Index
A
- A records, querying, Reverse DNS Sweeping
- AAAA records, IPv6 Host Enumeration
- ACLs (access control lists), reverse engineering by manipulating TTL, Manipulating TTL to Reverse Engineer ACLs-Manipulating TTL to Reverse Engineer ACLs
- address space layout randomization (ASLR), Compiler and OS Security Features
- Adobe ColdFusion, Adobe ColdFusion-Apache Solr Vulnerabilities
- adversaries, goals of, Adversarial Goals
- AFP (Apple Filing Protocol), Apple Filing Protocol
- AIX operating systems, heap management, The heap
- AJP (Apache JServ Protocol), Attacking Apache JServ Protocol
- allocator/de-allocator functions, managing heap data, The heap
- antivirus engines
- Apache Coyote, Apache Tomcat, Attacking Apache JServ Protocol
- Apache Hadoop, Apache Hadoop
- Apache HTTP Server
- Apache Solr, vulnerabilities, Apache Solr Vulnerabilities
- Apache Struts, Apache Struts-JDWP
- Apache Tomcat, Known Apache Coyote Weaknesses, Apache Tomcat-JBoss Testing
- APIs
- APNIC database, enumerating Nintendo objects in, Enumerating database objects via WHOIS
- Apple Filing Protocol (see AFP)
- Apple OS X (see OS X)
- application data, targeting, Overwriting memory structures for gain
- application servers, The Application Tier
- application tier (web applications), The Application Tier
- arbitrary code execution, Adversarial Goals
- ARIN database, enumerating Nintendo objects in, Enumerating database objects via WHOIS
- ARP cache poisoning, Network infrastructure testing, Local Network Discovery Recap
- AS (Autonomous System) numbers, BGP Enumeration
- asleap utility, cracking PEAP credentials, PEAP
- ASLR (address space layout randomization), Compiler and OS Security Features
- ASP.NET framework, Microsoft ASP.NET
- attack graphs, plotting, Attacker Economics
- attack platforms for internal routing protocols, Internal Routing Protocols
- attack proxies, Web service testing
- attack surface, considering, Considering Attack Surface
- attacker economics, Attacker Economics
- attackers, goals of, Adversarial Goals
- attributes (HTTP cookies), Setting cookies
- authentication
- 802.1X methods of, 802.1X PNAC
- enumerating mechanisms for SMTP using EHLO, Brute-Force Password Grinding
- exposed Microsoft authentication mechanisms, Brute-Force Password Grinding
- HTTP mechanisms for, HTTP authentication mechanisms
- IKE methods of, Supported transform enumeration
- IMAP services, Brute-Force Password Grinding
- in SSH, enumerating supported mechanisms, Supported authentication mechanisms
- in TLS, TLS Authentication-Session Resumption
- in web application data tier, mechanisms for, The Data Tier
- IPsec, Attacking XAUTH
- Kerberos, Kerberos-VNC
- LDAP clients, LDAP Authentication
- POP3 services, Brute-Force Password Grinding
- SMB, SMB authentication
- strong authentication via certificate validation, Local Network Attack Countermeasures
- Windows authentication information leak, Windows authentication information leak
- with Microsoft SQL Server, Authenticating and Evaluating Configuration
- with Oracle Database, Authenticating with Oracle Database
- with PostgreSQL, Brute-Force Password Grinding
- Authorization request header, HTTP authentication mechanisms
- autoDANE utility, Automating the process
- automated enumeration tools, Automating Enumeration
B
- Barracuda Spam Firewall, Remotely Exploitable Flaws
- baseboard management controllers (BMCs), IPMI
- bash shell, vulnerability, Exposed logic examples
- Basic authentication, HTTP authentication mechanisms
- BEAST attacks (TLS), SSL and TLS protocol weaknesses
- BGP (Border Gateway Protocol) enumeration, BGP Enumeration
- BIND
- BlindElephant, framework fingerprinting with, Framework and Data Store Profiling
- BMCs (baseboard management controllers), IPMI
- BREACH attack (TLS), SSL and TLS protocol weaknesses
- Bridge Protocol Data Unit (BPDU) frames, 802.1D STP
- broadcast addresses, Using broadcast addresses
- browsers
- brute-force password grinding, Common Network Service Assessment Recap
- BSD operating systems, heap management, The heap
- BSS (block started by symbol) segment (memory), Data and BSS segments
- buffer overflows, Adversarial Goals
- bug trackers, public, Public vulnerability sources, Bug Trackers
C
- C/C++
- caching in HTTP sessions, Support for persistent connections and caching
- calling convention, The stack
- CAM table overflow, 802.3 Ethernet Testing, CAM table overflow
- CAs (certificate authorities), TLS Authentication
- Catalina, Apache Tomcat, Attacking Apache JServ Protocol
- CDE (Common Desktop Environment) services, Unix RPC Services
- CDNs (content delivery networks), Web Application Types, CDNs
- CDP (see Cisco Discovery Protocol)
- CERT vulnerability notes, Public vulnerability sources
- certificate authorities (see CAs)
- certificate validation, strong authentication through, Local Network Attack Countermeasures
- certificates
- CFML (ColdFusion Markup Language), Adobe ColdFusion
- chains (certificate), CAs and chaining
- Change Cipher Spec records (TLS), Finished
- Chess, Brian, A Taxonomy of Software Security Errors
- chunked encoding, Support for persistent connections and caching
- chunks (SCTP), Packet format
- cipher suites (TLS), Cipher Suites
- ciphertext, attacks on, Cryptographic Weaknesses
- Cisco ASA, aggressive mode IKE group enumeration flaw, Aggressive mode IKE group enumeration
- Cisco Discovery Protocol (CDP), CDP-CDP
- attacks against, CDP
- CDP frame decode using Yersinia, CDP
- Cisco IronPort, Remotely Exploitable Flaws
- Cisco switches
- Cisco VPN, getting information on via Google search, Obtaining VPN configuration files
- cisco-decrypt tool, Obtaining VPN configuration files
- Cisco-specific data link security features, Local Network Attack Countermeasures
- clients
- close proximity, system access from, System Access and Execution Context
- cloud computing
- clusterd utility, Framework and Data Store Profiling
- CMSs (content management systems), Web Application Types
- code analysis tools, Static code analysis
- code executon, arbitrary, by attackers, Adversarial Goals
- code quality, A Taxonomy of Software Security Errors
- code signing, Compiler and OS Security Features
- ColdFusion application server (see Adobe ColdFusion)
- ColdFusion Markup Language (CFML), Adobe ColdFusion
- collisions, Cryptographic Weaknesses
- Coly, EIGRP attacks via, EIGRP
- command execution in Windows in MITM ARP cache poisoning attacks, ARP cache poisoning
- command injection, Web application testing, Logic Flaws and Other Bugs
- commands (SMTP), listing supported, Enumerating Supported Commands and Extensions
- Common Criteria, Design review
- Common Desktop Environment (CDE) services, Unix RPC Services
- community strings (SNMP), SNMP
- compiler security features, Compiler and OS Security Features
- compression
- configuration review, Configuration review
- constructors and destructors, Overwriting memory structures for gain
- Content Addressable Memory (see CAM table overflow)
- content checking, circumventing in email, Content Checking Circumvention
- content delivery networks (CDNs), Web Application Types, CDNs
- content filtering mechanisms (email), Identifying antivirus and content checking mechanisms
- content management systems (see CMSs)
- Content-Encoding headers, Presentation-Tier Data Formats
- Content-Type headers, Presentation-Tier Data Formats
- COOKIE ECHO (SCTP) chunks, Nmap scan of, Nmap support
- cookies
- CORE Impact, Exploitation of Vulnerabilities
- countermeasures
- country-code TLDs, registries of, Domain WHOIS
- Coyote (see Apache Coyote)
- CPU opcode sequences, CPU opcode sequences
- CRAM-MD5 authentication (SMTP), Brute-Force Password Grinding
- credentials, exposure through information leaks, Reading memory structures for gain
- CRIME attacks (TLS), SSL and TLS protocol weaknesses
- cross-site request forgery (CSRF), Web application testing
- cross-site scripting (XSS), Web application testing, System Access and Execution Context
- cross-site tracing (XST) attacks, TRACE
- cryptographic materials, exposure of, Reading memory structures for gain
- cryptography
D
- data execution prevention (see DEP)
- data exposure or modification, Adversarial Goals
- data formats
- data link layer, Data Link Protocols
- data link protocols, Data Link Protocols-Root bridge takeover
- data segment (memory), Data and BSS segments
- data stores
- data stores, assessing, Assessing Data Stores-Data Store Countermeasures
- Apache Hadoop, Apache Hadoop
- Apple Filing Protocol (AFP), Apple Filing Protocol
- countermeasures when hardening data tier components, Data Store Countermeasures
- iSCSI, iSCSI
- Memcached, Memcached
- Microsoft SQL Server, Microsoft SQL Server-Authenticating and Evaluating Configuration
- MongoDB, MongoDB
- MySQL, MySQL-PostgreSQL
- NFS, NFS-Apple Filing Protocol
- Oracle Database, Oracle Database-MongoDB
- PostgreSQL, PostgreSQL-Microsoft SQL Server
- Redis, Redis-Memcached
- data tier (web applications), The Data Tier
- databases, The Data Tier, Assessing Data Stores
- Datagram Transport Layer Security (DTLS), Assessing TLS Services
- davtest utility, WebDAV methods
- decryption tools for 3DES-encrypted passwords, Obtaining VPN configuration files
- DefaultActionMapper (Apache Struts), exploiting, Exploiting the DefaultActionMapper
- defender's dilemma, The State of the Art
- DEFLATE compression (in TLS), Compression
- DELETE method (HTTP), PUT and DELETE
- denial of service, Adversarial Goals
- denial of service tools for DHCP, Active DHCP attacks
- DEP (data execution prevention), Compiler and OS Security Features
- DES ciphers, Weak cipher suites
- DES encryption in Kerberos authentication, Active downgrade and offline brute-force
- design review, Design review
- desktop software packages
- destination unreachable messages (ICMP), TCP
- destructors, Overwriting memory structures for gain
- DHCP (Dynamic Host Configuration Protocol), DHCP-Active DHCP attacks
- DHCPv6, Intercepting local IPv6 traffic
- dictionary attack, forward DNS grinding, Dictionary attack
- Diffie-Hellman (DH) key exchange, IKE Assessment, Client Certificate and Key Exchange
- Diffie-Hellman ephemeral (DHE) key exchange, Key Exchange and Authentication
- dig utility
- Digest authentication, HTTP authentication mechanisms
- DIGEST-MD5 authentication, Brute-Force Password Grinding, Brute-Force Password Grinding
- Digital Signature Algorithm (DSA), DH key exchange
- Digital Signature Standard (DSS), DH key exchange
- directory structure (LDAP), LDAP Directory Structure
- Distinguished Names (DNs) in LDAP, LDAP Directory Structure
- distributed file systems, The Data Tier
- Django, Django
- remotely exploitable flaws, Django
- DKIM (DomainKeys Identified Mail), DKIM
- DMARC (Domain-based Message Authentication, Reporting and Conformance), DMARC
- DNS, DNS-NTP
- DNS querying, DNS Querying-SMTP Probing
- dns-srv-enum script, Obtaining SRV records
- DNS64, Intercepting local IPv6 traffic
- dnsdict6 utility, IPv6 Host Enumeration
- dnsenum, Automated querying
- dnsrevenum6 utility, IPv6 Host Enumeration
- DNSSEC, querying servers supporting, NSEC and NSEC3 enumeration
- DomainKeys Identified Mail (DKIM), DKIM
- DomainTools, using for network discovery, DomainTools
- double-tagging VLAN frames, 802.1Q double-tagging
- DROWN attacks (TLS), SSL and TLS protocol weaknesses
- Drupal CMS
- DSA (Digital Signature Algorithm), DH key exchange
- DSA and RSA SSH host keys, Retrieving RSA and DSA host keys
- DSS (Digital Signature Standard), DH key exchange
- DTLS (Datagram Transport Layer Security), Assessing TLS Services
- DTP (Dynamic Trunking Protocol), Dynamic trunking
- dtpscan.sh utility, Dynamic trunking
- dynamic testing, Dynamic Testing
- dynamic trunking, Dynamic trunking
E
- EAP (Extensible Authentication Protocol), 802.1X PNAC
- ebp processor registers (Intel IA-32), Processor Registers and Memory
- ebrute
- ECDH (see elliptic curve Diffie-Hellman)
- echo requests (ICMPv4), ICMP
- economics, attacker, Attacker Economics
- EHLO command, enumerating authentication methods, Brute-Force Password Grinding
- EIGRP (Enhanced Interior Gateway Routing Protocol), Local IP Protocols, EIGRP
- eip processor registers (Intel IA-32), Processor Registers and Memory
- elevation of privilege, Adversarial Goals
- elliptic curve Diffie-Hellman (ECDH), Client Certificate and Key Exchange
- encapsulation flaws, A Taxonomy of Software Security Errors, Logic Flaws and Other Bugs
- encryption
- enum4linux utility, Anonymous IPC Access via SMB
- enumeration of supported features, Common Network Service Assessment Recap
- enumeration techniques (Internet-based querying), Enumeration Technique Recap
- enumeration tools, automated, for Internet-based network and hosts, Automating Enumeration
- environment, vulnerabilities in, A Taxonomy of Software Security Errors
- errors, exploitation of, A Taxonomy of Software Security Errors
- esp processor registers (Intel IA-32), Processor Registers and Memory
- Ethernet
- Ettercap
- Etypes (encryption types), Microsoft Windows, Active downgrade and offline brute-force
- events and conferences (security), Security Events and Conferences
- Evil Foca utility, Intercepting local IPv6 traffic
- Exchange servers, LDAP
- execution context, System Access and Execution Context
- Exim, flaws in, Remotely Exploitable Flaws
- EXPN command, using to enumerate local users, EXPN
- exposed logic, Exposed Logic
- Extensible Authentication Protocol (see EAP)
- extensions (SMTP), listing supported, Enumerating Supported Commands and Extensions
- extensions (TLS), listing supported, Listing supported TLS extensions
F
- fallback, TLS sessions
- FDE (full-disk encryption), PXE
- fierce utility, forward DNS grinding, Dictionary attack
- file extensions for server-side technologies, Crawling and Investigation of Content
- fingerprinting, Common Network Service Assessment Recap
- Firewalk, Manipulating TTL to Reverse Engineer ACLs
- firewalls, Threats and Attack Surface
- format string protection, Compiler and OS Security Features
- forward DNS grinding, Forward DNS Grinding
- frame pointers, saved, Overwriting memory structures for gain
- free function, The heap
- Frei, Stefan, Private vulnerability sources
- FTP, FTP-TFTP
- Full Disclosure mailing list, Public vulnerability sources
- full-disk encryption (FDE), PXE
- function pointers, Overwriting memory structures for gain
G
- garbage collector, RMI distributed garbage collector, Exploiting the RMI Distributed Garbage Collector
- gateway-finder.py, Identifying Local Gateways
- gateways
- genkeys utility, PEAP
- GET method (HTTP), HTTP
- Git respositories, examining, Reviewing Exposed Content
- global offset table (GOT) entries, Overwriting memory structures for gain
- global variables, Overwriting memory structures for gain
- GNU wget, using to scrape websites, Crawling and Investigation of Content
- gnuplot utility, IP ID sampling with Scapy
- golden tickets, Kerberos
- Google
- Google Chrome
- Google Hacking Database, Querying Search Engines and Websites
- Google Search, using for network discovery, Google Search
- grep utility
- Group Policy Object (GPO) settings, Microsoft Services Countermeasures
- groups (DH), Supported transform enumeration, Exploitable IPsec Weaknesses
- groups (IKE), VPN Services Countermeasures
- GSSAPI authentication, Brute-Force Password Grinding
H
- HackerOne Internet bug bounty, Public vulnerability sources
- “Hacking Team: a zero-day market case study”, Private vulnerability sources
- hacking, fundamental concept of, The Fundamental Hacking Concept
- hacks and scrambles (SniffJoke), Data Insertion and Scrambling with SniffJoke
- Hadoop (see Apache Hadoop)
- Hadoop Distributed File System (HDFS), Apache Hadoop
- handshake message flow in TLS, Session Negotiation
- Handshake records (TLS), Session Negotiation
- hardware platforms, runtime memory layout, Runtime Memory Layout
- HE BGP Toolkit
- HEAD method (HTTP)
- headers
- heap memory, The heap
- heap pointers, Overwriting memory structures for gain
- heap protection, Compiler and OS Security Features
- heartbleed flaw (OpenSSL), OpenSSL TLS heartbeat extension information leak
- HMAC (hashed message authentication code), Session Negotiation
- hostapd-wpe.conf file, PEAP
- hostnames
- hosts
- HP Fortify team, study of software security errors, Static code analysis
- Hping3, crafting TCP packets and performing a TCP SYN scan, Crafting Arbitrary Packets-TCP/IP Stack Fingerprinting
- HSRP (Hot Standby Routing Protocol), Local IP Protocols, HSRP and VRRP
- hsrp utility (Kali Linux), Attacking HSRP
- HTML
- HTML injection, System Access and Execution Context
- HTTP
- HTTPS
- hypervisors, System Components
I
- IBM Domino servers, LDAP, LDAP Server Implementation Flaws
- ICMP
- IDEA cipher, Weak cipher suites
- IDS and IPS evasion, IDS and IPS Evasion-Network Scanning Recap
- IEEE 802.1, 802,2 and 802.3 standards, Data Link Protocols
- ifconfig utility, Attacking specific VLANs
- IFID values, Identifying Exposed RPC Services
- ifids tool, Identifying Exposed RPC Services
- IIS (see Microsoft IIS)
- IKE (Internet Key Exchange), IPsec, ISAKMP, IKE, and IKEv2
- aggressive mode IKE group enumeration, Aggressive mode IKE group enumeration
- aggressive mode IKE PSK cracking, Aggressive Mode IKE PSK Cracking
- assessment of, IKE Assessment-Exploitable IPsec Weaknesses
- DH key exchange, weaknesses of, Exploitable IPsec Weaknesses
- ISAKMP, IKE, and IKEv2, ISAKMP, IKE, and IKEv2
- ike-scan utility, IKE Assessment
- IKEv2, ISAKMP, IKE, and IKEv2
- IMAP, IMAP-Mail Services Testing Recap
- Immunity CANVAS, Exploitation of Vulnerabilities
- Impacket scripts, Remote command execution
- implementation flaws, TLS and DTLS, TLS implementation flaws
- in-memory key-value stores, The Data Tier
- information leak bugs, Web application testing
- information leaks, Logic Flaws and Other Bugs
- Infrastructure as a Service (IaaS) platforms, load balancing in, Load Balancers
- INIT (SCTP) chunks, Nmap scan of, Nmap support
- input validation and representation, A Taxonomy of Software Security Errors
- instruction pointers (eip), Processor Registers and Memory
- Intel processor registers and runtime memory layout, Processor Registers and Memory
- intermediate certificates, CAs and chaining
- internal routing protocols, Local IP Protocols, Internal Routing Protocols-IPv6 Network Discovery
- Internet network discovery, Internet Network Discovery-Enumeration Countermeasures
- Internet-based social engineering, Internet-based social engineering
- Internet-exposed services, identifying with Shodan, Using Shodan
- Internet-Wide Scan Data Repository, Using Shodan
- interpreted languages, arbitrary code execution through, System Access and Execution Context
- investigation of materials obtained, Common Network Service Assessment Recap
- invoker servlets (JBoss), Web Consoles and Invoker Servlets
- IP addresses
- IP ID analysis, IP ID Analysis-Stealth IP ID scanning with Nmap
- IP network scanning, IP Network Scanning-Network Scanning Countermeasures
- IP protocols (local), Local IP Protocols-Local Network Discovery Recap
- DHCP, DHCP-Active DHCP attacks
- identifying local gateways, Identifying Local Gateways
- internal routing protocols, Internal Routing Protocols-IPv6 Network Discovery
- IPv6 network discovery, IPv6 Network Discovery-Identifying Local Gateways
- LLMNR, NBT-NS, and mDNS, LLMNR, NBT-NS, and mDNS
- PXE, PXE
- WPAD, WPAD
- IPC (interprocess communication)
- iplist.net, Cross-Referencing DNS Datasets
- IPMI services, IPMI
- IPsec, Reading memory structures for gain, IPsec-PPTP
- exploitable weaknesses, Exploitable IPsec Weaknesses
- IKE assessment, IKE Assessment
- ISAKMP, IKE, and IKEv2, ISAKMP, IKE, and IKEv2
- packet format, Packet Format
- testing services, recap, VPN Testing Recap
- VPN client variables, Obtaining VPN configuration files
- IPv4
- IPv6
- IRIX, heap management algorithm, The heap
- IRPAS, Internal Routing Protocols
- ISAKMP (Internet Security Association and Key Management Protocol), ISAKMP, IKE, and IKEv2
- ISC BIND
- iSCSI, iSCSI
- iterative assessment approach, An Iterative Assessment Approach
J
- Jasper, Apache Tomcat
- Java
- Java Debug Wire Protocol (JDWP), JDWP
- JavaScript, System Access and Execution Context, Presentation-Tier Data Formats
- JBoss
- JDWP (Java Debug Wire Protocol), JDWP
- JexBoss utility, Automated JBoss Scanning
- JMX console
- John the Ripper, Internal Routing Protocols
- Joomla, Framework and Data Store Profiling
- JSESSIONID values, application servers, Cookie analysis
- just-in-time (JIT) compilers, The text segment
K
- Kali Linux, Your Testing Platform
- KDC (Key Distribution Center), Kerberos
- KDC master keys, Kerberos Keys
- keep-alive sessions, Support for persistent connections and caching
- Kerberos, Kerberos-VNC
- kernel exploits, Attacker Economics
- key block
- key exchange
- key generation and handling (X.509 certificates), Key generation and handling
- keyboard-interactive SSH authentication, Supported authentication mechanisms
- keys (Kerberos), Kerberos Keys
- “The Known Unknowns”, Private vulnerability sources
L
- LDAP, LDAP-Kerberos
- attacks on LDAP servers, LDAP
- authentication, LDAP Authentication
- brute-force password grinding in, Brute-Force Password Grinding
- directory structure, LDAP Directory Structure
- fingerprinting and anonymous binding, Fingerprinting and Anonymous Binding
- layers when using TLS, LDAP Operations
- obtaining sensitive data from, Obtaining Sensitive Data
- operations, LDAP Operations
- server implementation flaws, LDAP Server Implementation Flaws
- structures and attributes in Microsoft Active Directory, LDAP Directory Structure
- libraries (TLS), Identifying the TLS Library and Version
- LinkedIn, searching, Searching LinkedIn
- Linux
- LLMNR (Link-Local Multicast Name Resolution), Local IP Protocols, LLMNR, NBT-NS, and mDNS
- load balancers, System Components, Identifying Proxy Mechanisms
- local IP protocols (see IP protocols (local))
- local network discovery, Local Network Discovery-Local Network Attack Countermeasures
- log files, examining, Reviewing Exposed Content
- logic flaws, Logic Flaws and Other Bugs
- LOGIN authentication (SMTP), Brute-Force Password Grinding
- Logjam attacks (TLS), SSL and TLS protocol weaknesses
- Loki, Internal Routing Protocols
- advertising new OSPF route with, OSPF
- OSPF attacks, OSPF
- LSARPC, Querying LSARPC and SAMR interfaces
- Lucky 13 attacks, Mitigating TLS Exposures, Weak cipher suites
M
- MAC addresses
- macof utility, creating CAM table overflow, CAM table overflow, Root bridge takeover
- mail server software packages, vulnerabilities in, Remotely Exploitable Flaws
- mail services, assessing, Assessing Mail Services-Mail Services Countermeasures
- mailing lists for security vulnerablities, Mailing Lists
- malicious PHP file creation, System Access and Execution Context
- malloc function, The heap
- man-in-the-middle (MITM) attacks, ARP cache poisoning, ARP cache poisoning
- managed security service providers (MSSPs), SMTP
- Management Information Base (MIB), SNMP, SNMP
- MapReduce, Apache Hadoop
- marshalling, Application-Tier Data Formats
- master secret generation, Generating the master secret and key block, DH key exchange
- MBeans, Identifying MBeans
- McGraw, Gary, A Taxonomy of Software Security Errors
- MD5 cryptographic hash
- mDNS (multicast DNS), Local IP Protocols, LLMNR, NBT-NS, and mDNS, Multicast DNS
- media types, Presentation-Tier Data Formats
- Memcached, Memcached
- querying and extracting key-values, Memcached
- memory
- memory safety, programming languages and, Adversarial Goals
- message transfer agents (MTAs), SMTP
- message types (ICMP), ICMP, ICMP Message Types
- Metagoofil tool, Google Search
- Metasploit, Exploitation of Vulnerabilities, Your Testing Platform
- Apache Struts DefaultActionMapper, exploiting, Exploiting the DefaultActionMapper
- CDP frame manipulation, CDP
- JBoss vulnerability scanning with, Automated JBoss Scanning
- MBeans, exploiting, Over HTTP
- Microsoft SQL Server, authenticated modules for, Authenticating and Evaluating Configuration
- MySQL modules, authenticated, Authenticated MySQL Attacks
- obtaining link-local addresses via router advertisement, Local IPv6 host enumeration
- Oracle Database exploitable flaws, Privilege Escalation and Pivoting
- Oracle SID values, grinding, Oracle SID Grinding
- PostgreSQL brute-force password grinding, Brute-Force Password Grinding
- PostgreSQL, authenticated modules for, Authenticated PostgreSQL Attacks
- querying RMI registry service, Enumerating MBeans via the RMI registry service
- search directive, Known FTP Vulnerabilities
- Shodan search module, Using Shodan
- SNMP community dictionary, SNMP community string and password grinding
- testing SSH public key, Enumerating valid keys
- tomcat_mgr_deploy module, The Manager Application
- vhost scanner module, Enumerating Valid Hosts
- Metasploitable 2, Deploying a Vulnerable Server
- MIB (Management Information Base), SNMP, SNMP
- Microsoft
- Microsoft .NET, memory safety, Adversarial Goals
- Microsoft Active Directory
- Microsoft ASP.NET, Microsoft ASP.NET
- Microsoft DNS server, defects of, Microsoft DNS
- Microsoft Exchange (see Exchange servers)
- Microsoft HTTP extensions, Microsoft HTTP extensions
- Microsoft IIS
- Microsoft Kerberos implementation
- Microsoft Outlook (see Outlook)
- Microsoft services, assessing, Assessing Microsoft Services-Microsoft Services Countermeasures
- anonymous IPC access via SMB, Anonymous IPC Access via SMB
- attacking SMB and RPC, Attacking SMB and RPC-Remote Desktop Services
- hardening steps within Microsoft environments, Microsoft Services Countermeasures
- NetBIOS name and datagram services, NetBIOS Name Service-SMB
- protocols supporting Microsoft Exchange and Outlook, Assessing Microsoft Services
- recap of testing techniques, Microsoft Services Testing Recap
- remote desktop services, Remote Desktop Services-Microsoft Services Testing Recap
- RPC services, Microsoft RPC Services
- services using open protocols, Assessing Microsoft Services
- services using proprietary protocols, Assessing Microsoft Services
- SMB (Server Message Block), SMB
- Microsoft SQL Server, Microsoft SQL Server-Authenticating and Evaluating Configuration
- Microsoft Windows (see Windows)
- Microsoft Windows Server
- MIME headers, modifying to circumvent content checking, Content Checking Circumvention
- Mimikatz
- MIT Kerberos, Kerberos Attack Surface
- MITM (man-in-the-midddle) attacks, ARP cache poisoning, ARP cache poisoning
- modification of ciphertext, Cryptographic Weaknesses
- MongoDB, MongoDB
- known vulnerabilities, MongoDB
- Nmap interrogation of available services, MongoDB
- mountd service (NFS), querying, NFS
- MS-CHAPv2 material, capturing, PEAP
- MSSPs (managed security service providers), SMTP
- MTAs (message transfer agents), SMTP
- MX lookup, reverse, DomainTools
- MX records, querying, Manual querying
- MySQL, MySQL-PostgreSQL
N
- name resolution protocols, local, Local IP Protocols
- name service (NetBios), NetBIOS Name Service
- NASA, listing web servers supporting directory indexing, Identifying web servers
- NAT-PT configuration, Intercepting local IPv6 traffic
- NAT64, Intercepting local IPv6 traffic
- native code execution, goal in attack on Google Chrome, Attacker Economics
- NBT-NS (NetBIOS Name Service), Local IP Protocols, LLMNR, NBT-NS, and mDNS
- NDP (Neighbor Discovery Protocol), IPv6 Network Discovery
- negative scanning, UDP
- Negotiate authentication, HTTP authentication mechanisms
- Nemesis, Internal Routing Protocols
- RIP protocol attacks, RIP
- setup and configuration in Kali Linux, RIP
- Nessus, Bulk Vulnerability Scanning
- NetBIOS, name and datagram services, NetBIOS Name Service-SMB
- Netcraft, querying with, Querying Netcraft
- Netscape SSL, Assessing TLS Services
- network discovery, local (see local network discovery)
- network infrastructure testing, Network infrastructure testing
- network scanning tools, Vulnerability Scanning
- network security assessment methodology, Network Security Assessment Methodology-Your Testing Platform
- network services (common), assessing, Assessing Common Network Services-Service Hardening and Countermeasures
- DNS, DNS-NTP
- FTP, FTP-TFTP
- IPMI, IPMI
- Kerberos, Kerberos-VNC
- LDAP, LDAP-Kerberos
- recap of techniques for uncovering vulnerabilities, Common Network Service Assessment Recap
- service hardening and countermeasures, Service Hardening and Countermeasures
- SNMP, SNMP-LDAP
- SSH, SSH-Telnet
- Telnet, Telnet-IPMI
- TFTP, TFTP
- Unix RPC services, Unix RPC Services-Common Network Service Assessment Recap
- VNC (Virtual Network Computing), VNC-Unix RPC Services
- networks
- Nexpose, Bulk Vulnerability Scanning
- NFS (Network File System), NFS-Apple Filing Protocol
- Nginx, Attacking Server Software
- Nikto web server assessment tool, Identifying Exposed Content
- NIS components, RPC services, Unix RPC Services
- NIST National Vulnerability Database, Public vulnerability sources
- NIST SP 800-115, exploitation tasks, Exploitation of Vulnerabilities
- Nmap, Your Testing Platform
- Node.js, Node.js
- remotely exploitable flaws in modules, Node.js
- nondelivery notification messages (NDNs), SMTP Probing, SMTP
- Novell eDirectory servers, LDAP Server Implementation Flaws
- NS lookup, reverse, DomainTools
- NSE (Nmap)
- NSEC and NSEC3 enumeration, NSEC and NSEC3 enumeration
- NSID querying with Nmap, Fingerprinting
- nslookup, obtaining MX records with, Manual querying
- NTLM authentication, Brute-Force Password Grinding, Brute-Force Password Grinding, HTTP authentication mechanisms
- NTLM hash, authentication with SMB using, SMB authentication
O
- object-relational database management system (ORDBMS), PostgreSQL
- objects, marsahlling/unmarshalling, Application-Tier Data Formats
- OCLHashcat, Aggressive Mode IKE PSK Cracking
- Offensive-Security Exploit Database, Public vulnerability sources, Your Testing Platform
- OID (Object Identifier) values
- Open Shortest Path First (OSPF), Local IP Protocols
- Open Web Application Security Project (OWASP) Top 10, Web application testing
- OpenLDAP utilities package, LDAP Operations
- OpenSSH, Fingerprinting
- OpenSSL
- OpenVAS, Bulk Vulnerability Scanning
- OpenVPN, getting information on via Google search, Obtaining VPN configuration files
- operating systems
- OPTIONS method (HTTP), Analyzing Server Responses
- Oracle Database, Oracle Database-MongoDB
- organizational units (OUs) in LDAP, LDAP Directory Structure
- OS X
- OSI Layer 2
- OSI Layer 3, attack methods for local networks, Local Network Discovery Recap
- OSI network model, Data Link Protocols
- OSPF (Open Shortest Path First), OSPF
- Outlook
- over-reads, Adversarial Goals
- OWASP vulnerable web applications directory, Deploying a Vulnerable Server
P
- PAC (privilege attribute certificate) data structure, Ticket Format
- Packet Storm, Public vulnerability sources
- packets
- parameters (DH public keys), DH key exchange
- passive network sniffing, Kerberos authentication requests, Passive network sniffing
- passwords
- changing user password with long-term key in Kerberos, Changing a user password with a long-term key
- for PostgreSQL, obtaining and cracking password hashes, Authenticated PostgreSQL Attacks
- found in PCFs, decryption of, Obtaining VPN configuration files
- grinding in SNMP with THC Hydra, SNMP community string and password grinding
- leaked via LDAP, cracking, Obtaining Sensitive Data
- MySQL root password, uncovering, Brute-Force Password Grinding
- payload scanning, UDP
- PCFs (profile configuration files), querying via Google search, Obtaining VPN configuration files
- PEAP (Protected EAP), 802.1X PNAC
- capturing and cracking PEAP credentials, PEAP
- deploying rogue authenticator to capture MS-CHAPv2 material, PEAP
- penetration testing, Exploitation of Vulnerabilities
- PentesterLab, Deploying a Vulnerable Server
- PGP public key servers, querying, PGP Public Key Servers
- phishing
- PHP
- phpMyAdmin
- physical access, direct, to system components, System Access and Execution Context
- physical, data link, and network layers, Data Link Protocols
- ping, ARP cache poisoning
- PKI, use in Kerberos, Kerberos Keys
- PLAIN authentication (SMTP), Brute-Force Password Grinding
- Plesk management console, PHP Management Consoles
- PLT (procedure linkage table) entries, Overwriting memory structures for gain
- PNAC (port-based network access control), 802.1X PNAC-CDP
- Point-to-Point Tunneling Protocol (see PPTP)
- pointer encoding, Compiler and OS Security Features
- pointers, abuse of, Adversarial Goals
- points of presence (POPs), maintained by CDNs, CDNs
- POODLE attacks (TLS), SSL and TLS protocol weaknesses
- POP3, POP3-IMAP
- port isolation settings, Layer 3 private VLAN bypass
- port states
- in STP networks, 802.1D STP
- returned by Nmap in IPv4 TCP network scan, TCP
- portmapper service (RPC), Unix RPC Services
- POST method (HTTP), HTTP
- Postfix, flaws in, Remotely Exploitable Flaws
- PostgreSQL, PostgreSQL-Microsoft SQL Server
- PPTP, PPTP-VPN Testing Recap
- Preboot Execution Environment (PXE), Local IP Protocols
- premaster secret, Client Certificate and Key Exchange
- presentation tier (web applications), The Presentation Tier
- principal long-term keys (Kerberos), Kerberos Keys
- principals (Kerberos), Kerberos
- private keys
- private VLAN attacks, Layer 3 private VLAN bypass
- privileges, elevation of, Adversarial Goals
- PRNGs (pseudorandom number generators), Cryptographic Weaknesses
- procedure linkage table (PLT) entries, Overwriting memory structures for gain
- processsor registers and memory, Processor Registers and Memory
- ProFTPD, vulnerabilities, Known FTP Vulnerabilities
- programming languages
- promiscuous mode, 802.3 Ethernet Testing
- PROPFIND method (HTTP), WebDAV methods
- PROPPATCH method (HTTP), Analyzing Server Responses
- Protected EAP (see PEAP)
- protocols
- proxies
- proximity, close, system access through, System Access and Execution Context
- PSK (pre-shared key) authentication, Supported transform enumeration, Aggressive mode IKE group enumeration
- PTR records, querying, DNS Zone Transfer Techniques, Reverse DNS Sweeping
- Pure-FTPd, vulnerabilities, Known FTP Vulnerabilities
- PUT method (HTTP), Analyzing Server Responses, PUT and DELETE
- PXE (Preboot Execution Environment), PXE
- attacks in PXE environments, PXE
- Python, System Access and Execution Context
R
- Rails, Attacking Server Software, Rails-Node.js
- Rapid7
- RC2 cipher, Weak cipher suites
- RC4 byte bias attacks, mitigating, Lucky 13 and RC4 byte bias mitigation within web applications
- RC4 byte biases, SSL and TLS protocol weaknesses
- RC4 cipher, Weak cipher suites
- RC4 encryption in Kerberos authentication, Active downgrade and offline brute-force
- RCPT TO command, using to enumerate local users, RCPT TO
- RDP (Remote Desktop Protocol), Remote Desktop Services
- (see also remote desktop services (Microsoft), assessing)
- rdp-sec-check utility, Assessing Transport Security
- reading from memory, Reading from Memory
- realm enumeration (Kerberos), using dig, Realm enumeration
- reconnaissance in network security assessment, Reconnaissance
- records (TLS), TLS Mechanics
- recursion support in DNS, testing for, Testing for Recursion Support
- Redis, Redis-Memcached
- Regional Internet Registries (RIRs), IP WHOIS
- registry
- relocation read-only (RELRO), Compiler and OS Security Features
- remote desktop services (Microsoft), assessing, Remote Desktop Services-Microsoft Services Testing Recap
- Remote Development Services (RDS) in ColdFusion, Exposed Management Interfaces
- remote framebuffer (RFB) protocol, VNC
- renegotiation, TLS sessions, Session Renegotiation, Session renegotiation
- replay of ciphertext, Cryptographic Weaknesses
- resource records (DNS), DNS Querying
- Responder
- REST APIs, testing, Web service testing
- resumption modes, TLS sessions, Session Resumption
- resumption, TLS sessions, Session resumption
- return-oriented programming (ROP) chains, Bypassing DEP
- reverse DNS sweeping, Reverse DNS Sweeping
- RID cycling via LSARPC, Querying LSARPC and SAMR interfaces
- RIP (Routing Information Protocol), RIP
- Nemesis and Scapy attacks against different versions, RIP
- RIPE database, searching, Using WHOIS web interfaces
- RIPv2 MD5 hashes, cracking with John the Ripper, Cracking authentication keys
- RMI
- robots.txt directives, Enumeration Countermeasures
- rogue server setup, DHCP attacks, DHCP
- root bridge takeover (STP networks), Root bridge takeover
- root CA certificates, CAs and chaining
- ROP (return-oriented programming) chains, Bypassing DEP
- ROP gadgets, ROP gadgets
- ROPEME, CPU opcode sequences
- ROPGadget, CPU opcode sequences
- Routing Information Protoccol (see RIP)
- routing protocols, internal (see internal routing protocols)
- RPC over HTTP, Microsoft Exchange Server, Microsoft HTTP extensions
- RPC services
- rpcclient utility, Querying LSARPC and SAMR interfaces
- rpcdump tool, Identifying Exposed RPC Services
- RSA key exchange and authentication (in TLS), RSA key exchange and authentication
- RSA keys, Client Certificate and Key Exchange
- RSA SSH host keys, Retrieving RSA and DSA host keys
- rstatd daemon, Unix RPC Services
- Ruby, System Access and Execution Context, Rails
- runtime memory layout, Runtime Memory Layout-The stack
- ruserd, identifying active user sessions with, RPC rusers
S
- Samba client utilities, Querying LSARPC and SAMR interfaces
- SAMR, listing users via, Querying LSARPC and SAMR interfaces
- SAs (Security Associations), IPsec
- SASL (Simple Authentication and Security Layer), LDAP Authentication
- scanning tools, Network infrastructure testing
- Scapy, Internal Routing Protocols
- scraping websites, using GNU wget, Crawling and Investigation of Content
- SCTP, SCTP-Nmap support
- search engines
- searchsploit, using in Kali Linux, Known FTP Vulnerabilities
- secret_token value, Rails applications, Using an Application’s Secret Token
- security
- Security Associations (SAs), IPsec
- security errors, taxonomy of, A Taxonomy of Software Security Errors
- security features, A Taxonomy of Software Security Errors
- Security Support Providers (SSPs), HTTP authentication mechanisms
- SecurityFocus, Public vulnerability sources
- SEHOP, Compiler and OS Security Features
- Sendmail, flaws in, Remotely Exploitable Flaws
- SensePost Auto Domain Admin and Network Exploitation (autoDANE) utility, Automating the process
- Sentinel, Assessment Workflow and Tools
- serialization, Application-Tier Data Formats
- server applications, increasing decoupling of, System Access and Execution Context
- Server header, Analyzing Server Responses
- Server Hello message (TLS), Server Hello
- Server Message Block (see SMB)
- server software, attacking, Attacking Server Software
- server status codes (HTTP), Server status codes
- server-side file upload and content modification, methods supporting, Analyzing Server Responses
- session management flaws, Web application testing
- session tokens, Reading memory structures for gain
- sessions
- SET (Social Engineer Toolkit), Phishing via SMTP
- Set-Cookie server header, Setting cookies
- SHA-1 cryptographic hashing function, known weaknesses, Signature algorithm flaws
- Shodan database of network scan data, Using Shodan
- SID values (Oracle), grinding, Oracle SID Grinding
- side channel attacks, Cryptographic Weaknesses
- signature algorithm flaws (X.509 certificates), Signature algorithm flaws
- signing of data, Cryptographic Weaknesses
- SIGTRAN. SCTP protocol family, SCTP
- SilverStripe, PHP CMS Packages
- simple authentication (LDAP), LDAP Authentication
- Simple Authentication and Security Layer (SASL), LDAP Authentication
- site certificates, CAs and chaining
- SMB (Server Message Block), SMB
- anonymous IPC access via, Anonymous IPC Access via SMB
- authenticating with and using access, Authenticating and Using Access
- brute-force password grinding using Hydra, Brute-Force Password Grinding
- capturing and cracking credentials using Kali Linux, LLMNR, NBT-NS, and mDNS
- exploitable implementation flaws, SMB Implementation Flaws
- remote command execution over, Remote command execution
- service hardening and countermeasures, Microsoft Services Countermeasures
- shares exposed to clients, SMB
- using walksam over SMB and named pipes, Querying LSARPC and SAMR interfaces
- SMTP
- brute-force password grinding, Brute-Force Password Grinding
- content checking circumvention, Content Checking Circumvention
- enumerating supported commands and extensions, Enumerating Supported Commands and Extensions-Enumerating Supported Commands and Extensions
- mapping SMTP architecture, Mapping SMTP Architecture-Enumerating Supported Commands and Extensions
- phishing via, Phishing via SMTP-Sending email
- probing, SMTP Probing
- remotely exploitable flaws, Remotely Exploitable Flaws
- review of mail security features, Review of Mail Security Features-DMARC
- server hostnames, revealing, Manual querying
- service fingerprinting, Service Fingerprinting
- TLS session over, STARTTLS
- user account enumeration, User Account Enumeration-Brute-Force Password Grinding
- smtp-user-enum utility, User Account Enumeration
- SniffJoke, IDS and IPS Evasion
- SNMP, SNMP-LDAP
- Social Engineer Toolkit (SET), Phishing via SMTP
- social engineering
- software security errors, A Taxonomy of Software Security Errors
- software switches, System Components
- software, reasons for vulnerability in, Why Software Is Vulnerable
- Solaris, heap management algorithm, The heap
- Spanning Tree Protocol (see STP)
- SPF (Sender Policy Framework), SPF
- SQL injection attack, on Microsoft SQL Server, Framework and Data Store Profiling
- SQL Server (see Microsoft SQL Server)
- sqlplus utility, Authenticating with Oracle Database
- SRV records, obtaining, Obtaining SRV records, NSEC and NSEC3 enumeration
- SSH, Reading memory structures for gain, SSH-Telnet
- classes of attack against, SSH
- configuration files, querying via Google search, Obtaining VPN configuration files
- default and hardcoded credentials, Default and Hardcoded Credentials
- enumerating features of, Enumerating Features
- fingerprinting, Fingerprinting
- hardening servers, Service Hardening and Countermeasures
- how it works, SSH
- insecurely generated host keys, Insecurely Generated Host Keys
- server software flaws, SSH Server Software Flaws
- SSL (Secure Sockets Layer), Assessing TLS Services
- ssl-enum-ciphers script, Enumerating Supported Protocols and Cipher Suites
- ssl-known-key script, X.509 certificates with known private keys
- sslsqueeze utility, Stress Testing TLS Endpoints
- SSLyze, Session resumption
- SSPs (Security Support Providers), HTTP authentication mechanisms
- stack, The stack
- stack canaries, Compiler and OS Security Features
- stack frames, The stack
- standalone web applications, Web Application Types
- STARTTLS command, STARTTLS, Enumerating Supported Protocols and Cipher Suites
- state vulnerabilities, A Taxonomy of Software Security Errors
- stateless address autoconfiguration (SLAAC), Local IPv6 host enumeration
- static code analysis, Static code analysis
- status codes, HTTP server, Server status codes
- Stonesoft Evader, IDS and IPS Evasion
- storage nodes, System Components
- STP (Spanning Tree Protocol), 802.1D STP-Root bridge takeover
- stress testing TLS endpoints, Stress Testing TLS Endpoints
- Stunnel utility, Manually Accessing TLS-Wrapped Services
- Stuxnet worm, The State of the Art
- subnets
- Supervisory Control And Data Acquisition (SCADA), Exploitation of Vulnerabilities
- SVN (Subversion) entries for servers, examining, Reviewing Exposed Content
- Swaks, Sending email, Mail Services Testing Recap
- system access
- system components, exploitable vulnerabilities, System Components
T
- Target Vulnerability Validation Techniques, Exploitation of Vulnerabilities
- taxonomy of software security errors, Static code analysis, A Taxonomy of Software Security Errors
- TCP
- TCP ports, TCP Ports
- TCP/IP stack fingerprinting, TCP/IP Stack Fingerprinting
- tcpdump
- technical audit and review, Static Analysis
- Telnet, Telnet-IPMI
- text segment (memory), The text segment
- TFTP, TFTP
- tftp utility, TFTP
- THC Hydra
- THC IPv6 toolkit
- thc-pptp-bruter utility, PPTP
- thc-ssl-dos utility, Stress Testing TLS Endpoints
- threat modeling, Threat Modeling-Attacker Economics
- threats and attack surface, Threats and Attack Surface-Exploiting exposed logic
- “Threats and Countermeasures Guide” (Microsoft), Microsoft Services Countermeasures
- ticket-granting ticket (TGT), Kerberos
- tickets (Kerberos)
- time and state vulnerabilities, A Taxonomy of Software Security Errors
- TIME attacks (TLS), SSL and TLS protocol weaknesses
- time to live (TTL)
- timestamp requests (ICMPv4), ICMP
- TLS (Transport Layer Security), System Access and Execution Context, Reading memory structures for gain
- as countermeasure for local network attacks, Local Network Attack Countermeasures
- assessing TLS services, Assessing TLS Services-Web Application Hardening
- assessing endpoints, Assessing TLS Endpoints-TLS Service Assessment Recap
- attack mitigation strategies, Mitigating TLS Exposures
- authentication, TLS Authentication-Session Resumption
- cipher suites, Cipher Suites
- compression, Compression
- hardening endpoints, TLS Hardening
- key exchange and authentication, Key Exchange and Authentication-ECC
- recap of testing steps, TLS Service Assessment Recap
- record format, content types, and protocol versions, TLS Mechanics
- session negotiation, Session Negotiation-Finished
- session resumption, Session Resumption
- STARTTLS command, STARTTLS
- TLS running at OSI Layer 6, Assessing TLS Services
- heartbeat information leak (OpenSSL), OpenSSL TLS heartbeat extension information leak
- in web application presentation tier, TLS
- protocols providing, Cryptographic Weaknesses
- standard, development of, Assessing TLS Services
- TLS Prober, Identifying the TLS Library and Version
- unsafe cipher suites, Unsafe TLS Cipher Suites
- use with FTP, FTP
- TNS (Transparent Network Substrate) protocol, Oracle Database
- TNS listener, interacting with, Interacting with the TNS Listener
- top-level domains (TLDs), querying registries of, Domain WHOIS
- TRACE method (HTTP), TRACE
- transform sets (IKE), IKE Assessment
- Transparent Network Substrate (TNS) protocol, Oracle Database
- Transport Layer Security (see TLS)
- transport protocols, Microsoft RPC services, Microsoft RPC Services
- transport security, testing for RDP with Nmap, Assessing Transport Security
- tree utility, using to review scraped content, Crawling and Investigation of Content
- trusted root certificates, CAs and chaining
- Trustwave SpiderLabs Blog, Aggressive Mode IKE PSK Cracking
- Tsipenyuk, Katrina, A Taxonomy of Software Security Errors
- Tsyrklevich, Vlad, Private vulnerability sources
- twiddle.sh utility, interacting with MBeans over RMI, Over RMI
U
- UDP, UDP-SCTP
- UDP ports, UDP Ports
- Unicornscan, UDP
- Unix-based platforms
- unmarshalling, Application-Tier Data Formats
- URL paths to server components, Server and Application Framework Fingerprinting
- user-defined functions (UDFs), local OS command execution via MySQL, Local OS command execution via MySQL
- usernames
- discovering with Internet search engines, Google Search
- enumerating email accounts with IP WHOIS, Enumerating database objects via WHOIS
- enumerating in SNMP exploitation, Username enumeration via SNMPv3
- enumerating via LSARPC and SAMR, Querying LSARPC and SAMR interfaces
- enumerating, using Google search, Enumerating contact details
- inference of, Logic Flaws and Other Bugs
- Kerberos username enumeration with Nmap, Username enumeration
- searching for, with LinkedIn, Searching LinkedIn
V
- Virtual Router Redundancy Protocol (see VRRP)
- virtualiation software, Your Testing Platform
- VLANs (802.1Q), Network infrastructure testing, 802.1Q VLAN
- VMware Fusion, Your Testing Platform
- VMware Workstation, Your Testing Platform
- VNC (Virtual Network Computing), VNC-Unix RPC Services
- VPNs (virtual private networks)
- VRFY command, using to enumerate local users, VRFY
- VRRP (Virtual Router Redundancy Protocol), Local IP Protocols, HSRP and VRRP
- vulnerability information sources, Sources of Vulnerability Information-Security Events and Conferences
- vulnerability scanning, Vulnerability Scanning
- vulnerable server, deploying, Deploying a Vulnerable Server
W
- WAF (web application firewall) mechanisms, Active Scanning
- walksam utility, Querying LSARPC and SAMR interfaces, Querying LSARPC and SAMR interfaces
- web application firewall mechanisms (see WAF mechanisms)
- web application frameworks
- web application frameworks, assessing, Assessing Web Application Frameworks-Application Framework Security Checklist
- Adobe ColdFusion, Adobe ColdFusion-Apache Solr Vulnerabilities
- Apache Struts, Apache Struts-JDWP
- Apache Tomcat, Apache Tomcat-JBoss Testing
- common framework configurations, Assessing Web Application Frameworks
- Django, Django
- framework and data store profiling, Framework and Data Store Profiling-Framework and Data Store Profiling
- Java Debug Wire Protocol (JDWP), JDWP
- JBoss, JBoss Testing-Apache Struts
- Node.js, Node.js
- PHP, PHP
- Rails, Rails-Node.js
- security checklist, Application Framework Security Checklist
- understanding common flaws, Understanding Common Flaws
- web applications, Web Application Architecture-The Data Tier
- application tier, The Application Tier
- attacking, Attacking Web Applications
- data tier, The Data Tier
- Lucky 13 and RC4 byte bias mitigation in, Lucky 13 and RC4 byte bias mitigation within web applications
- presentation tier, The Presentation Tier
- testing, Web application testing
- tiers, Web Application Tiers
- types of, Web Application Types
- with HTTPS components, hardening, Web Application Hardening
- web consoles, exposing JBoss invoker servlets via, Web Consoles and Invoker Servlets
- web interfaces (WHOIS), using, Using WHOIS web interfaces
- Web Proxy Auto-Discovery (see WPAD)
- web servers
- web servers, assessing, Assessing Web Servers-Web Server Hardening
- web service testing, Web service testing
- WebDAV HTTP extensions, WebDAV HTTP extensions
- WhatWeb, fingerprinting a web server, Server and Application Framework Fingerprinting
- WHOIS
- Wikto
- WildFly (see JBoss)
- Windows Active Directory servers, KDC master keys, Kerberos Keys
- Windows systems
- Wireshark, sniffing local Ethernet traffic, Passive network sniffing
- WMI, querying, Querying WMI
- WMICracker, Brute-Force Password Grinding
- WMIdump, Querying WMI
- WordPress, Framework and Data Store Profiling
- WPAD (Web Proxy Auto-Discovery), Local IP Protocols, WPAD
- attacks against, automation with Responder, WPAD