Foreword |
|
xvii | |
Acknowledgments |
|
xxi | |
Introduction |
|
xxiii | |
Part I Casing the Establishment |
|
|
Case Study: Target Acquisition |
|
|
2 | (3) |
|
|
5 | (28) |
|
|
6 | (1) |
|
Why Is Footprinting Necessary? |
|
|
6 | (1) |
|
|
6 | (25) |
|
Determine the Scope of Your Activities |
|
|
8 | (5) |
|
|
13 | (9) |
|
|
22 | (5) |
|
|
27 | (4) |
|
|
31 | (2) |
|
|
33 | (38) |
|
|
44 | (2) |
|
Identifying TCP and UDP Services Runing |
|
|
46 | (5) |
|
Windows-Based Port Scanners |
|
|
51 | (6) |
|
|
57 | (4) |
|
Active Stack Fingerprinting |
|
|
61 | (4) |
|
Passive Stack Fingerprinting |
|
|
65 | (2) |
|
The Whole Enchilada: Automated Discovery Tools |
|
|
67 | (1) |
|
|
68 | (3) |
|
|
71 | (46) |
|
Windows NT/2000 Enumeration |
|
|
72 | (28) |
|
NT/2000 Network Resource Enumeration |
|
|
76 | (11) |
|
NT/2000 User and Group Enumeration |
|
|
87 | (8) |
|
NT/2000 Applications and Banner Enumeration |
|
|
95 | (4) |
|
Let Your Scripts Do the Walking |
|
|
99 | (1) |
|
|
100 | (6) |
|
Browsing the Network Neighborhood |
|
|
100 | (6) |
|
|
106 | (7) |
|
|
113 | (3) |
Part II System Hacking |
|
|
Case Study: Know Your Enemy |
|
|
116 | (1) |
|
Hacking Windows 95/98 and ME |
|
|
117 | (24) |
|
|
118 | (12) |
|
Direct Connection to Win 9x Shared Resources |
|
|
119 | (5) |
|
Win 9x Backdoor Servers and Trojans |
|
|
124 | (5) |
|
Known Server Application Vulnerabilities |
|
|
129 | (1) |
|
|
130 | (1) |
|
|
130 | (7) |
|
Windows Millennium Edition (ME) |
|
|
137 | (1) |
|
|
138 | (3) |
|
|
141 | (78) |
|
|
143 | (1) |
|
|
143 | (1) |
|
|
143 | (1) |
|
The Quest for Administrator |
|
|
144 | (30) |
|
Remote Exploits: Denial of Service and Buffer Overflows |
|
|
160 | (4) |
|
|
164 | (10) |
|
|
174 | (37) |
|
|
185 | (5) |
|
|
190 | (4) |
|
Remote Control and Back Doors |
|
|
194 | (9) |
|
|
203 | (4) |
|
General Countermeasures to Privileged Compromise |
|
|
207 | (4) |
|
Rootkit: The Ultimate Compromise |
|
|
211 | (3) |
|
|
214 | (2) |
|
|
214 | (1) |
|
|
214 | (1) |
|
|
215 | (1) |
|
|
216 | (3) |
|
|
219 | (46) |
|
|
221 | (1) |
|
|
221 | (5) |
|
|
226 | (3) |
|
|
229 | (4) |
|
NetBIOS-SMB Password Guessing |
|
|
229 | (1) |
|
Eavesdropping on Password Hashes |
|
|
229 | (1) |
|
|
229 | (4) |
|
|
233 | (1) |
|
|
233 | (5) |
|
|
238 | (3) |
|
|
241 | (10) |
|
Grabbing the Win 2000 Password Hashes |
|
|
241 | (5) |
|
The Encrypting File System (EFS) |
|
|
246 | (3) |
|
|
249 | (2) |
|
|
251 | (1) |
|
|
251 | (1) |
|
|
252 | (1) |
|
|
252 | (1) |
|
|
252 | (5) |
|
|
252 | (3) |
|
|
255 | (2) |
|
|
257 | (1) |
|
General Countermeasures: New Windows Security Tools |
|
|
257 | (4) |
|
|
257 | (3) |
|
|
260 | (1) |
|
|
261 | (4) |
|
|
265 | (40) |
|
Attaching but Not Touching |
|
|
267 | (1) |
|
Enumerate Bindery and Trees |
|
|
268 | (7) |
|
Opening the Unlocked Doors |
|
|
275 | (2) |
|
Authenticated Enumeration |
|
|
277 | (5) |
|
|
282 | (3) |
|
Application Vulnerabilities |
|
|
285 | (2) |
|
Spoofing Attacks (Pandora) |
|
|
287 | (3) |
|
Once You Have Admin on a Server |
|
|
290 | (2) |
|
|
292 | (6) |
|
|
298 | (4) |
|
|
299 | (3) |
|
|
302 | (1) |
|
Web Sites (ftp:/ /ftp.novell.com/pub/updates/nw/nw411/) |
|
|
302 | (1) |
|
|
303 | (1) |
|
|
303 | (2) |
|
|
305 | (72) |
|
|
306 | (1) |
|
|
306 | (1) |
|
|
307 | (1) |
|
Remote Access Versus Local Access |
|
|
307 | (1) |
|
|
308 | (31) |
|
|
312 | (5) |
|
|
317 | (5) |
|
Common Types of Remote Attacks |
|
|
322 | (17) |
|
|
339 | (18) |
|
|
357 | (13) |
|
|
358 | (11) |
|
|
369 | (1) |
|
|
370 | (4) |
Part III Network Hacking |
|
|
Case Study: Sweat the Small Stuff! |
|
|
374 | (3) |
|
Dial-Up, PBX, Voicemail, and VPN Hacking |
|
|
377 | (44) |
|
|
380 | (25) |
|
|
380 | (1) |
|
|
381 | (1) |
|
|
382 | (1) |
|
|
382 | (21) |
|
|
403 | (2) |
|
|
405 | (10) |
|
Virtual Private Network (VPN) Hacking |
|
|
415 | (4) |
|
|
419 | (2) |
|
|
421 | (38) |
|
|
422 | (11) |
|
|
422 | (7) |
|
|
429 | (4) |
|
|
433 | (10) |
|
|
433 | (4) |
|
Lower the Gates (Vulnerabilities) |
|
|
437 | (6) |
|
|
443 | (14) |
|
Detecting the Media You're On |
|
|
444 | (1) |
|
Passwords on a Silver Platter: Dsniff |
|
|
445 | (3) |
|
Sniffing on a Network Switch |
|
|
448 | (4) |
|
|
452 | (5) |
|
|
457 | (2) |
|
|
459 | (24) |
|
|
460 | (1) |
|
|
460 | (9) |
|
Advanced Firewall Discovery |
|
|
465 | (4) |
|
Scanning Through Firewalls |
|
|
469 | (4) |
|
|
473 | (4) |
|
Application Proxy Vulnerabilities |
|
|
477 | (4) |
|
|
479 | (2) |
|
|
481 | (2) |
|
Denial of Service (DoS) Attacks |
|
|
483 | (28) |
|
Motivation of DoS Attackers |
|
|
484 | (1) |
|
|
485 | (3) |
|
|
485 | (1) |
|
|
486 | (1) |
|
|
486 | (1) |
|
|
487 | (1) |
|
|
488 | (6) |
|
|
491 | (3) |
|
|
494 | (12) |
|
|
495 | (4) |
|
Distributed Denial of Service Attacks |
|
|
499 | (5) |
|
|
504 | (2) |
|
|
506 | (2) |
Part IV Software Hacking |
|
|
Case Study: Using All the Dirty Tricks to Get In |
|
|
508 | (3) |
|
Remote Control Insecurities |
|
|
511 | (18) |
|
Discovering Remote Control Software |
|
|
512 | (1) |
|
|
513 | (1) |
|
|
514 | (7) |
|
|
516 | (1) |
|
|
517 | (4) |
|
What Software Package Is the Best in Terms of Security? |
|
|
521 | (6) |
|
|
521 | (1) |
|
|
521 | (1) |
|
|
521 | (2) |
|
Remotely Possible/ControIIT |
|
|
523 | (1) |
|
|
523 | (1) |
|
Virtual Network Computing (VNC) |
|
|
523 | (3) |
|
|
526 | (1) |
|
|
527 | (2) |
|
|
529 | (36) |
|
|
530 | (3) |
|
|
533 | (22) |
|
|
555 | (3) |
|
Subverting the System Environment: Rootkits and Imaging Tools |
|
|
558 | (3) |
|
|
561 | (2) |
|
|
563 | (2) |
|
|
565 | (36) |
|
|
566 | (4) |
|
Finding Well-Known Vulnerabilities |
|
|
570 | (3) |
|
Automated Scripts, for All Those ``Script Kiddies'' |
|
|
570 | (2) |
|
|
572 | (1) |
|
Script Inadequacies: Input Validation Attacks |
|
|
573 | (17) |
|
Active Server Pages (ASP) Vulnerabilities |
|
|
582 | (8) |
|
|
590 | (8) |
|
|
598 | (2) |
|
|
600 | (1) |
|
Hacking the Internet User |
|
|
601 | (66) |
|
|
603 | (20) |
|
|
603 | (11) |
|
|
614 | (4) |
|
Beware the Cookie Monster |
|
|
618 | (3) |
|
Internet Explorer HTML Frame Vulnerabilities |
|
|
621 | (2) |
|
|
623 | (3) |
|
|
626 | (21) |
|
|
626 | (3) |
|
Executing Arbitrary Code Through Email |
|
|
629 | (8) |
|
Outlook Address Books Worms |
|
|
637 | (2) |
|
|
639 | (8) |
|
|
647 | (2) |
|
Napster Hacking with Wrapster |
|
|
649 | (1) |
|
Global Countermeasures to Internet User Hacking |
|
|
650 | (2) |
|
Keep Antivirus Signatures Updated |
|
|
650 | (1) |
|
|
651 | (1) |
|
|
652 | (5) |
Part V Appendixes |
|
|
|
657 | (4) |
|
B Top 14 Security Vulnerabilities |
|
|
661 | (2) |
|
C About the Companion Web Site |
|
|
663 | (4) |
|
|
664 | (1) |
|
|
665 | (1) |
|
|
665 | (1) |
|
Wordlists and Dictionaries |
|
|
666 | (1) |
|
|
666 | (1) |
|
|
666 | (1) |
Index |
|
667 | |