, from http://www.lockdown.co.uk/?pg=password_guide. Biometric Education: Fingerprint, from http://www.barcode.ro/tutorials/biometrics/fingerprint.html. Kimon Rethis, (2006), Biometrics Authentication, from http://www.csun.edu/. IPSec Authentication and Authorization Models, from http://www.ciscopress.com/articles/article.asp?p=421514&seqNum=4%20-%2031k%20-&rl=l. Digital Certificates, from http://www.bitpipe.com/tlist/Digital-Certificates.html. John, HTTP Authentication: Basic and Digest Access Authentication, from htt p://www.ietf.0rg/rfc/rfc2617. txt. Authentication, Authorization, and Access Control, from http://httpd.apache.org/docs/. Functions and Procedures: Basic Authentication, from http://www.zeitungsjunge.de/delphi/mime/Help/DIMime.htm. The Cross-Site Scripting (XSS) FAQ, from http://www.cgisecurity.com/xss-faq.html. Input Validation Cheat Sheet, from http://michaeldaw.org/input_validation_cheat_sheet. Quick Security Reference - Cross-Site Scripting.docx, from http://download.microsoft.eom/download/E/E/7/EE7B9CF4-6A59-4832-8EDE B018175F4610/Quick%20Security%20Reference%20-%20Cross-Site%20Scripting.docx. Web Application Penetration Testing, from http://www.owasp.org/index.php/Web_Application_Penetration_Testing. Jeff Orloff, The Big Website Guide to a Hacking Attack, from http://www.applicure.com/blog/bigwebsite-guide-to-a-hacking-attack. What is Cross-Site Scripting (XSS)?, from http://www.applicure.com/blog/what-is-cross-site-scripting. LDAP Filters, from http://www.selfadsi.org/ldap-filter.htm. Paul Lee, (2002), Cross-site scripting, from http://www.ibm.com/developerworks/tivoli/library/scsscript/. XSS (Cross Site Scripting) Prevention Cheat Sheet, from http://www.owasp.org/index.php/XSS_%28Cross_Site_Scripting%29_Prevention_Cheat_Sheet. Amit Klein, (2005), DOM Based Cross Site Scripting or XSS of the Third Kind, from http://www.webappsec.org/projects/articles/071105.shtml. Samoa: Formal Tools for Securing Web Services, from http://research.microsoft.com/en us/projects/samoa/.

1425. 1426. 1427. 1428. 1429. 1430. 1431. 1432.

References Page 3021

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1433. 1434. 1435. 1436.

RSnake"XSS (Cross Site Scripting) Cheat Sheet Esp: for filter evasion", from http://ha.ckers.org/xss.html. Microsoft's Anti-Cross Site Scripting Security Runtime Engine Sample -AntiXSS 3.1, from http://davidhayden.com/blog/dave/archive/2009/09/22/antixsssample.aspx. Philip Tellis, (2010), Common Security Mistakes in Web Applications, from http://www.smashingmagazine.com/2010/10/18/common-security-mistakes-in-web-applications/. J.D. Meier, Alex Mackman, Michael Dunner, Srinath Vasireddy, Ray Escamilla and Anandha Murukan, (2003), Improving Web Application Security: Threats and Countermeasures, from http://msdn.microsoft.com/en-us/library/ff649874.aspx. Alex Homer, Components and Web Application Architecture, from http://technet.microsoft.com/enus/library/bb727121.aspx. Ryan Barnett, (2011), Web-Hacking-lncident-Database, from http://projects.webappsec.org/WebHacking-lncident-Database#TopApplication Weaknesses. (2009), Path Traversal, from http://www.owasp.org/index.php/Path_Traversal. (2010), Web Parameter Tampering, from http://www.owasp.org/index.php/Web_Parameter_Tampering. Unvalidated Input, from http://www.0wasp.0rg/index.php/Unvalidated_lnput#Exarnples_and_References. Kevin Beaver, The importance of input validation, from http://searchsoftwarequality.techtarget.com/tip/0,289483,sid92_gcil214373_meml,00.html. (2010), Validating Input, from http://developer.apple.eom/library/ios/#documentation/Security/Conceptual/SecureCodingGuide/Articl es/Validatinglnput.html. Seth Fogie, (2006), Code Injection Explained, from http://www.informit.com/guides/content.aspx?g=security&seqNum=226. Code injection, from http://en.wikipedia.org/wiki/Code_injection. Injection Prevention Cheat Sheet, from http://www.owasp.org/index.php/lnjection_Prevention_Cheat_Sheet. Remote file inclusion, from http://en.wikipedia.org/wiki/Remote_file_inclusion. Robert Auger, (2011), LDAP Injection, from http://projects.webappsec.org/LDAP-lnjection. Testing for LDAP Injection (OWASP-DV-006), from http://www.owasp.org/index.php/Testing_for_LDAP_lnjection_%280WASP-DV-006%29. Shreeraj Shah, (2006), Top 10 Web 2.0 Attack Vectors, from http://www.netsecurity.org/article. php?id=949. Robert Auger, (2010), Threat Classification, from http://projects.webappsec.org/Threat-Classification. (2006), Preventing HTML form tampering, from http://advosys.ca/papers/web/60-form-tampering.html. (2010), Cross-site Scripting (XSS), from http://www.owasp.org/index.php/Cross$ite_Scripting_%28XSS%29. Paul Lee, Cross-site scripting, from http://www.ibm.com/developerworks/tivoli/library/s-csscript/. Cross-site scripting, from http://en.wikipedia.org/wiki/Cross-site_scripting. DOM Based XSS, from http://www.owasp.org/index.php/DOM_Based_XSS. Phil Haack, (2009), CSRF Attacks and Web Forms, from http://haacked.com/archive/2009/04/02/csrfwebforms.aspx. Chris Shiflettk, (2004), Cross-Site Request Forgeries, from http://shiflett.org/articles/cross-site-requestforgeries.

1437. 1438. 1439. 1440. 1441. 1442. 1443.

1444. 1445. 1446. 1447. 1448. 1449. 1450. 1451. 1452. 1453. 1454. 1455. 1456. 1457. 1458.

References Page 3022

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1459. 1460. 1461. 1462. 1463. 1464. 1465. 1466. 1467. 1468. 1469. 1470. 1471. 1472. 1473. 1474. 1475. 1476. 1477. 1478. 1479. 1480. 1481. 1482. 1483. 1484. 1485. 1486. 1487. 1488. 1489. 1490. 1491. 1492.

Robert Auger, (2010), The Cross-Site Request Forgery (CSRF/XSRF) FAQ, from http://www.cgisecurity.com/csrf-faq.html. Application Denial of Service, from http://www.owasp.org/index.php/Application_Denial_of_Service. Cookie Poisoning, from http://www.imperva.com/resources/glossary/cookie_poisoning.html. Cookie Poisoning howto, from http://forum.intern0t.net/security-tutorials-guides/2270-cookiepoisoning-how.html. Broken Authentication and Session Management, from http://www.owasp.org/index.php/Broken_Authentication_and_Session_Management. Robert Auger, (2010), Buffer Overflow, from http://pr0jects.webappsec.0rg/w/page/13246916/Buffer Overflow. (2009), Buffer Overflow, from http://www.owasp.org/index.php/Buffer_Overflow. Free XML tools and software, from http://www.garshol.priv.no/download/xmltools/. SYS-CON tv, (2005), Anatomy of a Web Services Attack, from http://education.sys-con.com/node/80899. Robert Auger, (2010), Brute Force, from http://pr0jects.webappsec.0rg/w/page/13246915/Brute-F0rce. Ian de Villiers, sensepost j-baah, from http://www.sensepost.com/labs/tools/pentest/j-baah. (2009), Session Prediction, from http://www.owasp.org/index.php/Session_Prediction. Robert Auger, (2010), XPath Injection, from http://projects.webappsec.0rg/w/page/13247005/XPath Injection. (2009), XPATH Injection, from http://www.owasp.org/index.php/XPATH_lnjection. SmartWhois, from http://www.tamos.com/download/main/index.php. Netcraft, from http://searchdns.netcraft.com/7host. Whois, from http://tools.whois.net. DNSstuff, from http://www.dnsstuff.com. dnsstuff, from http://www.dnsstuff.com/. network-tools, from http://network-tools.com/. DNS, from http://e-dns.org. DomainTools, from http://www.domaintools.com. WhatsUp PortScanner Tool, from http://www.whatsupgold.com/products/download/network_management.aspx?k_id=portscan. hping, from http://www.hping.org/download.php. Sandcat Browser, from http://www.syhunt.com/?n=Sandcat.Browser. Netcat, from http://sourceforge.net/projects/netcat/files/latest/download?source=files. ID Serve, from http://www.grc.com. Netcraft, from http://toolbar.netcraft.com. OWASP Zed Attack Proxy, from https://code.google.com/p/zaproxy/downloads/detail?name=ZAP_2.0.0_Windows.exe&can=2&q=. Burp Spider, from http://blog.portswigger.net/2008/ll/mobp-all-new-burp-spider.html. WebScarab, from https://www.0wasp.0rg/index.php/Categ0ry:0 WASP_WebScarab_Pr0ject. Burp Suite, from http://blog.portswigger.net/2008/ll/mobp-all-new-burp-spider.html. Brutus, from http://www.hoobie.net/brutus/brutus-download.html. Sensepost's Crowbar, from http://research.sensepost.com/tools/web/j-baah.

References Page 3023

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1493. 1494. 1495. 1496. 1497. 1498. 1499. 1500. 1501. 1502. 1503. 1504. 1505. 1506. 1507. 1508. 1509. 1510. 1511. 1512. 1513. 1514. 1515. 1516. 1517. 1518. 1519. 1520. 1521. 1522. 1523. 1524.

UrIScan, from http://www.microsoft.com/web/gallery/install.aspx?appsxml=&appid=UrlScan%3bUrlScan. Nikto, from http://www.cirt.net/nikt02. Nessus, from http://www.tenable.com/products/nessus/select-your-operating-system. Acunetix Web Vulnerability Scanner, from http://www.acunetix.com/vulnerabilityscanner/download.htm. Weblnspect, from https://download.hpsmartupdate.com/webinspect/. HttPrint, from http://net-square.com/httprint.html. WebScarab, from https://www.0wasp.0rg/index.php/Categ0ry:0 WASP_WebScarab_Pr0ject, GNU Wget, from ftp://ftp.gnu.org/gnu/wget/. Teleport Pro, from http://www.tenmax.com/teleport/pro/download.htm. BlackWidow, from http://softbytelabs.com/us/downloads.html. Brutus, from http://www.hoobie.net/brutus/brutus-download.html. THC-Hydra, from http://www.thc.org/thc-hydra/. soapUI, from http://www.soapui.org/. CookieDigger, from http://www.mcafee.com/apps/free-tools/termsofuse.aspx7urh/us/downloads/freetools/cookiedigger.aspx. WebScarab, from https://www.0wasp.0rg/index.php/Categ0ry:0 WASP_WebScarab_Pr0ject. Instant Source, from http://www.blazingtools.eom/downloads.html#is. HttpBee, from http://www.o0o.nu/projects/stif. w3af, from http://w3af.sourceforge.net. Teleport Pro, from http://www.tenmax.com/teleport/pro/download.htm. GNU Wget, from ftp://ftp.gnu.org/gnu/wget/. WebCopier Pro, from http://www.maximumsoft.com/products/wc_pro/overview.html. HTTrack Website Copier, from http://www.httrack.c0m/page/2/. BlackWidow, from http://softbytelabs.com/us/downloads.html. cURL, from http://curl.haxx.se/download.html. MileSCAN ParosPro, from http://www.milescan.com/hk/index.php?option=com_content&view=article&id=15&ltemid=157. Acunetix Web Vulnerability Scanner, from http://www.acunetix.com/vulnerabilityscanner/download.htm. Watcher Web Security Tool, from http://websecuritytool.codeplex.com/downloads/get/62386. Netsparker, from http://www.mavitunasecurity.com/. N-Stalker Web Application Security Scanner, from http://www.nstalker.com/products/editions/free/. VampireScan, from http://www.vampiretech.com/store/?product=vampirescan-doud-securitystandardedition. SandcatMini, from http://www.syhunt.com/?n=Syhunt.Mini. Websecurify, from https://code.google.com/p/websecurify/downloads/detail?name=Websecurify%20Suite%201.0.0.exe&c an=2 &q=. OWASP ZAP, from https://code.google. com/p/zaproxy/downloads/detail?name=ZAP_2.0.0_Windows.exe&can=2&q=.

1525.

References Page 3024

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1526. 1527. 1528. 1529. 1530. 1531. 1532. 1533. 1534. 1535.

NetBrute, from http://www.rawlogic.com/netbrute/. skipfish, from https://c0de.g00gle.c0m/p/skipfish/. X5s, from http://xss.codeplex.com/downloads/get/115610. SecuBat Vulnerability Scanner, from http://secubat.codeplex.com/. WSSA -Web Site Security Scanning Service, from https://secure.beyondsecurity.com/vulnerabilityscanner-signup?step=l. SPIKE Proxy, from http://www.immunitysec.com/resources-freesoftware.shtml. Ratproxy, from https://c0de.g00gle.c0 m/p/ratpr0xy/. Wapiti, from http://wapiti.sourceforge.net/. Syhunt Hybrid, from http://www.syhunt.com/?n=Syhunt.Dynamic. WebWatchBot, from http://www.exclamationsoft.com/ExclamationSoft/download/instructions/html.asp?product=WebWatc hBot&fe=no. Exploit-Me, from http://labs.securitycompass.com/exploit-me/. KeepNI, from http://www.keepni.com/. WSDigger, from http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/freetools/wsdigger.aspx. Arachni, from http://arachni-scanner.com/latest. XSSS, from http://www.sven.de/xsss/. Vega, from http://www.subgraph.com/vega_download.php. dotDefender, from http://www.applicure.com/Products/. ServerDefender VP, from http://www.port80software.com/products/serverdefendervp/try. Radware's AppWall, from http://www.radware.com/Products/ApplicationDelivery/AppWall/default.aspx. Barracuda Web Application Firewall, from https://www.barracuda.com/products/webapplicationfirewall. ThreatSentry, from http://www.privacyware.com/TS_Registration.html. Stingray Application Firewall, from . QualysGuard WAF, from http://www.qualys.com/forms/web-application-firewall/. IBM Security AppScan, from http://www-01.ibm.com/software/awdtools/appscan/. ThreatRadar, from http://www.imperva.com/products/wsc_threatradar-reputation-services.html. Trustwave WebDefend, from https://www.trustwave.c0m/web-applicati0n-firewall/#0verview. ModSecurity, from http://www.modsecurity.org/download/. Cyberoam's Web Application Firewall, from http://www.cyberoam.com/webapplicationfirewall.html. Burp Proxy, from http://blog.portswigger.net/2008/ll/mobp-all-new-burp-spider.html. WebScarab, from https://www.0wasp.0rg/index.php/Categ0ry:0WASP_WebScarab_Pr0ject. TamperlE, from http://www.bayden.com/tamperie/. Tamper Data, from https://addons.mozilla.org/en-US/firefox/addon/tamper-data/eula/79565?src=dpbtn-primary. Amap, from http://www.thc.org/thc-amap/. Netcat, from http://sourceforge.net/projects/netcat/files/latest/download?source=files.

1536. 1537. 1538. 1539. 1540. 1541. 1542. 1543. 1544. 1545. 1546. 1547. 1548. 1549. 1550. 1551. 1552. 1553. 1554. 1555. 1556. 1557. 1558. 1559.

References Page 3025

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1560. 1561. 1562. 1563. 1564. 1565. 1566. 1567. 1568. 1569. 1570. 1571. 1572. 1573. 1574. 1575. 1576. 1577. 1578. 1579. 1580. 1581. 1582. 1583. 1584.

OWASP CAL9000, from https://www.0wasp.0rg/index.php/Categ0ry:0 WASP_D0wnl0ad. Hackvertor, from https://hackvertor.co.uk/public. BeEF, from http://beefproject.com/. XSS-Proxy, from http://sourceforge.net/projects/xss-proxy/files/latest/download. Backframe, from http://www.gnucitizen.org/blog/backframe/. XSS Assistant, from https://c0de.g00gle.c0m/p/xss-assistant/. SWFIntruder, from https://code.google.com/p/swfintruder/downloads/detail?name=swfintruder0.9.1.tgz&can=2&q=. Flare, from http://www.nowrap.de/flare.html. MTASC, from http://www.mtasc.org/. Flasm, from http://flasm.sourceforge.net/. swfmill, from http://swfmill.org/. Debugger Version of Flash Plugin/Player, from http://www.adobe.eom/support/flashplayer/downloads.html#fpll. SQLiX, from https://www.0wasp.0rg/index.php/Categ0ry:0 WASP_SQLiX_Pr0ject. sqlninja, from http://sqlninja.sourceforge.net/download.html. SqlDumper, from http://sqldumper.ruizata.com/. sqlbftools, from http://packetst0rmsecurity.c0 m/files/d0wnl0ad/43795/sqlbft00ls-l.2 .tar.gz. Softerra LDAP Browser, from http://www.ldapadministrator.com/download.htm. Hibernate, from http://www.hibernate.org/downloads. NHibernate, from http://nhforge.org/. Ruby On Rails, from http://rubyinstaller.org/downloads. String searcher: grep, from http://sourceforge.net/projects/gnuwin32/files/grep/2.5.4/grep-2.5.4bin.zip/download?use_mirror=nchc. wsChess, from http://www.net-square.com/wschess.html. Soaplite, from http://soaplite.com/download.html. cURL, from http://curl.haxx.se/download.html. Perl, from http://www.activestate.com/activeperl/downloads/thankyou?dl=http://downloads.activestate.com/ActivePerl/releases/5.16.3.1603/ActivePerl-5.16.3.1603MSWin32-x64-296746.msi. UDDI Browser, from http://sourceforge.net/projects/uddibrowser/files/uddibrowser/UDDI%20Browser%200.2%20Binaries/u b-0.2-bin. zip/download?use_mirror=nchc&download=. WSIndex, from http://www.wsindex.org/. Xmethods, from http://www.xmethods.net/ve2/index.po. WSDigger, from http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/freetools/wsdigger.aspx. Sprajax, from https://www.0wasp.0 rg/index.php/Categ0ry:0 WASP_Sprajax_Pr0ject.

1585.

1586. 1587. 1588. 1589.

Module 14: SQL Injection 1590. 1591. Advanced SQL Injection, from http://www.slideshare.net/Sandra4211/advanced-sql-injection-3958094. Advanced SQL Injection, from http://www.slideshare.net/devteev/advanced-sql-injection-eng.

References Page 3026

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1592. 1593. 1594. 1595. 1596. 1597. 1598. 1599. 1600. 1601. 1602. 1603. 1604. 1605. 1606. 1607. 1608. 1609. 1610. 1611. 1612. 1613. 1614. 1615.

SQL injection, from http://searchsqlserver.techtarget.com/feature/SQL-injection. SQL Injection, from http://hakipedia.com/index.php/SQL_lnjection. ERROR SQL INJECTION - DETECTION, from http://www.evilsql.com/main/page2.php. What is SQL Injection?, from http://www.secpoint.com/what-is-sql-injection.html. Securing Oracle Database from Search Engines Attack, from http://www.ijana.in/papers/V4l2-l.pdf. Stop SQL Injection Attacks Before They Stop You, from http://msdn.microsoft.com/enus/magazine/ccl63917.aspx . Rise in SQL Injection Attacks Exploiting Unverified User Data Input, from http://technet.microsoft.com/en-us/security/advisory/954462 . Injection Protection, from http://msdn.microsoft.com/en-us/library/aa224806(v=sql.80).aspx . Understanding SQL Injection, from http://www.cisco.com/web/about/security/intelligence/sql_injection.html. SQL INJECTION - Tutorial, from http://elitezone.forumotion.bz/t77-sql-injection-tutorial. System testing, from http://en.wikipedia.org/wiki/System_testing. Testing for SQL Injection (OWASP-DV-005), from https://www.owasp.org/index.php/Testing_for_SQL_lnjection_(OWASP-DV-005). SQL Injection Cheat Sheet, from http://ferruh.mavituna.com/sql-injection-cheatsheet-oku/. SQL Injection Introduction, from http://www.controllingtheinter.net/forums/viewtopic.php?f=45&t=8. Classification of SQL Injection Attacks, from http://courses.ece.ubc.ca/412/term_project/reports/2007fall/Classification_of_SQL_lnjection_Attacks.pdf. CHAPTER 1: INTRODUCTION, from http://isea.nitk.ac.in/publications/web.pdf. Dmitry Evteev, (2009), Advanced SQL Injection, from http://www.ptsecurity.com/download/PT-devteevAdvanced-SQL-lnjection-ENG.zip. Krzysztof Kotowicz, (2010), SQL Injection: Complete walkthrough (not only) for PHP developers, from http://www.slideshare.net/kkotowicz/sql-injection-complete-walktrough-not-only-for-php-developers. Nick Merritt, SQL Injection Attacks, from http://www.evilsql.com/main/pagel.php. SQL Injection Cheat Sheet, from http://michaeldaw.org/sql-injection-cheat-sheet. Sagar Joshi, 2005, SQL Injection Attack and Defence, Available from http://www.securitydocs.com/library/3587. Kevin Spett, Blind SQL Injection-Are your web applications vulnerable?, from http://www.netsecurity.org/dl/articles/Blind_SQLInjection.pdf. Cameron Hotchkies, (2004), Blind SQL Injection Automation Techniques from http://www.blackhat.com/presentations/bh-usa-04/bh-us-04-hotchkies/bh-us-04-hotchkies.pdf. San-Tsai Sun, Ting Han Wei, Stephen Liu, and Sheung Lau, Classification of SQL Injection Attacks, from http://courses.ece.ubc.ca/412/term_project/reports/2007fall/Classification_of_SQL_lnjection_Attacks.pdf. SQL Injection, from http://msdn.microsoft.com/en-us/library/msl61953.aspx. SQL INJECTION, from http://www.authorstream.com/Presentation/useful-155975-sql-injection-hackingcomputers-22237-education-ppt-powerpoint/. SQL Injection Cheat Sheet, from http://ferruh.mavituna.com/sql-injection-cheatsheetoku/#Unionlnjections. SQL Injection, from http://hakipedia.com/index.php/SQL_lnjection.

1616. 1617. 1618. 1619.

References Page 3027

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1620.

K. K. Mookhey and Nilesh Burghate, (2004), Detection of SQL Injection and Cross-site Scripting Attacks, from http://www.symantec.com/connect/articles/detection-sql-injection-and-cross-site-scriptingattacks. Ferruh Mavituna, Deep Blind SQL Injection, from http://docs.google. com/viewer?a=v&q=cache:uvo9RU3T0v8J :labs, portcullis. co.uk/download/Deep_Blin d_SQL_lnjection.pdf+deep+blind+sql+injection&hl=en&gl=in&pid=bl&srcid=ADGEESgQ9uwlz-eJFMk3zGP5NJQmHXmfP7UIWOSNTBIOhAV9h2pUWIvibONoFpuOMndYi_3YKOxT9sizjU2ljvSzVi4w4Xc_rDMKVFNSzpj60kXYsYwUQ480EW9IV-OijwWFwYnOJW&sig=AHIEtbT5rxBYONIb02-gShdro-oVnzYeA. Debasish Das, Utpal Sharma, and D.K. Bhattacharyya, (2009), An Approach to Detection of SQL Injection Attack Based on Dynamic Query Matching from http://www.ijcaonline.org/journal/number25/pxc387766.pdf. (2010), Quick Security Reference: SQL Injection from http://download.microsoft.eom/download/E/E/7/EE7B9CF4-6A59-4832-8EDE B018175F4610/Quick%20Security%20Reference%20-%20SQL%20lnjection.docx. Ferruh Mavituna, One Click Ownage,Adventures of a lazy pentester, from http://www.0wasp.0rg/images/8/8e/0 ne_Click_0 wnage-Ferruh_Mavituna.pdf. Alexander Kornbrust, (2009), ODTUG -SQL Injection Crash Course for Oracle Developers from http://www.red-database-security.com/wp/00w2009_sql_crashcourse_for_developers.pdf. Pankaj Sharma,(2005), SQL Injection Techniques & Countermeasures from http://www.certin.org.in/Downloader?pageid=7&type=2&fileName=ciwp-2005-06.pdf. Pankaj Sharma, (2005), SQL Injection Techniques & Countermeasures, from http://docs.google.com/viewer?a=v&q=cache:OKkPI9hllR8J:www.certin.org.in/knowledgebase/whitepapers/ciwp-200506.pdf+sql+injection+countermeasures&hl=en&gl=in&pid=bl&srcid=ADGEESjfo76m84G_nbZgOQax9yl5HEXkM9ZSyLNa0_kJfDD4v4PLvO41fByd3YJk3GcTKoczBFU2WiNWNMK13Tc28CJ4WcO2bHXqldlWzR0GGmHSRmT39qkpqM2yhKpmfkQNCe80g&sig=AHIEtbR4WivS8bCzwK13BkKQXXHIepLWq w. William G.J. Halfond, Jeremy Viegas, & Alessandro Orso, (2006), A Classification of SQL Injection Attack Techniques and Countermeasures, from http://www.cc.gatech.edu/~orso/papers/halfond.viegas.orso. ISSSE06.presentation.pdf. Code Injection, Available from http://www.owasp.org/index.php/Code_lnjection. Understanding SQL Injection, Available from http://www.cisco.com/web/about/security/intelligence/sql_injection.html. VIVEK KUMBHAR, (2009), From Mind To Words, http://blogs.msdn.com/vivekkum/default.aspx. Reviewing Code for SQL Injection, Available from http://www.owasp.org/index.php/Reviewing_Code_for_SQL_lnjection. Cross Site Scripting - OWASP, from www.owasp.org/index.php/Cross_Site_Scripting. Injection Flaws -OWASP, from www.owasp.org/index.php/lnjection_Flaws. Application Security Guidelines on Kavi Community, from http://community.kavi.com/developers/security_standards/. J. Howard Beales, III, (2003), OWASP Web Application Security Top Ten List, from www.owasp.org/images/c/ce/OWASP_Top_Ten_2004.doc. Web Attacks -Cookie poisoning, from www.lodoga.co.uk/attackinfo/thethreat/examples/cook.htm. Victor Chapela,(2005), Advanced SQL Injection, from http://www.0wasp.0rg/images/7/74/Advanced_SQL_lnjecti0n.ppt.
Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

1621.

1622.

1623.

1624. 1625. 1626. 1627.

1628.

1629. 1630. 1631. 1632. 1633. 1634. 1635. 1636. 1637. 1638.

References Page 3028

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1639. 1640. 1641. 1642. 1643. 1644. 1645. 1646. 1647. 1648. 1649. 1650. 1651. 1652. 1653. 1654. 1655. 1656. 1657. 1658. 1659. 1660. 1661. 1662. 1663. 1664. 1665. 1666. 1667. 1668. 1669. 1670. 1671. 1672. 1673.

Chema Alonso, (2008), RFD (Remote File Downloading) using Blind SQL Injection Techniques, from http://www.toorcon.org/tcx/16_Alonso.pdf. [PPT] AFITC 2001, from www.whitehatsec.com/presentations/AFITC_2001/afitc_2001.ppt. What is parameter tampering?, from www.imperva.com/application_defense_center/glossary/parameter_tampering.html. D.E. Chadbourne, Post office break in..., from http://olduvai.blu.org/pipermail/discuss/2004January/043138.htm. Blind SQL Injection, from http://www.securitydocs.com/library/2651. Jrubner, (2006), 'SQL injection' attacks on the rise in Atlanta, from http://www.bizjournals.com/atlanta/stories/2006/06/12/story8.html. BSQLHacker, from http://labs.portcullis.co.uk/application/bsql-hacker/. Marathon Tool, from http://marathontool.codeplex.com. SQL Power Injector, from http://www.sqlpowerinjector.com/download.htm. Havij, from http://www.itsecteam.com. SQL Brute, from http://www.gdssecurity.c0m/l/t.php. BobCat, from http://www.northern-monkee.co.uk/pub/bobcat.html. Sqlninja, from http://sqlninja.sourceforge.net/download.html. sqlget, from http://www.darknet.org.uk/2007/07/sqlget-vl00-blind-sql-injection-tool-in-perl/. Absinthe, from http://www.darknet.org.uk/2006/07/absinthe-blind-sql-injection-toolsoftware/. Blind Sql Injection Brute Forcer, from http://c0de.g00gle.c0m/p/bsqlbf-v2/. sqlmap, from http://sqlmap.org/. SQL Injection Digger, from http://sqid.rubyforge.org. Pangolin, from http://nosec.org/en/evaluate/. SQLPAT, from http://www.cqure.net/wp/tools/password-recovery/sqlpat/. FJ-lnjector Framework, from http://sourceforge.net/projects/injection-fwk/. Exploiter (beta), from http://www.ibm.com/developerworks/rational/downloads/08/appscan_exploiter/. SQLIer, from http://bcable.net/project.php7sqlier. sqlsus, from http://sqlsus.sourceforge.net. SQLEXEC() Function, from http://msdn.microsoft.com/en-us/library/lx933c7s(v=vs.80).aspx. Sqllnjector, from http://www.woanware.co.uk/?page_id=19. Automagic SQL Injector, from http://www.securiteam.com/tools/6P00L0AEKQ.html. SQL Inject-Me, from http://labs.securitycompass.com/exploit-me/sql-inject-me/. NTO SQL Invader, from http://www.ntobjectives.com/go/nto-sql-invader-free-download/. The Mole, from http://themole.nasel.com.ar/?q=downloads. Microsoft Source Code Analyzer, from http://www.microsoft.com/enus/download/details.aspx?id=16305. Microsoft UrIScan Filter, from http://www.microsoft.com/en-in/download/details.aspx?id=5728. dotDefender, from http://www.applicure.com/download-latest. IBM Security AppScan, from http://www.ibm.eom/developerworks/downloads/r/appscan/. WebCruiser, from http://sec4app.com/.

References Page 3029

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1674. 1675. 1676. 1677. 1678. 1679. 1680. 1681. 1682. 1683.

HP Weblnspect, from http://www.hpenterprisesecurity.com/products/hp-fortify-software-securitycenter/hp-webinspect. SQLDict, from http://ntsecurity.nu/toolbox/sqldict/. HP Scrawlr, from https://h30406.www3.hp.com/campaigns/2008/wwcampaign/l-57C4K/index.php. SQL Block Monitor, from http://sql-tools.net/blockmonitor/. Acunetix Web Vulnerability Scanner, from http://www.acunetix.com/vulnerability-scanner/. GreenSQL Database Security, from http://www.greensql.com/content/greensql-databasesecurity#&sliderl=l. Microsoft Code Analysis Tool .NET (CAT.NET), from http://www.microsoft.com/enus/download/details.aspx?id=5570. NGS SQuirreL Vulnerability Scanners, from http://www.nccgroup.com/en/our-services/security-testingaudit-compliance/information-security-software/ngs-squirrel-vulnerability-scanners/. WSSA -Web Site Security Scanning Service, from http://www.beyondsecurity.com/sql-injection.html. N-Stalker Web Application Security Scanner, from http://www.nstalker.com/products/editions/free/.

Module 15: Hacking Wireless Networks 1684. 1685. 1686. 1687. 1688. 1689. 1690. 1691. 1692. 1693. 1694. 1695. 1696. The ABCs of IEEE 802.11, from http://home.comcast.net/~timgroth/abc.htm. Wi-Fi Hotspot Networks Sprout Like Mushrooms, from http://spectrum.ieee.org/telecom/wireless/wifihotspot-networks-sprout-like-mushrooms/abc. A list of wireless network attacks, from http://searchsecurity.techtarget.com/feature/A-list-of-wirelessnetwork-attacks. Rogue Access Point Setups on Corporate Networks, from http://www.infosecuritymagazine.com/view/10516/comment-rogue-access-point-setups-on-corporate-networks-/ Advanced SQL Injection, from http://blog.pages.kr/1341. Identifying Rogue Access Points, from http://www.wi-fiplanet.com/tutorials/article.php/1564431. Bluetooth Security Risks and Tips to Prevent Security Threats, from http://www.brighthub.com/computing/smb-security/articles/30045.aspx. Cisco Unified Wireless Network ArchitectureBase Security Features, from http://www.cisco.com/en/US/docs/solutions/Enterprise/Mobility/emob41dg/ch4_Secu.html. Tutorial: My Plate is Compatible?, from http://www.aircrack-ng.org/doku.php?id=ptbr:compatible_cards. Wireless Networking Security, from http://technet.microsoft.com/en-us/library/bb457019.aspx. Path Traversal and URIs, from http://phucjimy.wordpress.com/category/document-security/. How to Cheat at Securing a Wireless Network, from http://www.sciencedirect.com/science/artide/pii/B9781597490870500572. Eliminating interference thru Wi-Fi spectrum analysis, from http://searchmobilecomputing.techtarget.com/tip/Eliminating-interference-thru-Wi-Fi-spectrumanalysis. How to Surf Safely on Public Wi-Fi, from http://technology.inc.eom/2007/07/01/how-to-surf-safely-onpublic-wi-fi/. Understanding WiFi Hotspots... from http://www.scambusters.org/wifi.html. WLAN Glossary, from http://www.lever.co.uk/wlan-glossary.html.

1697. 1698. 1699.

References Page 3030

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1700. 1701. 1702. 1703. 1704. 1705. 1706. 1707. 1708. 1709. 1710. 1711.

Basic Service Set Identity (BSSID), from http://www.interwifi.co.Uk/glossary/b/basic-service-set identity.html. DSSS - Direct Sequence Spread Spectrum, from http://www.telec0mabc.c0m/d/dsss.html. Frequency-hopping spread spectrum, from https://www.princeton.edu/~achaney/tmve/wikilOOk/docs/Frequency-hopping_spread_spectrum.html 802.llx Modules, Dev Kits Can Help Simplify Wireless Design Efforts, from http://www.digikey.com/us/en/techzone/wireless/resources/articles/802-llx-modules-dev-kits.html. Antennas, from http://82.157.70.109/mirrorbooks/wireless/0321202171/ch03levlsec3.html. How 802.11 Wireless Works, from http://technet.microsoft.com/enus/library/cc757419%28v=WS.10%29.aspx. TKIP (Temporal Key Integrity Protocol), from http://www.tech-faq.com/tkip-temporal-key-integrityprotocol.html. WPA2, from http://www.wi-fi.org/knowledge-center/glossary/wpa2%E2%84%A2. Cisco Unified Wireless Network ArchitectureBase Security Features, from http://www.cisco.com/en/US/docs/solutions/Enterprise/Mobility/emob41dg/ch4_Secu.html. Understanding WEP Weaknesses, from http://www.dummies.com/how-to/content/understanding-wepweaknesses.html. V.802.11 Wireless LAN, from http://www.apl.jhu.edu/~hhsu/cs771/cs771-ll.pdf. 7 Things Hackers Hope You Don't Know, from http://www.esecurityplanet.com/views/article.php/3891716/7-Things-Hackers-Hope-You-DontKnow.htm. Rogue Wireless Access Point, from http://www.tech-faq.com/rogue-wireless-access-point.html. How to Surf Safely on Public Wi-Fi, from http://technology.inc.com/2007/07/01/how-to-surf-safely-onpublic-wi-fi. Wireless Network Security Tools, from http://www.wirelessnetworktools.com/index.html. How to War Drive, from http://www.wikihow.com/War-Drive. Tools for analyzing WLAN traffic abound, from http://www.computerworld.com.au/article/273427/tools_analyzing_wlan_traffic_abound/. Tutorial: Is My Wireless Card Compatible? from http://www.aircrackng.org/doku.php?id=compatible_cards. MITM Attack, from https://wilder.hq.sk/OpenWeekend-2005/foill4.html. Security Threats of Smart Phones and Bluetooth, from http://www.aaronfrench.com/coursefiles/ucommerce/Loo_2009.pdf. Tips for using Bluetooth Securely, from http://www.brighthub.com/computing/smbsecurity/articles/30045.aspx. Carrumba, (2009), How to Crack WPA/WPA2, from http://www.megapanzer.com/2009/10/02/how-tocrack-wpawpa2/. Introduction to Wireless Network, Available from http://media.wiley.com/product_data/excerpt/02/07645973/0764597302.pdf. Prabhaker Mateti, Hacking Techniques in Wireless Networks, Available from http://www.cs.wright.edu/~pmateti/lnternetSecurity/Lectures/WirelessHacks/MatetiWirelessHacks.htm. Cisco Unified Wireless Network ArchitectureBase Security Features, from http://www.cisco.com/en/US/docs/solutions/Enterprise/Mobility/emob41dg/ch4_Secu.html.

1712. 1713. 1714. 1715. 1716. 1717. 1718. 1719. 1720. 1721. 1722. 1723.

1724.

References Page 3031

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1725. 1726. 1727. 1728.

(2008), WLAN Security Threats, from http://enterasys.com/company/literature/WLAN%20Security%20Today-Siemens%20whitepaper_EN.pdf. Hack Wireless WPA Network, Available from http://mediakey.dk/~cc/hack-wireless-wpa-network/ Hack Wireless WEP Network, Available from http://mediakey.dk/~cc/hack-wireless-network-crack/ Brian Kuebler, Wireless Wrongs; Hacking WiFi, Available from http://www.abc2news.com/news/local/story/Wireless-Wrongs-Hacking-WiFi/0anuc7UkOaxjPcfcjwOuw.cspx. Tony Northrup , 10 tips for improving your wireless network, Available from http://www.microsoft.com/athome/setup/wirelesstips.aspx. Bradley Mitchell, Wired vs. Wireless Networking, Available from http://c0mpnetw0rking.ab0ut.c0m/cs/h0menetw0rking/a/h0mewiredless.htm. Wireless Network Image, Available from http://www.hvitsolutions.com/main/images/building_diagram_wireless.jpg. Wireless networking standards, Available from http://reviews.cnet.com/4520-7605_7-6871493-2.html. What are the types of Wireless Networks?, Available from http://www.tech-faq.com/wirelessnetworks.shtml. Different Types of Wireless Network, Available from http://www.greyfriars.net/gcg/greyweb.nsf/miam/article0 1 . Hacking Techniques in Wireless Networks, Available from http://www.mundowifi.com.br/forum/threadll81.html. Evan Mckinney, Disadvantages of Wireless Networks, Available from http://www.ehow.com/facts_4809373_disadvantages-wireless-networks.html. Bradley Mitchell, Wireless Standards -802.11b 802.11a 802.llg and 802.lln , Available from http://compnetworking.about.eom/cs/wireless80211/a/aa80211standard.htm. Wireless Network Devices, Available from http://www.pcrush.com/category/65/Wireless-NetworkDevices. WEP (wired equivalent privacy), Available from http://www.networkworld.com/details/715.html. Wi-Fi Protected Access, Available from http://searchmobilecomputing.techtarget.com/sDefinition/0sid40_gci887323,00.html. WPA (Wi-Fi Protected Access), Available from http://www.tech-faq.com/wpa-wi-fi-protectedaccess.shtml. Paul Arana, (2006), Benefits and Vulnerabilities of Wi-Fi Protected Access 2 (WPA2), Available from http://cs.gmu.edu/~yhwangl/INFS612/Sample_Projects/Fall_06_GPN_6_Final_Report.pdf. The Wi-Fi Protected Access 2 (WPA2)/Wireless Provisioning Services Information Element (WPS IE) update for Windows XP with Service Pack 2 is available, Available from http://support.microsoft.com/kb/893357. TKIP (Temporal Key Integrity Protocol), Available from http://www.tech-faq.com/tkip-temporal-keyintegrity-protocol.shtml. Renaud Deraison2009) ), Using Nessus to Detect Wireless Access Points, Available from http://www.nessus.org/whitepapers/wap-id-nessus.pdf. WLAN Networking / 802.11, Available from http://www.wardrive.net/. Cracking WEP and WPA Wireless Networks, Available from http://docs.lucidinteractive.ca/index.php/Cracking_WEP_and_WPA_Wireless_Networks. Cracking WEP using Backtrack, Available from http://ryanunderdown.com/linux/cracking-wep-usingbacktrack.php.

1729. 1730. 1731. 1732. 1733. 1734. 1735. 1736. 1737. 1738. 1739. 1740. 1741. 1742. 1743.

1744. 1745. 1746. 1747. 1748.

References Page 3032

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1749. 1750. 1751. 1752. 1753. 1754. 1755. 1756.

Wireless Hacking, Available from http://www.darknet.org.uk/category/wireless-hacking/. WiFi Wireless Hacking, Available from http://www.hackerscatalog.com/Products/CDROMS/WiFiHacking.html. Bradley Morgan, (2006), Wireless Cracking Tools, Available from http://www.windowsecurity.com/whitepapers/Wireless-Cracking-Tools.html. What Are Rogue Access Points?, Available from http://www.manageengine.com/products/wifimanager/rogue-access-point.html. Rick Doten, Wireless Security and Wireless Security Monitoring, Available from http://www.issane.org/documents/ISSARogueAPpresentationBoston.ppt. Gary Wollenhaupt, How Cell Phone Jammers work, Available from http://electronics.howstuffworks.com/cell-phone-jammerl.htm. Brian R. Miller & Booz Allen Hamilton, 2002, Issues in Wireless security, Available from http://www.acsac.org/2002/case/wed-c-330-Miller.pdf. Justin Montgomery, How WPA wireless networks are hacked, and how to protect yourself, Available from http://tech.blorge.eom/Structure:%20/2009/02/07/how-wpa-wireless-networks-are-hacked-and how-to-protect-yourself/. Jonathan Hassell, (2004), Wireless Attacks and Penetration Testing, Available from http://www.securityfocus.com/infocus/1783. Robert J. Shimonski, (2003), Wireless Attacks Primer, Available from http://www.windowsecurity.com/articles/Wireless_Attacks_Primer.html. Wireless Network Attack Methodology, Available from http://www.wirelessnetworktools.com/. Martin Beck & TU-Dresden, (2008), Practical attacks against WEP and WPA, Available from http://dl.aircrack-ng.org/breakingwepandwpa.pdf. Simple Steps To Basic Wireless Hacking, Available from http://mixeduperic.com/Windows/Hacks/simplesteps-to-basic-wireless-hacking.html. LE Webmaster, (2005), Wireless Scanning Wardriving / Warchalking, Available from http://www.linuxexposed.com/content/view/42/52/. Finding cloaked access points, (Chapter 9), Available from http://books.google. com/books?id=wGJhDNspE3wC&pg=PA333&lpg=PA333&dq=doaked+access+point &source=bl&ots=ZDkHSykDNV&sig=lsLKIxlZcqkhUdrlWpFaqYczyl&hl=en&ei=V8R2Ss35002e6gP59viqCw&sa=X&0i=b00k_result&ct=result&resnu m=3#v=onepage&q=cloaked%20access%20point&f=false. Wireless Scanning Wardriving / Warchalking, Available from http://www.it-observer.com/wirelessscanning-wardriving-warchalking.html. Zamzom Wireless Network Tool, Available from http://www.freewarehome.com/index.html?http%3A//www.freewarehome.com/lnternet/Networking/ Network_Monitoring_t.html. 5 - Wireless Network, Available from http://www.hackingtheuniverse.com/information-security/attackvs-defense/attack-vs-defense-on-an-organizational-scale/5-wireless-network. Hacking the Invisible Network, Available from http://www.net-security.org/dl/articles/Wireless.pdf. Michael Roche, Wireless Attack Tools, Available from http://www.cse.wustl.edu/~jain/cse57107/ftp/wireless_hacking.pdf. Joshua Wright, Detecting Wireless LAN MAC Address Spoofing, Available from http://forskningsnett.uninett.no/wlan/download/wlan-mac-spoof.pdf. How to Break WEP Encryption, Available from http://www.ehow.com/how_2209766_break-wepencryption.html.
Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

1757. 1758. 1759. 1760. 1761. 1762. 1763.

1764. 1765.

1766. 1767. 1768. 1769. 1770.

References Page 3033

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1771. 1772.

Daniel V. Hoffman, Essential Wireless Hacking Tools, Available from http://www.ethicalhacker.net/content/view/16/24/. Protecting your wireless network from hacking, Available from http://www.businessknowledgesource.com/technology/protecting_your_wireless_network_from_hacki ng_025027.html. Eric Janszen, (2002), Understanding Basic WLAN Security Issues, from http://www.wifiplanet.com/tutorials/article.php/953561. RTX NEWS JANUARY 2003 NO.l, from www.rtx.dk/Admin/Public/DWSDownload.aspx?File=Files%2FFiler%2Fannouncements%2Fnewsletter%2 F4_SCREEN.pdf. Agustina, J.V.Peng Zhang, and Kantola, (2003), Performance evaluation of GSM handover traffic in a GPRS/GSM network, from http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?isnumber=27298&arnumber=1214113&count=217&index = 2 1. Service set identifier, from http://searchmobilecomputing.techtarget.com/sDefinition/0sid40_gci853455,00.html. Antenna Cabling Guide, from http://wireless.gumph.0rg/content/3/12 /0 1 1 -antenna-cabling.html. Wireless Security Auditor (WSA), from http://www.research.ibm.com/gsal/wsa/. NAI's Sniffer Wireless to Support 802.11a and 802.11b Networks, from http://www.findarticles.c0m/p/articles/mi_zd4168/is_200202/ai_n9515340. RADIUS Protocol Security and Best Practices, from http://www.microsoft.com/technet/prodtechnol/windows2000serv/maintain/security/radiussec.mspx. Wi-Fi Security, from http://main.wi-fi.org/OpenSection/secure.asp?TID=2#Radius. WarChalking (Screen Shots), from http://www.blackbeltjones.com. Eavesdropping Detection Audits, from http://www.spybusters.com. Anton T. Rager, (2001), WEPCrack, AirSnort, from http://wepcrack.sourceforge.net/. Wireless Communication Policy - Rensselaer Help Desk, from http://helpdesk.rpi.edu/update.do?artcenterkey=545. Responsibility for Wireless Access Points, from http://cals.arizona.edu/calsnet/security/ua-wirelessguidelines.htm. Telephone tapping or wire tapping, from http://en.wikipedia.org/wiki/Telephone_tapping. Connie J. Sadler, NetBIOS NULL Sessions, from http://www.brown.edu/Facilities/CIS/CIRT/help/netbiosnull.html. The Hacker's Choice, from http://freeworld.thc.org/releases.php?o=l&s=4%20-%2017k.\. DOS_in_Wireless_Routing_Protocols_Hamilton, from http://www.eng.auburn.edu/users/hamilton/security/SE2/. Network Security Library, http://www.windowsecurity.com/whitepapers/windows_security/The_Unofficial_NT_Hack_FAQ/The_U nofficial_NT_Hack_FAQ__Section_05.html. Oren Chapo, (1999), Network Management Protocols, from http://www.chapo.co.il/articles/snmp/. DaAnZeR, (2004), End to End Security for Windows 2000 Server, http://www.securitydocs.com/library/2647. Pascal Etienne, (2001), Weekly Security Tools Digest, from http://boran.linuxsecurity.com/security/sp/toolsdigest/2001/tools20010426.html.

1773. 1774.

1775.

1776. 1777. 1778. 1779. 1780. 1781. 1782. 1783. 1784. 1785. 1786. 1787. 1788. 1789. 1790. 1791.

1792. 1793. 1794.

References Page 3034

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

1795.

DumpAcI dumps NTs permissions and audit settings, from http://www.windowsnetworking.com/kbase/WindowsTips/WindowsNT/AdminTips/Miscellaneous/Dum pAddumpsNTspermissionsandauditsettings.html. Windows 2000 Server, from http://technet.microsoft.com/hi-in/windowsserver/2000/default(enus).aspx. Definitions & Terms, from http://www.bytepile.com/definitions-d.php. VPN & Internet Security Solutions, from http://www.solucom.com/define.htm. Stephen M. Specht & Ruby B.Lee, Distributed Denial of Service:Taxonomies of Attacks, Tools and Countermeasures, from http://palms.ee.princeton.edu/PALMSopen/DDoS%20Final%20PDCS%20Paper.pdf. Craig A. Huegen, 2005, Denial of Service Attacks: "Smurfing", from http://www.windowsecurity.com/whitepapers/Denial-of-Service-Attacks-Smurfing.html. Wireless LAN Security 802.11b and Corporate Networks, from http://documents.iss.net/whitepapers/wireless_LAN_security.pdf. The Wireless Intrusion detection system, from http://www.forum-intrusion.com/widz_design.pdf. Wireless LAN Security, 802.11/Wi-Fi Wardriving & Warchalking, from http://www.wardrive.net/. Jim Geier, (2003), Identifying Rogue Access Points, from http://www.wifiplanet.com/tutorials/article.php/1564431. Lisa Phifer, Service set identifier, http://searchmobilecomputing.techtarget.com/sDefinition/0sid40_gci853455,00.html. WIRELESS COMMUNICATION POLICY, from http://www.longwood.edu/vpaf/final_policy_base/6000/6124.htm. Kevin D. Murray, (2006), Security Scrapbook, from http://www.spybusters.com/SS0402.html. post office break in..., from http://olduvai.blu.org/pipermail/discuss/2004-January/043138.html. Venky, (2006), Wireless LAN Security, from http://www.iss.net/documents/whitepapers/wireless_LAN_security.pdf. WAVEMON, from http://www.janmorgenstern.de/projects-software.html. Patrik Karlsson, (2002), WaveStumbler, 802.11 Network Mapper, from http://www.securiteam.com/tools/5GP002K6BM.html. Egsander, (2006), WIRELESS DATA CONNECTIVITY GUIDELINE, from http://cals.arizona.edu/calsnet/security/ua-wireless-guidelines.htm. NPS Information Technology Policy/Standard, from https://www.nps.navy.mil/ITACS/New05/ITPolicy/NPSITPolicy202.pdf. Simple Active Attack Against TCP, from https://db.usenix.org/. Humphrey Cheung, (2005), How To Crack WEP - Part 1: Setup & Network Recon, from http://www.tomsguide.com/us/how-to-crack-wep,review-451.html. Humphrey Cheung, (2005), How To Crack WEP - Part 2: Performing the Crack, from http://www.tomsguide.com/us/how-to-crack-wep,review-459.html. Humphrey Cheung, (2005), How To Crack WEP - Part 3: Securing your WLAN, from http://www.tomsguide.com/us/how-to-crack-wep,review-471.html. Advantages and Disadvantages of WLANs, from http://www.wireless-center.net/Wi-FiSecurity/Advantages-and-Disadvantages-of-WLANs.html. Advantages vs. Disadvantages of WiFi, from http://mason.gmu.edu/~fkondolo/page3.

1796. 1797. 1798. 1799.

1800. 1801. 1802. 1803. 1804. 1805. 1806. 1807. 1808. 1809. 1810. 1811. 1812. 1813. 1814. 1815. 1816. 1817. 1818. 1819.

References Page 3035

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1820. 1821. 1822. 1823. 1824. 1825.

Alrady, Howto Use WIFI Hotspots with Security, from http://www.ehow.com/how_5287862_use-wifihotspots-security.html. James Kendrick, (2010), Smartphone Wi-Fi Usage on the Rise, from http://jkontherun.com/2010/08/24/smartphone-wi-fi-usage-on-the-rise/. Chris Weber and Gary Bahadur, Wireless Networking Security, from http://technet.microsoft.com/enus/library/bb457019.aspx. Barb Bowman (2003), WPA Wireless Security for Home Networks, from http://www.microsoft.com/windowsxp/using/networking/expert/bowman_03july28.mspx. (2005), Wi-Fi Adoption, from http://www.businessweek.com/technology/tech_stats/wifi051003.htm. Christopher Elliott, 6 wireless threats to your business, from http://www.microsoft.com/business/enus/resources/technology/broadband-mobility/6-wireless-threats-to-yourbusiness.aspx#wirelessthreatstoyourbusiness. Warchalking Symbols, from http://www.hackerskitchen.com/mac-old/wifi/War_Chalk/. The RSN Protocol Process, from http://www.tech-faq.com/rsn-robust-secure-network.html. (2003), WEP encryption Process, from http://technet.microsoft.com/enus/library/cc757419%28WS.10%29.aspx. (2006), WPA2: Second Generation WiFi Security, from http://pcquest.ciol.com/content/technology/2006/106050803.asp. The Four-Way Handshake, from http://www.answers.com/topic/ieee-802-lli-2004. Brandon Teska, (2008), How To Crack WPA / WPA2, from http://www.smallnetbuilder.com/wireless/wireless-howto/30278-how-to-crack-wpa-wpa2. Eric Geier, (2010), 7 Things Hackers Hope You Don't Know, from http://www.esecurityplanet.com/views/article.php/3891716/7-Things-Hackers-Hope-You-DontKnow.htm. "Wireless LAN SecurityChecklist", from http://www.wardrive.net/. 802.11 Security Tools, from http://www.wardrive.net/security/tools. Wireless Security Tools, from http://www.corecom.com/html/wlan_tools.html. Lisa Phifer, (2010), Top Ten Free Wi-Fi Security Test Tools, from http://www.esecurityplanet.com/views/article.php/3881181/Top-Ten-Free-Wi-Fi-Security-TestTools.htm. Free Wireless Security Tools, from http://netsecurity.ab0ut.c0m/cs/hackert00ls/a/aafreewifi.htm. Bryan, (2005), Cracking WEP and WPA Wireless Networks, from http://docs.lucidinteractive.ca/index.php/Cracking_WEP_and_WPA_Wireless_Networks#WPA_Crackin. (2006), A Comprehensive Review of 802.11 Wireless LAN Security and the Cisco Wireless Security Suite, from http://www.cisco.c0 m/warp/public/cc/pd/witc/aol200ap/prodlit/wswpf_wp.htm#wp39475. (2006), How To Crack WEP and WPA Wireless Networks, from http://121space.com/index.php?showtopic=3376. Cisco Unified Wireless Network ArchitectureBase Security Features, from http://www.cisco.c0m/en/US/docs/solutions/Enterprise/Mobility/emob41dg/ch4_Secu.html#wpl01898 4. Wireless DoS, from http://www.cisco.c0m/en/US/docs/wireless/technology/wips/deployment/guide/wipsdep.html#wpl50 481. (2009), How to prevent wireless DoS attacks, from http://searchsecurity.techtarget.com/generic/0,295582,sidl4_gcill73628_mem 1,00. html.

1826. 1827. 1828. 1829. 1830. 1831. 1832.

1833. 1834. 1835. 1836.

1837. 1838. 1839. 1840. 1841.

1842.

1843.

References Page 3036

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1844. 1845. 1846. 1847. 1848. 1849. 1850. 1851. 1852. 1853.

Jim Geier, (2003), Denial of Service a Big WLAN Issue, from http://www.esecurityplanet.com/trends/article.php/2200071/Denial-of-Service-a-Big-WLAN-lssue.htm. Jonathan Hassell, (2004), Wireless Attacks and Penetration Testing (part 1 of 3), from http://www.symantec.com/connect/articles/wireless-attacks-and-penetration-testing-part-l-3. (2009), A list of wireless network attacks, from http://searchsecurity.techtarget.com/generic/0,295582,sidl4_gcill67611_mem 1,00. html. Lisa Phifer, (2009), A wireless network vulnerability assessment checklist, from http://searchsecurity.techtarget.com/generic/0,295582, sid 14_gcill67666_mem 1,00. html. Lisa Phifer, (2009), Hunting for rogue wireless devices, from http://searchsecurity.techtarget.com/generic/0,295582,sidl4_gcill67664_mem 1,00. html. PreciousJohnDoe, List of Wireless Network Attacks, from http://www.brighthub.com/computing/smbsecurity/articles/53949.aspx. Security Disciplines for Objective 3: Detection and Recovery, from http://www.it.ojp.gov/documents/asp/wireless/section3-3-l.htm. (2010), Wireless Sniffer, from http://www.personaltelco.net/WirelessSniffer. How to: Sniff Wireless Packets with Wireshark, from http://www.wirelessnets.com/resources/tutorials/sniff_packets_wireshark.html. WifiEagle Single- and Dual-Band 802.11 Channel Analyzers, from http://www.nutsaboutnets.com/performance-wifi/products/product-wifieagle-wifi-channelanalyzer.htm. Creating A Cheap Bluetooth Sniffer, from http://thewifihack.com/blog/?p=27. WLAN Analyzer and Protocol Decoder -CommView for WiFi, from http://www.tamos.com/htmlhelp/commwifi/packets.htm. Jim Geier, (2002), Understanding 802.11 Frame Types, from http://www.wifiplanet.com/tutorials/article. php/1447501/Understanding-80211-Frame-Types.htm. Laurent Oudot, (2004), Wireless Honeypot Countermeasures, from http://www.symantec.com/connect/articles/wireless-honeypot-countermeasures. (2009), Fragmentation Attack, from http://www.aircrack-ng.org/doku.php?id=fragmentation. Andrei A. Mikhailovsky, Konstantin V. Gavrilenko, and Andrew Vladimirov, (2004), The Frame of Deception: Wireless Man-in-the-Middle Attacks and Rogue Access Points Deployment, from http://www.informit.com/articles/article.aspx?p=353735&seqNum=7. Comment: Rogue Access Point Setups on Corporate Networks, from http://www.infosecurityus.com/view/10516/comment-rogue-access-point-setups-on-corporate-networks-/. Kevin Beaver and Peter T. Davis, Understanding WEP Weaknesses, from http://www.dummies.com/howto/content/understanding-wep-weaknesses.html. (2007), Cracking WEP Using Backtrack: A Beginner's Guide, from http://ryanunderdown.com/linux/cracking-wep-using-backtrack.php. (2009), FakelKEd - Fake IKE Daemon Tool for MITM, from http://www.darknet.org.uk/2009/08/fakeiked-fake-ike-daemon-tool-for-mitm/. Renee Oricchio, How to Surf Safely on Public Wi-Fi, from http://technology.inc.com/telecom/articles/200707/WiFi.html. Aircrack-ng for Windows -Aircrack, from http://www.wirelessdefence.org/Contents/Aircrackng_WinAircrack.htm. (2010), Crack WEP key via connected client, from http://carpeblunte.com/.

1854. 1855. 1856. 1857. 1858. 1859.

1860. 1861. 1862. 1863. 1864. 1865. 1866.

References Page 3037

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1867. 1868. 1869. 1870. 1871. 1872. 1873. 1874. 1875. 1876. 1877. 1878. 1879. 1880. 1881. 1882. 1883. 1884. 1885. 1886. 1887. 1888. 1889. 1890. 1891. 1892.

Using Cain and the AirPcap USB adapter to crack WPA/WPA2, from http://www.irongeek.com/i.php?page=videos/airpcap-cain-wpa-cracking. WiFi Hopper, from http://wifihopper.com/overview.html. PhoneSnoop: Spying on Blackberry Users, from http://www.symantec.com/connect/blogs/phonesnoopspying-blackberry-users. What is BlueJacking, from http://www.newmobilemedia.com/bluejacking-2.htm. , from http://www.oxid.it/cain.html. KisMAC, from http://kismac-ng.org/. inSSIDer, from http://www.metageek.net/products/inssider/. NetSurveyor, from http://www.performancewifi.net/performance-wifi/products/netsurveyor-networkdiscovery.htm. Vistumbler, from http://www.vistumbler.net/. WirelessMon, from http://www.passmark.com/products/wirelessmonitor.htm. WiFi Hopper, from http://www.wifihopper.com/download.html. Wavestumbler, from http://www.cqure.net/wp/tools/other/wavestumbler/. iStumbler, from http://www.istumbler.net/. WiFinder, from http://www.pgmsoft.com/apps/wifinder_for_android/. Meraki WiFi Stumbler, from http://www.meraki.com/products/wireless/wifi-stumbler. Wellenreiter, from http://wellenreiter.sourceforge.net/. AirCheck Wi-Fi Tester, from http://www.flukenetworks.com/enterprise-network/networktesting/AirCheck-Wi-Fi-Tester. AirRadar 2, from http://www.koingosw.com/products/airradar.php. Xirrus Wi-Fi Inspector, from http://www.xirrus.com/Products/Wi-Fi-lnspector. Wifi Analyzer, from http://a.farproc.com/wifi-analyzer. WiFiFoFum -WiFi Scanner, from http://www.wififofum.net/downloads. Network Signal Info, from http://www.kaibits-software.com/product_netwotksignal.htm. WiFi Manager, from http://kmansoft.com/. OpenSignalMaps, from http://opensignal.com/. WIGLE, from http://wigle.net/gps/gps/main/download/. Skyhook, from http://www.skyhookwireless.com/location-technology/sdk.php.

1893. jiWire, from http://v4.jiwire.com/search-hotspot-locations.htm. 1894. 1895. 1896. 1897. 1898. WeFi, from http://www.wefi.com/download/. Wireshark, from http://www.wireshark.org/download.html. Cascade Pilot, from http://www.riverbed.com/products-solutions/products/performancemanagement/network-infrastructure/High-Speed-Packet-Analysis.html. OmniPeek, from http://www.wildpackets.com/products/omnipeek_network_analyzer. Sniffer Portable Professional Analyzer, from http://www.netscout.com/products/enterprise/Sniffer_Portable_Analyzer/Sniffer_Portable_Professiona l_Analyzer/Pages/default.aspx. Capsa WiFi, from http://www.colasoft.com/download/products/capsa_free.php. ApSniff, from http://www.monolith81.de/apsniff.html.

1899. 1900.

References Page 3038

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1901. 1902. 1903. 1904. 1905. 1906. 1907. 1908. 1909. 1910. 1911. 1912. 1913. 1914. 1915. 1916. 1917. 1918. 1919. 1920. 1921. 1922. 1923. 1924. 1925. 1926. 1927. 1928. 1929. 1930. 1931. 1932. 1933. 1934. 1935. 1936. 1937.

NetworkMiner, from http://www.netresec.com/?page=NetworkMiner. Airscanner Mobile Sniffer, from http://www.airscanner.com/products/sniffer/. Observer, from http://www.networkinstruments.com/products/observer/index.php?tab=download. WifiScanner, from http://wifiscanner.sourceforge.net/. Mognet, from http://www.monolith81.de/mognet.html. Iperf, from http://iperf.sourceforge.net/. Aircrack-ng, from http://www.aircrack-ng.org/. SMAC, from http://www.klcconsulting.net/smac/. KisMAC, from http://kismac-ng.org/. Elcomsoft Wireless Security Auditor, from http://www.elcomsoft.com/ewsa.html. WepAttack, from http://wepattack.sourceforge.net/. Wesside-ng, from http://www.aircrack-ng.org/doku.php?id=wesside-ng. WEPCrack, from http://wepcrack.sourceforge.net/. WepDecrypt, from http://wepdecrypt.sourceforge.net/. Portable Penetrator, from http://www.secpoint.com/portable-penetrator.html. CloudCracker, from https://www.cloudcracker.com/. coWPAtty, from http://wirelessdefence.org/Contents/coWPAttyMain.htm. Wifite, from https://code.google.com/p/wifite/downloads/detail?name=wifite-2.0r85.tar.gz. WepOff, from http://www.ptsecurity.ru/download/wepoff.tar.gz. ApSniff, from http://www.monolith81.de/apsniff.html. WiFiFoFum, from http://www.aspecto-software.com/rw/applications/wififofum/. WarLinux, from http://sourceforge.net/projects/warlinux/. MacStumbler, from http://www.macstumbler.com/. WiFi-Where, from http://www.threejacks.com/?q=node/13. AirFart, from http://airfart.sourceforge.net/. AirTraf, from http://airtraf.sourceforge.net/. 802.11 Network Discovery Tools, from http://wavelan-tools.sourceforge.net/. NetworkManager, from http://projects.gnome.org/NetworkManager/. KWiFiManager, from http://kwifimanager.sourceforge.net/. NetworkControl, from http://www.arachnoid.com/NetworkControl/index.html. KOrinoco, from http://korinoco.sourceforge.net/. Sentry Edge II, from http://www.tek.com/document/news-release/tektronix-advances-rf-monitoringsentry-edge-ii. WaveNode, from http://www.wavenode.com/. xosview, from http://xosview.sourceforge.net/. RF Monitor, from http://www.newsteo.com/gb/data-logger/features/monitoring-software.php. DTC-340 RFXpert, from http://www.dektec.com/products/Apps/DTC-340/index.asp. Home Curfew RF Monitoring System, from http://solutions.3m.com/wps/portal/3M/en_US/ElectronicMonitoring/Home/ProductsServices/OurProd ucts/HomeCurfewRFMonitoringSystem/.

References Page 3039

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1938. 1939. 1940. 1941. 1942. 1943. 1944. 1945. 1946. 1947. 1948. 1949. 1950. 1951. 1952. 1953. 1954. 1955. 1956. 1957. 1958. 1959. 1960. 1961. 1962. 1963. 1964. 1965. 1966. 1967. 1968. 1969. 1970.

RFProtect Spectrum Analyzer, from http://www.arubanetworks.com/products/arubaos/rfprotectspectrum-analyzer/. AirMagnet WiFi Analyzer, from http://www.flukenetworks.com/enterprise-network/wirelessnetwork/AirMagnet-WiFi-Analyzer. OptiView XG Network Analysis Tablet, from http://www.flukenetworks.com/enterprisenetwork/network-monitoring/optiview-xg-network-analysis-tablet. Network Traffic Monitor & Analyzer CAPSA, from http://www.javvin.com/packet-traffic.html. Observer, from http ://www. networkinstruments.com/products/observer/index.php?tab=download. Ufasoft Snif, from http://ufasoft.com/sniffer/. vxSniffer, from http://www.cambridgevx.com/vxsniffer.html. OneTouch AT Network Assistant, from http://www.flukenetworks.com/enterprise-network/networktesting/OneTouch-AT-Network-Assistant. SoftPerfect Network Protocol Analyzer, from http://www.softperfect.com/products/networksniffer/. WirelessNetView, from http://www.nirsoft.net/utils/wireless_network_view.html. Airview, from http://airview.sourceforge.net. RawCap, from http://www.netresec.com/?page=RawCap. Cisco Spectrum Expert, from http://www.cisco.com/en/US/products/ps9393/index.html. AirMedic USB, from http://www.flukenetworks.com/enterprise-network/wireless-network/AirMedic. AirSleuth-Pro, from http://nutsaboutnets.com/airsleuth-spectrum-analyzer/. BumbleBee-LX Handheld Spectrum Analyzer, from http://www.bvsystems.com/Products/Spectrum/BumbleBee-LX/bumblebee-lx.htm. Wi-Spy, from http://www.metageek.net/products/wi-spy/. Super Bluetooth Hack, from http://gallery.mobile9.eom/f/317828/. BTBrowser, from http://wireless.klings.org/BTBrowser/. BH Bluejack, from http://croozeus.com/blogs/?p=33. Bluediving, from http://bluediving.sourceforge.net/. Blooover, from http://trifinite.org/trifinite_stuff_blooover.html. BTScanner, from http://www.pentest.co.uk/downloads.html?cat=downloads&section=01_bluetooth. CIHwBT, from http://sourceforge.net/projects/cih-with-bt/files/. BT Audit, from http://trifinite.org/trifinite_stuff_btaudit.html. BlueAlert, from http://www.insecure.in/bluetooth_hacking_02.asp. AirMagnet WiFi Analyzer, from http://www.flukenetworks.com/enterprise-network/wirelessnetwork/AirMagnet-WiFi-Analyzer. AirDefense, from http://www.airdefense.net/products/servicesplatform/index.php. Adaptive Wireless IPS, from http://www.cisco.com/en/US/products/ps9817/index.html. Aruba RFProtect WIPS, from http://www.arubanetworks.com/products/arubaos/rfprotect-wirelessintrusion-protection. Enterasys Intrusion Prevention System, from http://www.enterasys.com/products/advanced-securityapps/dragon-intrusion-detection-protection.aspx. RFProtect Wireless Intrusion Protection, from http://www.arubanetworks.com/products/arubaos/rfprotect-wireless-intrusion-protection. SonicWALL Wireless Networking, from http://o-www.sonicwall.com/us/en/solutions/4224.html.

References Page 3040

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1971. 1972. 1973. 1974. 1975. 1976. 1977. 1978. 1979. 1980. 1981.

HP TippingPoint IPS, from http://hl7007.wwwl.hp.com/us/en/products/networksecurity/HP_S_lntrusion_Prevention_System_(IPS)_Series/index.aspx. AirTight WIPS, from http://www.airtightnetworks.com/home/products/AirTight-WIPS.html. Network Box IDP, from http://www.network-box.co.uk/technology/threatmanagement/IDP. AirMobile Server, from http://www.airmobile.se/airmobile_server.htm. WLS Manager, from http://www.airpatrolcorp.com/products/wls_manager.php. Wireless Policy Manager (WPM), from http://airpatrolcorp.com/airpatrol-products/wpmwec/. ZENworks Endpoint Security Management, from http://www.novell.com/products/zenworks/endpointsecuritymanagement/features/. AirMagnet Planner, from http://www.flukenetworks.com/enterprise-network/wirelessnetwork/AirMagnet-Planner. Cisco Prime Infrastructure, from http://www.cisco.com/en/US/products/psl2239/index.html. AirTight Planner, from http://www.airtightnetworks.com/home/products/AirTight-Planner.html. LANPIanner, from http://www.motorola.com/Business/USEN/Business+Product+and+Services/Software+and+Applications/WLAN+Management+and+Security+Sof tware/LANPIanner_US-EN. RingMaster, from http://www.juniper.net/us/en/products-services/software/network-managementsoftware/ringmaster/. Connect EZ Predictive RF CAD Design, from http://www.connect802.eom/suite_spot.htm#. Ekahau Site Survey (ESS), from http://www.ekahau.com/products/ekahau-site-survey/overview.html. ZonePlanner, from http://www.ruckuswireless.com/products/zoneplanner. Wi-Fi Planning Tool, from http://www.aerohive.com/planner. TamoGraph Site Survey, from http://www.tamos.com/products/wifi-site-survey/wlan-planner.php. OSWA, from http://securitystartshere.org/page-downloads.htm. WiFiZoo, from http://c0mmunity.c0rest.c0m/~h0ch0a/wifiz00/index.html#d0wnl0ad. Network Security Toolkit, from http://networksecuritytoolkit.org/nst/index.html. Nexpose Community Edition, from http://www.rapid7.com/products/nexpose/compare-downloads.jsp. WiFish Finder, from http://www.airtightnetworks.com/home/resources/knowledge-center/wifishfinder.html. Penetrator Vulnerability Scanning Appliance, from http://www.secpoint.com/penetrator.html. SILICA, from http://www.immunityinc.com/downloads.shtml. Wireless Network Vulnerability Assessment, from http://www.secnap.com/products/audits/wirelessassessment.html. Karma, from http://www.theta44.org/karma/. Hotspotter, from http://www.wirelessdefence.org/Contents/hotspotter.htm. Airsnarf, from http://airsnarf.shmoo.com/. Asleap, from http://www.willhackforsushi.com/Asleap.html.

1982. 1983. 1984. 1985. 1986. 1987. 1988. 1989. 1990. 1991. 1992. 1993. 1994. 1995. 1996. 1997. 1998. 1999.

2000. THC-LEAP Cracker, from http://wirelessdefence.org/Contents/THC-LEAPcracker.htm. 2001. Airsnort, from http://airsnort.shmoo.com/. 2002. Void 11, from http://www.wirelessdefence.org/Contents/VoidllMain.htm.
2003. Technitium MAC Address Changer (TMAC), from http://www.technitium.com/tmac/index.html.

References Page 3041

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

Module 16 : Hacking Mobile Platforms 2004. 2005. Delivering enterprise information securely on Android and Apple iOS devices, from http://www.citrix.com/site/resources/dynamic/additional/iPad_Technical_Guide_US_WP.pdf. Understanding the Security Changes in Windows Phone 8, from http://www.mobilejaw.com/articles/2012/08/understanding-the-security-changes-in-windows-phone8/. HOW TO HACK YOUR ANDROID PHONE, from http://www.mobilenyou.in/2010/10/hack-your-androidphone.html. Windows Phone 8, from http://en.wikipedia.org/wiki/Windows_Phone_8. Delivering corporate data securely on employee iPads, from http://resources.idgenterprise.com/original/AST-0043716_iPad_Technical_Guide_US_WP_2_.pdf. Working guide to Root Android Phones Easy with SuperOneClick, from http://fixlife.in/23/working-guideroot-android-devices-phones-easy-way-superoneclick. http://readwrite.com/2010/01/27/how_to_hack_your_android_phone.

2006. 2007. 2008. 2009.

2010 . How to Hack Your Android Phone (and Why You Should Bother), from 2 0 11 . New Android Trojan Masquerades as Google Library, Taps Device Administration API, from
http://www.netqin.com/en/security/newsinfo_4595_2.html%20.

2012 . Security Alert: New SMS Android Trojan - DroidLive - Being Disguised as a Google Library, from
http://www.csc.ncsu.edu/faculty/jiang/DroidLive/. 2013. 2014. 2015. 2016. 2017. 2018. 2019. SuperOneClick, from http://shortfuse.org/. Superboot, from http://www.modaco.com/topic/348161-superboot-galaxy-nexus-root-solution/. Unrevoked, from http://unrevoked.com/recovery/. Universal Androot, from http://android.org.in/2012/08/universal-androot-root-android-in-5-sec/. Unlock Root, from http://www.unlockroot.com/products.html. DroidSheep, from http://droidsheep.de. FaceNiff, from http://faceniff.ponury.net.

2020. Google Apps Device Policy, from https://play.google.com. 2021 . DroidSheep Guard, from http://droidsheep.de. 2022. X-Ray, from http://www.xray.io.
2023. 2024. 2025. 2026. 2027. 2028. 2029. 2030. 2031. 2032. 2033. 2034. 2035. Android Network Toolkit -Anti, from http://www.zantiapp.com. Find My Phone, from http://findmyphone.mangobird.com. Prey Anti-Theft, from http://preyproject.com. Android Anti Theft Security, from http://www.snuko.com. Wheres My Droid, from http://wheresmydroid.com. iHound, from https://www.ihoundsoftware.com. GadgetTrak Mobile Security, from http://www.gadgettrak.com. Total Equipment Protection App, from https://protection.sprint.com. AndroidLost.com, from http://www.androidlost.com. RedsnOw, from http://blog.iphone-dev.org. Absinthe, from http://greenpoisOn.com. SnOwbreeze, from http://www.idownloadblog.com/download/. PwnageTool, from http://blog.iphone-dev.org.

References Page 3042

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

2036. 2037. 2038. 2039. 2040. 2041. 2042. 2043. 2044. 2045. 2046. 2047. 2048. 2049. 2050. 2051. 2052. 2053. 2054. 2055. 2056. 2057. 2058. 2059. 2060. 2061. 2062. 2063. 2064. 2065. 2066. 2067. 2068. 2069. 2070. 2071. 2072. 2073. 2074. 2075.

LimeRaln, from http://www.limeraln.com. Jailbreakme, from http://www.jailbreakme.com. Blackraln, from http://blackraln.com. Spirit, from http://spiritjb.com. Find My iPhone , from https://itunes.apple.com. iHound, from https://www.ihoundsoftware.com. GadgetTrak iOS Security, from http://www.gadgettrak.com. iLocalis, from http://ilocalis.com. MaaS360 Mobile Device Management (MDM), from http://www.maas360.com. Citrix XenMobile MDM, from http://www.zenprise.com. Absolute Manage MDM, from http://www.absolute.com. SAP Afaria , from http://www.sybase.com. Device Management Centre, from http://www.sicap.com. AirWatch, from http://www.air-watch.com. Good Mobile Manager, from http://wwwl.good.com. Mobilelron, from http://www.mobileiron.com. Rule Mobility, from http://www.tangoe.com. TARMAC, from http://www.tarmac-mdm.com. MediaContact, from http://www.device-management-software.com. BullGuard Mobile Security, from http://www.bullguard.com. Lookout, from https://www.lookout.com. WISelD, from http://www.wiseid.mobi. McAfee Mobile Security, from https://www.mcafeemobilesecurity.com. AVG AntiVirus Pro for Android, from http://www.avg.com. avast! Mobile Security, from http://www.avast.com. Norton Mobile Security, from http://us.norton.com. ESET Mobile Security, from http://www.eset.com. Kaspersky Mobile Security, from http://www.kaspersky.com. F-Secure Mobile Security, from http://www.f-secure.com. Trend Micro Mobile Security, from http://www.trendmicro.com. Webroot Secure Anywhere Mobile, from http://www.webroot.com. NetQin Mobile Security, from http://en.nq.com/mobilesecurity/download. AnDOSid, from http://apps.opera.com/en_us/andosid.html. ComDroid, from http://www.comdroid.org/. Woodpecker, from http://www.firmhouse.com/. iPhoneSimFree, from http://www.iphonesimfree.com/. anySIM, from https://code.google.eom/p/devteam-anysim/downloads/list. Metasploit, from http://www.metasploit.com/. Cain & Abel, from http://www.oxid.it/cain.html. WindowBreak, from http://windowsphonehacker.com/windowbreak/.

References Page 3043

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

2076. 2077.

BBProxy, from http://www.Symantec.com/security_response/writeup.jsp?docid=2006-081416-4756-99. Elcomsoft Phone Password Breaker, from http://www.elcomsoft.com/eppb.html.

Module 17: Evading IDS, Firewalls, and HoneyPots 2078. Intrusion Detection System (IDS) Evasion, from http://complianceandprivacy.com/WhitePapers/iDefense-IDSEvasion/i Defense_IDSEvasion_20060510.pdf. Evading NIDS, from http://www.bandwidthco.com/sf_whitepapers/penetration/Evading%20NIDS%20Revisited.pdf. Intrusion detection system evasion techniques, from http://en.wikipedia.org/wiki/lntrusion_detection_system_evasion_techniques. How to bypass a firewall, from http://www.bit.uni-bonn.de/Wob/images/49692243.pdf. Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art, from http://www.sciencedirect.c0m/science/article/pii/S092054890500098X. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection, from http://www.windowsecurity.com/whitepapers/intrusion_detection/lnsertion_Evasion_and_Denial_of_S ervice_Eluding_Network_lntrusion_Detection_.html. SmartDefense, from http://www.sciencedirect.com/science/article/pii/B9781597492454000076. How to configure Internet Explorer to use a proxy server, from http://support.microsoft.com/kb/135982. Defeating Sniffers and Intrusion Detection Systems, from http://www.phrack.org/issues.html?issue=54&id=10. Techniques used for bypassing firewall systems, from http://www.terena.org/activities/tfcsirt/meeting9/gowdiak-bypassing-firewalls.pdf. Firewalking, from http://www.webopedia.eom/TERM/F/firewalking.html. IT Infrastructure Security Plan, from http://www.sciencedirect.com/science/article/pii/B9781597490887500098. What is a firewall? from http://kb.iu.edu/data/aoru.html. Functionalities of Firewalls, from http://www.cs.ucsb.edu/~koc/ns/projects/04Reports/He.pdf. Updating snort with a customized controller to thwart port scanning, from http://www.aloul.net/Papers/faloul_scnlO.pdf. Firewalls, from http://www.techrepublic.c0m/i/tr/downloads/home/0072260815_chapter_9.pdf. Firewalking, from http://www.webopedia.eom/TERM/F/firewalking.html. What is HoneyPot? from http://www.securityhunk.com/2010/06/what-is-honeypot.html. Honeypots - Definitions and Value of Honeypots , from http://infosecwriters.com/texts.php?op=display&id=80. How to Set Up a Honey Pot, from http://www.ehow.com/how_5245821_set-up-honey-pot.html. Snort 2.8.5.2 : Intrusion Detection Tool, from http://ashwintumma.files.wordpress.com/2010/ll/is_snort.pdf. Writing Snort Rules, from http://paginas.fe.up.pt/~mgi98020/pgr/writing_snort_rules.htm. http://www.creangel.com/papers/Eluding%20Network%20lntrusion%20Detection.pdf.

2079. 2080. 2081. 2082. 2083.

2084. 2085. 2086. 2087. 2088. 2089. 2090. 2091. 2092. 2093. 2094. 2095. 2096. 2097. 2098. 2099.

2100 . Insertion, Evasion, and Denial of Service:Eluding Network Intrusion Detection, from 2 10 1 . Intrusion detection system evasion techniques, from
http://en.Wikipedia.org/w/index.php?title=lntrusion_detection_system_evasion_techniques&oldid=311 670246.
Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

References Page 3044

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

2102 . Evading NIDS, revisited, from http://www.symantec.com/connect/articles/evading-nids-revisited.


2103. 2104. 2105. 2106. 2107. 2108. 2109. How To Access Blocked / Bypass Blocked Websites, from http://www.computingunleashed.com/how-toaccess-blocked.html. How do 1use a Proxy Server? from http://whatismyipaddress.com/using-proxies. How to configure Internet Explorer to use a proxy server, from http://support.microsoft.com/kb/135982. Firewall Fairytales, from http://www.iqmtm.com/PDF_presentations/IQ_Firewall_Fairytales_June2010l.pdf. Intrusion detection systems IDS, from http://www.geeksgate.com/blog/812.html. Defending Against Network IDS Evasion, from http://www.raidsymposium.org/raid99/PAPERS/Paxson.pdf. Sumit Siddharth, (2005), Evading NIDS, revisited, Available from http://www.securityfocus.com/infocus/1852. up-honey-pot.html.

2 110 . Alexis Lawrence, Howto Set Up a Honey Pot, Available from http://www.ehow.com/how_5245821_set2 1 1 1 . GHH, What is GHH?, Available from http://ghh.sourceforge.net/. 2 112 . Phrack Magazine Volume Seven, Issue Forty-Nine File 06 o f..., from
http://www.phrack.org/phrack/49/P49-06. 2113. 2114. Kasey Efaw, Installing Snort 2.8.5.2 on Windows 7, http://www.sn0rt.0rg/assets/135/lnstalling_Sn0rt_2.8.5.2_0n_Wind0ws_7.pdf. (2006), Intrusion Detection System (IDS) Evasion, http://complianceandprivacy.com/WhitePapers/iDefense-IDSEvasion/i Defense_IDSEvasion_20060510.pdf. Brian Caswell, Writing Snort Rules A quick guide, http://www.shmoo.com/~bmc/presentations/2004/honeynet/caswell-writing-snort-rules.ppt. Unblock Blocked Websites like Myspace, Bebo and Orkut, from http://www.clazh.com/unblock-blockedwebsites-like-myspace-bebo-and-orkut/. Firewalls, from http://hacker-dox.net/Que-Certified.Ethical.Hacker.E/0789735318/chl0levlsec5.html. Firewall Basics, http://www.unixgeeks.org/security/newbie/security/firewall.html. Honeypots, from http://www.infosecwriters.com/texts.php?op=display&id=80. http://www.gtpcc.org/gtpcc/honeypotsforwindows.htm.

2115. 2116. 2117. 2118. 2119.

2120 . Dale Farris, (2005), Honeypots for Windows, from 2 12 1 . Mike Neuman, (1995), Bugtraq: ANNOUNCE: Freely available TTY monitoring/control program, from
http://seclists.org/bugtraq/1995/Jun/0049.html.

2122 . Web Application Attacks, [PDF] Guide, from www.netprotect.ch/downloads/webguide.pdf.


2123. 2124. 2125. 2126. 2127. 2128. David Endler & Michael Sutton, [PPT] iDEFENSE Labs, from www.blackhat.com/presentations/bh-usa-

02/endler/bh-us-02-endler-brute.ppt.
Intrusion detection, from http://www.networkworld.com/links/Downloads/Security/lntrusion_detection/. Tony Bradley, Free Intrusion Detection (IDS) and Prevention (IPS) Software, from http://netsecurity.ab0ut.c0m/0d/intrusi0ndetecti0nidl/a/aafreeids.htm. AIDE, from http://www.cryptomancer.de/programme/aide-en.html. The Evolution of Intrusion Detection System, from www.secutityfocus.com/infocus. Navy Information Assurance Website, from https:/.. ./ps/?t=infosecprodsservices/infosecprodsservices.tag&bc=/infosecprodsservices/bc_ids.htnnl.

References Page 3045

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

2129. 2130. 2131. 2132. 2133. 2134. 2135. 2136. 2137. 2138. 2139. 2140. 2141. 2142. 2143. 2144. 2145. 2146. 2147. 2148. 2149. 2150. 2151. 2152. 2153. 2154. 2155. 2156. 2157. 2158.

Firewalking, from http://www.webopedia.eom/TERM/F/firewalking.html. Vinay, (2009), How to Bypass Firewalls Restrictions using Proxy Servers, from http://www.ihackintosh.com/2009/03/how-to-bypass-firewalls-restrictions-using-proxy-servers/. Adam Gowdiak, (2003), Firewall Attack Techniques, from http://www.terena.org/activities/tfcsirt/meeting9/gowdiak-bypassing-firewalls.pdf. How to bypass the firewall (Bypassing from external sources and MITM attacks), from www.b-itcenter.de/Wob/images/81134082.ppt. Bypassing Firewalls, http://flylib.eom/books/en/3.500.l.95/l/. Intrusion detection system - EnterpriseNetworkingPlanet, from http://networking.webopedia.eom/TERM/l/intrusion_detection_system.html. An Introduction to IDS, from www.securityfocus.com/infocus/. Network security, from www.njcpu.net/security.htm. Hacking Through IDSs, from www.airscanner.com/pubs/ids.pdf. INTRUSION DETECTION -BISS Forums, from www.bluetack.co.uk/forums/index.php7showtopic. iSecurityShop, from www.isecurityshop.com/. Enterasys Dragon Host Sensor, from www.enterasys.com/products/ids/DSHSS-xxx/. MJohnson, Vanguard Security Solutions -Vanguard Integrity Professionals, from www.go2vanguard.com/software. Thomas H. Ptacek, Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection, from www.insecure.org/stf/secnet_ids/secnet_ids.pdf. Insertion, Evasion, and Denial of Service,from www.snort.org/docs/idspaper/. Evading Intrusion Detection, from www.tux.org/pub/tux/storm/ids-simple.doc. IDS: Re: Polymorphic Shellcode detection, from sedists.org/lists/focus-ids/2003/May/0019. Hardware Firewalls, from http://cybercoyote.org/security/hardware.shtml. Circuit-Level Gateway, from www.softheap.com/internet/circuit-level-gateway.html. Vicomsoft Firewall Q&A, from www.vicomsoft.com/knowledge/reference/firewallsl.html. Statoo.htm: some simple stalking tools, from www.searchlores.org/statoo.htm. van Hauser, Placing Backdoors Through Firewalls, from www.thc.segfault.net/download.php?t=p&f=fwbackd.htm. J. Christian Smith, (2000), Introduction, www.gray-world.net/papers/covertshells.txt. BSD Search.Com -Applications: Networking, from www.bsdsearch.com/dir//applications/networking.php. Peter Kieltyka, ICMP Shell, from icmpshell.sourceforge.net/. Measuring Security Threats with Honeypot, from www.honeynet.org/papers/individual/sane-2004. Lance Spitzner, (2003), Open Source Honeypots: Learning with Honeyd, from www.securityfocus.com/infocus/1659. Honeypot Software, Honeypot Products, Deception Software, from www.honeypots.net/honeypots/products. Measuring Security Threats with Honeypot Technology, from www.honeynet.org/papers/individual/sane-2004. Know Your Enemy: Sebek, from www.honeynet.org/papers/sebek.pdf.

References Page 3046

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

2159.

Intrusion Detection System (IDS) Evasion, from http://complianceandprivacy.com/WhitePapers/iDefense-IDSEvasion/i Defense_IDSEvasion_20060510.pdf. Intrusion Detection/Prevention, from http://www.protectpoint.com/services_intrusiondetection.htm. Intrusion Detection Systems, from http://www.cra.org/Activities/craw/dmp/awards/2003/Tan/research/rules.html. Managed Security Services- Intrusion Detection Programs, from http://www.gus.net/lntrusion_Dectection.htm. Nick DeClario, Keep O ut: Host Intrusion Detection, from http://www.linuxsecurity.com/content/view/112852/151/. Yona Hollander, The Future of Web Server Security, from http://www.mcafee.com/us/local_content/white_papers/wp_future.pdf. Unauthorized remote users can read IIS files, from http://xforce.iss.net/xforce/xfdb/2663. Jan Meijer, Multiple Microsoft IIS Vulnerabilities, from http://cert-nl.surfnet.nI/s/2000/S-00-35.htm. Automated Web Interface Scans IIS for Multiple Vulnerabilities, from http://www.ciac.org/ciac/bulletins/k-068.shtml. Mark Burnett, (2001), Running Snort on IIS Web Servers Part 2: Advanced Techniques, from http://www.securityfocus.com/infocus/1316. Spanish Honeypot Project, from http://www.honeynet.org.es/project/. Lance Spitzner, 2003, Honeypots, from http://www.ip97.com/trackinghackers.com/papers/honeypots.html. A Virtual Honeypot Framework, from http://www.citi.umich.edu/techreports/reports/citi-tr-03-l.pdf. What is SPECTER, from http://www.specter.ch/introduction50.shtml. Shaheem Motlekar, (2004), Honeypot FAQ, from http://www.tracking-hackers.com/misc/faq.html. Honeytokens: The Other Honeypot, from http://www.securityfocus.com/infocus/1713. van Hauser, Placing Backdoors Through Firewalls, from http://www.securitymap.net/sdm/docs/attack/fw-backd.htm. Placing Backdoors Through Firewalls, from http://www.windowsecurity.com/whitepapers/Placing_Backdoors_Through_Firewalls.html. Honeypots: Three new tools related to IDS, forensics, honeypots, from http://seclists.org/honeypots/2003/q2/0279.html. Network Intrusion Detection Using Snort, from http://www.linuxsecurity.com/content/view/117497/49/. Intrusion Detection, from http://www.ctssg.com/ids_p.htm. INTRUSION DETECTION, from http://www.pafis.shh.fi/~tantit01/isac2002/ce03/password.html. Paul Innella, 2001, An Introduction to IDS, from http://www.securityfocus.com/infocus/1520. Ricky M. Magalhaes, (2003), Host-Based IDS vs Network-Based IDS, from http://www.windowsecurity.com/articles/Hids_vs_Nids_Part2.html. Intrusion detection system, from http://www.webopedia.eom/TERM/l/intrusion_detection_system.html. Paul Innella, 2001, The Evolution of Intrusion Detection Systems, from http://www.securityfocus.com/infocus/1514. Host, from http://lists.debian.org/.

2160. 2161. 2162. 2163. 2164. 2165. 2166. 2167. 2168. 2169. 2170. 2171. 2172. 2173. 2174. 2175. 2176. 2177. 2178. 2179. 2180. 2181. 2182. 2183. 2184. 2185.

References Page 3047

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

2186.

Spammers use Word files to bypass filters, from http://www.zdnet.com.aU/news/security/soa/Spammers_use_Word_files_to_bypass_filters/0,1300617 44,139267487,OO.htm. Know Your Enemy: Sebek, from http://www.honeynet.org/papers/sebek.pdf. Honeyd - Network Rhapsody for You, from http://www.citi.umich.edU/u/provos/honeyd/. SPECTER Introduction, from http://www.specter.ch/introduction50.shtml. Measuring Security Threats with Honeypot Technology, from http://www.honeynet.org/papers/individual/sane-2004.pdf. Lance Spitzner, (2003), SecurityFocus: Honeytokens -The Other Honeypot, from http://www.securityfocus.com/infocus/1713. Andrea Barisani, vol5issue6, from http://www.tisc-insight.com/newsletters/56.html. Peter Kieltyka, (2006), ICMP Shell, from http://icmpshell.sourceforge.net/. ntsecurity.nu - ack tunneling, from http://ntsecurity.nu/papers/acktunneling/. SecuriTeam -ACK Tunneling Trojans, from http://www.securiteam.com/securityreviews/5OP0P156AE.html. Placing Backdoors Through Firewalls, from http://www.thc.segfault.net/papers/fw-backd.htm. Mike, Firewalk, from www.blackhat.com/presentations/bh-usa-99/Route/bh-us-99-schiffman.ppt. Hardware Firewalls, from http://cybercoyote.org/security/hardware.shtml. Evading Intrusion Detection, from www.tux.org/pub/tux/storm/ids-simple.doc.

2187. 2188. 2189. 2190. 2191. 2192. 2193. 2194. 2195. 2196. 2197. 2198. 2199.

2200. Insertion, Evasion, and Denial of Service, from http://www.snort.org/docs/idspaper/. 2201 . Securing IT Assets with Linux, from www.bass-inc.com/presentations/arp21_2004/linuxsecurity.ppt. 2202. Linux Security Quick Reference Guide, from http://www.tldp.org/REF/ls_quickref/QuickRefCard.pdf.
2203. 2204. 2205. 2206. 2207. 2208. 2209. Vanguard Security Solutions - Vanguard Integrity Professionals, from http://www.go2vanguard.com/software/. iSecurityShop, from http://www.isecurityshop.com/. Going on the Defensive: Intrusion Detection Systems, from http://www.airscanner.com/pubs/ids.pdf. Network Security, from http://www.njcpu.net/security.htm. Tipping Point, from http://hl0163.wwwl.hp.com. Security Network Intrusion Prevention System, from http://www-01.ibm.com. Enterprise, from http://www.tripwire.com/it-security-software/security-configurationmanagement/file-integrity-monitoring/.

2210 . Specter, from http://www.specter.com/default50.htm. 2 2 11 . Honeyd, from http://www.honeyd.org/. 2212 . KFSensor, from http://www.keyfocus.net/kfsensor/.
2213. 2214. 2215. 2216. 2217. 2218. 2219. Symantec Decoy Server, from http://www.symantec.com/press/2003/n030623b.html. Tiny Honeypot, from http://freecode.com/projects/thp. LaBrea, from http://labrea.sourceforge.net/labrea-info.html. PatriotBox, from http://www.alkasis.com/?action=products&pid=6. Kojoney, from http://kojoney.sourceforge.net/. HoneyBOT, from http://www.atomicsoftwaresolutions.com/honeybot.php. Google Hack Honeypot, from http://ghh.sourceforge.net/.

References Page 3048

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

2220. WinHoneyd, from http://www2.netvigilance.com/winhoneyd. 2221 . HI HAT, from http://hihat.sourceforge.net/. 2222. Argos, from http://www.few.vu.nl/argos/?page=2.
2223. 2224. 2225. 2226. 2227. 2228. 2229. 2230. 2231. 2232. 2233. 2234. 2235. 2236. 2237. 2238. 2239. 2240. 2241. 2242. 2243. 2244. 2245. 2246. 2247. 2248. 2249. 2250. Glastopf, from http://glastopf.org/. Send-Safe Honeypot Hunter, from http://www.send-safe.com/honeypot-hunter.html. IBM Security Network Intrusion Prevention System, from http://www-

0 1 .ibm.com/software/tivoli/products/security-network-intrusion-prevention/.
Peek & Spy, from http://networkingdynamics.com/peek-spy/peekspy/. INTOUCH INSA-Network Security Agent, from http://www.ttinet.com/doc/insa_vl5_025.html. Strata Guard, from http://www.stillsecure.com/strataguard. IDP8200 Intrusion Detection and Prevention Appliances, from https://www.juniper.net/in/en/productsservices/security/idp-series/idp8200/. OSSEC, from http://www.ossec.net/?page_id=19. Cisco Intrusion Prevention Systems, from http://www.cisco.com/en/US/products/ps5729/Products_Sub_Category_Home.html. AIDE (Advanced Intrusion Detection Environment), from http://aide.sourceforge.net/. SNARE (System iNtrusion Analysis & Reporting Environment), from http://www.intersectalliance.com/. Vanguard Enforcer, from http://www.go2vanguard.com/enforcer.php. Check Point Threat Prevention Appliance, from http://www.checkpoint.com/products/threatprevention-appliances/. fragroute, from http://www.monkey.org/~dugsong/fragroute/. Next-Generation Intrusion Prevention System (NGIPS), from http://www.sourcefire.com/securitytechnologies/network-security/next-generation-intrusion-prevention-system. Outpost Network Security, from http://www.agnitum.com/products/networksecurity/index.php. Check Point IPS-1, from http://www.checkpoint.com/products/ips-l/. FortiGate, from http://www.fortinet.com/solutions/ips.html. Enterasys Intrusion Prevention System, from http://www.enterasys.com/products/advanced-securityapps/dragon-intrusion-detection-protection.aspx. StoneGate Virtual IPS Appliance, from http://www.stonesoft.com/en/products/appliances/virtualips.html. Cyberoam Intrusion Prevention System, from http://www.cyberoam.com/ips.html. McAfee Host Intrusion Prevention for Desktops, from http://www.mcafee.com/us/products/host-ips-fordesktop.aspx. ZoneAlarm PRO Firewall, from http://www.zonealarm.com/security/en-us/zonealarm-pro-firewall-antispyware.htm. Check Point Firewall Software Blade, from http://www.checkpoint.com/products/firewall-softwareblade/index.html. eScan Enterprise Edition, from http://www.escanav.com/english/content/products/corp_enterprise/escan_enterprise.asp. Jetico Personal Firewall, from http://www.jetico.com/firewall-jetico-personal-firewall/. Outpost Security Suite, from http://free.agnitum.eom/#. Novell BorderManager, from http://www.novell.com/products/bordermanager/.

References Page 3049

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

2251. 2252. 2253. 2254. 2255. 2256. 2257. 2258. 2259. 2260. 2261. 2262. 2263. 2264. 2265. 2266. 2267. 2268. 2269. 2270. 2271. 2272. 2273. 2274. 2275. 2276. 2277. 2278. 2279. 2280. 2281. 2282. 2283. 2284. 2285.

Firewall UTM, from http://www.esoft.com/network-security-appliances/instagate/. Sonicwall, from http://www.tribecaexpress.com/products/by-manufacturers/sonicwall-firewallsprice.htm. Comodo Firewall, from http://personalfirewall.comodo.com/. Online Armor, from http://www.online-armor.com/products-online-armor-free.php. FortiGate-5101C, from http://www.fortinet.com/press_releases/120227.html. proxify, from http://proxify.com. spysurfing, from http://www.spysurfing.com. alienproxy, from http://alienproxy.com. zendproxy, from http://zendproxy.com/. anonymouse, from http://anonymouse.org. anonymizer, from http://www.anonymizer.com. webproxyserver, from http://www.webproxyserver.net/. boomproxy, from http://www.boomproxy.com/. Loki ICMP tunneling, from http://www.iss.net/security_center/reference/vuln/Loki.htm. AckCmd, from http://ntsecurity.nu/toolbox/ackcmd/. HTTPTunnel, from http://www.nocrew.org/software/httptunnel.html. Send-Safe Honeypot Hunter, from http://www.send-safe.com/honeypot-hunter.html. Traffic IQ Professional, from http://www.idappcom.com/downloads.php. tcp-over-dns, from http://analogbit.com/software/tcp-over-dns. Snare Agent for Windows, from http://www.intersectalliance.com/projects/BackLogNT/. AckCmd, from http://ntsecurity.nu/toolbox/ackcmd/. Tomahawk, from http://tomahawk.sourceforge.net/. Your Freedom, from http://www.your-freedom.net/index.php?id=downloads. Atelier Web Firewall Tester, from http://www.atelierweb.com/products/firewall-tester/. Freenet, from https://freenetproject.org/. GTunnel, from http://gardennetworks.org/download. Hotspot Shield, from http://www.anchorfree.com/hotspot-shield-VPN-download-windows.php. Proxifier, from http://www.proxifier.com/. Vpn One Click, from http://www.vpnoneclick.com/download/index.html. Multi-Generator (MGEN), from http://cs.itd.nrl.navy.mil/work/mgen/index.php. Net-lnspect, from http://search.cpan.org/~sullr/Net-lnspect/lib/Net/lnspect/L3/IP.pm. NConvert, from http://www.xnview.com/en/nconvert/. fping 3, from http://fping.org/. pktgen, from http://www.linuxfoundation.org/collaborate/workgroups/networking/pktgen. PacketMaker, from http://www.jdsu.com/en-us/Test-and-Measurement/Products/a-z-productlist/Pages/packetmaker-sas-sata-tester.aspx.

Module 18: Buffer Overflow 2286. Understanding Buffer Overruns, from http://uk.sys-con.com/node/33998.

References Page 3050

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

2287. 2288. 2289. 2290. 2291. 2292. 2293. 2294. 2295. 2296. 2297. 2298. 2299. 2300. 2301. 2302. 2303. 2304. 2305. 2306. 2307. 2308. 2309. 2310. 2311. 2312. 2313. 2314.

Exploits: Heap, from http://www.sciencedirect.com/science/article/pii/B9781597499972500066. Exploits: Stack, from http://www.sciencedirect.com/science/artide/pii/B9781597499972500054. Writing Exploits II, from http://www.sciencedirect.com/science/article/pii/B9781597499972500091. Hacking Unix, from http://media.techtarget.com/searchEnterpriseLinux/downloads/Hacking_Exp_ch7.pdf. Testing for Stack Overflow, from https://www.owasp.org/index.php/Testing_for_Stack_Overflow. Heap Corruption, from http://www.sciencedirect.com/science/article/pii/B9781932266672500463. Buffer Overflow Attacks-Detect, Exploit, Prevent, from http://newark.pardey.org/deck/book/buffer_overflow_attacks.pdf. Hack Proofing Your Network-8, from http://forum.slime.com.tw/threadll7254.html. Statically Detecting Likely Buffer Overflow Vulnerabilities, from http://lclint.cs.virginia.edu/usenix0 1 .html. Buffer Overflow -OWASP, from www.owasp.org/index.php/Buffer_Overflow. NedSecure Solutions -Toelichting aanvalstechnieken, from www.nedsecure.nl/index.php?option=com_content&task=view&id=lll&ltemid=44&lang=. Tony Bradley, Zero Day Exploits: The Holy Grail, from http://netsecurity.ab0ut.c0m/0d/newsandedit0riall/a/aazer0day.htrn. FWSM URL Filtering Solution TCP ACL Bypass Vulnerability [Products from www.cisco.com/en/US/products/products_security_advisory09186a0080464d00.shtml. Roger Gustavsson, (2006), Buffer overflow, from http://idenet.bth.se/servlet/download/news/23644/Gustavsson+-+Buffer+Overflows.pdf. Stack Smashing Defense: A Buffer Overflow Lab Exercise, from http://cisa.umbc.edu/CDX/Will/stack_smash_proposal.pdf. US-CERT Vulnerability Note VU#726198, from http://www.kb.cert.org/vuls/id/726198. David Litchfield, Windows Heap Overflows, www.blackhat.com/presentations/win.../bh-win-04litchfield.ppt. Ronnie Johndas, Steps Involved in Exploiting a Buffer Overflow Vulnerability using a SEH Handler, http://www.infosecwriters.com/text_resources/pdf/RJohndas_Buffer_Overflow_SEH_Handler.pdf. Microsoft Index Server ISAPI Extension Buffer Overflow, from http://www.ciac.org/ciac/bulletins/l098.shtml. Mehdi Mousavi, What an ISAPI extension is?, from http://www.codeproject.com/KB/ISAPI/isapi_extensions.aspx. Fireproofing Against DoS Attacks, from http://www.networkcomputing.com/1225/1225f38.html. Unchecked Buffer in ISAPI Extension Enables Remote Compromise of IIS 5.0 Server, from http://www.securiteam.com/windowsntfocus/5CP010K4AK.html. Heap Overrun in HTR Chunked Encoding Could Enable Web Server Compromise, from http://www.securiteam.com/windowsntfocus/5IP0ClP7FC.html. Unchecked Buffer in Index Server ISAPI Extension Leads to Web Server Compromise, from http://www.securiteam.com/windowsntfocus/5FP0B2K4KU.html. Testing for Heap Overflow, from http://www.owasp.org/index.php/Testing_for_Heap_Overflow. Tom Chmielarski, (2010), Enhanced Mitigation Experience Toolkit reduces buffer overflow attacks, from http://searchmidmarketsecurity.techtarget.com/tip/0,289483,sidl98_gcil520906,00.html. ADMmutate, from http://www.ktwo.ca/security.html. GDB, from http://www.gnu.org/software/gdb/.
Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

References Page 3051

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

2315. 2316. 2317. 2318. 2319. 2320. 2321. 2322. 2323. 2324. 2325. 2326. 2327. 2328. 2329. 2330. 2331. 2332. 2333. 2334. 2335. 2336. 2337. 2338. 2339. 2340. 2341.

Netcat, from http://netcat.sourceforge.net/download.php. LCLint, from http://www.linuxjournal.com/article/3599. Code::Blocks, from http://www.codeblocks.org/. eEye Retina, from http://www.eeye.com/. Spike, from http://spike.lazypics.de/dl_index_en.html. Brute Force Binary Tester (BFB), from http://bfbtester.sourceforge.net/. Immunity CANVAS, from http://www.immunityinc.com/products-canvas.shtml. Immunity Debugger, from http://www.immunityinc.com/products-immdbg.shtml. Splint, from http://www.splint.org/download.html. Flawfinder, from http://www.dwheeler.com/flawfinder/. BLAST, from http://mtc.epfl.ch/software-tools/blast/index-epfl.php. Stack Shield, from http://www.angelfire.com/sk/stackshield/download.html. Valgrind, from http://valgrind.org/downloads/current.html. PolySpace C Verifier, from http://www.mathworks.in/products/polyspace/. Insure++, from http://www.parasoft.com/jsp/products/insure.jsp?itemld=63. /GS, from http://microsoft.com. BufferShield, from http://www.sys-manage.com/PR0DUCTS/BufferShield/tabid/61/Default.aspx. DefenseWall, from http://www.softsphere.com/online-help/defenceplus/. TIED, from http://www.security.iitk.ac.in/index.php?page=contents/projects/tied_libsafe/tied_libsafeplus. LibsafePlus, from http://www.security.iitk.ac.in/index.php?page=contents/projects/tied_libsafe/tied_libsafeplus. Comodo Memory Firewall, from http://www.comodo.com/news/press_releases/16_01_08.html. Clang Static Analyzer, from http://clang-analyzer.llvm.org/. FireFuzzer, from https://c0de.g00gle.c0m/p/firefuzzer/. BOON, from http://www.cs.berkeley.edu/~daw/boon/. The Enhanced Mitigation Experience Toolkit, from http://www.microsoft.com/enus/download/details.aspx?id=29851. CodeSonar Static Analysis Tool, from http://www.grammatech.com/codesonar. CORE IMPACT Pro, from http://www.coresecurity.com/core-impact-pro.

Module 19: Cryptography 2342. 2343. 2344. 2345. 2346. 2347. 2348. MD5 - message digest (fingerprint, checksum), from http://www.akadia.com/services/md5.html. Web App Security, from http://www.hackerscenter.com/archive/view.asp?id=25264. Cryptography, from http://www.crcnetbase.com/doi/abs/10.1201/9780203507872.ch6. Integrated Technologies, from http://www.crcnetbase.com/doi/abs/10.1201/9780203330708.ch8. Cracking S/MIME encryption using idle CPU time, from http://www.securiteam.com/tools/3J5PRQ0PPQ.html. Check Point RealSecure Attack Signatures Glossary, from http://www.checkpoint.com/support/technical/documents/realsecure/Attack_Signatures.pdf. MarkJ Cox, from http://www.awe.com/mark/talks/apachecon2003us.html.

References Page 3052

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

2349. 2350. 2351. 2352. 2353. 2354. 2355. 2356. 2357. 2358. 2359. 2360. 2361. 2362. 2363. 2364. 2365. 2366. 2367. 2368. 2369. 2370. 2371. 2372. 2373. 2374. 2375.

(2001), Announcing the ADVANCED ENCRYPTION STANDARD (AES), http://csrc.nist.gov/publications/fips/fipsl97/fips-197.pdf. MICHAEL WELSCHENBACH, Cryptography in C and C+ + , Second Edition, apress.com/book/view/1590595025. Rolf Oppliger, (2005), Contemporary Cryptography, http://www.free-ebook-download.net/technical book/8574-contemporary-cryptography.html. R. F. Churchhouse, (2001), Codes and ciphers (Julius Caesar, the Enigma and the internet), http://ebookee.org/Codes-and-CiphersJulius-Caesar-the-Enigmaand-the-lnternet_128588.html. John Talbot and Dominic Welsh, (2006), Complexity and Cryptography an introduction, http://www.cambridge.org/gb/knowledge/isbn/itemll72875/?site_locale=en_GB. BRUCE SCHNEIER, Applied Cryptography, Second Edition, http://www.schneier.com/book-applied.html. JAMES BAMFORD, (2002), Body of Secrets, http://sandiego.indymedia.org/media/2007/02/125027.pdf. T. W. Korner, (1998), Coding and Cryptography, http://www.dpmms.cam.ac.uk/~twk/. Kenneth W. Dam and Herbert S. Lin, (1996), Cryptography's Role In Securing The Information Society, http://www.comms.scitech.susx.ac.uk/fft/crypto/cryptorole.pdf. Peter Gutmann, Cryptography and Data Security, http://www.comms.scitech.susx.ac.uk/fft/crypto/CryptoTutorial/partl.pdf. Documentation and Encryption, from http://www.linuxsecurity.com/content/view/17/70/. Josh Ryder, Introduction to Encryption, from http://www.developer.com/tech/article.php/630681. Authentication Technologies, from http://www.techarch.state.ar.us/domains/security/resources/techlist.htm. Jari Arkko, Vesa Torvinen, Aki Niemi, (2002), HTTP Authentication with EAP, from http://www.arkko.com/publications/draft-torvinen-http-eap-0 1 .txt. Ralf Junker, Functions and Procedures: Basic Authentication, from http://www.zeitungsjunge.de/delphi/mime/Help/DIMime.htm. Authentication, Authorization, and Access Control, from httpd.apache.org/docs. John Franks, (1999), HTTP Authentication: Basic and Digest Access Authentication, from http://www.ietf.org/rfc/rfc2617.txt. Jeff Kercher, Edward Jezierski, (2001), Authentication in ASP.NET: .NET Security Guidance, from http://msdn.microsoft.com/library/default. asp?url=/library/en-us/dnbda/html/authaspdotnet. asp. Digital Certificates, from www.bitpipe.com/tlist/Digital-Certificates.html. Vijay Bollapragada, IPSec Authentication and Authorization Models, from www.ciscopress.com/articles/article.asp?p=421514&seqNum=4 -31k . Certificate-based Authentication, from http://www.microsoft.com/technet/security/Bulletin/MS02048.mspx. Abel Banda, (2003), Forms-based Authentication, from www.ondotnet.com/pub/a/dotnet/2003/01/06/formsauthpl.html. Kimon Rethis Biometrics Authentication, from www.csun.edu. Fingerprint-based Identification, from www.barcode.ro/tutorials/biometrics/fingerprint.html Michael Anissimov, Retina Scanning, from www.wisegeek.com/how-does-a-retinal-scan-work.htm. Afghan Woman Recognized After 17 Years, from http://www.ct.gov/dss/cwp/view.asp?a=2349&q=304748. Bill Gates at the RSA Conference 2006, from http://www.microsoft.com/billgates/speeches.

References Page 3053

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

2376. 2377. 2378. 2379. 2380. 2381. 2382. 2383. 2384. 2385. 2386. 2387. 2388. 2389. 2390. 2391. 2392. 2393. 2394. 2395. 2396. 2397. 2398. 2399. 2400. 2401. 2402. 2403. 2404. 2405. 2406.

Security Awareness is Rising while Security Protections are falling, from www.miora.com/articles/awareness.htm. Soumyadip Rakshit, Biometric access control, from http://www.jiskha.com/science/biology/biometrics.html. Prof. Ausif Mahmood RSA (Rivest, Shamir, and Adleman), from www.bridgeport.edu/sed/projects/cs597/Spring_2004/sbhumana/index.htm. BlowFish, from www.answers.com/topic/blowfish. Algorithms and Security, from www.tcuconnect.com/help/faq_security.asp. SHA (Secure Hash Algorithm), from http://www.safeexim.safescrypt.com/SafeDoXX_User_Manual.pdf. Christopher Allen, Tim Dierks, SSL Handshake Protocol Flow, from https://www.ipa.go.jp/security/rfc/RFC2246-07EN.html. Cryptography Attacks, from www.hack.gr/users/dij/crypto/overview/terminology.html. Cryptography Attacks, from http://ieeexplore.ieee.org/iel5/10600/33508/01590056.pdf?isnumber=33508&arnumber=1590056. What is a hash function?, from http://www.rsa.com/rsalabs/node.asp?id=2176. What is Capstone?, from http://www.rsa.com/rsalabs/node.asp?id=2317. What are RC5 and RC6?, from http://www.rsa.com/rsalabs/node.asp?id=2251. This challenge is no longer active, from http://www.rsa.com/rsalabs/node.asp?id=2094. Dorothy E. Denning & Dennis K. Branstad, 1996, A Taxonomy for Key Escrow Encryption Systems, from http://www.cosc.georgetown.edu/~denning/crypto/Taxonomy.html. Parameter Tampering, from http://www.imperva.com/resources/glossary/parameter_tampering.html. Pascal Meunier, (2004), Programming Issues, from www. cerias. purdue. edu/secprog/class2/7.Canon_&_DT.ppt. About Secure Shell, from http://www.onsight.com/faq/ssh/ssh-faq-l.html. PGP Attack FAQ: The asymmetric cipher http://www.iusmentis.com/technology/encryption/pgp/pgpattackfaq/asymmetric/. Digital Signature Guidelines, from Tutorial http://www.abanet.org/scitech/ec/isc/dsg-tutorial.html. What is public-key cryptography?, from http://www.rsa.com/rsalabs/node.asp?id=2165. What is Public-Key Cryptography?, from http://www.x5.net/faqs/crypto/q3.html. Security FAQs, from http://www.tcuconnect.com/help/faq_security.asp. RSA Security- 2.1.1 What is public-key cryptography?, from http://www.rsasecurity.com/rsalabs/node.asp?id=2165. Mahmood, (2006), Encryption and Decryption using RSA, from http://www.bridgeport.edu/sed/projects/cs597/Spring_2004/sbhumana/index.htm. HashCalc, from http://www.slavasoft.com/hashcalc/. MD5 Calculator, from http://www.bullzip.com/products/md5/info.php. HashMyFiles, from http://www.nirsoft.net/utils/hash_my_files.html. Advanced Encryption Package, from http://www.aeppro.com/. BCTextEncoder, from http://www.jetico.com/encryption-bctextencoder. CommuniCrypt File Encryption Tools, from http://www.communicrypt.com. Steganos LockNote, from https://www.steganos.com/us/products/for-free/locknote/overview/.

References Page 3054

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

2407. 2408. 2409. 2410. 2411. 2412. 2413. 2414. 2415. 2416. 2417. 2418. 2419. 2420. 2421. 2422. 2423. 2424. 2425. 2426. 2427. 2428. 2429. 2430. 2431. 2432. 2433. 2434. 2435. 2436. 2437. 2438. 2439. 2440. 2441. 2442. 2443. 2444. 2445. 2446.

AxCrypt, from http://www.axantum.com/axcrypt/. AutoKrypt, from http://www.hiteksoftware.com/autokrypt/data-encryption-software.htm. CryptoForge, from http://www.cryptoforge.com/. NCrypt XL, from http://www.littlelite.net/ncryptxl/. ccrypt, from http://ccrypt.sourceforge.net/. WinAES, from http://fatlyz.com/en/winaes/. EncryptOnClick, from http://www.2brightsparks.com/onclick/eoc.html. GNU Privacy Guard, from http://www.gnupg.org. comodo, from http://www.comodo.com/. thawte, from http://www.thawte.com/. verisign, from http://www.verisign.com. entrust, from http://www.entrust.net/. TrueCrypt, from http://www.truecrypt.org/. GiliSoft Full Disk Encryption, from http://www.gilisoft.com/product-full-disk-encryption.htm. DriveCrypt, from http://www.securstar.com/products_drivecrypt.php. ShareCrypt, from http://www.securstar.com/products_sharecrypt.php. PocketCrypt, from http://www.securstar.com/products_pocketcrypt.php. Rohos Disk Encryption, from http://www.rohos.com/products/rohos-disk-encryption/. R-Crypto, from http://www.r-tt.com/data_security_software/. SafeBit Disk Encryption, from http://www.safebit.net/. DiskCryptor, from http://diskcryptor.net/wiki/Main_Page/en. alertsec, from http://www.alertsec.com/software-overview/. Symantec Drive Encryption, from http://www.symantec.com/whole-disk-encryption. DriveCrypt Plus Pack, from http://www.securstar.com/products_drivecryptpp.php. CrypTool, from http://www.cryptool.org/en. CryptoBench, from http://www.addario.org/cryptobench/. JCrypTool, from http://www.cryptool.org/en/jcryptool. Ganzua, from http://ganzua.sourceforge.net/en/index.html. Crank, from http://crank.sourceforge.net/index.html. EverCrack, from http://evercrack.sourceforge.net/. AlphaPeeler, from http://alphapeeler.sourceforge.net/indexl.htm. Draft Crypto Analyzer, from http://www.literatecode.com/draca. Linear Hull Cryptanalysis of PRESENT, from http://www.ecrypt.eu.org/tools/present-linear-hull. mediggo, from http://c0de.g00gle.c0m/p/medigg0/. SubCypher, from http://www.esclepiusllc.com/index.php?page=subcypher. MD5 Decrypt, from http://www.md5decrypt.org/. MD5Cracker, from http://md5crack.com/. MD5 Hash Cracker, from http://www.tmto.org/pages/passwordtools/hashcracker/. Hash Cracker, from http://www.hash-cracker.com/. MD5Decrypter, from http://www.md5decrypter.com/.

References Page 3055

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

2447. 2448. 2449. 2450. 2451.

OnlieHashCrack.com, from http://www.onlinehashcrack.com/index.php. MD5Decrypter.co.uk, from http://www.md5decrypter.co.uk/. Md5.My-Addr.com, from http://md5.my-addr.com/md5_decryptmd5_cracker_online/md5_decoder_tool.php. cmd5.org, from http://www.cmd5.org/. Crypt and Decrypt Online Tool Conversion, from http://myeasywww.appspot.com/utility/free/online/Crypt-and-Decrypt-toolonline/en?command=UTILITY&ID=2.

Module 20: Penetration Testing 2452. 2453. 2454. 2455. 2456. 2457. 2458. 2459. 2460. 2461. 2462. 2463. 2464. 2465. 2466. 2467. 2468. 2469. 2470. 2471. 2472. 2473. Assessing Network Security, from http://www.scribd.com/doc/24594933/Assessing-Network-Security. Technical (Bottom-Up) Methodology, from http://www.crcnetbase.com/doi/abs/10.1201/9780203503041.ch6. Auditing, from http://www.crcnetbase.com/doi/abs/10.1201/9781420000047.ch3. Automated Penetration Testing - False Sense of Security, from http://www.it-observer.com/automatedpenetration-testing-false-sense-security.html. Application Assessment Questioning, from http://www.technicalinfo.net/papers/AssessmentQuestions.html. How are Penetrating Testing conducted?, from www.corsaire.com . Categories of security assessments, from http://safari.oreilly.com/0735618682/part06. Assessing Network Security, from http://safari.phptr.com/0735620334/ch01levlsec3. Penetration testing guide, from http://www.penetration-testing.com/. COMPUTER SECURITY PERFORMANCE TESTEXAMPLE, from http://sedists.org/lists/pentest/2003/Feb/att-0015/Pennetration_Test_Agreement_txt. Service Level Agreements, from http://it.usu.edu/htm/hardware/service-level-agreements. Jeff Forrista, (2001), Fireproofing Against DoS Attacks, from http://www.networkcomputing.com/1225/1225f38.html. Konstantinos Karagiannis, Pen-Test Using FoundScan Hardware Appliances, from http://www.eweek.com/cobrand/0,3223,a=27473&s=1610&ap=,00.asp. Pen-Test Using NetRecon, from http://www.net-security.org/dl/newsletter/txt/issue059.txt. Pen-Test Using SATAN, SARA and Security Analyzer, from http://www.ciac.org/ciac/ToolsUnixNetSec.html. E- Commerce Security, from http://netdesignplus.net/publications/victor_sawma_thesis.pdf. Design Guidelines for Secure Web Applications, from http://msdn.microsoft.com/library/enus/dnnetsec/html/thcmch04.asp?frame=true. KEN BRANDT, STU GREEN, ENRIQUE ZUNIGA, Activity: Escalating Privileges, from http://infosecuritymag.techtarget.com/ar. The Professional Security Testers (PST) Warehouse: Web Proxy, from http://www.professionalsecuritytesters.org/modules.php?name=News&new_topic=16. Microsoft Security Bulletin (MS99-046) Frequently Asked Questions, http://www.microsoft.com/technet/security/bulletin/fq99-046.mspx. Penetration testing guide, from http://www.penetration-testing.com/. Netscape, from http://netscape.aol.com/.

References Page 3056

Ethical Hacking and C ounterm easures Copyright by EC -C O U IIC il All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures References

Exam 312-50 Certified Ethical Hacker

2474. 2475. 2476. 2477. 2478. 2479. 2480. 2481. 2482. 2483. 2484. 2485. 2486.

Kyle Lai, (2002), Change MAC Address on Win2K & XP, from http://sedists.org/pentest/2002/Nov/0025.html. Anatomy of an ARP Poisoning Attack, from http://www.watchguard.com/infocenter/editorial/135324.asp. Hacking Lexicon, from http://www.cybersoft.com/whitepapers/reference/hacking_lexicon.shtml Information Security Magazine, from http://infosecuritymag.techtarget.com/articles/march01/features4_battle_plans.shtml. Finding and Fixing Network Vulnerabilities, from http://www.eweek.com/cobrand/0,3223,a=27473&s=1610&ap=,00.asp. Fireproofing against DoS Attacks, from http://www.networkcomputing.com/1225/1225f38.html. Get quality service from your suppliers, from http://www.businesslink.gov.uk/bdotg/action/detail?type=RESC>URCES&itemld=1073792560. Stephen, (2006), USU Help Desk, from http://helpdesk.usu.edu/content/hardware/sla.contracts.php. Computer Security Performance Test example Independent Oversight Cyber Security Performance Test, from http://seclists.org/lists/pen-test/2003/Feb/att-0015/Pennetration_Test_Agreement_txt. Safari Books Online- Microsoft Windows Security Resource Kit, from http://safari.oreilly.com/0735618682/part06. Christopher R. Russel, (2001), Penetration Testing with dsniff, from http://www.ouah.org/dsniffintr.htm. IDA, from https://www.hex-rays.com/products/ida/index.shtml. Kismet, from http://www.kismetwireless.net/download.shtml.

References Page 3057

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Das könnte Ihnen auch gefallen