You are on page 1of 82

Ethical H acking a n d C o u n te rm e a s u re s R efe re n c e s

Exam 3 1 2 -5 0 C ertified Ethical H acker

M odule 01: Introduction to Ethical Hacking 1. Zero-day attacks are meaner, more rampant than we ever thought, from http://arstechnica.com /security/ 2012/ 10 /zero-day-attacks-are-meaner-and-more-plentiful-thanthought/. SECURITY POLICY: TARGET, CONTENT, & LINKS, from http://csrc.nist.gov/nissc/1998/proceedings/paperG4.pdf. Anatomy of the Hack - Hands-on Security, from http://w ww.slideshare.net/NewBU/anatom y-of-thehack-handson-security-information-assurance-dub. Hacker methodology, from http://www.hackersecuritymeasures.com /. Ethical Hacking, from www.securedeath.com. C. C. Palmer, Ethical hacking from http://researchweb.w atson.ibm .com /journal/sj/403/palm er.htm l. An Overview of Computer Security, from www.cc.gatech.edu/classes/AY2005/cs4803cns_fall/security_overview.ppt. Dr. Death, (2006), Ethical Hacking, from http://w w w .securedeath.com . Ethical Hacking, from http://new order.box.sk/new s/921. How are Penetrating Testing conducted?, from www.corsaire.com. Ethical Hacking: The Security Justification Redux, from http://www.sosresearch.org/publications/ISTAS02ethicalhack.PDF. Ethical Hacking, from www.sosresearch.org/publications. Ethical Hacking, from www.research.ibm.com. Covering Tracks, from h ttp ://ro o tp ro m p t.o rg . Attack, from http://w w w .linuxsecurity.com /content/view /17/70/. Security Issues in Wireless MAGNET at Networj Layer, from http://csce.unl.edu/~jaljaroo/publications/TR02-10-07.pdf. Glossary of Security and Internet terms, from http://wssg.berkeley.edu/Securitylnfrastructure/glossary.html. Glossary of Vulnerability Testing Terminology, from http://w w w .ee.oulu.fi/research/ouspg/sage/glossary/. Information about Information about hackers, from h ttp ://w w w .an tion line .com /. hackers, from http://w 2.eff.org/N et_culture/H ackers/.

2. 3. 4. 5.

6.
7.

8.
9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24.

LEX LUTHOR, information about hackers, from http://bak.spc.org/dm s/archive/britphrk.txt. Information about hackers, from http://directory.google.com /Top/Com puters/Hacking/.

Information about hackers, from http://directory.google.com/Top/Com puters/Security/Hackers/. Information about hackers, from http://bak.spc.org/dm s/archive/profile.htm l.

R e fe re n c e s Page 2 9 7 6

Ethical H acking a n d C o u n te rm e a s u re s C opyright by EC-COUIICil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

25.

Information about hackers, from http://dir.yahoo.com/Computers_and_lnternet/Security_and_Encryptior 1 /H acking/.

M odule 02: Footprinting and Reconnaissance 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. Search Operators, from http://www.googleguide.com /advanced_operators.htm l. The Complete Windows Trojans Paper, from http://www.windowsecurity.com /whitepapers/trojans/The_Com plete_W indows_Trojans_Paper.htm l. Naples, (2008), Information Gathering Tools, Available from http://it.toolbox.com /w iki/index.php/lnform ation_G athering_Tools. Extract Website Information from archive.org, Available from www.archive.org. Footprinting, from http://www.ethicalhacker.net/com ponent/option,com _sm f/ltem id,49/topic,228.m sg672. Simson Garfinkel and David Cox, (2009), Finding and Archiving the Internet Footprint, http://sim son.net/clips/academ ic/2009.BL.lnternetFootprint.pdf. CHAPTER 2 [FOOTPRINTING], from http://w w w .ecqurity.com /w p/footprinting-encored.pdf. Donna F. Cavallini and Sabrina 1 . PACIFICI, Got COMPETITIVE INTELLIGENCE, http://w w w .llrx.com /features/gotci.ppt. Spammers & hackers: using the APNIC Whois Database to find in their network, from http://w w w .apnic.net/info/faq/abuse/using_w hois.htm l. P. Mockapetris, (1987), DOMAIN NAMES - CONCEPTS AND FACILITIES, from htt p ://w w w .iet f .0 rg/ rf c/ rf c 1034. tx t. Manic Velocity, Footprinting And The Basics Of Hacking, from http://w eb.textfiles.com /hacking/footprinting.txt. Dean, (2001), Windows 2000 Command Prompt Troubleshooting Tools, from http://w w w .pcm ech.com /show /troubleshoot/192/. nslookup Command, from h ttp ://p u b lib .boulder. ibm .com/infocenter/pseries/v5r3/index.jsp?topic=/com.ibm.aix.doc/cmds/aixcmd s4/nslookup.htm. The nslookup Manual Page, from http://w w w .stopspam .org/usenet/m m f/m an/nslookup.htm l. Bob Hillery, (2001), Neohapsis Archives - Incidents list - Re: Finding out who owns ..., from http://archives.neohapsis.com /archives/incidents/2001-01/0032.htm l. Ryan Spangler, (2003), Analysis of Remote Active Operating System Fingerprinting Tools, from http://ww w .packetwatch.net/docum ents/papers/osdetection.pdf. Ryan Spangler, (2003), Analysis of Remote Active Operating System Fingerprinting Tools, from http://www.securiteam.com/securityreviews/5ZP010UAAI.html. Fingerprint methodology: 1 PID sampling, from http://w w w .insecure.org/nm ap/nm ap-fingerprintingold.html. Fyodor, (1998), Remote OS detection via TCP/IP Stack Fingerprinting, from http://w w w .donkboy.com /htm l/fingerprt.htm . Remote OS Detection, from http://nm ap.org/book/osdetect.htm l. Regional Internet Registry, from http://en.wikipedia.org/wiki/Regional_lnternet_Registry. Boy Scouts, Fingerprinting from h ttp ://onin.eom /fp/fpm eritbdg.htm l#top. The Hacker's Choice, from http://freew orld.thc.org/w elcom e/. THC Fuzzy Fingerprint, from h ttp ://fre e w o rld .th c.o rg /th c-ffp /.

39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49.

R efere n ce s Page 2977

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

50. 51. 52. 53.

Katherine Knickerbocker, CJ625 Student Paper, from http://all.net/C ID /Attack/papers/Spoofing.htm l. Arik R. Johnson, What is competitive intelligence? How does competitive ..., from http://auroraw dc.com /w hatisci.htm . Guangliang (Benny), (2006), Spamming and hacking, from http://w w w .apnic.net/info/faq/abuse/using_w hois.htm l. Dhillon, (2006), Footprinting: The Basics of Hacking: Hack In The Box, from http://www.hackinthebox.org/modules.php?op=modload&name=News&file=article&sid=5359&mode=t hread&order= 0 &thold= 0 . Roshen, (2006), Paladion - Customers - Success Stories - Penetration Testing, from http://paladion.net/pentration_testing.php. Paul Thompson, (2006), Cognitive Hacking and Digital Government: Digital Identity, from http://w w w .ists.dartm outh.edu/library/chd0803.pdf. Greg Sandoval, (2006), MPAA accused of hiring a hacker, from http://news.com.com/MPAA+accused+of+hiring+a+hacker/2100-1030_3-6076665.html. Kurt Seifried, (2005), Closet20001213 Backdoors, Back Channels and HTTP(S), from h ttp ://w w w .seif ried.org/security/index.php/Closet20001213_Backdoors,_Back_Channels_and_HTTP(S). Happy Browser, (2005), from http://w w w .hotscripts.com /D etailed/39030.htm l. Client-server architecture, from http://w w w .netw orkintrusion.co.uk/N _scan.htm . Elegant architecture: NASI, from http://w w w .nessus.org/features/. The Signatures, from http://w w w .honeynet.org/papers/finger/. Ryan Spangler, (2003), Analysis of Remote Active Operating System Fingerprinting Tools, Nmap t o o l: technique, from http://www.securiteam.com /securityreviews/5ZP010UAAI.htm l. Beware!: War dialing, Sandstorm Sandtrap 1.5 Wardialer Detector Plus 16 and Basic Detectors, from http://www.data-connect.com/Santstorm_PhoneSweep.htm. Appendix A - Glossary of Terms: IPSEC, from http://www.im sglobal.org/gws/gwsvlpO/im sgws_securityProfvlpO.htm l. Def. and info. Vulnerability scanning, from http://www.webencanto.com /computer_glossary/Com munications/Ethics/vulnerability_scanning.html. Footprinting, from http://books.m cgrawhill. com/downloads/products//0072193816/0072193816_ch01. pdf]. P. Mockapetris, Zvon - RFC 1034 [DOMAIN NAMES - CONCEPTS AND FACILITIES] - DOMAIN..., from http://www.zvon.org/tm RFC/RFC1034/Output/chapter3.htm l. Gaurav, (2006), The Domain Name System (DNS), from http://people.csa.iisc.ernet.in/gaurav/np/rfcs/dns.htm l. Using the Internet for Competitive Intelligence, from http://www.cio.com /CIO/arch_0695_cicolum n.htm l. Reporting network abuse: Spamming and hacking, from http://w w w .apnic.net/info/faq/abuse/using_w hois.htm l. Bastian Ballmann, (2011), Information gathering tools, from http://www2.packetstorm security.org/cgibin/search/search.cgi?searchvalue=information+gathering&type=archives&[search].x= 0 &[search].y= 0 . Google Earth, from http://w w w .google.com /earth/index.htm l. p ip l,from h ttp s://p ip l.co m /. spokeo, from http://w w w .spokeo.com . Zaba Search, from http://www.zabasearch.com .

54. 55. 56. 57. 58. 59. 60. 61. 62. 63. 64. 65.

66.
67.

68.
69. 70. 71. 72. 73. 74. 75.

R efere n ce s Page 2978

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

76. 77. 78. 79. 80. 81. 82. 83. 84. 85.

123 People Search, from http://w w w .123people.com . Zoomlnfo, from http://w w w .zoom info.com . PeekYou, from http://w w w .peekyou.com . Wink People Search, from http ://w ink.com . Intelius, from http://w w w .intelius.com . AnyWho, from http://w w w .anyw ho.com . PeopleSmart, from http://w w w .peoplesm art.com . People Lookup, from https://w w w .peoplelookup.com . WhitePages, from http://w w w .w hitepages.com . Facebook, from https://w w w .facebook.com /. Linkedln, from http://w w w .linkedin.com . Google+, from https://plus.google.com . Twitter, from h ttp ://tw itte r.c o m . Google Finance, from http://finance.google.com /finance. Yahoo Finance, from http://finance.yahoo.com . Zaproxy, from https://code.google.eom /p/zaproxy/downloads/list. Burp Suite, from http://portsw igger.net/burp/dow nload.htm l. Firebug, from https://getfirebug.com /dow nloads/. HTTrack Website Copier, from http://w w w .httrack.c 0 m /page/ 2/ . BlackWidow, from http://softbytelabs.com /us/dow nloads.htm l. Webripper, from http://w w w .calluna-softw are.com /W ebripper. SurfOffline, from h ttp ://w w w .surfo ffline .co m /. Website Ripper Copier, from http://w w w .tensons.com /products/w ebsiterippercopier/. PageNest, from http://w w w .pagenest.com . Teleport Pro, from http://w w w .tenm ax.com /teleport/pro/dow nload.htm . Backstreet Browser, from http://w w w .spadixbd.com /backstreet/. Portable Offline Browser, from http://w w w .m etaproducts.com /Portable_Offline_Browser.htm . Offline Explorer Enterprise, from http://w w w .m etaproducts.com /offline_explorer_enterprise.htm . Proxy Offline Browser, from http://w w w .proxy-offline-brow ser.com /. GNU Wget, from ftp ://ftp .g n u .o rg /g n u /w g e t/. iMiser, from http://internetresearchtool.com . Hooeey W ebprint, from http://www.hooeeywebprint.com.s3-website-us-eastl.amazonaws.com/download.html. Wayback Machine, from http://archive.org/w eb/w eb.php. WebSite-Watcher, from http://aignes.com /dow nload.htm . eMailTrackerPro, from http://w w w .em ailtrackerpro.com . PoliteMail, from http://w w w .politem ail.com . Email Lookup - Free Email Tracker, from http://w w w .ipaddresslocation.org. Read Notify, from http://w w w .readnotify.com . Pointofmail, from h ttp://w w w .pointofm ail.com .

86.
87.

88 .
89. 90. 91. 92. 93. 94. 95. 96. 97. 98. 99.

100 . 101 . 102 .


103. 104. 105. 106. 107. 108. 109.

110 . 111 . 112 .


113. 114.

R efere n ce s Page 2979

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

115. 116. 117. 118. 119.

DidTheyReadlt, from http://w w w .didtheyreadit.com . Super Email Marketing Software, from http://w w w .bulk-em ail-m arketing-softw are.net. Trace Email, from http://whatism yipaddress.com /trace-em ail. WhoReadMe, from http://w horeadm e.com . MSGTAG, from http://w w w .m sgtag.com /dow nload/free/. GetNotify, from h ttp://w w w .getnotify.com . Zendio, from http://w w w .zendio.com /dow nload. G-Lock Analytics, from http://glockanalytics.com . EDGAR Database, from http://w w w .sec.gov/edgar.shtm l. Hoovers, from http://w w w .hoovers.com . LexisNexis, from http://www.lexisnexis.com . Business Wire, from http://www.businesswire.com . Market Watch, from http://w w w .m arketw atch.com . The Wall Street Transcript, from h ttp ://w w w .tw st.co m . Upper Marketplace, from http://w w w .lipperm arketplace.com . Euromonitor, from http://w w w .eurom onitor.com . Fagan Finder, from http://w w w .faganfinder.com . SEC Info, from http://w w w .secinfo.com . The Search M onitor, from http://w w w .thesearchm onitor.com . Compete PRO, from http://w w w .com pete.com . Copernic Tracker, from http://w w w .copernic.com . ABI/INFORM Global, from http://w w w .proquest.com . SEMRush, from http://w w w .sem rush.com . AttentionM eter, from h ttp://w w w .attentionm eter.com . Jobitorial, from http ://w w w .job itorial.co m . Google Hacking Database, from http://w w w .hackersforcharity.org. MetaGoofil, from http://w w w .edge-security.com . Google Hack Honeypot, from http://ghh.sourceforge.net. Goolink Scanner, from http://w w w .ghacks.net. GMapCatcher, from http://code.google.com . SiteDigger, from http://w w w .m cafee.com . SearchDiggity, from http://w w w .stachliu.com . Google Hacks, from http://code.google.com . Google HACK DB, from http://w w w .secpoint.com . BiLE Suite, from http://w w w .sensepost.com . Gooscan, from http://w w w .darknet.org.uk. WHOIS Lookup at DomainTools.com, from http://w hois.dom aintools.com /. Domain Dossier, from http://centralops.net/co. SmartWhois, from http://w w w .tam os.com /dow nload/m ain/index.php. CountryWhois, from http://w w w .tam os.com /products/countryw hois/.

120 . 121 . 122 .


123. 124. 125. 126. 127. 128. 129. 130. 131. 132. 133. 134. 135. 136. 137. 138. 139. 140. 141. 142. 143. 144. 145. 146. 147. 148. 149. 150. 151. 152. 153. 154.

R efere n ce s Page 2980

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

155. 156. 157. 158. 159. 160. 161. 162. 163. 164. 165. 166. 167. 168. 169. 170. 171. 172. 173. 174. 175. 176. 177. 178. 179. 180. 181. 182. 183. 184. 185. 186. 187. 188. 189. 190. 191. 192. 193. 194.

Whois Analyzer Pro, from http://www.whoisanalyzer.com /download.opp. LanWhols, from http://lantricks.com /dow nload/. HotWhois, from http://w w w .tialsoft.com /dow nload/?url=http://w w w .tialsoft.com /hw hois.exe. Batch IP Converter, from http://w w w .netw orkm ost.com /dow nload.htm . Whois 2010 Pro, from http://lapshins.com /. CallerIP, from http://w w w .callerippro.com /dow nload.htm l. ActiveWhois, from h ttp ://w w w .joh nru.com /. Whois Lookup M ultiple Addresses, from http://w w w .sobolsoft.com /. WhoisThisDomain, from http://w w w .nirsoft.net/utils/w hois_this_dom ain.htm l. SmartWhois, from http://sm artw hois.com . Whois, from http://tools.w hois.net. Better Whois, from http://w w w .betterw hois.com . DNSstuff, from http://w w w .dnsstuff.com . Whois Source, from http://w w w .w hois.se. Network Solutions Whois, from http://w w w .netw orksolutions.com . Web Wiz, from http://w w w .w ebw iz.co.uk/dom ain-tools/w hois-lookup.htm . WebToolHub, from http://w w w .w ebtoolhub.com /tn561381-whois-lookup.aspx. Network-Tools.com, from http://netw ork-tools.com . Ultra Tools, from https://w w w .ultratools.com /w hois/hom e. dnsstuff, from http ://w w w .dn sstu ff.co m /. network-tools, from h ttp ://n etw o rk-to ols.co m /. DNS Queries, from http://w w w .dnsqueries.com /en/. DIG, from http://w w w .kloth.net/services/dig.php. myDNSTools, from http://w w w .m ydnstools.info/nslookup. DNSWatch, from http://w w w .dnsw atch.info. DomainTools, from http://w w w .dom aintools.com . Professional Toolset, from http://w w w .dnsstuff.com /tools. DNS, from http://e-dns.org. DNS Records, from http://netw ork-tools.com . DNS Lookup Tool, from http://w w w .w ebwiz.co.uk/dom ain-tools/dns-records.htm . DNSData View, from h ttp ://w w w .n irso ft.n e t. DNS Query Utility, from http://w w w .w ebm aster-toolkit.com . WHOIS-RWS, from h ttp ://w h ois.a rin .ne t/u i. Netcraft, from http://searchdns.netcraft.com/Phost. Shodan, from http://w w w .shodanhq.com /. Path Analyzer Pro, from http://w w w .pathanalyzer.com /dow nload.opp. VisualRoute 2010, from http://w w w .visualroute.com /dow nload.htm l. Network Pinger, from http://w w w .netw orkpinger.eom /en/dow nloads/#dow nload. Magic NetTrace, from h ttp ://w w w .tialsoft.com /dow nload/?url= http://w w w .tialsoft.com /m NTr.exe. GEO Spider, from http://orew are.com /view program .php?prog=22.

R efere n ce s Page 2981

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

195. 196. 197. 198. 199.

3D Traceroute, from h ttp ://w w w .d3tr.de/dow nload.htm l. vTrace, from http://vtrace.pl/dow nload.htm l. AnalogX HyperTrace, from http://w w w .analogx.com /contents/dow nload/N etw ork/htrace/Freew are.htm . Trout, from http://www.m cafee.com /apps/free-tools/term sofuse.aspx?url=/us/downloads/freetools/trout.aspx. Network Systems Traceroute, from http://w w w .net.princeton.edu/traceroute.htm l. Roadkil's Trace Route, from http://www.roadkil.net/program.php/P27/Trace% 20Route Ping Plotter, from h ttp://w w w .pingplotter.com . myiptest, from http://w w w .m yiptest.com /staticpages/index.php/how -about-you. Maltego, from http://w w w .paterva.com /w eb6/products/dow nload4.php. Domain Name Analyzer Pro, from http://www.domainpunch.com /dom ain-nam e-analyzerpro/download.php. Web Data Extractor, from http://w w w .w ebextractor.com . Prefix Whois, from http://pw hois.org. Netmask (IRPAS), from http://w w w .phenoelit.org/irpas/dow nload.htm l. Binging, from http://w w w .blueinfy.com /tools.htm l. Tctrace (IRPAS), from http://w w w .phenoelit.org/irpas/dow nload.htm l. Spiderzilla, from http://spiderzilla.m ozdev.org/installation.htm l. Autonomous System Scanner (ASS) (IRPAS), from http://w w w .phenoelit.org/irpas/dow nload.htm l. Sam Spade, from http://www.majorgeeks.com/Sam_Spade_d594.html. DNS DIGGER, from http://w w w .dnsdigger.com . Robtex, from http://w w w .robtex.com . Dig Web Interface, from http://www.digwebinterface.com SpiderFoot, from http://sourceforge.net/projects/spiderfoot/?so.urce=dlp. Domain Research Tool, from http://w w w .dom ainresearchtool.com . CallerIP, from http://w w w .callerippro.com /dow nload.htm l. ActiveWhois, from h ttp://w w w .johnru.com . Zaba Search, from http://www.zabasearch.com /. yoName, from http://yonam e.com . GeoTrace, from http://w w w .nabber.org/projects/geotrace/. Ping-Probe, from http://w w w .ping-probe.com /Ping-Probe/index.htm l. DomainHostingView, from h ttp ://w w w .n irso ft.n e t.

200. 201 . 202.


203. 204. 205. 206. 207. 208. 209.

210 . 211 . 212 .


213. 214. 215. 216. 217. 218. 219.

220. 221 . 222.


223. 224.

M odule 03: Scanning Networks 225. 226. 227. 228. Explanation of the Three-Way Handshake via TCP/IP, from http://support.m icrosoft.com /kb/172983. Appendix G. Lists of reserved ports, ICMP types and codes, and Internet protocols, from http://w w w .ingate.com /files/422/fw m anual-en/xal0285.htm l. The Art of Port Scanning - by Fyodor, from http://nm ap.org/nm ap_doc.htm l. Methods of IP Network Scanning - Stealth TCP Scanning Methods, from h ttp ://w w w .c 0 dewalkers.c 0 m /c/a/Server-Adm inistrati 0 n /M e th 0 ds-0f-IP-Netw 0 rk-Scanning/3 / .

R efere n ce s Page 2982

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

229. 230. 231. 232. 233. 234. 235. 236. 237. 238. 239. 240. 241. 242.

What is Port Scanning and Types of Port Scanning, from http://w w w .hackillusion.com /w hat-is-portscanning-and-types-of-port-scanning/. UDP Scan, from http://w w w .netw orkuptim e.com /nm ap/page3-10.shtm l. Hacking Exposed, from http://www.scribd.com/doc/62708034/Hacking-Exposed-Book. Network Security Assessment, from https://www.trustm atta.com /downloads/pdf/M atta_IP_Network_Scanning.pdf. Quick-Tip: SSH Tunneling Made Easy, from http://w w w .revsys.com /writings/quicktips/ssh-tunnel.htm l. Detecting Spoofed Packets, from http://seclab.cs.ucdavis.edu/papers/DetectingSpoofed-DISCEX.pdf. Scanning modes: FIN, Xmas, Null, from http://w w w .openxtra.co.uk/support/how to/nm ap-scanmodes.php. Port scanning techniq:sW (Window scan), from http://w w w .paulisageek.com /nm ap/index.htm l. Prabhaker M ateti, UDP Scanning, from http://w w w .cs.w right.edu/~pm ateti/Courses/499/Probing/. FTP server bounce attack, TCP Fragmenting, Intrusion detection systems use signature-based mechanisms, from http://w w w .in-f-or.it/inform atica/docs/portscan.pdf. Laura Chappell, (2003), OS Fingerprinting With ICMP: ICMP echo, from http://www.securitypronews.com /it/security/spn-23-200309290SFingerprintingwithlCM P.htm l. Scan Type-sF -sX -sN, from http://content.ix2.net/arc/t-4370.htm l. Unixo3/introduction to Nmap, from http://w w w .sam hart.com /cgi bin/classnotes/wiki.pl?UNIX03/lntroduction_To_Nmap. Fyodor, (2006), Art of port scanning: Features, Ideal scanning and related IPID games, Nmap: discription, Fingerprint methadology: IPID samplingBounce attacks worked, Techniqe: TCP reverse ident scanning, from http://w w w .insecure.org/nm ap/nm ap_doc.htm l. Antirez, hping2(8) - Linux man page: Discription, Hping2 Commands, from http://w w w .hping.org/m anpage.htm l. Chris McNab, (2008), Third Party IP Network Scanning Methods, Available from h ttp ://w w w .c 0 dewalkers.c 0 m /c/a/Server-Adm inistrati 0 n/Third-Party-IP-Netw 0 rk-Scanning-Meth 0 d s/. Thierry Lagarde , AutoScan Network, Available from http://autoscannetwork.com/index.php?option=com_content&task=view&id=48&ltemid=32. Onion Routing, Available from http://dictionary.zdnet.com /definition/onion+routing.htm l. Van Geelkerken F.W.J, (2006), Digital Mixing (MIX nets), Available from http://w w w .iusm entis.com /society/privacy/rem ailers/onionrouting/. Keith J. Jones, Mike Shema, & Bradley C. Johnson, Vulnerability Scanners, from www.foundstone.com/pdf/books/AntiHackerSample.pdf. Examining Port Scan Methods- Analysing Audible Techniques, from h ttp ://w w w .in -for.it/inform atica/docs/portscan.pdf. IMS General Web Services Security Profile, http://www.im sglobal.org/gws/gwsvlpO/im sgws_securityProfvlpO.htm l. Beware!: War dialing, from http://w w w .castlecops.com /al361-W ar_dialing.htm l. Simson L. Garfinkel, Automatic Parity Detection, from http://archive.cert.unistuttgart.de/archive/bugtraq/1998/12/m sg00215.htm l. Lance Mueller, CREATE A REVERSE SSH TUNNEL, http://www.lancemueller.com/blog/Create%20Reverse%20SSH%20to%20reach%20servlet%20inside%2 Ofirewall.pdf.

243. 244. 245. 246. 247. 248. 249. 250. 251. 252. 253.

R efere n ce s Page 2983

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

254. 255. 256. 257. 258.

Avi Kak, (2010), Port Scanning, Vulnerability Scanning, Packet Sniffing, and Intrusion Detection, http://cobweb.ecn.purdue.edu/~kak/compsec/NewLectures/Lecture23.pdf. Renaud Deraison, Ron Gula, and Todd Hayton, (2009), Passive Vulnerability Scanning Introduction, http://nessus.org/whitepapers/passive_scanning_tenable.pdf. Cheng Guang, TCP Analysis Based on Flags, http://w w w .nordu.net/developm ent/2nd-cnnw /tcp-analysisbased-on-flags.pdf. Cheng Tang & Jonathan Gossels, (1999), Wardialing: Practical Advice to Understand Your Exposure, http://w w w .system experts.com /assets/tutors/wardial0299.pdf. Network Security Library, from http://www.windowsecurity.com /whitepapers/m isc/Exam ining_port_scan_m ethods__Analyzing_Audibl e_Te. Lance Cottrell, Anonymizer Limitations: Logs, from http://w w w .livinginternet.eom /i/is_anon.htm . Michel Leconte, (2006), Network security consulting, from http://w w w .activsupport.com /Sm allBusiness-Network-Security-Soluti. Angry IP Scanner, from h ttp://angryip. 0 rg/w /D 0 w nl 0 ad. SolarWinds Engineer's Toolset, from http://downloads.solarwinds.com/solarwinds/Release/Toolset/ZPToolset/ZP-Toolset-Ol.html. Colasoft Ping Tool, from http://w w w .colasoft.com /dow nload/products/download_ping_tool.php. PacketTrap MSP, from http://www.packettrap.com/download?hsCtaTracking=e95ec5b5-069f-4cd5962c-9c0e6e32a6da%7C072dfe23-353f-46c2-9ab0-la27d39c01fl. Visual Ping Tester - Standard, from h ttp://w w w .pingtester.net. Ping Sweep (Integrated into WhatsupGold), from http://www.whatsupgold.com /products/download/network_m anagem ent.aspx?k_id=ping-sweep-tool. Ping Scanner Pro, from http://www.digilextechnologies.com . Network Ping, from http://www.greenline-soft.com /product_network_ping/index.aspx. Ultra Ping Pro, from http://ultraping.webs.com /dow nloads.htm . Ping M onitor, from http://w w w .niliand.com . PinglnfoView, from h ttp ://w w w .nirsoft.net/utils/m ultiple_ping_tool.htm l. Pinkie, from http://w w w .ipuptim e.net/category/dow nload/. Colasoft Packet Builder, from http://w w w .colasoft.com /dow nload/products/download_packet_builder.php. NetScanTools Pro, from http://w w w .netscantools.com /nstprodem orequestform .htm l. PRTG Network M onitor, from http://w w w .paessler.com /dow nload/prtg. Global Network Inventory Scanner, from http://w w w .m agnetosoft.com /products/global_netw ork_inventory/gni_features.htm . Net Tools, from http://m absoft.com /nettools.htm . SoftPerfect Network Scanner, from http://w w w .softperfect.com /products/netw orkscanner/. IP Tools, from http://w w w .ks-soft.net/ip-tools.eng/dow npage.htm . Advanced Port Scanner, from http://www.radm in.com /download/previousversions/portscanner.php. MegaPing, from http://w w w .m agnetosoft.com /products/m egaping/m egaping_features.htm . Netifera, from h ttp ://n etifera.com . Network Inventory Explorer, from h ttp ://w w w .10 strike.com /networkinventoryexplorer/download.shtm l.

259. 260. 261. 262. 263. 264. 265. 266. 267. 268. 269. 270. 271. 272. 273. 274. 275. 276. 277. 278. 279. 280. 281. 282. 283.

R efere n ce s Page 2984

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

284. 285. 286. 287. 288. 289. 290. 291. 292. 293. 294. 295. 296. 297. 298. 299.

Free Port Scanner, from http://www.nsauditor.eom /network_tools/free_port_scanner.htm l#.UW JRvqLzvrw. ID Serve, from http://w w w .grc.com . Netcraft, from http://toolbar.netcraft.com . Netcat, from http://sourceforge.net/projects/netcat/files/latest/dow nload?source=files. GFI LanGuard, from h ttp ://w w w .g fi.com/downloads/mirrors.aspx?pid=lanss. SAINT, from http://w w w .saintcorporation.com /products/softw are/saintScanner.htm l. Retina CS, from http://www.beyondtrust.com/Landers/TY-Page-RetinaCSCommunity/index.html. OpenVAS, from http://w w w .openvas.org. Core Impact Professional, from http://w w w .coresecurity.com . Security Manager Plus, from http://www.m anageengine.com /products/securitymanager/download, html. Nexpose, from http://www.rapid7.com /products/nexpose/com pare-downloads.jsp. Shadow Security Scanner, from http://w w w .safety-lab.com /en/dow nload.htm . QualysGuard, from http://w w w .qualys.com . Nsauditor Network Security Auditor, from h ttp://w w w .nsaudit 0 r.c0 m /ne tw 0 rk_security/netw 0 rk_security_audit0 r.html#.UWKEx6 Lzvrw. Security Auditor's Research Assistant (SARA), from http://w w w -arc.com /sara/. LANsurveyor, from http://www.solarwinds.com/register/MoreSoftware.aspx?External=false&Program=17592&c=70150000 OOOPjNE. OpManager, from http://w w w .m anageengine.com /network-m onitoring/dow nload.htm l. NetworkView, from http://w w w .netw orkview .com /htm l/dow nload.htm l. The Dude, from http://w w w .m ikrotik.com /thedude. LANState, from http://w w w .10-strike.com /lanstate/dow nload.shtm l. HP Network Node Manager i software, from h ttp ://w w w 8 .hp.com /us/en/softwaresolutions/software. html?compURI=1170657#. FriendlyPinger, from http://w w w .kilievich.com /fpinger/dow nload.htm . NetMapper, from http://w w w .opnet.com . Ipsonar, from http://w w w .lum eta.com /product/product.htm l. NetBrain Enterprise Suite, from h ttp://w w w .netbraintech.com /instant-trial/. CartoReso, from http://cartoreso.campus.ecp.fr. Spiceworks-Network Mapper, from http://w w w .spicew orks.com /dow nload/. Switch Center Enterprise, from http://www.lan-secure.c 0 m /d 0 w nl 0 ads.htrn#netw 0 rk. NetCrunch, from http://w w w .adrem soft.com /dem o/dow nloadproduct. php?product=nc7&file=NCServer7Premium. exe. Proxy Workbench, from http://proxyw orkbench.com /. Proxifier, from http://w w w .proxifier.com /dow nload.htm . Proxy Switcher, from http://w w w .proxysw itcher.com /. SocksChain, from http://ufasoft.com /socks/. TOR (The Onion Routing), from https://w w w .torproject.org/dow nload/dow nload.

300. 301. 302. 303. 304. 305. 306. 307. 308. 309. 310. 311. 312. 313. 314. 315. 316. 317.

R efere n ce s Page 2985

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

318. 319. 320. 321. 322. 323. 324. 325. 326. 327. 328. 329. 330. 331. 332. 333. 334. 335. 336. 337. 338. 339. 340. 341. 342. 343. 344. 345. 346. 347. 348. 349. 350. 351. 352. 353.

Proxy, from http://w w w .analogx.com /contents/dow nload/N etw ork/proxy/Freew are.htrn. Proxy Commander, from http://w w w .dlao.com /proxycm d/. Protoport Proxy Chain, from http ://w w w .protop ort.co m . Proxy Tool Windows App, from http://w ebproxylist.com /proxy-tool-w indow s-app/. Proxy+, from http://w w w .proxyplus.cz/. Gproxy, from http://gpassl.com /gproxy.php. FastProxySwitch, from h ttp ://w w w .affinity-too ls.co m /fps/. Fiddler, from http://w w w .fiddler2.com /fiddler2/version.asp. ProxyFinder Enterprise, from http://w w w .proxy-tool.com . Socks Proxy Scanner, from http://w w w .m ylanview er.com . ezProxy, from h ttp s://w w w . 0 clc.0 rg/ezpr 0 xy/d 0 w nl 0 ad.en.h.tml. Charles, from http://w w w .charlesproxy.com /. JAP Anonymity and Privacy, from http://anon.inf.tu-dresden.de/w in/dow nload_en.htm l. UltraSurf, from http://w w w .ultrasurf.us. CC Proxy Server, from http://www.youngzsoft.net/ccproxy/proxy-server-download.htm . WideCap, from h ttp://w idecap.ru. FoxyProxy Standard, from https://addons.m ozilla.org. ProxyCap, from http://w w w .proxycap.com . Super Network Tunnel, from h ttp ://w w w .ne tw orktu nn el.n e t. HTTP-Tunnel, from h ttp ://w w w .http-tu nn el.co m . Bitvise, from http://w w w .bitvise.com . Psiphon, from http://psiphon.ca. Your-Freedom, from http://w w w .your-freedom .net. Just Ping, from http://w w w .just-ping.com . WebSitePulse, from http://w w w .w ebsitepulse.com . G-Zapper, from http://w w w .dum m ysoftw are.com /gzapper.htm l. Mowser, from http://w w w .m ow ser.com . Spotflux, from http://w w w .spotflux.com . Anonymous Web Surfing Tool, from http://www.anonym ous-surfing.com . U-Surf, from http://ultim ate-anonym ity.com . Hide Your IP Address, from http://w w w .hideyouripaddress.net. WarpProxy, from http://silent-surf.com . Anonymizer Universal, from http://w w w .anonym izer.com . Hope Proxy, from http://w w w .hopeproxy.com . Guardster, from http://w w w .guardster.com . Hide My IP, from http://w w w .privacy-pro.com /features.htm l.

M odule 04: Enumeration 354. 355. rpcinfo, from http://w w w .usoft.spb.ru/com m ands/rpcinfo/. RPCCLIENT, from http://w w w .sarata.com /m anpages/m anl/rpcclient.htm l.

R efere n ce s Page 2986

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

356. 357. 358. 359. 360. 361. 362. 363. 364. 365. 366. 367. 368. 369. 370. 371. 372. 373. 374. 375. 376. 377. 378. 379. 380. 381. 382. 383. 384. 385. 386. 387. 388. 389.

Enumeration, from http://w w w .edenofire.com /tutes/hack.php. smtp-user-enum User Documentation, from http://pentestm onkey.net/tools/user-enum eration/sm tpuser-enum. Chris Gates, (2006), Windows Enumeration: USER2SID & SID2USER, from http://www.windowsecurity.com/whitepaper/Windows-Enumeration-USER2SID-SID2USER.html. What is SNMP?, from http://w w w .w tcs.org/snm p4tpc/snm p.htm . SNMP, from http://w w w .cisc 0 .c0 m /univercd/cc/td/d 0 c/cisintw k/it 0_d 0 c/snm p.htm #xt 0 cid 5 . SNMPForDummies, from http://wiki.outboundindex.net/SNM PForDumm ies. Jan van Oorschot, Jeroen W ortelboer and Dirk Wisse, (2001), SNMP - The Mission Statement, http://w w w .securityfocus.com /infocus/1301. rpcinfo(lM ), from http://docs.hp.com /en/B2355-90692/rpcinfo.lM .htm l. GRAPE- INFO- DOT- COM, from http://w w w .grape-info.com . Joris Evers, (2006), AT&T hack exposes 19,000 identities, from http://news.cnet.com /2100-1029_36110765.html. SNMP from http://w w w .iss.net/security_center/advice/Reference/Networking/SNM P/default.htm . Simple Network Management Protocol (SNMP), from http://www.cisco.com /en/US/docs/internetworking/technology/handbook/SNM P.htm l. Linux / Unix finger command, from http://w w w .com puterhope.com /unix/ufinger.htm . Chris Gates, (2006), Windows Enumeration: USER2SID & SID2USER http://www.windowsecurity.com/whitepapers/Windows-Enumeration-USER2SID-SID2USER.html. SuperScan, from http://www.m cafee.com /us/downloads/free-tools/superscan.aspx. Hyena, from http://w w w .system tools.com /hyena/trial_dow nload.htm . W infingerprint, from http://w w w .w infingerprint.com . NetBIOS Enumerator, from http://nbtenum .sourceforge.net/. PsTools, from http://technet.m icrosoft.com /en-us/sysinternals/bb897553.aspx. OpUtils, from http://w w w .m anageengine.com /products/oputils/dow nload.htm l. SolarWind's IP Network Browser, from http://w w w .solarw inds.com /engineers-toolset/ip-netw orkbrowser.aspx. Getif, from http://w w w .w tcs.org/snm p4tpc/getif.htm . OiDViEW SNMP MIB Browser, from http://w w w .oidview .com /m ibbrow ser.htm l. iReasoning MIB Browser, from http://ireasoning.com /m ibbrow ser.shtm l. SNScan, from http://www.mcafee.com /us/downloads/free-tools/snscan.aspx. SNMP Scanner, from http://www.secure-bytes.com/SNMP+Scanner.php. SNMP Informant, from http://w w w .snm p-inform ant.com /. Net-SNMP, from http://net-snm p.sourceforge.net/download.htm l. Nsauditor Network Security Auditor, from h ttp://w w w .nsaudit 0 r.c0 m /ne tw 0 rk_security/netw 0 rk_security_audit0 r.html#.UV 7 LH5 NHLZ4 . Spiceworks, from http://www.spiceworks.com /free-snm p-network-m anagem ent-software/. Enum4linux, from http://labs.portcullis.co.uk/application/enum 4linux/. Softerra LDAP Administrator, from http://w w w .ldapadm inistrator.com /. JXplorer, from h ttp ://w w w .jxplore r.o rg/. LDAP Admin Tool, from http://w w w .ldapsoft.com /ldapbrow ser/ldapadm intool.htm l.

R efere n ce s Page 2987

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

390. 391. 392. 393. 394. 395. 396. 397. 398.

LDAP Account Manager, from https://www.ldap-account-m anager.org/lam cm s/. LEX - The LDAP Explorer, from http://w w w .ldapexplorer.com /. LDAP Admin, from http://w w w .ldapadm in.org/. Active Directory Explorer, from http://technet.m icrosoft.com /en-us/sysinternals/bb963907.aspx. LDAP Adm inistration Tool, from http://sourceforge.net/projects/ldap-at/. LDAP Search, from http://securityxploded.com /ldapsearch.php. Active Directory Domain Services Management Pack, from http://w w w .m icrosoft.com /enus/download/details.aspx?id=21357. LDAP Browser/Editor, from http://w w w .novell.com /coolsolutions/tools/13765.htm l. NSLookup, from http://w w w .kloth.net/services/nslookup.php.

M odule 05: System Hacking 399. 400. 401. 402. 403. 404. 405. 406. 407. 408. 409. Why Keyloggers are extremely dangerous?, from http://gam ecreator.hubpages.com /hub/W hyKeyloggers-are-extremely-dangerous. Steganography in Depth, from http://www.crcnetbase.com /doi/abs/10.1201/9780203504765.ch4. Detecting spoofed packets, from http://ieeexplore.ieee.0rg/xpl/articleDetails.jsp?arnumber=1194882. NTLM Authentication in Java, from http://w w w .luigidragone.com /softw are/ntlm -authentication-in-java/. A Tutorial Review on Steganography, from http://w w w .jiit.ac.in/jiit/ic3/IC 3_2008/IC 32008/APP2_21.pdf. network scanning, from http://searchm idm arketsecurity.techtarget.com /definition/network-scanning. Ricky M. Magalhaes, (2004), Using passwords as a defense mechanism to improve Windows security, from www.windowsecurity.com/artides/Passwords_lmprove_W indows_Security_Part2.html. Piazza & Peter, (2002), Hybrid threats have rosy future: attacks that combine virus ..., http://findartides.com /p/articles/m i_hb6380/is_200207/ai_n25618875?tag=content;coll. Andreas Westfeld and Andreas Pfitzmann, Attacks on Steganographic Systems, citeseerx.ist.psu.edu/. DaijiSanai and HidenobuSeki, (2004), Optimized Attack for NTLM2 Session Response http://www.blackhat.com /presentations/bh-asia-04/bh-jp-04-pdfs/bh-jp-04-seki.pdf. Zhi Wang, Xuxian Jiang, Weidong Cui, and Xinyuan Wang, Countering Persistent Kernel Rootkits Through Systematic Hook Discovery, http://research.m icrosoft.com /en-us/um /people/wdcui/papers/hookm apraid08.pdf. Elia Florio, When Malware Meets Rootkits, http://w w w .sym antec.com /avcenter/reference/when.m alware.m eets.rootkits.pdf. Peter Piazza, (2002), SMO: Tech Talk, from http://w w w .securitym anagem ent.com /library/001272.htm l. Brute force attack - Wikipedia, the free encyclopedia, from http://en.w ikipedia.org/w iki/Brute_force_attack. Talk:Brute force attack - Bvio, from http://bvio.ngic.re.kr/Bvio/index.php/Talk:Brute_force_attack. Passwords, from http://searchsecurity.techtarget.com/searchSecurity/downloads/HackingforDummiesCh07.pdf. Authernative, Inc. | Products | FAQs, from http://w w w .authernative.com /faqs.shtm l. CIAC Notes, from http://w w w .ciac.org/ciac/notes/N otes03a.shtm l. Path: newshost.uwo.caluwovax.uwo.calmneville From: mneville@uwovax ..., from h ttp ://w w w .uw o .ca/its/do c/n ew sletters/ln T o uch /vo ll-9 49 5/w inl8 .txt. The Hack FAQ: Password Basics, from http://w w w .nm rc.org/pub/faq/hackfaq/hackfaq-04.htm l.

410. 411. 412. 413. 414. 415. 416. 417. 418.

R efere n ce s Page 2988

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

419. 420. 421. 422. 423. 424. 425. 426. 427.

Luigi Dragone, NTLM Authentication in Java, from http://w w w .luigidragone.com /netw orking/ntlm .htm l. Hardening the Base Windows 2000 Server, from http://w w w .m icrosoft.com /technet/security/prodtech/window s2000/secw in2k/sw in2k06.m spx. Bill Wall, Sunbelt TECH BRIEFING, from http://ww w .stratvantage.com /security/ntpass.htm . Security Options, from http://w w w .m icrosoft.com /technet/security/topics/serversecurity/tcg/tcgch05n.m spx. Technical Explanation of Network SMB Capture, from http://ebook.coolersky.com /hack/lc5.04_doc/sm b_capture.html. Detecting Alternate Data Streams, from http://w w w .w indow sitpro.com /A rticle/A rtidelD /16189/16189.htm l. Bojan Smojver, Linux Today - ZDNet Australia: Threats Move Beyond Linux to Windows, http://www.linuxtoday.com/security/2002121100426SCSVNT. Neohapsis Archives - NTBugtraq - Proposal for protection from ..., from http://archives.neohapsis.com /archives/ntbugtraq/2000-q2/0245.htm l. Russell Kay, (2006), Sidebar: A Simple Rootkit Example, http://www.com puterworld.eom /securitytopics/security/hacking/story/0,10801,108116,00.html?from=s tory_package. Russell Kay, (2006), Rootkits offer the lure of total control, from http://w w w .tech world. com/security/features/index.cfm?featureid=2219. Paladion Networks, from http://w w w .paladion.net/m edia/insights/ihfaq.htm . NTFS Streams - Everything you need to know (demos and tests included), from http://www.diam ondcs.com .au/stream s/stream s.htm . H. Carvey, (2002), The Dark Side of NTFS (Microsoft's Scarlet Letter), from http://www.infosecwriters.com /texts.php?op=display&id=53. Stegonography (a secretly hidden coding that dates back to a ncien t...), from http://w w w .w ordinfo.info/w ords/index/info/view _unit/3403/?letter=S&spage=9. Ravindranath AV, Steganography: Hiding Data in Images, from http://www.asptoday.com/Content.aspx?id=2347. Paul Robertson, (2005), CS 450 Homework 4, from http://www.cs.umb.edu/~paulr/CS450/assignments/ass4.html. NBTdeputy (v 1.0.1), from http://w w w .securityfriday.com /T opics/w inxpl.htm l. Sir Dystic, (2002), NBName, from http://w w w .securityfocus.com /com m ents/tools/1670/12751/threaded. Fred B. Schneider, Authentication, from http://www.cs.cornell.edu/Courses/cs513/2000sp/NL10.html. CS513: System Security - Topic Outline, from http://w w w .cs.cornell.edu/courses/cs513/2005fa/02.outline.htm l. Security Options from http://w w w .m icrosoft.com /technet/security/guidance/serversecurity/tcg/tcgch05n.m spx. Hardening the Base Windows 2000 Server, http://technet.m icrosoft.com /hi-in/library/cc751216(enus).aspx. Brute force attack, from http://w w w .reference.com /brow se/w iki/Brute_force_attack. What is pwdump2, from http://w ww.bindview.com /Services/razor/Utilities/W indows/pwdum p2_readm e.cfm . Derogee, Steganography and Steganalysis, from http://w w w .liacs.nl/hom e/tm oerlan/privtech.pdf.

428. 429. 430. 431. 432. 433. 434. 435. 436. 437. 438. 439. 440. 441. 442. 443.

R efere n ce s Page 2989

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

444.

Techworld.com - Rootkits offer the lure of total control, from http://w w w .tech world. com/websecurity/features/index.cfm?featureid=2219&pagtype=samecatsamech an. Dasmith, Software Analysis, from h ttp ://w w w .un c.e du /~sm ithd r/inlsl87 /sr.htm l. Hacking Windows-Specific Services, from http://awkwardalliteration.com/ebooks/Computers/Hacking%20Exposed%20Windows%202003%20Chapter%205.pdf. Ricky M. Magalhaes, (2003), Using passwords as a defense mechanism to improve Windows security, from http://www.windowsecurity.com/articles/Passwords_lmprove_W indows_Security_Part2.html. Winrtgen, from http ://w w w .oxid .it/p ro jects.htm l. RainbowCrack, from h ttp ://p r 0ject-rainb 0wcrack.c 0 m /index.htm #d 0w nl 0 ad. Elcomsoft Distributed Password Recovery, from http://w w w .elcom soft.com /edpr.htm l. Securityoverride, from http://securityoverride.org/default-password-list. Cirt, from h ttp ://c irt.n e t. Default-password, from http://default-passw ord.info. Defaultpassword, from http://w w w .defaultpassw ord.us. Passwordsdatabase, from http://www.passwordsdatabase.com. W3dt, from https://w 3dt.net/tools/defaultpassw ords/. Virus, from http://www.virus.org/default_passwds. Open-sez.me, from http://open-sez.m e/passwd.htm . Routerpasswords, from http://w w w .routerpassw ords.com /. Fortypoundhead, from http://w w w .fortypoundhead.com /tools_dpw.asp. pwdump7, from http://w w w .tarasco.org/security/pw dum p_7/. fgdump, from http://w w w .foofus.net/~fizzgig/fgdum p/. LOphtCrack, from http://www.IO phtcrack.com /download.htm l. Ophcrack, from http://ophcrack.sourceforge.net/download.php. RainbowCrack, from h ttp ://p r 0ject-rainb 0wcrack.c 0 m /index.htm #d 0w nl 0 ad. Password Unlocker Bundle, from http://www.passwordunlocker.com/password-recovery-bundle.html. Proactive System Password Recovery, from http://w w w .elcom soft.com /pspr.htm l. John the Ripper, from h ttp ://w w w .op en w all.co m /jo hn /. Windows Password Cracker, from http://w w w .windows-password-cracker.com /download.htm l. WinPassword, from http://lastbit.com /ntpsw /default.asp. Passware Kit Enterprise, from http://w w w .lostpassw ord.com /kit-enterprise.htm . PasswordsPro, from http://www.insidepro.com /eng/passwordspro.shtm l. LSASecretsView, from http://w w w .nirsoft.net/utils/lsa_secrets_view .htm l. LCP, from http://w w w .lcpsoft.com /english/dow nload.htm . Password Cracker, from http://www.am lpages.com /pwdcrack.shtm l. Kon-Boot, from http://w w w .thelead82.com /kon-boot/konbootW IN .htm l. Windows Password Recovery Tool, from http://www.windowspasswordsrecovery.com /. Hash Suite, from http://hashsuite.openw all.net/dow nload. SAMInside, from http://w w w .insidepro.com /eng/sam inside.shtm l.

445. 446.

447. 448. 449. 450. 451. 452. 453. 454. 455. 456. 457. 458. 459. 460. 461. 462. 463. 464. 465. 466. 467. 468. 469. 470. 471. 472. 473. 474. 475. 476. 477. 478. 479.

R efere n ce s Page 2990

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

480. 481. 482. 483. 484. 485. 486. 487. 488. 489. 490.

Windows Password Recovery, from http://www.passcape.com/windows_password_recovery. Password Recovery Bundle, from http://www.top-password.com /password-recovery-bundle.htm l. krbpwguess, from http://w w w .cqure.net/w p/tools/passw ord-recovery/krbpwguess/. Windows Password Breaker Enterprise, from http://www.recoverwindowspassword.com /windowspassword-breaker.html. Rekeysoft Windows Password Recovery Enterprise, from http://w w w .rekeysoft.com /reset-window spassword.html. Active( Password Changer, from http://w w w.password-changer.com /. Offline NT Password & Registry Editor, from http://pogostick.net/~pnh/ntpassw d/. Windows Password Reset Kit, from http://w w w .reset-w indows-passw ord.net/. Windows Password Recovery Tool, from http://www.windowspasswordsrecovery.com /. ElcomSoft System Recovery, from http://w w w .elcom soft.eom /esr.htm l#forgot adm inistrator password. Trinity Rescue Kit, from http://trinityhome.org/Home/index.php?content=TRINITY_RESCUE_KIT_DOWNLOAD&front_id=12&lang =en&locale=en. Windows Password Recovery Bootdisk, from http://www.rixler.com /windows-password-recoverybootdisk.htm. PasswordLastic, from http://www.passwordlastic.com/windows-password-recovery-lastic. Stellar Phoenix Password Recovery, from http://w w w .stellarinfo.com /passw ord-recovery.htm . Windows Password Recovery Personal, from http://www.windows-passwordrecovery.com /. Windows Adm inistrator Password Reset, from http://www.systoolsgroup.com /windows-adm instratorpassword-reset.html. RemoteExec, from http://www.isdecisions.com /products/rem oteexec. PDQ Deploy, from http://w w w .adm inarsenal.com /dow nload-pdq. DameWare NT Utilities, from http://w w w .dam ew are.ru/nt_utilities.htm l. Spytech SpyAgent, from http://w ww.spytech-web.com /spyagent.shtm l. All In One Keylogger, from h ttp ://w w w .re lytec.com /. Ultimate Keylogger, from http://w w w .ultim atekeylogger.com /dow nload/. Advanced Keylogger, from http://www.m ykeylogger.com /perfect-keylogger. The Best Keylogger, from http://w w w .thebestkeylogger.com /. SoftActivity Keylogger, from http://w w w .softactivity.com /dow nload-al.asp. Elite Keylogger, from http://w w w .w idestep.com /elite-keystroke-recorder-info. Powered Keylogger, from http://www.m ykeylogger.com /undetectable-keylogger/. StaffCop Standard, from http://w w w .staffcop.com /dow nload/. iMonitorPC, from h ttp ://w w w .im o nito rp c.co m /. PC Activity M onitor Standard, from http://w w w .pcacm e.com /dow nload.htm l. KeyProwler, from http://keyprow ler.com /dow nload.aspx. Keylogger Spy M onitor, from http://ematrixsoft.com /download.php?p=keylogger-spy-m onitor-software. REFOG Personal M onitor, from http://w w w .refog.com /personal-m onitor.htm l. Actual Keylogger, from http://www.actualkeylogger.com /download-free-key-logger.htm l. Spytector, from http://w w w .spytector.com /dow nload.htm l.

491. 492. 493. 494. 495. 496. 497. 498. 499. 500. 501. 502. 503. 504. 505. 506. 507. 508. 509. 510. 511. 512. 513. 514.

R efere n ce s Page 2991

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

515. 516. 517. 518. 519. 520. 521. 522. 523. 524. 525. 526. 527. 528. 529. 530. 531. 532. 533. 534. 535. 536. 537. 538. 539. 540. 541. 542. 543. 544. 545. 546. 547. 548. 549. 550. 551.

KidLogger, from http://kidlogger.net/dow nload.htm l. PC Spy Keylogger, from http://www.pc-spy-keylogger.com . Revealer Keylogger, from http://w w w .logixoft.com /free-keylogger-dow nload. Spy Keylogger, from http://w w w .spy-key-logger.com /dow nload.htm l. Actual Spy, from http://w w w .actualspy.com /dow nload.htm l. SpyBuddy 2013, from http://w w w .exploreanyw here.com /products/spybuddy/. Amac Keylogger, from http://w w w .am ackeylogger.com /. Aobo Mac OS X KeyLogger, from http://w w w .keylogger-m ac.com /. Perfect Keylogger for Mac, from http://w w w .blazingtools.com . Award Keylogger for Mac, from http://w w w .aw ard-soft.com /content/view /275/136. Mac Keylogger, from http://w w w .aw ard-soft.com /M ac_Keylogger/. REFOG Keylogger for MAC, from http://w w w .refog.com /m ac-keylogger.htm l. KidLogger for MAC, from http://kidlogger.net/dow nload.htm l. MAC Log Manager, from http://www.keylogger.in/keylogger/m adogm anager.htm l. logkext, from h ttp s://c 0 de.g 00gle.c 0 m /p /l 0 gkext/. Keyboard Spy, from http://alphaomega.software.free.fr/keyboardspy/Keyboard%20Spy.html. FreeMacKeylogger, from http://w w w .hw suite.com /free-m ac-keylogger/. KeyGrabber, from http://w w w .keydem on.com . KeyGhost, from http://w w w .keyghost.com . Activity M onitor, from http://w w w .softactivity.com /dow nload.asp. Remote Desktop Spy, from http://w w w .global-spy-softw are.com /dow nload.php. SSPro, from http://w w w .gpsoftdev.com /dow nload-m onitoring-softw are/. RecoveryFix Employee Activity M onitor, from http://w ww.recoveryfix.com /download-em ployeem onitoring.html. Employee Desktop Live Viewer, from http://www.nucleustechnologies.com /download-em ployeedesktop-live-viewer.php. NetVizor, from http://w w w .netvizor.net/dow nload.htm . Net Spy Pro, from http://w w w .net-m onitoring-softw are.com /w indow s/trial.htm l. REFOG Employee M onitor, from http://w w w .refog.com /em ployee-com puter-m onitoring-softw are.htm l. OsMonitor, from http://w w w .os-m onitor.com /dow nload.htm . LANVisor, from http://w w w .lanvisor.com /dow nload.htm . Work Examiner Standard, from http://w w w .w orkexam iner.com /dow nload.htm l. Power Spy, from http://em atrixsoft.com /index.php. eBLASTER, from http://www.$pectorsoft.com/products/eBlaster_Windows/index.asp?source=nav-hseBwin. !m onitor Employee Activity M onitor, from http://w w w .em ployee-m onitoring-softw are.ee/. Employee Monitoring, from http://w w w .em ployeem onitoring.net/dow nload.asp. OsMonitor, from http://w w w .os-m onitor.com /dow nload.htm . Ascendant NFM, from http://www.ascendant-security.com /download.shtm l. Spylab WebSpy, from http://w w w .spylab.org/dow nload.htm .

R efere n ce s Page 2992

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

552. 553. 554. 555. 556. 557. 558. 559. 560. 561. 562. 563. 564. 565. 566. 567. 568. 569. 570. 571. 572. 573. 574. 575. 576. 577. 578. 579. 580. 581. 582. 583. 584. 585. 586. 587. 588.

Personal Inspector, from http://w w w .spyarsenal.com /personal-inspector/. CyberSpy, from http://w w w .cyberspysoftw are.com /dow nload.htm l. AceSpy, from http://w w w .acespy.com /features.htm l. EmailObserver, from http://w w w .softsecurity.com /prod_D 7_m ore.htm l. Net Nanny Home Suite, from http://w w w .netnanny.com /products/netnanny_hom e_suite/detail/technical. Aobo Filter fo r PC, from http://w w w .aobo-porn-filter.com /dow nloads. CyberSieve, from http://w w w .softforyou.com /cs-dow nload.php. Child Control, from http://salfeld.com /dow nload/child-control/index.htm l. SentryPC, from http://w w w .sentrypc.com /trial.htm . iProtectYou Pro, from http://w w w .softforyou.com /ip-index.htm l. K9 Web Protection, from http://w w w l.k9w ebprotection.com /getk9/dow nload-softw are. Verity Parental Control Software, from http://w w w .nchsoftw are.com /childm onitoring/index.htm l. Profil Parental Filter, from http://w w w .profiltechnology.com /en/hom e/profil-parental-filter. PC Pandora, from http://w w w .pcpandora.com /dow nload/. KidsWatch, from http://w w w .kidsw atch.com /. SoftActivity TS M onitor, from http://w w w .softactivity.com /dow nloadtsm .aspx. Desktop Spy, from http://w w w .spyarsenal.com /download.htm l. IcyScreen, from http://www.16software.com /icyscreen/screenshots.php. Spector Pro, from http://www.spectorsoft.com/products/SpectorPro_W indows/index.asp?source=navhs-ProWin. PC Tattletale, from h ttp ://w w w .pctattle ta le .co m /. Computer Screen Spy M onitor, from http://w w w .m ysuperspy.com /dow nload.htm . PC Screen Spy M onitor, from http://ematrixsoft.com /download.php?p=pc-screen-spy-m onitor-software. Kahlown Screen Spy M onitor, from http ://w w w .leso ftrejion .co m /. Guardbay Remote Computer M onitoring Software, from http://w w w .guardbay.com . HT Employee M onitor, from http://w w w .hidetools.com /em ployee-m onitor.htm l. Spy Employee M onitor, from http://w w w .spysw .com /em ployee-m onitor-softw are.htm . USBSpy, from http://w w w .everstrike.com /usb-m onitor/. USB M onitor, from http://w w w .hhdsoftw are.com /usb-m onitor. USB Grabber, from http://usbgrabber.sourceforge.net/. USBTrace, from http://www.sysnudeus.com /usbtrace_download.htm l. USBDeview, from http://w w w .nirsoft.net/utils/usb_devices_view .htm l. Advanced USB Port M onitor, from http://w w w .aggsoft.com /usb-port-m onitor.htm . USB M onitor Pro, from http://w w w .usb-m onitor.com /. USB Activity M onitoring Software, from http://w w w .datadoctor.org/partition-recovery/dow nloads.htm l. Stealth iBot Computer Spy, from http://www.brickhousesecurity.com /product/stealth+ibot+com puter+spy.do. KeyCarbon USB Hardware Keylogger, from http://w w w .spyw aredirect.net/keycarbon-usb.htm l. USB 2GB Keylogger, from http://diij.com/KL2-Keylogger-2GB-USB-Hardware-keelog/prod_24.html.

R efere n ce s Page 2993

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

589. 590. 591. 592. 593. 594. 595. 596. 597. 598. 599. 600. 601. 602. 603. 604. 605. 606. 607. 608. 609. 610. 611. 612. 613. 614. 615. 616. 617. 618. 619. 620. 621. 622. 623. 624. 625. 626. 627. 628.

Spy Voice Recorder, from http://w w w .m ysuperspy.com /recorder.htm . Sound Snooper, from http://w w w .sound-snooper.com /en/dow nload.php. WebCam Recorder, from http://w ebcam recorder.com /. WebcamMagic, from http://www.robom agic.com /webcam m agic.htm . MyWebcam Broadcaster, from http://w w w .eyespyfx.com /broadcast.php. I-Can-See-You, from http://w w w .internetsafetysoftw are.com . Digi-Watcher, from http://w w w .digi-w atcher.com /. NET Video Spy, from http://w w w .sarbash.com /dow nload.shtm l. Eyeline Video Surveillance Software, from http://w w w .nchsoftw are.com /surveillance/index.htm l. Capturix VideoSpy, from http://www.capturix.com/default.asp?target=consumer&product=cvs. WebCam Looker, from http://felenasoft.com /w ebcam looker/en/. SecuritySpy, from http://w w w .bensoftw are.com /securityspy/dow nload.htm l. iSpy, from http://www.ispyconnect.com /download.aspx. Printer Activity M onitor, from http://w w w .redline-softw are.com /eng/products/pam /. Print M onitor Pro, from http://w w w .spyarsenal.com /printer-m onitoring-softw are/print-m onitor-pro/. Accurate Printer M onitor, from http://w w w .aggsoft.com /printer-m onitor.htm . Print Censor Professional, from http://usefuls 0 ft.c 0 m /print-cens 0 r/#.UWPW 8JNHLZ4 . All-Spy Print, from http://w w w .all-spy.com /all-spy-print.htm l. O&K Print Watch, from http://w w w .prnw atch.com /okpw .htm l. Print Job M onitor, from http://w w w .im onitorsoft.com /product-print-job-m onitor.htm . PrintTrak, from http ://w w w .lygil.com /p rin ttrak/printtra k.htm . Printer Admin - Copier Tracking System, from http://w w w .printeradm in.com /copy-m anagem ent.htm . Print Inspector, from http://w w w .softperfect.com /products/pinspector/. Print365, from http://kraw asoft.com /index.htm l. Mobile Spy, from http://w w w .phonespysoftw are.com /. VRS Recording System, from http://w w w .nch.com .au/vrs/index.htm l. Modem Spy, from http://w w w .m odem spy.com /en/dow nload.php. MobiStealth Cell Phone Spy, from http://w w w .m obistealth.com /m obile-phone-spy-software. SPYPhone GOLD, from http://spyera.com /products/spyphone-gold-internet. SpyPhoneTap, from http://w w w .spyphonetap.com /. FlexiSPY OMNI, from http://www.flexispy.com /en/flexispy-om ni-spy-app-cell-phone.htm . SpyBubble, from http://www.spybubble.com /cell-phone-spy.php. MOBILE SPY, from http://w w w .m obile-spy.com /. StealthGenie, from http://w w w .stealthgenie.com /. CellSPYExpert, from http://w w w .cellspyexpert.com /. SPYPhone, from http://spyera.com /products/spy-phone-basic-internet. EasyGPS, from http://w w w .easygps.com /. FlexiSPY PRO-X, from http://www.flexispy.com /spyphone-call-interceptor-gps-tracker-symbian.htm . GPS TrackMaker Professional, from http://w w w .trackm aker.com /dwlpage.php. MOBILE SPY, from http://w w w .m obile-spy.com /.

R efere n ce s Page 2994

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

629. 630. 631. 632. 633. 634. 635. 636. 637. 638. 639. 640. 641. 642. 643. 644. 645. 646. 647. 648. 649. 650. 651. 652. 653. 654. 655. 656. 657. 658. 659. 660. 661. 662. 663. 664. 665.

World-Tracker, from h ttp://w w w .w orld-tracker.com /v4/. ALL-in-ONE Spy, from http://w w w .thespyphone.com /allinone.htm l. Trackstick, from http://w w w .trackstick.com /dow nload.htm l. MobiStealth Pro, from http://w w w .m obistealth.com . mSpy, from http://w w w .buym spy.com /. GPS Retriever, from http://www.mobilebugstore.com /Blackberry_gps_retriver.aspx. Zemana AntiLogger, from http://www.zem ana.com /Download.aspx. Anti-Keylogger, from http://w w w .anti-keyloggers.com /. PrivacyKeyboard, from http ://w w w .an tikeylogger.eom/products/privacykeyboard/overview.html#download. DefenseWall HIPS, from http://w w w .softsphere.com /program s/. KeyScrambler, from http://w w w .qfxsoftw are.com /dow nload.htm . 1 Hate Keyloggers, from http://dew asoft.com /privacy/i-hate-keyloggers.htm . SpyShelter STOP-LOGGER, from http://w w w.spyshelter.com /download-spyshelter. DataGuard AntiKeylogger Ultimate, from http://www.m axsecuritylab.com /dataguard-antikeylogger/download-anti-keyloger.php. PrivacyKeyboard, from http://www.privacykeyboard.com /privacy-keyboard.htm l. Elite Anti Keylogger, from http://w w w .elite-antikeylogger.com /free-dow nload.htm l. CoDefender, from https://www.encassa.com/downloads/default.aspx. PC Tools Spyware Doctor, from http://w w w .pctools.com /spyw are-doctor/. SUPERAntiSpyware, from http://superantispyw are.com /index.htm l. Spyware Terminator 2012, from http://w w w .pcrx.com /spyw areterm inator/. Ad-Aware Free Antivirus+, from http://w w w .lavasoft.com /products/ad_aware_free.php. Norton Internet Security, from http://in.norton.com /dow nloads-trial-norton-internet-security. SpyHunter, from http://w w w .enigm asoftw are.com /products/. Kaspersky Internet Security 2013, from http://ww w .kaspersky.com /internet-security-free-trial. SecureAnywhere Complete 2012, from http://www.webroot.com /En_US/consumer-productssecureanywhere-complete.html. MacScan, from http://macscan.securemac.com/. Spybot - Search & Destroy, from http://w w w .safer-netw orking.org/dl/. Malwarebytes Anti-Malware PRO, from http://w w w .m alwarebytes.org/products/m alw arebytes_pro/. Fu, from http://w w w .f-secure.com /v-descs/fu.shtm l. KBeast, from http://core.ipsecs.com /rootkit/kernel-rootkit/kbeast-vl/. Hacker Defender HxDef Rootkit, from http://vishnuvalentino.com /hacking-tutorial/hacker-defenderhxdef-rootkit-tutorial-in- 10 -steps-nostalgia/. Stinger, from http://www.m cafee.com /us/downloads/free-tools/how-to-use-stinger.aspx. UnHackMe, from http://w w w .greatis.com /unhackm e/dow nload.htm . Virus Removal Tool, from http://w w w .sophos.com /en-us/products/free-tools/virus-rem oval-tool.aspx. Hypersight Rootkit Detector, from http://northsecuritylabs.com /. Avira Free Antivirus, from http://w w w .avira.com /en/avira-free-antivirus. SanityCheck, from http://w w w .resplendence.com /downloads.

R efere n ce s Page 2995

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

666.
667.

GMER, from h ttp ://w w w .g m e r.n e t/. Rootkit Buster, from http://dow nloadcenter.trendm icro.com/index. php?regs=NABU&dk=result_page&dkval=drop_list&catid =6&prodid=155. Rootkit Razor, from http://w w w .tizersecure.com /. RemoveAny, from http://w w w .free-anti-spy.com /en/index.php. TDSSKiller, from http://support.kaspersky.com/5350?el=88446. Prevx, from http://www.prevx.com /freescan.asp. StreamArmor, from http://securityxploded.com /stream arm or.php. ADS Spy, from http://www.m erijn.nu/program s.php#adsspy. ADS Manager, from http://dm itrybrant.com /adsm anager. Streams, from http://technet.m icrosoft.com /en-us/sysinternals/bb897440.aspx. AlternateStreamView, from http://w w w .nirsoft.net/utils/alternate_data_stream s.htm l. NTFS-Streams: ADS manipulation tool, from http://sourceforge.net/projects/ntfs-ads/. Stream Explorer, from http://www.rekenwonder.eom /stream explorer.htm #Stream s. ADS Scanner, from http://www.pointstone.com /products/ADS-Scanner/. RKDetector, from h ttp ://w w w .rkd etecto r.com /. GMER, from h ttp ://w w w .g m e r.n e t/. HijackThis, from http://w w w .trendm icro.com /us/security/products/index.htm l. SNOW, from http://w w w .darkside.com .au/snow /index.htm l. QuickStego, from http://quickcrypto.com /free-steganography-software.htm l. Hide In Picture, from http://sourceforge.net/projects/hide-in-picture/. gifshuffle, from http://w w w .darkside.com .au/gifshuffle/index.htm l. CryptaPix, from http://w w w .briggsoft.com /cpix.htm . BMPSecrets, from http://bm psecrets.com /. OpenPuff, from http://embeddedsw.net/OpenPuff_Steganography_Home.html. OpenStego, from http://openstego.sourceforge.net/. PHP-Class StreamSteganography, from http://www.phpclasses.org/package/6027-PHP-Store-andhidden-information-in-PNG-images.html. Red JPEG, from http://w w w .totalcm d.net/plugring/redjpeg.htm l. Steganography Studio , from http://stegstudio.sourceforge.net/.

668.
669. 670. 671. 672. 673. 674. 675. 676. 677. 678. 679. 680. 681. 682. 683. 684. 685.

686.
687.

688.
689. 690. 691. 692. 693. 694. 695. 696. 697. 698. 699. 700. 701. 702.

Virtual Steganographic Laboratory (VSL), from http://vsl.sourceforge.net/. wbStego, from http://w bstego.w bailer.com /. Merge Streams, from http://w w w .ntkernel.com /w &p.php?id=23. Office XML, from http://www.irongeek.com/i.php?page=security/m s-office-stego-code. Data Stash, from http://w w w .skyjuicesoftw are.com /softw are/ds_info.htm l. FoxHole, from http://foxhole.sourceforge.net. Xidie Security Suite, from http://w w w .stegano.ro. StegParty, from http://w w w .fasterlight.com . Hydan, from http://w w w .crazyboy.com /hydan/.

R efere n ce s Page 2996

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

703. 704. 705. 706. 707. 708. 709. 710. 711. 712. 713. 714. 715. 716. 717. 718. 719. 720. 721. 722. 723. 724. 725. 726. 727. 728. 729. 730. 731. 732. 733. 734. 735. 736. 737. 738. 739. 740. 741.

StegJ, from http://sourceforge.net/projects/stegj/files/. StegoStick, from http://stegostick.sourceforge.net/. SNOW, from http://w w w .darkside.com .au/snow /index.htm l. OmniHide PRO, from h ttp ://o m n ihid e.co m /. Our Secret, from http://w w w .securekit.net/oursecret.htm . RT Steganography, from http://rtstegvideo.sourceforge.net/. Masker, from http://w w w .softpuls.com /m asker/. Max File Encryption, from http://w w w .softeza.com /fileencryption/. MSU StegoVideo, from http://w w w .com pression.ru/video/stego_video/index_en.htm l. BDV DataHider, from http://w w w .bdvnotepad.com /products/bdv-datahider/. StegoStick, from http://stegostick.sourceforge.net/. OpenPuff, from http://embeddedsw.net/OpenPuff_Steganography_Home.html. Stegsecret, from http://stegsecret.sourceforge.net/. PSM Encryptor, from http://dem o.powersoftm akers.com /psm e.zip. DeepSound, from http://jpinsoft.net/DeepSound/Download.aspx. Mp3stegz, from http://m p3stegz.sourceforge.net/. MAXA Security Tools, from http://www.m axa-tools.com /m st.php?lang=en. BitCrypt, from http://bitcrypt.m oshe-szweizer.com /. MP3Stego, from http://w w w .petitcolas.net/fabien/steganography/m p3stego/. Hide4PGP, from http://w w w .heinz-repp.onlinehom e.de/. CHAOS Universal, from http://safechaos.com /cu.htm . SilentEye, from http://w w w .silenteye.org/. QuickCrypto, from http://w w w .quickcrypto.com /dow nload.htm l. CryptArkan, from http://w w w .kuskov.com /com ponent/option,com _rem ository/ltem id,30/func,fileinfo/id,l/. StegoStick, from http://stegostick.sourceforge.net/. Invisible Secrets 4, from http://w w w .invisiblesecrets.com /. Folder Lock, from http://w w w .new softw ares.net/folderlock/. A+ Folder Locker, from http://w w w .giantm atrix.com /products/aplus-folder-locker/. Toolwiz BSafe, from http://w w w .toolw iz.com /products/toolw iz-bsafe/. Hide Folders 2012, from h ttp ://fsp ro.n e t/h id e-fo lde rs/. GiliSoft File Lock Pro, from http://w w w .gilisoft.com /product-file-lock-pro.htm . Universal Shield, from http://w w w .everstrike.com /shield.htm . WinMend Folder Hidden, from http://w w w .w inm end.com /folder-hidden/. Encrypted Magic Folders , from http://w w w .pc-m agic.c 0 m /des.htm #em f. QuickCrypto, from http://w w w .quickcrypto.com /dow nload.htm l. Max Folder Secure, from http://w w w .m axfoldersecure.com /. Spam Mimic, from http://w w w .spam m im ic.com /. Sams Big G Play Maker, from http://w w w .scram disk.clara.net/. Gargoyle Investigator Forensic Pro, from h ttp ://w e ts t 0 netech.c 0 m /p r 0 d u c t/ 2/d 0w nl 0 ads.

R efere n ce s Page 2997

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

742. 743. 744. 745. 746. 747. 748. 749. 750. 751. 752. 753. 754. 755. 756. 757. 758. 759. 760. 761. 762. 763. 764.

XStegsecret, from http://stegsecret.sourceforge.net/. Stego Suite, from h ttp ://w w w .w e ts t 0 netech.c 0 m /p r 0 d u c t/l/d 0 w nl 0 ads. StegAlyzerAS, from http://www.sarc-wv.com /products/stegalyzeras/. StegAlyzerRTS, from http://w w w .sarc-wv.com /products/stegalyzerrts/. StegSpy, from http://w w w .spy-hunter.com /stegspy. StegAlyzerSS, from http://www.sarc-wv.com /products/stegalyzerss/. StegMarkSDK, from http://www.datam ark.com .sg/downloads-sdk.htm . Steganography Studio, from http://stegstudio.sourceforge.net/. Virtual Steganographic Laboratory (VSL), from http://vsl.sourceforge.net/. Stegdetect, from http://w w w .outguess.org/detection.php. Auditpol, from http://technet.m icrosoft.com /en-us/library/cc755264(v=ws.l0).aspx. CCIeaner, from h ttp://w w w .piriform .com /dow nload. MRU-Blaster, from h ttp://w w w .brightfort.com /m rublaster.htm l. Wipe, from http://privacyroot.com /softw are/w w w /en/w ipe.php. Tracks Eraser Pro, from http://w w w .acesoft.net/features.htm . BleachBit, from http://bleachbit.sourceforge.net/news/bleachbit-093. AbsoluteShield Internet Eraser Pro, from http://w w w .internet-track-eraser.com /ineteraser.php. Clear My History, from http://w w w .hide-m y-ip.com /clearm yhistory.shtm l. EvidenceEraser, from http://w w w .evidenceeraser.com /. WinTools.net Professional, from h ttp ://w w w .w in to o ls.n e t/. RealTime Cookie & Cache Cleaner (RtC3), from http://w w w .kleinsoft.co.za/buy.htm l. AdvaHist Eraser, from http://w w w .advacrypt.cjb.net/. Free Internet W indow Washer, from http://w w w .eusing.com /W indow_W asher/W indow_W asher.htm .

M odule 06: Trojans and Backdoors 765. 766. 767. 768. 769. 770. 771. 772. 773. Placing Backdoors through Firewalls, from http://www.cyberwarzone.com /cyberwarfare/placingbackdoors-through-firewalls. A Deep Look into Netcat - The TCP/IP Swiss Army Knife, from http://w w w .linux-support.com /cm s/adeep-look-into-netcat-the-tcpip-swiss-army-knife/. Trojans Revealed: Hackers Center: Internet Security Archive ..., http://www.hackerscenter.com/archive/view.asp?id=24717. Dancho Danchev, The Complete Windows Trojans Paper, from http://w w w .fram e4.com /content/pubs/com p_trojans.txt. The corporate threat posed by email Trojans, from http://w w w .gfisoftw are.de/w hitepapers/netw orkprotection-against-trojans.pdf. Trojan Horses, from http://www-i4.inform atik.rwth-aachen.de/lufg/teaching/ss2004/dependabilitysem inar/paper/final 8 .pdf. Trojans - and how to protect your network against them, from http://w w w .w indow security.com /w hitepapers/trojans_protect_your_network.htm l. Fausi Qattan & Fredrik Thernelius, (2004), Master's Thesis, from http://www.dsv.su.se/research/seclab/pages/pdf-files/04-34.pdf. Malicious Intrusion Techniques, http://w ww.telecom worx.com /Adobe/Files39087.pdf.

R efere n ce s Page 2998

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

774. 775. 776. 777. 778. 779. 780. 781. 782. 783. 784. 785. 786. 787. 788. 789. 790. 791. 792.

Increased use of Trojan Horse Programs, from http://www.niscc.gov.uk/niscc/docs/tn-2004021600080.html?lang=en. Anti Trojan source - How to protect your network against trojans ..., from http://new s.m yinstall.com /news/45/. Dancho Danchev, Trojan W hite Paper, from http://w w w .anti-trojan-softw are-review s.com /trojan-w hitepaper-p 2 .htm. Trojans, from http://w w w .em ailprivacy.info/trojans. Remote Access Trojan FAQ and Port List Computer Security - Network ..., from http://www.infosyssec.com /infosyssec/trojanportlist.htm l. WINSNORT.com: Intrusion Detection, from http://www.winsnort.com/modules.php?op=modload&name=FAQ&file=index&myfaq=yes&id_cat=13. Trojan Horse Computer Infection Symptoms, from http://hacker-elim inator.com /trojansym ptom s.htm l. LockDown Millennium Advanced Online Help, from http://lockdowncorp.com /m anual/TrojanlnfectionSym ptom s.htm . Commodon Communications - Threats to your Security on the Internet, from http://w w w .com m odon.com /threat/threat-detect.htm . Van Hauser/THC, Placing Backdoors Through Firewalls, from http://www.cgisecurity.com /lib/placing_backdoors_through_firewalls.txt. Mikejc, (2004), Tech-Recipes.com - Use System File Checker to Solve Problems, from h ttp ://w w w .te chrecipes.com/windows_tips602.html. Exploring the Explodable, from http://w w w .guninski.com /brow sers.htm l. David Wells, (1996), Wrappers, from http://w w w .objs.com /survey/w rap.htm . Milly, Steve A., Stan, Ojatex, Gordon, Darius and Buzz, (2000), WordPad, from www.pchelp.org/security/scrap.htm. Trojans FAQ http://w w w .w indow security.com /faqs/Trojans/. Information on Computer Viruses, from http://w w w -rohan.sdsu.edu/viruses.htm l. Advanced Network Configuration and Troubleshooting, from http://snow .nl/dist/xhtm lc/ch05s02.htm l. Tom Armstrong, (2001), Netcat - The TCP/IP Swiss Army Knife, from h ttp ://rn.nu /p ro gram /u til/ne tca t/n etca t.h tm l. Microsoft - Windows File, from Protection, from http://w w w .m icrosoft.com /resources/docum entation/w indow s/xp/all/proddocs/enus/system_file_protection.mspx?mfr=true. Scott W. Hotaling's, Placing Backdoors Through Firewalls, from http://m asc2279.no-ip.org/gadgetstoys/internet/placing-backdoors-through-firewalls. How to block ICMP tunneling?, from https://listserv.icsalabs.com /piperm ail/firewall-wizards/1999July/006060.html. Newbie: Security, from http://w w w .unixgeeks.org/security/new bie/security/firew all.htm l. Phrack Magazine 0 0 . Volume Seven, Issue Forty-Nine File 06 o f ..., from http://w w w .phrack.org/phrack/49/P49-06. Dancho Danchev dancho, The Complete Windows Trojans Paper, from http://www.astalavista.com/index.php?section=directory&linkid=640. Declan McCullagh, (2006), Case 2:00-cr-00170-WHA-VPM, from http://w w w .politechbot.com /docs/feds.trojan.hacking.brief.082406.pdf. TCPView, from http://technet.m icrosoft.com /en-us/sysinternals/bb897437.aspx.

793. 794. 795. 796. 797. 798. 799.

R efere n ce s Page 2999

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

800. 801. 802. 803. 804. 805. 806. 807. 808. 809. 810. 811. 812. 813. 814. 815. 816. 817. 818. 819. 820. 821. 822. 823. 824. 825. 826. 827. 828. 829. 830. 831. 832. 833. 834. 835. 836. 837. 838.

CurrPorts, from h ttp ://w w w .nirsoft.ne t/utils/cp orts.h tm l. Process M onitor, from http://technet.m icrosoft.com /en-in/sysinternals/bb896645.aspx. What's Running, from http://w w w .w hatsrunning.net/. PrcView, from h ttp://w w w .team cti.com . Winsonar, from http://w w w .few byte.com /w insonar.htm l. HiddenFinder, from h ttp://w w w .w enpoint.com /dow nload/. Autoruns for Windows, from http://technet.m icrosoft.com /en-us/sysinternals/bb963902.aspx. KillProcess, from http://orangelam psoftware.com /products_killprocess.php. Security Task Manager, from http://w w w .neuber.com /taskm anager/. Yet Another (remote) Process M onitor, from http://yaprocm on.sourceforge.net/. MONIT, from h ttp ://m m o n it.co m /m o n it/. OpManager, from http://w w w .m anageengine.com /network-m onitoring/process-m onitoring.htm l. j v l 6 PowerTools 2012, from http://w w w .m acecraft.com /jvl6-pow ertools-2012/. PC Tools Registry Mechanic, from http://w w w .pctools.com /registry-m echanic/. Reg Organizer, from http://w w w .chem table.com /organizer.htm . Registry Shower, from http://w w w .registryshow er.com /dow nload.htm . Comodo Cloud Scanner, from http://w w w .com odo.com /hom e/internet-security/cloud-scanner.php. Buster Sandbox Analyzer, from http://bsa.isoftw are.nl/. All-Seeing Eyes, from http://w w w .fortego.com /en/ase.htm l. MJ Registry Watcher, from http ://w w w .jac 0 bsm.c 0 m /m js 0 ft.htm #rgw tchr. Active Registry M onitor, from http://w w w .devicelock.com /arm /. SpyMe Tools, from http://www.lcibrossolutions.com /spym e_tools.htm . Regshot, from http://regshot.sourceforge.net/. Registry Live Watch, from http://leelusoft.blogspot.in/2009/ll/registry-live-w atch-10.htm l. DriverView, from http ://w w w .nirsoft.ne t/utils/d rive rview .h tm l. Driver Detective, from http://w w w .drivershq.com /. Unknown Device Identifier, from http://w w w .zhangduo.com /udi.htm l. DriverGuide Toolkit, from http://w w w .driverguidetoolkit.com /. DriverMax, from http://w w w .innovative-sol.com /driverm ax/index.htm . Driver Magician, from http://w w w .driverm agician.com /. Driver Reviver, from http://w w w .reviversoft.com /driver-reviver/. DriverScanner, from http://w w w .uniblue.com /softw are/driverscanner/. Double Driver, from h ttp://w w w .boozet.org/dd.htm . My Drivers, from http://w w w .zhangduo.com /driverbackup.htm l. DriverEasy, from http://w w w .drivereasy.com /. Windows Service Manager (SrvMan), from http://tools.sysprogs.org/srvm an/. SMART Utility, from http://www.thewindowsclub.com /sm art-a-utility-for-tweaking-windows-7-vista-xpservices. Netwrix Service M onitor, from http://www.netwrix.com /windows_services_m onitoring_freeware.htm l. Vista Services Optimizer, from http://ww w .sm artpcutilities.com /servicesoptim izer.htm l.

R efere n ce s Page 3000

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

839. 840. 841. 842. 843. 844. 845. 846. 847. 848. 849. 850. 851. 852. 853. 854. 855. 856. 857. 858. 859. 860. 861. 862. 863. 864. 865.

ServiWin, from h ttp ://w w w .nirsoft.ne t/utils/se rviw in.h tm l. Windows Service Manager Tray, from http://winservicemanager.codeplex.com /. AnVirTask Manager, from http://w w w .anvir.com /dow nload.htm . Process Hacker, from http://processhacker.sourceforge.net/downloads.php. Free Windows Service M onitor Tool, from http://www.manageengine.com/free-windows-servicemonitor/free-windows-service-m onitor-index.htm l. Overseer Network M onitor, from http://www.overseer-network-m onitor.com /Download.aspx. Total Network M onitor, from http://w w w .softinventive.com /products/total-netw ork-m onitor/. Starter, from http://codestuff.tripod.com /products_starter.htm l. Security AutoRun, from http://tcpm onitor.altervista.org/startup-m anager/. Absolute Startup manager, from http://w w w .absolutestartup.com /. ActiveStartup, from http://w w w .hexilesoft.com /activestartup.htm l. StartEd Lite, from http://w w w .outertech.com /en/w indow s-startup. Startup Inspector, from http://w w w .w indow sstartup.com /startupinspector.php. Program Starter, from http://w w w .ab-tools.com /de/softw are/program m starter/. Disable Startup, from http://w w w .disablestartup.com /. StartupM onitor, from h ttp://w w w .m lin.net/S tartupM onitor.shtm l. Chameleon Startup Manager, from http://www.chameleon-m anagers.com/downloads.php. Startup Booster, from http://w w w .sm artpctools.com /startup_booster/. FCIV, from http://www.m icrosoft.com /en-us/download/details.aspx?id=11533. Tripwire, from http://w w w .tripw ire.com /it-security-softw are/security-configuration-m anagem ent/fileintegrity-m onitoring/. FastSum, from http://w w w .fastsum .com /dow nload.php. WinMD5, from http://w w w .blisstonia.eom /softw are/W inM D 5/#dow nload. Advanced Checksum Verifier (ACSV), from h ttp ://w w w .irn is .n e t/. Fsum Fronted, from http://fsum fe.sourceforge.net/. Verisys, from http://w w w .ionx.co.uk/products/verisys. AFICK (Another File Integrity Checker), from http://afick.sourceforge.net/. File Integrity M onitoring, from http://www.ncircle.com/index.php?s=products_ccm _file-integritymonitoring. Attribute Manager, from http://w w w .m iklsoft.com /attrm an/index.htm l. PA File Sight, from http://w w w .pow eradm in.com /file-sight/index3.aspx. CSP File Integrity Checker, from http://w w w .tandem security.com /solution_14.php. ExactFile, from http://w w w .exactfile.com /dow nloads/. OSSEC, from http://www.ossec.net/?page_id=19. Windows Defender, from http://w w w .m icrosoft.com /en-in/dow nload/details.aspx?id=17. McAfee AntiVirus Plus, from http://hom e.m cafee.com /store/free-antivirus-trials. Norton AntiVirus, from http://us.norton.com /dow nloads-trial-nortonantivirus?inid=us_hho_topnav_download_detail_nav. Trojan Horse Construction Kit, from http://www.pestpatrol.eom /zks/pestinfo/t/trojan_horse_construction_kit.asp.

866.
867.

868.
869. 870. 871. 872. 873. 874.

R efere n ce s Page 3001

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

875. 876. 877. 878. 879. 880. 881. 882. 883. 884. 885.

Progenic Mail Trojan Construction Kit - PMT, from http://w w w .sim ovits.com /trojans/tr_data/y2630.htm l. Pandora's Box, from http://greece.m rdonn.org/greekgods/pandora.htm l. TrojanHunter, from h ttp ://w w w .trojan h un ter.co m /trojan hu n ter/. Emsisoft Anti-Malware, from http://w w w .em sisoft.in/en/softw are/antim alw are/. Anti-Trojan Shield (ATS), from http://w w w .atshield.com /?r=dow nload. Spyware Doctor, from http://w w w .pctools.com /spyware-doctor/download/?src=lp_sd. Anti Malware BOCIean, from http://w w w .com odo.com /hom e/internet-security/anti-m alw are.php. Anti Hacker, from http://w w w .hide-m y-ip.com /antihacker.shtm l. XoftSpySE, from http://w w w .paretologic.com /xoftspy/se/new lp/xray/. SPYWAREfighter, from http://www.spamfighter.com/SPYW AREfighter/. Anti Trojan Elite, from http://w w w .rem ove-trojan.com /index_ate.php. SUPERAntiSpyware, from http://w w w .superantispyware.com /index.htm l. Trojan Remover, from http://w w w .sim plysup.com /trem over/dow nload.htm l. Twister Antivirus, from http://w w w .filseclab.com /en-us/.

886.
887.

888.

M odule 07: Viruses and Worms 889. 890. 891. 892. 893. 894. 895. 896. 897. 898. 899. 900. 901. 902. Types of Virus, from http://w w w .m indpride.net/root/Extras/Viruses/virus_protection_and_rem oval_ii.htm . Vulnerabilities in Network Infrastructures and Prevention/Containment Measures, from http://proceedings.informingscience.org/lnSITE2012/lnSITE12p053-067Awodele0012.pdf. Terminology, from http://w w w .f-secure.com /en/w eb/labs_global/term inology-f. Virus Protection, from http://w w w .m indpride.net/root/Extras/Viruses/virus_protection_and_rem oval_iii.htm . Paul Boutin, (2003), An inside view of the worm that crashed the Internet in 15 minutes, founder from h ttp ://w w w .w ired .co m /w ired /a rch ive/ll.0 7/sla m m e r.h tm l. Case Study: Microsoft Network Hacked by QAZ Trojan, from http://www.msnbc.com /m sn/482011.asp Oct. 29, 2000. Mark Russinovich, (2008), TCPView for Windows v2.53, from http://w w w .sysinternals.com /U tilities/TcpView .htm l. Mark Russinowich and Bryce Cogswell, (2008), Autoruns fo r windows (v 9.32), from http://w w w .sysinternals.com /U tilities/Autoruns.htm l. Merijn, (2005), Hijack This (System Checker) (v 1.99.1), from http://www.majorgeeks.com /download.php?det=3155. Norman Book on Computer Viruses, from http://download.norman.no/manuals/eng/BOOKON.PDF. Carey Nachenberg, Understanding and Managing Polymorphic Viruses from http://w w w .sym antec.com /avcenter/reference/striker.pdf. The Spread of the Sapphire/Slammer Worm, from http://www.caida.org/publications/papers/2003/sapphire/sapphire.htm l. Mike Gunderloy, (2003), Microsoft Certified Professional Magazine Online | Newsletters, vol 2 # 8, from http://m cpm ag.com /newsletter/article. asp?EditorialslD=153. R. A. Hettinga, (2003), Random Scanning Worms and Sapphire/Slammer's PRNG, from h ttp ://w w w .m a ilarchive. com/cryptography@wasabisystems.com/msg03503.html.

R efere n ce s Page 3002

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

903. 904. 905. 906.

Information on a virus on campus, http://security.uw o.ca/antivirus/infoH istory.htm l. Virus History The Senior Most Virus!!, from w w w.optusnet.com .au/learning/em ail/virus. Computer Knowledge Virus Tutorial, from www.mpl.org.eg/doc/eBOOKs/vtutor.pdf. Dr. Alan Solomon and Robert M. Slade, 1990 - VX BBS & Little Black Book (AT&T Attack), 1991 - Tequila, 2001 - Gnuman, Winux Windows/Linux Virus, 2004 - Trojan.Xombe, Randex, Bizex, W itty, from w w w.cknow.com /vtutor/HistoryofViruses.htm l. Michelangelo, DAME, & VCL, from http://library.thinkquest.org/04oct/00460/m alw areH istory.htm l. Honeypots, Honeynets, and Intrusion Detection, from h ttp://w w w .honeypots.net/. Featured Files, from http://packetstorm security.org/. BinText, from http://w w w .m cafee.com /apps/free-tools/term sofuse.aspxPurh/us/downloads/freetools/bintext.aspx. UPX, from http://upx.sourceforge.net/#downloadupx. Process Explorer, from http://technet.m icrosoft.com /en-in/sysinternals/bb896653.aspx. RegShot, from http://regshot.sourceforge.net/. OllyDbg, from http ://w w w .ollydb g .de /. ProcDump, from http://technet.m icrosoft.com /en-us/sysinternals/dd996900.aspx. IDA Pro, from https://w w w .hex-rays.com /products/ida/support/dow nload_dem o.shtm l. VirusTotal, from h ttps://w w w .virustotal.com /en/. Anubis: Analyzing Unknown Binaries, from http://anubis.iseclab.org. Avast! Online Scanner, from http://onlinescan.avast.com . Malware Protection Center, from http://w w w .m icrosoft.com /security/portal/. ThreatExpert, from http://w w w .threatexpert.com . Dr. Web Online Scanners, from http://vm s.drw eb.com . Metascan Online, from http://w w w .m etascan-online.com /. Bitdefender QuickScan, from http://w w w .bitdefender.com /scanner/online/free.htm l. GFI SandBox, from http://w w w .gfi.com /m alw are-analysis-tool. UploadMalware.com, from UploadMalware.com. Fortinet, from http://w w w .fortiguard.com /antivirus/virus_scanner.htm l. Immunet, from http://w w w .im m unet.com /free/index.htm l. AVG Antivirus, from http://free.avg.com /in-en/hom epage. BitDefender, from http://w w w .bitdefender.com /D ow nloads/. Kaspersky Anti-Virus, from http://w w w .kaspersky.com /trials. Trend Micro Internet Security Pro, from http://apac.trendm icro.com . Norton AntiVirus, from http://us.norton.com /dow nloads-trial-nortonantivirus?inid=us_hho_topnav_download_detail_nav. F-Secure Anti-Virus, from http://w w w .f-secure.com /en/w eb/hom e_global/anti-virus. Avast Pro Antivirus, from http://w w w .avast.com /pro-antivirus. McAfee AntiVirus Plus 2013, from http://hom e.m cafee.com /store/free-antivirus-trials. ESET Smart Security 6, from h ttp://w w w .eset.eom /dow nload/hom e/detail/fam ily/5/. Total Defense Internet Security Suite, from http://w w w .totaldefense.com /shop/total-defense-internetsecurity-suite.aspx.

907. 908. 909. 910. 911. 912. 913. 914. 915. 916. 917. 918. 919. 920. 921. 922. 923. 924. 925. 926. 927. 928. 929. 930. 931. 932. 933. 934. 935. 936. 937. 938.

R efere n ce s Page 3003

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

939. 940. 941. 942. 943. 944. 945. 946.

What's Running, from h ttp://w w w .w hatsrunning.net/. Winsonar, from http://w w w .few byte.com /w insonar.htm l. Reg Organizer, from http://w w w .chem table.com /organizer.htm . Windows Service Manager (SrvMan), from http://tools.sysprogs.org/srvm an/. ServiWin, from h ttp ://w w w .nirsoft.ne t/utils/se rviw in.h tm l. Starter, from http://codestuff.tripod.com /products_starter.htm l. Security AutoRun, from http://tcpm onitor.altervista.org/startup-m anager/. FCIV, from http://www.microsoft.com /en-u$/download/details.aspx?id=11533.

M odule 08: Sniffing 947. 948. 949. 950. 951. 952. 953. 954. 955. 956. 957. 958. What is Sniffer and how to detect sniffing in computer network, from http://w w w .aboutonlinetips.com /sniffer-types-and-protecting-against-sniffing/. Anatomy of an ARP Poisoning Attack, from http://www.unitedsystemsok.com/anatom y-of-an-arppoisoning-attack. What is ARP?, from http://w w w .antiarp.com /english_94.htm l. Modeling and Analysis of Wireless LAN Traffic, from http://www.dm clab.hanyang.ac.kr/files/publication/journals/international/200911_08.pdf. Dynamic ARP Inspection (DAI), from http://daxm.net/ccienotes/20100131/dynam ic-arp-inspection-dai. Overview of Layer 2 Switched Networks and Communication, from http://www.sakunsharm a.in/2011/07/overview-layer-2-switched-networks-com m unication/. Application Protocol IPv6, from http://w w w .ciscoexpo.ru/dub/sites/default/files/sem inar_attachm ents/ipv 6.pdf. Dynamic Host Configuration Protocol, from h ttp ://w w w .ie tf.o rg /rfc/rfc2 1 3 1 .txt. Understanding,Preventing,Defending Against Layer 2 Attacks, from http://www.sanog.org/resources/sanogl5/sanogl5-yusuf-l2-security.pdf. A New Scheme to Check ARP Spoofing: Prevention of MAN-IN-THE-MIDDLE Attack, from http://www.ijcsit.com /docs/Volume% 202/vol2issue4/ijcsit2011020420.pdf. LAYER 2 ATTACKS & MITIGATION TECHNIQUES, from http://www.sanog.org/resources/sanog7/yusuf-L2attack-mitigation.pdf. Chris Martin, What is Sniffer and how to detect Sniffing in computer network, Available from http://74.125.153.132/search?q=cache:Tu6yfsiaY3AJ:www.aboutonlinetips.com/sniffer-types-andprotecting-against-sniffing/+wire+sniffing+techniques&cd=25&hl=en&ct=clnk&gl=in&client=fi refox-a. Adam Barth, Secure content sniffing for Web browsers or How to stop papers from reviewing themselves, Available from http://w w w .adam barth.com /papers/2009/barth-caballero-song.pdf. Undetectable sniffing on Ethernet, Available from http://www.askapache.com/security/sniffing-onethernet-undetected.html. Suhas A Desai, (2007), Techniques for Preventing Sniffing, Packet Sniffing: Sniffing Tools Detection Prevention Methods, Available from http://e-articles.info/e/a/title/Packet-Sniffing:-Sniffing-ToolsDetection-Prevention-Methods/. Suhas A Desai, (2007), Tool to Detect Sniffers, Packet Sniffing: Sniffing Tools Detection Prevention Methods, Available from http://e-articles.info/e/a/title/Packet-Sniffing:-Sniffing-Tools-DetectionPrevention-Methods/. Identifying Nonessential Services and Attacks > Attacks, from http://www.inform it.com /articles/article.asp?p=98121&seqNum =2.

959. 960. 961.

962.

963.

R efere n ce s Page 3004

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

964. 965. 966. 967. 968. 969. 970. 971. 972. 973.

ARP cache poisoning /ARP spoofing, from http://su2.info/doc/arpspoof.php. Network management, network discovery, SNMP, MIB and WMI browsers, from w w w .netw orkview .com /htm l/features.htm l. Address Resolution Protocol (ARP), from www.erg.abdn.ac.uk/users/gorry/course/inet-pages/arp.htm l. Angela D. Orebaugh, (2004), Top Ten Ethereal Tips and Tricks, from http://w w w .onlam p.eom /pub/a/security/2004/05/13/etherealtips.htm l. Packages, from http://packages.debian.org/. Network Protocol Analysis, from http://w w w .m aatec.com /. The Hacker's Ethic, from http://w eb.textfiles.com /ezines/H W A/hw a-hn34.txt. Jaromil, Dyne:ll GNU/Linux User's Guide, from http://dynebolic.org/dynebolic-m an.pdf. Address Resolution Protocol (arp), from www.erg.abdn.ac.uk/users/gorry/course/inet-pages/arp.htm l. Adam Barth, Juan Caballero and Dawn Song, Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves, http://www.adam barth.com /papers/2009/barth-caballerosong.pdf. Alberto Ornaghi and Marco Valleri, Man in the middle attacks, http://w w w .blackhat.com /presentations/bh-europe-03/bh-europe-03-valleri.pdf. Tom Olzak, (2006), DNS Cache Poisoning: Definition and Prevention, http://adventuresinsecurity.com/Papers/DNS_Cache_Poisoning.pdf. Sean Whalen, (2001), An Introduction to Arp Spoofing, http://w w w .rootsecure.net/content/dow nloads/pdf/arp_spoofing_intro.pdf. Daiji Sanai, (2001), Detection of Promiscuous Nodes using ARP packets, http://www.securityfriday.com /prom iscuous_detection_ 01 .pdf. Network management, network discovery, SNMP, MIB and WMI browsers, from w w w.netw orkview .com /htm l/w hat_s_new .htm l. Source Address Spoofing, from http://w w w .netw orkcom puting.com /shared/article/showArticle.jhtm l?articleld=8702815&dassroom . Keith Brown, (1999), Security Briefs, from http://www.m icrosoft.com /m sj/0299/security/security0299.aspx. Corey Nachreiner, (2005), Anatomy of an ARP Poisoning Attack, from http://w w w .w atchguard.com /infocenter/editorial/135324.asp. macof, from http://w w w .m onkey.org. Yersinia, from http://w w w .yersinia.net/dow nload.htm . Dhcpstarv, from http://dhcpstarv.sourceforge.net/. Gobbler, from http://gobbler.sourceforge.net/. Cain & Abel, from h ttp ://w w w .oxid .it/ca in .h tm l. WinArpAttacker, from http://w w w .xfocus.org/index.htm l. Ufasoft Snif, from http ://u fa soft.com /sn iffe r/. XArp, from http://w w w .chrism c.de/developm ent/xarp/index.htm l. SMAC, from http://w w w .klcconsulting.net/sm ac/index.htm l#download. Cascade Pilot, from http://w w w .riverbed.com /products-solutions/products/perform ancemanagement/network-infrastructure/High-Speed-Packet-Analysis.html. Tcpdump, from h ttp ://w w w .tcp du m p .o rg /. WinDump, from http://w w w .w inpcap.org/w indum p/default.htm .

974. 975. 976. 977. 978. 979. 980. 981. 982. 983. 984. 985. 986. 987. 988. 989. 990. 991. 992. 993.

R efere n ce s Page 3005

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

994. 995. 996. 997. 998. 999.

Capsa Network Analyzer, from http://w w w .colasoft.com /dow nload/products/capsa_free.php. OmniPeek Network Analyzer, from http://www.wildpackets.com /products/om nipeek_network_analyzer. Observer, from http://w w w .netw orkinstrum ents.com /products/observer/index.php?tab=download. Sniff-O-Matic, from http://w w w .kw akkelflap.com /sniffer.htm l. JitBit Network Sniffer, from h ttp ://w w w .jitb it.co m /n e tw o rksn iffe r/. MSN Sniffer 2, from http://w w w .m snsniffer.com /dow nload/index.htm .

1000 . Ace Password Sniffer, from http://w w w .effetech.com /aps/. 1001 . RSA NetWitness Investigator, from http://w w w .em c.c 0 m /security/rsa-netwitness.htm #lfreeware. 1002 . Big-Mother, from http://w w w .tupsoft.com /dow nload.htm .
1003. 1004. 1005. 1006. 1007. 1008. 1009. EtherDetect Packet Sniffer, from http://w w w .etherdetect.com /dow nload.htm . dsniff, from http://m onkey.org/~dugsong/dsniff/. EffeTech HTTP Sniffer, from h ttp://w w w .effetech.com /dow nload/. Ntop, from h ttp ://w w w .n to p .o rg /p ro d u cts/n to p /. Ettercap, from http://ettercap.sourceforge.net/dow nloads.htm l. SmartSniff, from h ttp ://w w w .nirsoft.ne t/utils/sm sniff.htm l. EtherApe, from http://etherape.sourceforge.net/.

1010 . Network Probe, from h ttp://w w w .objectplanet.com /probe/. 1011 . Snort, from h ttp ://w w w .sn o rt.o rg /. 1012 . Sniffem, from http://w w w .sniff-em .com /dow nload.shtm l.
1013. 1014. 1015. 1016. 1017. 1018. 1019. MaaTec Network Analyzer, from http://w w w .m aatec.com /m tna/dow nload.htm l. Alchemy Network M onitor, from http://w w w .m ishelpers.com /netw ork_m onitor/index.htm l. CommView, from http://w w w .tam os.com /dow nload/m ain/index.php. NetResident, from http://w w w .tam os.com /products/netresident/. AIM Sniffer, from http://w w w .effetech.com /aim -sniffer/index.htm . Netstumbler, from http://w w w .netstum bler.com /dow nloads/. IE HTTP Analyzer, from http://w w w .ieinspector.com /httpanalyzer/.

1020 . MiniStumbler, from http://w w w .netstum bler.com /dow nloads. 1021 . PacketMon, from http://w w w .analogx.com /contents/dow nload/N etw ork/pm on/Freew are.htm . 1022 . NADetector, from http://w w w .nsauditor.com /netw ork_m onitoring/nadetector_traffic_analyzer.htm l.
1023. 1024. 1025. 1026. 1027. 1028. 1029. 1030. 1031. 1032. Microsoft Network M onitor, from http://www.m icrosoft.com /en-us/download/details.aspx?id=4865. NetworkMiner, from http://w w w .netresec.com /?page=NetworkM iner. Network Security Toolkit, from http://w w w .netw orksecuritytoolkit.org/nst/index.htm l. Ethereal, from h ttp ://w w w .ethe re al.co m /. KSniffer, from http://ksniffer.sourceforge.net/index.php?section=download. IPgrab, from http://ipgrab.sourceforge.net/. WebSiteSniffer, from http://w w w .nirsoft.net/utils/w eb_site_sniffer.htm l. ICQ Sniffer, from http://w w w .etherboss.com /icq/dow nload.htm . URL Helper, from http://w w w .urlhelper.com /index.htm . WebCookiesSniffer, from http://w w w .nirsoft.net/utils/w eb_cookies_sniffer.htm l.

R efere n ce s Page 3006

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

1033. 1034. 1035. 1036. 1037. 1038.

York, from http://thesz.diecru.eu/content/york.php. IP Traffic Spy, from http://www.networkdls.com /Software/View/IP_Traffic_Spy/. SniffPass, from http://w w w .nirsoft.net/utils/passw ord_sniffer.htm l. Cocoa Packet Analyzer, from http://w w w .tastycocoabytes.com /cpa/. vxSniffer, from http://w w w .cam bridgevx.com /vxsniffer.htm l. PromqryUI, from http://www.m icrosoft.com /en-us/download/details.aspx?id=16883.

M odule 09: Social Engineering 1039. 1040. 1041. 1042. 1043. The use of Detailed Explanation of the the the the the working principle of of the port scanning tool and the the NMAP, from http://www.boxueshe.org/read.php?tid=36 Sarah Granger, (2002), Social Engineering Fundamentals, Available from www.securityfocus.com/infocus/1533. Mika Tolvanen, (2006), F-Secure Trojan Information Pages, Available from http://w w w .f-secure.com /vdescs/redbrowser_a.shtml. Dancho Danchev, (2009), Social Engineering by a fake SMS spying tool, Available from http://blogs.zdnet.com /security/?p=3162. Growth on Use of Social Networking Sites, Available from http://www.pewinternet.0rg/~/media/Files/Reports/2009/PIP_Adult_social_networking_data_memo_FI NAL.pdf.pdf. Linkedln, Available from h ttp ://w w w .lin ked in.com /. Micha Pekrul, (2009), Rogue Linkedln Profiles Lead To Malware, Available from http://w w w .avertlabs.com /research/blog/index.php/2009/01/06/rogue-linkedin-profiles-lead-tomalware/. Bogdan Dumitru,(2009), Risks of Social Networking and the Corporate Network, Available from http://www.itbusinessedge.com/cm/com munity/features/guestopinions/blog/the-risks-of-socialnetworking-and-the-corporate-network/?cs=33877. Terry Turner, Social Engineering - Can Organizations Win the Battle?, from http://www.infosecwriters.com/text_resources/pdf/Social_Engineering_Can_Organizations_Win.pdf. Bruce Schneier, (2005), Schneier on Security: Weakest Link Security, from http://www.schneier.com /blog/archives/2005/12/weakest_link_se.htm l. Sharon Gaudin, Social Engineering: The Human Side Of Hacking, from http://w w w .crim eresearch.org/library/Sharon2.htm. Social Engineering Hackers-LAN Times 11/6/95, from http://w w w .security-protocols.com /textfiles/socialengineering/soc_eng 2 .html. Psychology of Social Engineering, from http://cybercrimes.net/Property/Hacking/Social%20Engineering/PsychSocEng/PsySocEng.html. Michael L. Snider, Articles, from h ttp ://s ta ff.rio .edu/msnider/?cat=7. Wylie Wong, (2000), Oracle chief defends Microsoft snooping | CNET News.com, from http://news.com.com/Oracle+chief+defends+Microsoft+snooping/2100-1001_3-242560.html. Engineering Hackers-LAN, from http://w w w .security-protocols.com /textfiles/socialengineering/soc_eng 2 .html. Examples of Phishing Emails, from http://www.banksafeonline.org.uk/phishing_exam ples.html. Anti-Phishing Resources, from http://w w w .antiphishing.org/resources.htm l.

1044. 1045.

1046.

1047. 1048. 1049. 1050. 1051. 1052. 1053. 1054. 1055. 1056.

R efere n ce s Page 3007

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

1057. 1058. 1059. 1060.

Netcraft Toolbar, from http://toolbar.netcraft.com /install. PhishTank, from http://w w w .phishtank.com /. ReadNotify, from h ttp ://w w w .re ad n otify.com /. Social Engineering Toolkit (SET), from https://www.trustedsec.com /downloads/social-engineer-toolkit/.

M odule 10: Denial-of-Service 1061. 1062. Distributed Denial of Service:Taxonomies of Attacks, Tools and Countermeasures, from http://palms.ee.princeton.edu/PALMSopen/DDoS%20Final%20PDCS%20Paper.pdf. Denial of Service Attack Detection Techniques, from https://w w w .evernote.com /shard/s9/note/blla8c31-8651-4d74-acf9Ifblb3c0f090/wishi/crazylazy#st=p&n=blla8c31-8651-4d74-acf9-lfblb3c0f090. Welcome to the new IP reality, from http://lukasz.brom irski.net/docs/prezos/confidence2008/new_ip_reality_bp.pdf. What Happened to Blue Security, from http://slashdot.org/story/06/05/08/142229/what-happened-toblue-security. Remotely Triggered Black Hole Filtering in IP Version 6 fo r Cisco IOS, Cisco IOS XE, and Cisco IOS XR Software, from http://w w w .cisco.com /w eb/about/security/intelligence/ipv 6_ rtb h.htm l. Frank Kargl, Jorn Maier, Stefan Schlott, and Michael W e b er, Protecting Web Servers from Distrubuted Denial of Service Attacks, from h ttp ://w w w l0 .o rg /cd ro m /p a p e rs/4 0 9 /. Denial of Service Attacks, from http://w w w .cert.org/tech_tips/denial_of_service.htm l. Craig A. Huegen, (2000), Smurf Attack Information, from http://w w w .pentics.net/denial-ofservice/white-papers/smurf.cgi. Denial of service, from http://searchappsecurity.techtarget.c0m/sDefinition/0,290660,sid92_gci213591,00.h tm l. Solucom, VPN (Virtual Private Network) and Internet F irew all..., from http://w w w .solucom .com /define.htm . Vladimir Golubev, (2005), DoS attacks: crime w itho ut penalty, http://w w w .crim eresearch.org/artides/1049/. Gunter Ollmann, (2009), The Botnet vs. Malware Relationship, http://www.damballa.com /downloads/d_pubs/W P% 20M any-tomany%20Botnet%20Relationships%20%282009-05-21%29.pdf. Gunter Ollmann, (2009), Botnet Communication Topologies, http://www.damballa.com/downloads/r_pubs/WP%20Botnet%20Communications%20Primer%20%2820 09-06-04%29.pdf. Kasey Efaw, Installing Snort 2.8 .5.2 on Windows 7, http://www.sn0rt.0rg/assets/135/lnstalling_Sn0rt_2.8.5.2_0n_W ind0ws_7.pdf. Renaud BIDOU, Fighting the Botnet Ecosystem, h ttp://w w w .iv2technologies.com/FightingBotnetEcosystem.pdf. Ping of death, from http://searchsecurity.techtarget.com /sDefinition/0 sidl4_gci822096,00.htm l. Apostates of Islam :: View topic - FFI down again, from http://www.apostatesofislam.com/forum/viewtopic.php?t=189&postdays=0&postorder=asc&start=225 &sid=0e55c35186bbe87c48bdfe6f62e0e4a5. Jason Anderson, An Analysis of Fragmentation Attacks, from h ttp ://w w w src.lip 6.fr/homepages/Fabrice.Legond-Aubry/www.ouah.org/fragm a.htm l.

1063. 1064. 1065. 1066. 1067. 1068. 1069. 1070. 1071. 1072.

1073.

1074. 1075. 1076. 1077.

1078.

R efere n ce s Page 3008

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

1079. 1080. 1081. 1082. 1083. 1084. 1085.

[PDF] IEEE P1615/D2 Draft Recommended Practice for Network ..., http://grouper.ieee.org/groups/sub/wgc3/C3TFl% 20Docum ents/drafts/P1615_draft2.pdf. [DOC] Abstract, from http://w ww.bridgeport.edu/sed/projects/cs597/Spring_2004/juilan/JuiLan_Network%20Security%20-%20Analysis%20of%20Attack%20and%20Defense%20Strategies.doc. Mariusz Burdach, (2003), Hardening the TCP/IP stack to SYN attacks, from http://w w w .securityfocus.com /infocus/1729. Citations: TCP SYN Flooding and IP Spoofing Attacks (Researchlndex), from http://citeseer.ist.psu.edu/context/141856/0Lasse Huovinen and Jani Hursti, from Denial of Service Attacks: Teardrop and Land, http://users.tkk.fi/~lhuovine/study/hacker98/dos.htm l. Underground security systems research, from http://w w w .ussrback.com /W in/. Stephen Specht & Ruby Lee, (2003), from Taxonomies of Distributed Denial of Service Networks, Attacks ..., from http://www.princeton.edu/~rblee/ELE572Papers/Fall04Readings/DDoSSurveyPaper_20030516_Final.pdf David Dittrich, (1999), The DoS Project's "trinoo" distributed denial of service attack tool from h ttp://w w w .donkboy.com /htm l/stuff.htm . Anti Online's Fight- Back! Computer Security..., from http://w w w .antionline.com /fightback/What_Are_DDOS_Attacks.php. Sven Dietrich, Analysis of the Shaft distributed Denial of Service tool, from http://www.securiteam.com /securitynews/5AP0F000IM .html. Analyzing Distributed Denial Of Service Tools: The Shaft Case, from http://www.ece.cm u.edu/~adrian/630-f03/readings/shaft.pdf. Distributed Denial of Service Tools, from http://w w w .fz-juelich.de/jsc/net/security/infos/D DoS/IN -9907.html. David Moore Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford, and Nicholas, (2003), Weaver Inside the Slammer Worm, from http://csdl2.computer. org/persagen/DLAbsToc.jsp?resourcePath=/dl/mags/sp/&toc=comp/mags/sp/20 03/04/j4toc.xml&DOI=10.1109/MSECP.2003.1219056. RudhraKumar Venkatesan and ShashidharLakkavalli, TCP/IP Vulnerabilities, from http://islab.oregonstate.edu/koc/ece478/00Report/LV.pdf. Dave Dittrich, Bugtraq: Analysis of trinOO, from http://seclists.org/lists/bugtraq/1999/Dec/0093.htm l Fravia denial of service attack tools, from w w w.searchlores.org/dodl.htm . David Dittrich, (1999), Trinoo Analysis, from http://staff.washington.edu/dittrich/m isc/trinoo.analysis. John Michalski, Carrie Price, Eric Stanton, Erik Lee, CHUA, Kuan Seah, Wong, Yip Heng and TAN, and Chung Pheng, (2002), DYNAT TECHNOLOGIES ASSESSMENT REPORT, from http://www.sandia.gov/iorta/docs/SAND%202002-3613%20DYNAT.pdf. <...... A.VERY..THING..IS..POSSIBLE..TO..ZEROGEEK........>, from http://m ifw arz.blogspot.com /. Jason Barlow and Woody Thrower, (2000), TFN2K - An Analysis Jason Barlow and Woody Thrower AXENT Security..., from http://packetst 0 rmsecurity.0 rg/distributed/TFN 2k_Analysis-l.3 .tx t. Jason Barlow and Woody Thrower, (2000), TFN2K - An Analysis (Revision : 1.3), from http://www.sym antec.com /avcenter/security/Content/2000_02_10_a.htm l. http://w w w .garykessler.net/library/ddos.htm l.

1086. 1087. 1088. 1089. 1090. 1091.

1092. 1093. 1094. 1095. 1096.

1097. 1098. 1099.

1100 . Gary C. Kessler, (2000), Distributed Denial-Of-Service, from

R efere n ce s Page 3009

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

1101 . David Dittrich, (1999), Stacheldraht Analysis,


http://staff.washington.edu/dittrich/m isc/stacheldraht.analysis.

1102 .
1103. 1104. 1105. 1106. 1107. 1108. 1109.

Bugtraq: Analysis of the Shaft distributed denial of service tool, from http://seclists.org/lists/bugtraq/2000/M ar/0215.htm l. Sven Dietrich, Neil Long, & David Dittrich, Analyzing Distributed Denial Of Service Tools: The Shaft Case, from http://w w w .usenix.org/event/lisa 2000/full_papers/dietrich/dietrich_htm l/. IP: new DoS attack, from http://www.interesting-people.org/archives/interestingpeople/200009/msg00006.html. Dave Farber, (2000), IP: new DoS attack, from http://www.princeton.edu/~rblee/DDoS%20Survey%20Paper_v7final.doc. David Dittrich, George Weaver, Sven Dietrich, and Neil Long, The mstream distributed denial of service attack tool, from http://w w w .linuxsecurity.c0m /content/view /107513/2/. The Distributed Reflection DoS Attack, from http://w w w .grc.com /dos/drdos.htm . Steve Gibson, (2002), Distributed Reflection Denial of Service Bandwidth Consumption, from http://cswww.cs.yale.edu/homes/arvind/cs425/doc/drdos.pdf. SYN Attack, from www.ieee.org. http://w w w .securitydocs.com /library/2576.

1110 . Hang Chau, (2004), Network Security - Defense Against D0 S/DD0 S Attacks, from 1111 . Aaron Sullivan, 2001, An Audit of Active Directory Security, from
http://w w w .securityfocus.com /infocus/1293.

1112 . Xatrix Security, from http://w w w .xatrix.org/dow nload.php?id=28& r=l.


1113. 1114. 1115. 1116. 1117. 1118. Denail of Service, from http://w w w .m ycert.org.m y/netw ork_abuse/dos.htm l. Denial of Service Attack in NetBIOS Services, from http://w w w .kb.cert.org/vuls/id/32650. James Middleton, (2001), Cloaking system poses new security threat, from http://www.iwr.co.uk/vnunet/news/2114991/cloaking-system-poses-security-threat. NFR DDOS problems, from http://w w w .shm oo.com /m ail/ids/m ay01/m sg00038.shtm l. Latest Windows Security Articles, from http://w w w .w indow security.com /. Gregg Keizer, (2006), Massive DoS Attacks Against ISPs On The Rise, from http://www.informationweek.com/story/showArtide.jhtml?articlelD=192701817&cid=RSSfeed_IWK_Ne ws. Jason Barlow and Woody Thrower, AXENT Security, from http://packetst 0 rmsecurity.0 rg/distributed/TFN 2 k_Analysis-l.3 .tx t.

1119.

1120 . Fabrice LEGOND-AUBRY, An Analysis of Fragmentation Attacks, from h ttp ://w w w src.lip 6 .fr/homepages/Fabrice.Legond-Aubry. 1121 . Jui-Lan Lai, Network Security-- Analysis of Attack and Defense, from
http://www.bridgeport.edu/sed/projects/cs597/Spring_2004/juilan/Jui-Lan_Network%20Security%20%20Analysis%20of%20Attack%20and%20Defense%20Strategies.doc Strategies.

1122 . Targa: [PDF] security, from https://w w w.cis.strath.ac.uk/~gw/52507/security.pdf.


1123. 1124. 1125. 1126. WORM_MYDOOM.B, Description and solution, from http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=W ORM_MYDOO.M.B. Information on a virus on campus, from http://security.uw o.ca/antivirus/infoH istory.htm l. [PDF] Microsoft PowerPoint - ISi_Malware.ppt, from http://w w w -t.zhw in.ch/it/isi/v/IS i_M alw are.pdf. R. A. Hettinga, (2003), Random Scanning Worms and Sapphire/Slammer's PRNG..., from http://www.mail-archive.c0m/cryptography@ wasabisystems.com/msg03503.html.

R efere n ce s Page 3010

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

1127. 1128. 1129. 1130. 1131. 1132. 1133. 1134. 1135. 1136. 1137. 1138. 1139. 1140. 1141. 1142. 1143.

Mike Gunderloy, (2003), Microsoft Certified Professional Magazine Online | Newsletters ..., from http://m cpm ag.com /new sletter/artide.asp?EditorialslD=153. The Spread of the Sapphire/Slammer Worm, from http://www.caida.org/publications/papers/2003/sapphire/sapphire.htm l. Norman Book on Computer Viruses, from http://download.norman.no/manuals/eng/BOOKON.PDF. IT Architect | Strategies & Issues: Honeypots - Sticking It to, from http://www.itarchitect.com /article/NM G20030403S0005. Roger A. Grimes, (2005), Honeypots for Windows, from http://w w w .gtpcc.org/gtpcc/honeypotsforwindow s.htm . Honeypots [lnfosecwriters.com], from http://www.infosecwriters.com/texts.php?op=display&id=80. J.A. Hamilton, Reflection of the Exploit, from http://www.eng.auburn.edu/users/hamilton/security/SE2/Directed_Reflection_DOS_Hamilton.pdf. Distributed Reflection Denial of Service Bandwidth Consumption ..., from http://w w w .grc.com /files/drdos.pdf. Kevin Houle & Chad Dougherty, (2000), CERT Incident Note IN-99-07: Distributed Denial of Service Tools, from http://w w w .cert.org/incident_notes/IN -2000-05.htm l. DDoS Resources, from http://w w w .anm l.iu.edu/ddos/tools.htm l. Jason Barlow and Woody Thrower, (2000), AXENT : SWAT : TFN2K - An Analysis, from http://www.sym antec.com /avcenter/security/Content/2000_02_10_a.htm l. David Dittrich, (1999), Trinoo Analysis, from http://staff.washington.edu/dittrich/m isc/trinoo.analysis. CERT warns of networked denial of service attacks - Computerworld, from http://www.computerworld.com/action/pages.do?command=viewPage&pagePath=/404. Internet security, from http://www.fsa.ulaval.ca/personnel/vernag/EH/F/m anif/lectures/internet_security.htm . Solucom VPN (Virtual Private Network) and Internet F irew all..., from http://w w w .solucom .com /define.htm . Library Computer and Network Security: Library Security Principles ..., from http://w w w .infopeople.org/resources/security/basics/threats_vulnerabilities.htm l. Wireless DoS, from http://w w w .cisco.c0m /en/U S/docs/w ireless/technology/wips/deploym ent/guide/w ipsdep.htm l#w pl50 481. Gary C. Kessler, (2000), "Defenses Against Distributed Denial of Service Attacks", from http://w w w .garykessler.net/library/ddos.htm l. Abhishek Singh, (2005), Demystifying Denial-Of-Service attacks, part one, from http://www.symantec.com /connect/articles/dem ystifying-denial-service-attacks-part-one. Denial-of-service attack, from http://en.w ikipedia. 0 rg/w iki/D enial- 0f-service_attack#lncidents. Kevin Poulsen, (2010), New: Cyberattack Against WikiLeaks Was Weak, from h ttp ://w w w .w ired .co m /thre atle vel/ 2010 /ll/w ik ile a k s -a tta c k /. PlugBot, from http://theplugbot.com . Illusion Bot and NetBot Attacker, from . DoS HTTP, from http://socketsoft.net/products.asp?p=doshttp. KFSensor, from http://w w w .keyfocus.net/kfsensor/dow nload/. FortiDDoS-300A, from http://w w w .fortinet.com /products/fortiddos/300A .htm l. DDoS Protector, from http://w w w .checkpoint.com /products/ddos-protector/.

1144. 1145. 1146. 1147. 1148. 1149. 1150. 1151. 1152. 1153.

R efere n ce s Page 3011

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

1154.

Cisco Guard XT 5650, from http://www.cisco.com/en/US/prod/collateral/vpndevc/ps5879/ps6264/ps5888/product_data_sheet090 0aecd800fa55e.html. Arbor Pravail: Availability Protection System, from http://w w w .arbornetw orks.com /products/pravail. D-Guard Anti-DDoS Firewall, from http://w w w .d-guard.com /. NetFlow Analyzer, from http://w w w .m anageengine.com /products/netflow /dow nload.htm l. FortiDDoS, from h ttp ://w w w .fo rtin et.com /p ro du cts/fortidd os/. SDL Regex Fuzzer, from http://w w w .m icrosoft.com /en-us/dow nload/confirm ation.aspx?id=20095. DefensePro, from http://www.radware.com/Products/ApplicationNetworkSecurity/DDoS_Attack_Protection.aspx. WANGuard Sensor, from https://w w w .andrisoft.com /store/evaluation-request. DOSarrest, from http://w w w .dosarrest.com . NetScaler Application Firewall, from http://w w w .citrix.com /products/netscaler-application-deliverycontroller/try. html?ntref=header_try. Anti DDoS Guardian, from http://w w w .beethink.com /antiddos.htm . FortGuard DDoS Firewall, from http://w w w .fortguard.com /ddosm onitor.htm l. DDoSDefend, from http://ddosdefend.com /ddos-protection.htm l. Webserver Stress Tool, from http://www.paessler.com /download/webstress. Web Stress Tester, from http://w w w .fastream .com /webstresstester.php. JMeter, from http://jm eter.apache.org/dow nloadJm eter.cgi. DoS HTTP, from http://socketsoft.net/products.asp?p=doshttp. Mail Bomber, from http://w w w .getfreefile.com /bom ber.htm l. Advanced Mail Bomber, from http://w w w .softheap.com /abom ber.htm l.

1155. 1156. 1157. 1158. 1159. 1160. 1161. 1162. 1163. 1164. 1165. 1166. 1167. 1168. 1169. 1170. 1171. 1172.

M odule 11: Session Hijacking 1173. 1174. 1175. 1176. 1177. 1178. 1179. 1180. 1181. 1182. 1183. Steps in Session Hijacking, from hijacking.html. http://www.hackguide4u.com/2010/03/steps-in-session-

Session Hijacking, from http://www.imperva.com/resources/glossary/session_hijacking.html. IP Hijack, from http://dokfleed.net/duh/m odules.php?name=News&file=article&sid=3. Spoofing Vs Hijacking, from http://www.hackguide4u.com /2010/03/spoofing-vs-hijacking.htm l. Lee Lawson, (2005), Session Hijacking Packet Analysis, Available from http://w w w .securitydocs.com /library/3479. Dave Dittrich, Session hijack script, Available from http://blinky-lights.org/script.htm l. Session hijacking attack, Available from http://www.owasp.org/index.php/Session_hijacking_attack. Shray Kapoor, Session Hijacking Exploiting TCP, UDP and HTTP Sessions, http://www.infosecwriters.com/text_resources/pdf/SKapoor_SessionHijacking.pdf. David Endler, (2001), Brute-Force Exploitation of Web Application Session IDs, http://www.cgisecurity.com/lib/SessionlDs.pdf. Robert Auger, Credential and Session Prediction, Available from http://projects.webappsec.org/Credential-and-Session-Prediction. Trojan horse, Available from http://searchsecurity.techtarget.com /sDefinition/0 sidl4_gci213221,00.htm l.

R efere n ce s Page 3012

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

1184. 1185. 1186. 1187. 1188. 1189. 1190.

Jamie.riden, (2008), CLIENT-SIDE ATTACKS, Available from http://w w w .honeynet.org/node/157. Lee Lawson, (2005), Session Hijacking Packet Analysis, Available from http://w w w .securitydocs.com /library/3479. Addison Wesley, (2007), Fibre Channel and IP session hijacking assessment exercise, Available from http://searchstoragechannel.techtarget.com/generic/0,295582,sid98_gcil250226,00.h tm l. Prevention from Session Hijacking, Available from http://hydtechie.blogspot.com /2008/08/preventionfrom-session-hijacking.html. Session Hijacking, Available from http://www.cs.binghamton.edu/~steflik/cs455/sessionhijacking.htm . Hackerthreads.org security: View topic - Network Session Hijacking, from www.hackerthreads.org/phpbb/viewtopic.php?t=745. OpenSSH - SwiK swik.net/OpenSSH MOM 2005: IP Security (IPSec), from www.microsoft.com/technet/prodtechnol/m om /m om 2005/Library/39cb2734-506c-4101-887cc2d2146621c0.mspx. Microsoft Security Bulletin (MS99-046): Frequently Asked Questions, from www.m icrosoft.com /technet/security/bulletin/fq99-046.m spx. Laurent Joncheray, Simple Active Attack Against TCP Sequence Number Prediction, from http://www.cert.org/advisories/CA-2001-09.htm l. Term: S/key, from www.webopedia.com. Attacks against IIS, from http://www.m icrosoft.eom /technet/prodtechnol/W indowsServer2003/Library/IIS/0al99196-4ae9-41ebb8cl-572251f9f550.mspx?mfr=true. Joe Jenkins, (2000), Internet Security and Your Business - Knowing the Risks, from http://w w w .securityfocus.com /infocus/1194. Webapplication Attacks - Intro, from w w w.netprotect.ch/downloads/webguide.pdf. Alexia Tsotsis, (2010), How To Protect Your Login Information From Firesheep, from http://techcrunch.com /2010/10/25/firesheep/. zaproxy, from https://code.google.eom /p/zaproxy/downloads/list. JHijack, from http://sourceforge.net/projects/jhijack/files/latest/dow nload?source=files.

1191. 1192. 1193. 1194.

1195. 1196. 1197. 1198. 1199.

1200 . Hamster, from http://erratasec.blogspot.in/2009/03/ham ster-20-and-ferret-20.htm l. 1201 . Ferret, from http://erratasec.blogspot.in/2009/03/ham ster-20-and-ferret-20.htm l. 1202 . Surf Jack, from https://code.google.com /p/surfjack/downloads/detail?nam e=surfjack0.2b.zip.
1203. 1204. 1205. 1206. 1207. 1208. 1209. PerJack, from http://packetstorm security.org. Ettercap, from http://sourceforge.net/projects/ettercap/files/latest/dow nload?source=dlp. WhatsUp Gold Engineer's Toolkit, from http://www.whatsupgold.com /products/download/network_m anagem ent.aspx?k_id=ping-sweep-tool. Hunt, from http://packetstorm security.com /files/dow nload/21968/hunt-l.5bin.tgz. Juggernaut, from http://w w w .securiteam .com . TamperlE, from http://w w w .bayden.com /Tam perlE/. Cookie Cadger, from https://www.cookiecadger.com/?page_id=19.

M odule 12: Hacking Webservers

1210 . Web Parameter Tampering, from https://www.owasp.org/index.php/W eb_Param eter_Tampering.

R efere n ce s Page 3013

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

1211 . Web Server Security and Database Server Security, from http://www.itura.net/trainir1g/19-web-serversecurity-and-database-server-security.pdf.

1212 . Configuring and organizing server security information, from


http://w w w .freepatentsonline.com /7712137.htm l. 1213. 1214. 1215. 1216. 1217. 1218. Internet Security, from http://w iki.w inf.at/184216 . Securing applications, from http://w w w.slideshare.net/florinc/application-security-1831714. About Securing Applications, from http://docs.oracle.com/cd/E16348_01/books/SecurHarden/SecurHarden_AppSecur2.html. Insecure Configuration Management, from http://www.upenn.edu/computing/security/swat/SW AT_Top_Ten_A10.php . Server Misconfiguration, from http://pr0jects.webappsec.0rg/w/page/13246959/Server%20Misc0nfigurati0n. Repairing system after following directions in attem pt to clean virus, from http://forum .hijackthis.de/archiv/18982-repairing-system-after-following-directions-attempt-cleanvirus.html. Header Manipulation, from http://w w w .hpenterprisesecurity.com /vulncat/en/vulncat/sql/header_m anipulation.htm l.

1219.

1220 . Cache Poisoning, from https://www.owasp.org/index.php/Cache_Poisoning . 1221 . Improving Web Application Security: Threats and Countermeasures, from
http://m sdn.m icrosoft.com/en-us/library/aa302418.aspx.

1222 . Best Practices for Applying Service Packs, Hotfixes and Security Patches, from
http://technet.m icrosoft.com /en-us/library/cc750077.aspx . 1223. 1224. 1225. Securing Your Web Server, from http://m sdn.m icrosoft.com /en-us/library/ff648653.aspx . Web Server Security and Database Server Security, from http://w ww.acunetix.com /websitesecurity/webserver-security. Windows IIS Server hardening checklist, from http://media.techtarget.com/searchSecurity/downloads/Windows_IIS_Server_hardening_checklist.pdf7t rack=LlAP . IIS Web Server Security, from http://www.acunetix.com /websitesecurity/iis-security. WEB SERVER SECURITY AND DATABASE SERVER SECURITY, from http://w w w .itura.net/training/19-w ebserver-security-and-database-server-security.html. Checklist: Securing Your Web Server, from http://m sdn.m icrosoft.com /en-us/library/ff648198.aspx . HTTP Response Splitting, Web Cache Poisoning Attacks, and Related Topics, from http://w w w .ouah.org/w hitepaper_httpresponse.pdf. Hacking Web Servers, from h ttp ://w w w .scribd.com /doc/35607686/hacking-M odule-ll. Terms used by Microsoft to describe the various software updates released by it, from http://www.thewindowsclub.com/terms-used-by-microsoft-to-describe-the-various-software-updatesreleased-by-it. Patch Management Best Practices, from http://w w w .oracle.com /technetw ork/system s/articles/patchmanagement-jsp-135385.html. Directory Traversal Attacks, from http://w w w .acunetix.com /websitesecurity/directory-traversal. Jason Chan, (2004), Essentials of Patch Management Policy and Practice, from http://www.patchmanagement.org/pmessentials.asp.

1226. 1227. 1228. 1229. 1230. 1231.

1232. 1233. 1234.

R efere n ce s Page 3014

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

1235.

Managing Web Server Security, from w w w .m icrosoft.com /technet/prodtechnol/w indow s 2000serv/technologies/iis/m aintain/featusability/c 0 5iis.mspx. There are basically three overlapping types of risk:, from http://w w w .rduonline.com /w ebpolicy.m gi. Frank Kargl, Jorn Maier, Stefan Schlott, Michael Weber, Protecting Web Servers from Distributed Denial of Service Attacks, from h ttp ://w w w l0 .o rg /cd ro m /p a p e rs/4 0 9 /. TCPflow (Analyzing Tool), from http://w w w .circlem ud.org/. Radu State, (2008), Hacking Web2, http://www.aims-conference.org/issnsm-2008/01-W ebHacking.pdf. Jeremiah Grossman, (2010), 10th Website Security Statistics Report, http://www.whitehatsec.com/home/assets/presentations/10PPT/PPT_stats0910.pdf. Reto E. Haeni, (1997), Firewall Penetration Testing, http://bandwidthco.com/whitepapers/netforensics/penetration/Firewall% 20Penetration% 20Testing.pdf AM Jahangiri, Google Hacking, http://www.alijahangiri.org/publication/Google-Hacking-by-AliJahangiri.pdf. Networking the networks, from http://w w w .terena.org/activities/tf-csirt/iodef/docs/itaxonomy_terms.ht. Network Computing, from http://w ww.networkcom puting.com /shared/article/showArticle.jhtm l?articleld=8702815&c. Barry Wheelbarger, Apache Security, from http://www.cs.uwf.edu/~wilde/StuPres200301/Apache_Security.ppt. Security issues affecting Apache httpd 2.0.40, from http://www.apacheweek.com /features/securityV2.0.40. Apache Web Server for Windows Lets Remote Users Crash the Web Server Application, from http://w w w .securitytracker.com /alerts/2001/0ct/1002543.htm l. The World Wide Web Security FAQ, from http://w w w .zentek-international.com /m irrors/w w w -securityfaq/w w w sfl.h tm l. HNS Newsletter, from http://w w w .net-security.org/dl/new sletter/txt/issue066.txt. Ethel the Blog, from http://stom m el.tam u.edu/~baum /ethel/2000_12_03_ethel-archive.htm l. Survey and Analysis of Available Tools, from http://www.securecoding.org/authors/artides/m ay202003/section7.php. Information Security Products, from h ttp ://w w w 935.ibm.com/services/us/index.wss/offerfamily/iss/a 1029097. Family of Load Balancers, from http://w w w .redhillnetworks.com /products/w ebm ux/load-balancer.htm . Advanced Defect Tracking Web Edition, from http://w w w .borderw ave.com /. Internet Security and Warfare (ISAW), from http://technews-isaw.blogspot.com /. Experimental Computer System lab, from http://www.ecsl.cs.sunysb.edu/. An Internet Encyclopedia, from http://www.freesoft.org/CIE/Topics/ssl-draft/3-SPEC.HTM. Apache httpd 2.0 vulnerabilities, from http://httpd.apache.org/security/vulnerabilities_20.htm l. Apache httpd 1.3 vulnerabilities, from http://httpd.apache.org/security/vulnerabilities_13.htm l. Web Hosting, E-commerce, and Domain Registration..., from h ttp://w w w .sidetrips.com /. Computers, Networking, and Security, from http ://w w w .cro m w e ll-intl.com /. Tony Bradley, (2006), Secure Internet and Network Security, from http://w w w .s3kur3.com /.

1236. 1237. 1238. 1239. 1240. 1241.

1242. 1243. 1244. 1245. 1246. 1247. 1248. 1249. 1250. 1251. 1252. 1253. 1254. 1255. 1256. 1257. 1258. 1259. 1260. 1261. 1262.

R efere n ce s Page 3015

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

1263. 1264.

Saumil Shah, (2003), One-way Web Hacking, from h ttp ://n e tsquare.com/papers/one_way/one_way.html. (2010), Case Study: Congressional Web Site Defacements Follow the State of the Union, from http://praetorianprefect.eom /archives/ 2010 / 01 /congressional-web-site-defacements-follow-the-stateof-the-union/. Definition: WEB-SITES DEFACEMENT, from http://w w w .freepatentsonline.com /y2010/0107247.htm l. Bodvoc, (2010), An Overview of a Web Server, from http://bodvoc.wordpress.com /2010/07/02/anoverview-of-a-web-server/. (2009), IIS 7.0 Architecture, from http://w w w .gandhipritesh.com /2009/05/iis-70-architecture.htm l. (2001), Defaced Websites, from h ttp ://a ttritio n .o rg /m irro r/a ttritio n /. Robert Auger, Server Misconfiguration, from http://pr0jects.webappsec.0rg/w/page/13246959/Server Misconfiguration. Insecure Configuration Management, from http://www.owasp.org/index.php/lnsecure_Configuration_Managem ent. (2009), hostmap 0.2 - Automatic Hostname & Virtual Hosts Discovery Tool, from http://w w w .darknet.org.uk/tag/w eb-server-hacking/. (2009), reDuh - TCP Redirection over HTTP, from http://w w w .darknet.org.uk/tag/w eb-server-hacking/. httprecon - Advanced Web Server Fingerprinting http://w w w .darknet.org.uk/tag/w eb-server-hacking/. Robert Auger, HTTP Response Splitting http://pr0jects.webappsec.0rg/w/page/13246931/HTTP Response-Splitting. HTTP Response Splitting, from http://www.owasp.org/index.php/HTTP_Response_Splitting. Introduction to HTTP Response Splitting, from http://www.securiteam.com/securityreviews/5WP0E2KFGK.html. Tunneling protocol, from http://en.wikipedia.org/w iki/Tunneling_protocol. Whois, from http://tools.w hois.net. Traceroute, from http://w hatism yipaddress.com /traceroute-tool. ActiveWhois, from h ttp ://w w w .joh nru.com /. Netcraft, from http://searchdns.netcraft.com /7host. httprecon, from http://w w w .com putec.ch/projekte/httprecon/?s=dow nload. ID Serve, from http://w w w .grc.com . HTTrack Website Copier, from http://w w w .httrack.c 0 m /page/ 2/ . WebCopier Pro, from http://w w w .m axim um soft.com /products/w c_pro/overview .htm l. BlackWidow, from http://softbytelabs.com /us/dow nloads.htm l. Hamster, from http://erratasec.blogspot.in/2009/03/ham ster-20-and-ferret-20.htm l. Firesheep, from http://codebutler.github.io/firesheep/. Brutus, from http://w w w .hoobie.net/brutus/brutus-dow nload.htm l. Metasploit, from http://w w w .m etasploit.com /dow nload/. WFetch, from http://d0wnl0ad.m icr0s0ft.c0m /d0wnl0ad/d/e/5/de5351d6-4463-4cc3-a27c 3e2274263c43/wfetch.exe (http://www.microsoft.com/downloads/details.aspx?FamilylD=56fc92eea71a-4c73-b628-ade629c89499&DisplayLang=en). Brutus, from http://w w w .hoobie.net/brutus/brutus-dow nload.htm l. Internet Password Recovery Toolbox, from http://w w w .rixler.com /passw ord_recovery_toolbox.htm .

1265. 1266. 1267. 1268. 1269. 1270. 1271. 1272. 1273. 1274. 1275. 1276. 1277. 1278. 1279. 1280. 1281. 1282. 1283. 1284. 1285. 1286. 1287. 1288. 1289. 1290. 1291.

1292. 1293.

R efere n ce s Page 3016

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

1294. 1295. 1296. 1297. 1298. 1299. 1300. 1301. 1302. 1303. 1304. 1305. 1306. 1307. 1308. 1309. 1310. 1311. 1312. 1313. 1314. 1315. 1316. 1317. 1318. 1319. 1320. 1321.

Microsoft Baseline Security Analyzer (MBSA), from http://w w w .m icrosoft.com /enus/download/details. aspx?id=7558. Altiris Client Management Suite, from http://w w w .sym antec.com /client-m anagem ent-suite/trialw are. Prism Patch Manager, from http://w w w .new boundary.com /products/prism -patch-m anager/trial. MaaS360 Patch Analyzer Tool, from http://w w w .m aas360.com /tools-and-trials/dow nloads/. Kaseya Security Patch Management, from http://w w w .kaseya.c 0 m/features/patch-management.aspx#. Secunia CSI, from http://secunia.com /products/corporate/csi/. ZENworks Patch Management, from http://w w w .novell.com . Lumension Patch and Remediation, from http://w w w .lum ension.com . Security Manager Plus, from http://www.m anageengine.com /products/securitymanager/download, html. VMware vCenter Protect, from http://www.shavlik.com /downloads.aspx. Syhunt Dynamic, from http://www.syhunt.com /?n=Syhunt.Dynam ic. N-Stalker Web Application Security Scanner, from http://w w w .nstalker.com /products/editions/free/. Wikto, from http://www.sensepost.com . Acunetix Web Vulnerability Scanner, from http://w w w .acunetix.com /vulnerabilityscanner/down load.htm. HackAlert, from http://www.arm orize.com /index.php?link_id=register. QualysGuard Malware Detection, from http://w w w .qualys.com /form s/trials/stopm alw are/. Retina CS, from http://www.beyondtrust.com/Landers/TY-Page-RetinaCSCommunity/index.html. Nscan, from http://nscan.hyperm art.net. NetlQ Secure ConfigurationManager, from https://www.netiq.com /products/secure-configurationmanager/. SAINT, from http://w w w .saintcorporation.com /products/softw are/saintScanner.htm l. HP Weblnspect, from https://dow nload.hpsm artupdate.com /w ebinspect/. Arirang, from http://w w w .m onkey.org/~pilot/arirang/. N-Stalker Web Application Security Scanner, from http://w w w .nstalker.com /products/editions/free/. Infiltrator, from http://w w w .infiltration-system s.com /dow nload.shtm l. WebCruiser, from http://sec4app.com /download.htm . dotDefender, from http://w w w .applicure.com /P roducts/. Core Impact Professional, from http://w w w .coresecurity.com . Immunity CANVAS, from http://w w w .im m unitysec.com /dow nloads.shtm l.

M odule 13: Hacking Web Applications 1322. 1323. 1324. 1325. 1326. 1327. Parameter Tampering, from http://www.im perva.com /resources/glossary/param eter_tam pering.htm l. Connection String Injection Attacks, from http://m sdn.m icrosoft.com /en-us/library/m s254947.aspx. A 6 2004 Injection Flaws, from https://www.owasp.org/index.php/A6_2004_lnjection_Flaws. Connection String Parameter Pollution Attacks, from http://blackhat.com /presentations/bh-dc10/Alonso_Chema/Blackhat-DC-2010-Alonso-Connection-String-Parameter-Pollution-wp.pdf. Session Prediction, from https://www.owasp.org/index.php?title=Session_Prediction&setlang=en. Buffer Overflow, from http://pr0jects.webappsec.0rg/w /page/13246916/Buffer-0verfl0w .

R efere n ce s Page 3017

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

1328. 1329. 1330. 1331. 1332. 1333. 1334. 1335. 1336. 1337. 1338. 1339. 1340. 1341. 1342. 1343. 1344. 1345. 1346. 1347. 1348. 1349. 1350. 1351. 1352. 1353. 1354. 1355.

Managed Application Firewall, from http://w w w .securew orks.com /resources/articles/other_artides/ 2010 -w af. Do you w rite secure code?, from http://www.slideshare.net/yuvalgo/do-you-write-secure-code-by-erezmetula. Web Parameter Tampering, from https://www.owasp.org/index.php/W eb_Param eter_Tampering. Path Traversal, from https://www.owasp.org/index.php/Path_traversal. Top 10 2010-A6-Security Misconfiguration, from https://www.owasp.org/index.php/Top_10_2010-A6Security_Misconfiguration. Common Security Mistakes in Web Applications, from http://roobon.net/2011/06/01/com m on-securitymistakes-in-web-applications. LDAP Injection & BLIND LDAP Injection, from http://w w w .blackhat.com /presentations/bh-europe08/Alonso-Parada/Whitepaper/bh-eu-08-alonso-parada-WP.pdf. Parameter Manipulation, from http://w w w .cgise curity.co m /o w asp /h tm l/ch lls04 .htm l. Cross-site Scripting (XSS), from https://www.owasp.org/index.php/Cross-site_Scripting_(XSS). XSS Filter Evasion Cheat Sheet, from https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet. Cross-Site Request Forgery (CSRF) Attack Lab, from http://www.cis.syr.edu/~wedu/seed/Labs/Attacks_CSRF/CSRF.pdf. Cross-Site Request Forgeries, from http://www.shiflett.org/articles/cross-site-request-forgeries. Webapplication Attack : DOS and DDOS attack, from http://funw hichuw ant.blogspot.in/ 2012/ 10 /webapplication-attack-dos-and-ddos.html. Buffer Overflow, from http://pr0jects.webappsec.0rg/w/page/13246916/Buffer% 200verfl0w. Cookie Poisoning, from http://www.imperva.com /resources/glossary/cookie_poisoning.html . Wen Application Vulnerabilities, from http://www.slideshare.net/technoplex/web-applicationvulnerabilities . Attacking XML Security Message Oriented Madness, XML Worms and Web Service Security Sanity, from http://www.slideshare.net/yusufm otiwala/attacking-xm l-security. Managing Web Services, from http://docs.oracle.com /cd/E19316-01/820-4335/gbbjk/index.htm l. Web Services Hacking And Hardening, from http://www.slideshare.net/rnewton/web-services-hackingand-hardening. Advanced Web Services Hacking, from http://www.slideshare.net/shreeraj/advanced-web-serviceshacking . Hacking Web 2.0 - Defending Ajax and Web Service, from http://www.slideshare.net/shreeraj/hackingweb-20-defending-ajax-and-web-services-hitb-2007-dubai. All-Purpose Tools, from http://w w w .securnet.biz/tools.htm . Error executing child request fo r Chartlmg.axd, from http://social.m sdn.m icrosoft.com /Forums/enUS/MSWinWebChart/thread/115d7f31-e4a8-4c09-b558-4db2cfle83e7. Session Prediction, from https://w w w .ow asp.org/index.php?title=Session_Prediction&setlang=en. Building Connection Strings, from http://msdn.microsoft.com/en-us/library/ms254947(v=vs.80).aspx . DOS ATTACKS USING SQL WILDCARDS, from http://hax.tor.hu/read/MSSQL_DoS/wildcard_attacks.pdf. Understanding Web Services Attacks, from http://www.datacorn.cz/files_datacom/understanding_webservicesattacks_ 0 .pdf. Spheon JSOAP - InterOp: MS SOAP ToolKit 3.0 (typed), from http://soap.fm ui.de/interop/interop 2OOlMSSOAPToolKitTyped.html.

R efere n ce s Page 3018

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

1356. 1357. 1358. 1359.

Web Services Attacks & Countermeasures, from http://www.interop.com /lasvegas/2004/presentations/downloads/sc04_c_sim a.pdf. Testing for HTTP Splitting/Smuggling (OWASP-DV-OI6), from https://www.owasp.org/index.php/Testing_for_HTTP_Exploit. Testing for SQL Wildcard Attacks (OWASP-DS-OOl), from https://www.owasp.org/index.php/Testing_for_SQL_Wildcard_Attacks_(OWASP-DS-001) . Testing for DoS User Specified Object Allocation (OWASP-DS-004), from https://w w w .ow asp.org/index.php/Testing_for_DoS_User_Specified_Object_Allocation_(OWASP-DS004). Testing for Storing too Much Data in Session (OWASP-DS-OO8 ), from https://www.owasp.org/index.php/Testing_for_Storing_too_Much_Data_in_Session_(OWASP-DS-008). Testing for Naughty SOAP Attachments, from http://nilm inus.wordpress.com /web-applicationpenetration-testing/web-services-testing/testing-for-naughty-soap-attachments. Testing for AJAX (OWASP-AJ-002), from https://www.owasp.org/index.php?title=Testing_for_AJAX_(OWASP-AJ-002)&setlang=es. Common Web-Based Applications Attacks, Available from http://w w w .applicure.c 0 m/C 0 mm 0 n_Web_Based_Applicati0 ns_Attacks# 2._lnjecti 0 n_Flaws. Bart Puype, WGET for Windows (Win32), version 1.11.4, Available from http://users.ugent.be/~bpuype/w get/. Andres Riancho, Web Application Attack and Audit Framework, Available from http://w 3af.sourceforge.net/. Market Leading Protection for Web Applications, Available from http://w w w .im perva.com /products/w eb-application-firew all.htm l. Vulnerability, from http://w w w .citi.um ich.edu/projects/itss/lectures/lecture-20.pdf. DATA IIS Vulnerability, from http://w w w .ciac.org/ciac/bulletins/k-068.shtm l. RPC DCOM Vulnerability, from http://seclists.org/bugtraq/2003/0ct/0151.htm l. ASN Exploits, from www.itworldcanada.com . [PDF] Introduction to Web Applications and Security, from http://books.m cgrawhill.com/downloads/products//007222438X/007222438X_ch01.pdf. The behaviors and tools of today's hacker, from www.symantec.com/symadvantage/014/hacker.html. Paper -- Cross Site Scripting, from www.technicalinfo.net/papers/CSS.html. Host Vulnerability, from http://w w w .cit.cornell.edu/security/scanning/sam ple.htm l. Joseph Seaman, (2003), Web Application Security from www.itsa.ufl.edu/slide_shows/2003/WebAppSec.ppt. Vulnerability Management Commitment and Disclosure Policy, from http://w w w .sym antec.com /security/. Bug Tracking Software Links, from http://w w w .bug-track.com /m ain/links.jsp. Mike Benham, (2002), Internet Explorer SSL Vulnerability, from http://www.securiteam.com /windowsntfocus/5JP0E0081M .html. The 21 Primary Classes of Web Application Threats, from www.netcontinuum.com/securityCentral/TopThreatTypes/index.cfm. Paper: HTML Code Injection and Cross-site scripting, from http://www.technicalinfo.net/papers/CSS.htm l. IS YOUR WEBSITE HACKABLE?, from www.acunetix.com /vulnerability-scanner/wvsbrochure.pdf.

1360. 1361. 1362. 1363. 1364. 1365. 1366. 1367. 1368. 1369. 1370. 1371. 1372. 1373. 1374. 1375. 1376. 1377. 1378. 1379. 1380. 1381.

R efere n ce s Page 3019

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

1382. 1383. 1384. 1385. 1386. 1387. 1388. 1389. 1390. 1391. 1392. 1393. 1394. 1395. 1396. 1397. 1398. 1399.

Regular Expressions: curl Simplifies Web Retrieval, from http://w w w .unixreview .com /docum ents/s=1820/unil011713175619/0201i.htm . FWSM URL Filtering Solution TCP ACL Bypass Vulnerability, from www.cisco.com. Zero Day Exploits: The Holy Grail, from www.netsecurity.about.com . What is parameter tampering?, from www.im perva.com . AFITC 2001, from www.whitehatsec.com . Toelichting aanvalstechnieken, from www.nedsecure.nl. Cross-Site Scripting, Injection Flaws, OWASP Web Application Security Top Ten List and Buffer Overflow, from www.owasp.org. Hacker Protection from SQL Injection - SPI Dynamics, from www.spidynamics.com. Changing Your Password, How Hackers Get Hold of Passwords, from www.lockdown.co.uk/?pg=password_guide. George Shaffer, Modus Operandi of an Attacker Using a Password Cracker, from http://geodsoft.com /howto/password/cracking_passwords.htm . Robert J. Shimonski, (2002), Hacking techniques, from www.ibm .com /developerworks/library/s-crack. Mark Curphey, Query String, from w w w .cgisecurity.com /ow asp/htm l/chlls04.htm l. Edward Skoudis, Authforce, from (2005), http://searchsecurity.techtarget.com/searchSecurity/downloads/Skoudis_ch07.pdf. Sarah Granger, (2002), A Guide To Better Password Practices, from www.securityfocus.com/infocus/1537. Bad Password Examples, from http://w w w .spy-hill.com /~m yers/help/Passwords.htm l. Microsoft Password Checker, from http://www.m icrosoft.com /athom e/security/privacy/password_checker.m spx. Mehdi Mousavi, What an ISAPI extension is?, from http://www.codeproject.com/KB/ISAPI/isapi_extensions.aspx. Maximum Security - Chapter 10 - Password Crackers, from http://w w w .windowsecurity.com /whitepapers/M axim um _Security__Chapter_10__Password_Crackers_. html. Patch improves the TCP Initial Sequence Number Randomness, from http://www.securiteam.com/windowsntfocus/3V5QBQKPPU.html. Mark Russinovich, (2008), TCP View for Windows, from http://technet.m icrosoft.com /hiin/sysinternals/bb897437(en-us).aspx. Admin Knowledge Base section, from http://www.windowsnetworking.com/kbase/W indowsTips/W indowsTips/W indowsNT/AdminTips/Utiliti es/TCPViewe. Web Application Security, from http://www.securityfocus.com /archive/107/223386/2001-10-28/200111 -02/ 0 . Nikola Strahija, (2002), Introduction to password cracking, from http://www.xatrix.org/article.php?s=1758. Password cracking, http://w w w -128.ibm .com /developerw orks/security/library/scrack/password_cracking.html. Password cracker, from http://searchfinancialsecurity.techtarget.com /sDefinition/0 sidl85_gci536994,00.html.

1400. 1401. 1402.

1403. 1404. 1405. 1406.

R efere n ce s Page 3020

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

1407. 1408. 1409. 1410. 1411. 1412. 1413. 1414. 1415. 1416. 1417. 1418. 1419. 1420. 1421. 1422. 1423. 1424.

David P. Kormann and Aviel D. Rubin, Risks of the Passport Single Signon Protocol, from http://www.cs.jhu.edu/~rubin/courses/sp03/papers/passport.pdf. Abel Banda, (2003), ASP.NET Forms Authentication, from h ttp ://w w w .on do tn et.eo m /pu b/a/d otne t/2 00 3/01 /06 /form sa uthp l.htm l. Erika, (2006), Microsoft Security Bulletin MS02-048, from http://w w w .m icrosoft.com /technet/security/Bulletin/M S02-048.m spx. Jeff Williams, (2006), Cross-Site Scripting, Injection Flaws, OWASP Web Application Security Top Ten List and Buffer Overflow, from http://w w w .ow asp.org/. Sarah Granger, (2002), A Guide To Better Password Practices, from http://w w w .securityfocus.com /infocus/1537. Gaining Access Using Application and Operating System Attacks, from http://searchsecurity.techtarget.com/searchSecurity/downloads/Skoudis_ch07.pdf. Rob Shimonski, (2002), Hacking techniques, from http://w w w -128.ibm .com /developerw orks/library/scrack/. Password Guidelines, from http://www.lockdown.co.uk/?pg=password_guide. Biometric Education: Fingerprint, from http://w w w .barcode.ro/tutorials/biom etrics/fingerprint.htm l. Kimon Rethis, (2006), Biometrics Authentication, from http://w w w .csun.edu/. IPSec Authentication and Authorization Models, from http://www.ciscopress.com/articles/article.asp?p=421514&seqNum=4%20-%2031k%20-&rl=l. Digital Certificates, from http://w w w .bitpipe.com /tlist/D igital-C ertificates.htm l. John, HTTP Authentication: Basic and Digest Access Authentication, from htt p ://w w w .ie tf.0 rg/ rf c/ rf c2617. tx t. Authentication, Authorization, and Access Control, from http://httpd.apache.org/docs/. Functions and Procedures: Basic Authentication, from http://w w w .zeitungsjunge.de/delphi/m im e/H elp/D IM im e.htm . The Cross-Site Scripting (XSS) FAQ, from http://www.cgisecurity.com /xss-faq.htm l. Input Validation Cheat Sheet, from http://m ichaeldaw.org/input_validation_cheat_sheet. Quick Security Reference - Cross-Site Scripting.docx, from http://download.microsoft.eom/download/E/E/7/EE7B9CF4-6A59-4832-8EDE B018175F4610/Quick%20Security%20Reference%20-%20Cross-Site%20Scripting.docx. Web Application Penetration Testing, from http://www.owasp.org/index.php/W eb_Application_Penetration_Testing. Jeff Orloff, The Big Website Guide to a Hacking Attack, from http://w w w .applicure.com /blog/bigwebsite-guide-to-a-hacking-attack. What is Cross-Site Scripting (XSS)?, from http://www.applicure.com /blog/what-is-cross-site-scripting. LDAP Filters, from http://w w w .selfadsi.org/ldap-filter.htm . Paul Lee, (2002), Cross-site scripting, from http://w w w .ibm .com /developerw orks/tivoli/library/scsscript/. XSS (Cross Site Scripting) Prevention Cheat Sheet, from http://www.owasp.org/index.php/XSS_%28Cross_Site_Scripting%29_Prevention_Cheat_Sheet. Amit Klein, (2005), DOM Based Cross Site Scripting or XSS of the Third Kind, from http://www.webappsec.org/projects/articles/071105.shtm l. Samoa: Formal Tools for Securing Web Services, from http://research.m icrosoft.com /enus/projects/samoa/.

1425. 1426. 1427. 1428. 1429. 1430. 1431. 1432.

R efere n ce s Page 3021

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

1433. 1434. 1435. 1436.

RSnake"XSS (Cross Site Scripting) Cheat Sheet Esp: for filte r evasion", from http://ha.ckers.org/xss.htm l. Microsoft's Anti-Cross Site Scripting Security Runtime Engine Sample - AntiXSS 3.1, from http://davidhayden.com /blog/dave/archive/2009/09/22/antixsssam ple.aspx. Philip Tellis, (2010), Common Security Mistakes in Web Applications, from http://www.smashingmagazine.com/2010/10/18/common-security-mistakes-in-web-applications/. J.D. Meier, Alex Mackman, Michael Dunner, Srinath Vasireddy, Ray Escamilla and Anandha Murukan, (2003), Improving Web Application Security: Threats and Countermeasures, from http://m sdn.m icrosoft.com /en-us/library/ff649874.aspx. Alex Homer, Components and Web Application Architecture, from http://technet.m icrosoft.com /enus/library/bb727121.aspx. Ryan Barnett, (2011), Web-Hacking-lncident-Database, from http://projects.webappsec.org/W ebHacking-lncident-Database#TopApplication Weaknesses. (2009), Path Traversal, from http://www.owasp.org/index.php/Path_Traversal. (2010), Web Parameter Tampering, from http://www.owasp.org/index.php/W eb_Param eter_Tampering. Unvalidated Input, from h ttp ://w w w . 0wasp.0 rg/index.php/Unvalidated_lnput#Exarnples_and_References. Kevin Beaver, The importance of input validation, from http://searchsoftwarequality.techtarget.co m /tip /0 ,289483, sid92_gcil214373_m em l, 00. html. (2010), Validating Input, from http://developer.apple.eom/library/ios/#documentation/Security/Conceptual/SecureCodingGuide/Articl es/Validatinglnput.html. Seth Fogie, (2006), Code Injection Explained, from http://www.inform it.com/guides/content.aspx?g=security&seqNum=226. Code injection, from http://en.w ikipedia.org/w iki/C ode_injection. Injection Prevention Cheat Sheet, from http://www.owasp.org/index.php/lnjection_Prevention_Cheat_Sheet. Remote file inclusion, from http://en.wikipedia.org/w iki/Rem ote_file_inclusion. Robert Auger, (2011), LDAP Injection, from http://projects.webappsec.org/LDAP-lnjection. Testing for LDAP Injection (OWASP-DV-OO6 ), from http://www.owasp.org/index.php/Testing_for_LDAP_lnjection_%280WASP-DV-006%29. Shreeraj Shah, (2006), Top 10 Web 2.0 Attack Vectors, from h ttp ://w w w .n e tsecurity.org/article. php?id=949. Robert Auger, (2010), Threat Classification, from http://projects.webappsec.org/Threat-Classification. (2006), Preventing HTML form tampering, from http://advosys.ca/papers/w eb/60-form -tam pering.htm l. (2010), Cross-site Scripting (XSS), from http://www.owasp.org/index.php/Cross$ite_Scripting_%28XSS%29. Paul Lee, Cross-site scripting, from http://w w w .ibm .com /developerw orks/tivoli/library/s-csscript/. Cross-site scripting, from http://en.wikipedia.org/wiki/Cross-site_scripting. DOM Based XSS, from http://www.owasp.org/index.php/DOM_Based_XSS. Phil Haack, (2009), CSRF Attacks and Web Forms, from http://haacked.com /archive/2009/04/02/csrfwebforms.aspx. Chris Shiflettk, (2004), Cross-Site Request Forgeries, from http://shiflett.org/articles/cross-site-requestforgeries.

1437. 1438. 1439. 1440. 1441. 1442. 1443.

1444. 1445. 1446. 1447. 1448. 1449. 1450. 1451. 1452. 1453. 1454. 1455. 1456. 1457. 1458.

R efere n ce s Page 3022

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

1459. 1460. 1461. 1462. 1463. 1464. 1465. 1466. 1467. 1468. 1469. 1470. 1471. 1472. 1473. 1474. 1475. 1476. 1477. 1478. 1479. 1480. 1481. 1482. 1483. 1484. 1485. 1486. 1487. 1488. 1489. 1490. 1491. 1492.

Robert Auger, (2010), The Cross-Site Request Forgery (CSRF/XSRF) FAQ, from http://w w w .cgisecurity.com /csrf-faq.htm l. Application Denial of Service, from http://www.owasp.org/index.php/Application_Denial_of_Service. Cookie Poisoning, from http://www.imperva.com /resources/glossary/cookie_poisoning.html. Cookie Poisoning h o w to , from http://forum .intern0t.net/security-tutorials-guides/2270-cookiepoisoning-how.html. Broken Authentication and Session Management, from http://www.owasp.org/index.php/Broken_Authentication_and_Session_Management. Robert Auger, (2010), Buffer Overflow, from http://pr0jects.webappsec.0rg/w/page/13246916/Buffer Overflow. (2009), Buffer Overflow, from http://w w w .ow asp.org/index.php/Buffer_O verflow . Free XML tools and software, from http://w w w .garshol.priv.no/dow nload/xm ltools/. SYS-CON tv, (2005), Anatomy of a Web Services Attack, from http://education.sys-con.com /node/80899. Robert Auger, (2010), Brute Force, from http://pr0jects.webappsec.0rg/w/page/13246915/Brute-F0rce. Ian de Villiers, sensepost j-baah, from http://w w w .sensepost.com /labs/tools/pentest/j-baah. (2009), Session Prediction, from http://www.owasp.org/index.php/Session_Prediction. Robert Auger, (2010), XPath Injection, from http://projects.webappsec.0rg/w/page/13247005/XPath Injection. (2009), XPATH Injection, from http://www.owasp.org/index.php/XPATH_lnjection. SmartWhois, from http://w w w .tam os.com /dow nload/m ain/index.php. Netcraft, from http://searchdns.netcraft.com /7host. Whois, from http://tools.w hois.net. DNSstuff, from http://w w w .dnsstuff.com . dnsstuff, from http ://w w w .dn sstu ff.co m /. network-tools, from h ttp ://n etw o rk-to ols.co m /. DNS, from http://e-dns.org. DomainTools, from http://w w w .dom aintools.com . WhatsUp PortScanner Tool, from http://www.whatsupgold.com /products/download/network_m anagem ent.aspx?k_id=port-scan. hping, from http://w w w .hping.org/dow nload.php. Sandcat Browser, from http://www.syhunt.com/?n=Sandcat.Browser. Netcat, from http://sourceforge.net/projects/netcat/files/latest/dow nload?source=files. ID Serve, from http://w w w .grc.com . Netcraft, from http://toolbar.netcraft.com . OWASP Zed Attack Proxy, from https://code.google.com/p/zaproxy/downloads/detail?name=ZAP_2.0.0_Windows.exe&can=2&q=. Burp Spider, from http://blog.portsw igger.net/2008/ll/m obp-all-new -burp-spider.htm l. WebScarab, from h ttp s://w w w . 0 wasp.0 rg/index.php/Categ 0 ry: 0 WASP_WebScarab_Pr0ject. Burp Suite, from http://blog.portsw igger.net/2008/ll/m obp-all-new -burp-spider.htm l. Brutus, from http://w w w .hoobie.net/brutus/brutus-dow nload.htm l. Sensepost's Crowbar, from http://research.sensepost.com /tools/web/j-baah.

R efere n ce s Page 3023

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

1493. 1494. 1495. 1496. 1497. 1498. 1499. 1500. 1501. 1502. 1503. 1504. 1505. 1506. 1507. 1508. 1509. 1510. 1511. 1512. 1513. 1514. 1515. 1516. 1517. 1518. 1519. 1520. 1521. 1522. 1523. 1524.

UrIScan, from http://www.microsoft.com/web/gallery/install.aspx?appsxml=&appid=UrlScan%3bUrlScan. Nikto, from h ttp ://w w w .cirt.n e t/n ik t 02 . Nessus, from http://www.tenable.com /products/nessus/select-your-operating-system . Acunetix Web Vulnerability Scanner, from http://w w w .acunetix.com /vulnerabilityscanner/download.htm. Weblnspect, from https://dow nload.hpsm artupdate.com /w ebinspect/. HttPrint, from h ttp://net-square.com /httprint.htm l. WebScarab, from h ttp s://w w w . 0 wasp.0 rg/index.php/Categ 0 ry: 0 WASP_WebScarab_Pr0je c t, GNU Wget, from ftp ://ftp .g n u .o rg /g n u /w g e t/. Teleport Pro, from http://w w w .tenm ax.com /teleport/pro/dow nload.htm . BlackWidow, from http://softbytelabs.com /us/dow nloads.htm l. Brutus, from http://w w w .hoobie.net/brutus/brutus-dow nload.htm l. THC-Hydra, from http ://w w w .th c.org/th c-h ydra/. soapUl, from h ttp://w w w .soapui.org/. CookieDigger, from http://w w w .m cafee.com /apps/free-tools/term sofuse.aspx7urh/us/dow nloads/freetools/cookiedigger.aspx. WebScarab, from h ttp s://w w w . 0 wasp.0 rg/index.php/Categ 0 ry: 0 WASP_WebScarab_Pr0 je c t. Instant Source, from http://w w w.blazingtools.eom /downloads.htm l#is. HttpBee, from h ttp ://w w w .o0 o.nu /p ro je cts/stif. w3af, from http://w 3af.sourceforge.net. Teleport Pro, from http://w w w .tenm ax.com /teleport/pro/dow nload.htm . GNU Wget, from ftp ://ftp .g n u .o rg /g n u /w g e t/. WebCopier Pro, from http://w w w .m axim um soft.com /products/w c_pro/overview .htm l. HTTrack Website Copier, from http://w w w .httrack.c 0 m /page/ 2/ . BlackWidow, from http://softbytelabs.com /us/dow nloads.htm l. cURL, from http://curl.haxx.se/download.htm l. MileSCAN ParosPro, from http://www.m ilescan.com /hk/index.php?option=com _content&view=article&id=15&ltem id=157. Acunetix Web Vulnerability Scanner, from http://w w w .acunetix.com /vulnerabilityscanner/download.htm. Watcher Web Security Tool, from http://websecuritytool.codeplex.com /downloads/get/62386. Netsparker, from http://w w w .m avitunasecurity.com /. N-Stalker Web Application Security Scanner, from http://w w w .nstalker.com /products/editions/free/. VampireScan, from http://www.vam piretech.com/store/?product=vam pirescan-cloud-securitystandardedition. SandcatMini, from http://w w w .syhunt.com /?n=Syhunt.M ini. Websecurify, from https://code.google.com/p/websecurify/downloads/detail?name=Websecurify%20Suite%201.0.0.exe&c an=2 &q=. OWASP ZAP, from https://code.google. com/p/zaproxy/downloads/detail?name=ZAP_2.0.0_Windows.exe&can=2&q=.

1525.

R efere n ce s Page 3024

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

1526. 1527. 1528. 1529. 1530. 1531. 1532. 1533. 1534. 1535.

NetBrute, from h ttp ://w w w .ra w lo g ic.com /n etb ru te /. skipfish, from h ttp s://c 0 de.g 00 gle.c 0 m /p/skip fish/. X5s, from http://xss.codeplex.com/downloads/get/115610. SecuBat Vulnerability Scanner, from http://secubat.codeplex.com /. WSSA - Web Site Security Scanning Service, from https://secure.beyondsecurity.com /vulnerabilityscanner-signup?step=l. SPIKE Proxy, from http://www.im m unitysec.com /resources-freesoftware.shtm l. Ratproxy, from h ttp s://c 0 de.g 00gle.c 0 m /p /ra tp r 0x y /. Wapiti, from http://w apiti.sourceforge.net/. Syhunt Hybrid, from http://www.syhunt.com /?n=Syhunt.Dynam ic. WebWatchBot, from http://www.exclamationsoft.com/Exclam ationSoft/download/instructions/htm l.asp?product=W ebW atc hBot&fe=no. Exploit-Me, from http://labs.securitycom pass.com /exploit-m e/. KeepNI, from h ttp://w w w .keepni.com /. WSDigger, from http://www.m cafee.com /apps/free-tools/term sofuse.aspx?url=/us/downloads/freetools/wsdigger.aspx. Arachni, from http://arachni-scanner.com /latest. XSSS, from http://w w w .sven.de/xsss/. Vega, from http://www.subgraph.com /vega_download.php. dotDefender, from http://w w w .applicure.com /P roducts/. ServerDefender VP, from http://w w w .port80softw are.com /products/serverdefendervp/try. Radware's AppWall, from http://www.radware.com /Products/ApplicationDelivery/AppW all/default.aspx. Barracuda Web Application Firewall, from https://w w w .barracuda.com /products/w ebapplicationfirew all. ThreatSentry, from http://www.privacyware.com/TS_Registration.htm l. Stingray Application Firewall, from . QualysGuard WAF, from http://w w w .qualys.com /form s/w eb-application-firew all/. IBM Security AppScan, from http://w w w -01.ibm .com /softw are/aw dtools/appscan/. ThreatRadar, from http://www.im perva.com /products/wsc_threatradar-reputation-services.htm l. Trustwave WebDefend, from https://w w w .trustw ave.c 0 m /web-applicati 0 n-firew all/# 0 verview. ModSecurity, from http://w w w .m odsecurity.org/dow nload/. Cyberoam's Web Application Firewall, from http://w w w .cyberoam .com /w ebapplicationfirew all.htm l. Burp Proxy, from http://blog.portsw igger.net/2008/ll/m obp-all-new -burp-spider.htm l. WebScarab, from h ttp s://w w w . 0 wasp.0 rg/index.php/Categ 0 ry: 0 WASP_WebScarab_Pr0je c t. TamperlE, from http://w w w .bayden.com /tam perie/. Tamper Data, from https://addons.m ozilla.org/en-US/firefox/addon/tam per-data/eula/79565?src=dpbtn-primary. Amap, from h ttp ://w w w .thc.org/thc-am ap/. Netcat, from http://sourceforge.net/projects/netcat/files/latest/dow nload?source=files.

1536. 1537. 1538. 1539. 1540. 1541. 1542. 1543. 1544. 1545. 1546. 1547. 1548. 1549. 1550. 1551. 1552. 1553. 1554. 1555. 1556. 1557. 1558. 1559.

R efere n ce s Page 3025

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

1560. 1561. 1562. 1563. 1564. 1565. 1566. 1567. 1568. 1569. 1570. 1571. 1572. 1573. 1574. 1575. 1576. 1577. 1578. 1579. 1580. 1581. 1582. 1583. 1584.

OWASP CAL9000, from h ttp s://w w w . 0 wasp.0 rg/index.php/Categ 0 ry: 0 WASP_D0w nl 0 ad. Hackvertor, from https://hackvertor.co.uk/public. BeEF, from h ttp ://b ee fp ro ject.com /. XSS-Proxy, from http://sourceforge.net/projects/xss-proxy/files/latest/dow nload. Backframe, from http://w w w .gnucitizen.org/blog/backfram e/. XSS Assistant, from h ttp s://c 0 de.g 00 gle.c 0 m/p/xss-assistant/. SWFIntruder, from https://code.google.com /p/swfintruder/downloads/detail?nam e=swfintruder0.9.1.tgz&can=2&q=. Flare, from h ttp ://w w w .now rap.de/flare.htm l. MTASC, from h ttp://w w w .m tasc.org/. Flasm, from http://flasm .sourceforge.net/. swfmill, from h ttp ://sw fm ill.o rg /. Debugger Version of Flash Plugin/Player, from http://w w w .adobe.eom /support/flashplayer/dow nloads.htm l#fpll. SQLiX, from h ttp s://w w w . 0 wasp.0 rg/index.php/Categ 0 ry: 0 WASP_SQLiX_Pr0je c t. sqlninja, from http://sqlninja.sourceforge.net/download.htm l. SqlDumper, from http://sqldum per.ruizata.com /. sqlbftools, from http://packetst 0 rmsecurity.c 0 m /files/d 0 w nl 0 ad/ 43795 /s q lb ft 00 ls -l. 2 .tar.gz. Softerra LDAP Browser, from http://w w w .ldapadm inistrator.com /dow nload.htm . Hibernate, from http://w w w .hibernate.org/dow nloads. NHibernate, from h ttp ://n h fo rg e .o rg /. Ruby On Rails, from http://rubyinstaller.org/dow nloads. String searcher: grep, from http://sourceforge.net/projects/gnuw in32/files/grep/2.5.4/grep-2.5.4bin.zip/download?use_mirror=nchc. wsChess, from http://www.net-square.com /wschess.htm l. Soaplite, from http://soaplite.com /dow nload.htm l. cURL, from http://curl.haxx.se/download.htm l. Perl, from http://w w w .activestate.com /activeperl/dow nloads/thankyou?dl=http://downloads.activestate.com/ActivePerl/releases/5.16.3.1603/ActivePerl-5.16.3.1603MSWin32-x64-296746.msi. UDDI Browser, from http://sourceforge.net/projects/uddibrowser/files/uddibrowser/UDDI%20Browser%200.2%20Binaries/u b-0 .2-bin. zip/download?use_mirror=nchc&download=. WSIndex, from http://w w w .w sindex.org/. Xmethods, from http://w w w .xm ethods.net/ve2/index.po. WSDigger, from http://www.m cafee.com /apps/free-tools/term sofuse.aspx?url=/us/downloads/freetools/wsdigger.aspx. Sprajax, from h ttp s://w w w . 0 wasp.0 rg/index.php/Categ 0 ry: 0 WASP_Sprajax_Pr0je c t.

1585.

1586. 1587. 1588. 1589.

M odule 14: SQL Injection 1590. 1591. Advanced SQL Injection, from http://www.slideshare.net/Sandra4211/advanced-sql-injection-3958094. Advanced SQL Injection, from http://www.slideshare.net/devteev/advanced-sql-injection-eng.

R efere n ce s Page 3026

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

1592. 1593. 1594. 1595. 1596. 1597. 1598. 1599. 1600. 1601. 1602. 1603. 1604. 1605. 1606. 1607. 1608. 1609. 1610. 1611. 1612. 1613. 1614. 1615.

SQL injection, from http://searchsqlserver.techtarget.com/feature/SQL-injection. SQL Injection, from http://hakipedia.com/index.php/SQL_lnjection. ERROR SQL INJECTION - DETECTION, from http://w w w .evilsql.com /m ain/page2.php. What is SQL Injection?, from http://w w w .secpoint.com /w hat-is-sql-injection.htm l. Securing Oracle Database from Search Engines Attack, from h ttp ://w w w .ija n a .in /p a p e rs/V 4 l2 -l.p d f. Stop SQL Injection Attacks Before They Stop You, from http://m sdn.m icrosoft.com /enus/magazine/ccl63917.aspx . Rise in SQL Injection Attacks Exploiting Unverified User Data Input, from http://technet.m icrosoft.com /en-us/security/advisory/954462 . Injection Protection, from http://msdn.m icrosoft.com/en-us/library/aa224806(v=sql.80).aspx . Understanding SQL Injection, from http://w w w .cisco.com /w eb/about/security/intelligence/sql_injection.htm l. SQL INJECTION - Tutorial, from http://elitezone.forum otion.bz/t77-sql-injection-tutorial. System testing, from http://en.wikipedia.org/w iki/System _testing. Testing for SQL Injection (OWASP-DV-005), from https://www.owasp.org/index.php/Testing_for_SQL_lnjection_(OWASP-DV-005). SQL Injection Cheat Sheet, from http://ferruh.m avituna.com /sql-injection-cheatsheet-oku/. SQL Injection Introduction, from http://w w w .controllingtheinter.net/forum s/view topic.php?f=45& t=8. Classification of SQL Injection Attacks, from http://courses.ece.ubc.ca/412/term _project/reports/2007fall/Classification_of_SQL_lnjection_Attacks.pdf. CHAPTER 1: INTRODUCTION, from http://isea.nitk.ac.in/publications/w eb.pdf. Dmitry Evteev, (2009), Advanced SQL Injection, from http://www.ptsecurity.com /download/PT-devteevAdvanced-SQL-lnjection-ENG.zip. Krzysztof Kotowicz, (2010), SQL Injection: Complete walkthrough (not only) for PHP developers, from http://www.slideshare.net/kkotowicz/sql-injection-com plete-walktrough-not-only-for-php-developers. Nick M erritt, SQL Injection Attacks, from http://w w w .evilsql.com /m ain/pagel.php. SQL Injection Cheat Sheet, from http://m ichaeldaw.org/sql-injection-cheat-sheet. Sagar Joshi, 2005, SQL Injection Attack and Defence, Available from http://w w w .securitydocs.com /library/3587. Kevin Spett, Blind SQL Injection-Are your web applications vulnerable?, from h ttp ://w w w .n e tsecurity.org/dl/articles/Blind_SQLInjection.pdf. Cameron Hotchkies, (2004), Blind SQL Injection Automation Techniques from http://www.blackhat.com/presentations/bh-usa-04/bh-us-04-hotchkies/bh-us-04-hotchkies.pdf. San-Tsai Sun, Ting Han Wei, Stephen Liu, and Sheung Lau, Classification of SQL Injection Attacks, from http://courses.ece.ubc.ca/412/term _project/reports/2007fall/Classification_of_SQL_lnjection_Attacks.pdf. SQL Injection, from http://m sdn.m icrosoft.com /en-us/library/m sl61953.aspx. SQL INJECTION, from http://www.authorstream.com /Presentation/useful-155975-sql-injection-hackingcomputers-22237-education-ppt-powerpoint/. SQL Injection Cheat Sheet, from http://ferruh.m avituna.com /sql-injection-cheatsheetoku/#Unionlnjections. SQL Injection, from http://hakipedia.com/index.php/SQL_lnjection.

1616. 1617. 1618. 1619.

R efere n ce s Page 3027

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

1620.

K. K. Mookhey and Nilesh Burghate, (2004), Detection of SQL Injection and Cross-site Scripting Attacks, from http://www.symantec.com /connect/articles/detection-sql-injection-and-cross-site-scriptingattacks. Ferruh Mavituna, Deep Blind SQL Injection, from h ttp ://d ocs.google. com/viewer?a=v&q=cache:uvo9RU3T0v8J :labs, portcullis. co.uk/download/Deep_Blin d_SQL_lnjection.pdf+deep+blind+sql+injection&hl=en&gl=in&pid=bl&srcid=ADGEESgQ9uwlz-eJFMk3zGP5NJQmHXmfP7UIWOSNTBIOhAV9h2pUWIvibONoFpuOMndYi_3YKOxT9sizjU2ljvSzVi4w4Xc_rDMKVFNSzpj60kXYsYwUQ480EW9IV-OijwWFwYnOJW&sig=AHIEtbT5rxBYONIb02-gShdro-oVnzYeA. Debasish Das, Utpal Sharma, and D.K. Bhattacharyya, (2009), An Approach to Detection of SQL Injection Attack Based on Dynamic Query Matching from http://w w w .ijcaonline.org/journal/num ber25/pxc387766.pdf. (2010), Quick Security Reference: SQL Injection from http://download.microsoft.com/download/E/E/7/EE7B9CF4-6A59-4832-8EDEB018175F4610/Quick%20Security%20Reference%20-%20SQL%20lnjection.docx. Ferruh Mavituna, One Click Ownage,Adventures of a lazy pentester, from h ttp ://w w w . 0wasp.0 rg/images/8/ 8e / 0 ne_Click_0 wnage-Ferruh_Mavituna.pdf. Alexander Kornbrust, (2009), ODTUG - SQL Injection Crash Course for Oracle Developers from http://www.red-database-security.com/wp/00w2009_sql_crashcourse_for_developers.pdf. Pankaj Sharma,(2005), SQL Injection Techniques & Countermeasures from h ttp ://w w w .ce rtin.org.in/Downloader?pageid=7&type=2&fileName=ciwp-2005-06.pdf. Pankaj Sharma, (2005), SQL Injection Techniques & Countermeasures, from http://docs.google.com/viewer?a=v&q=cache:OKkPI9hllR8J:www.certin.org.in/knowledgebase/whitepapers/ciwp-200506.pdf+sql+injection+countermeasures&hl=en&gl=in&pid=bl&srcid=ADGEESjfo76m84G_nbZgOQax9yl5HEXkM9ZSyLNa0_kJfDD4v4PLvO41fByd3YJk3GcTKoczBFU2WiNWNMK13Tc28CJ4WcO2bHXqldlWzR0GGmHSRmT39qkpqM2yhKpmfkQNCe80g&sig=AHIEtbR4WivS8bCzwK13BkKQXXHIepLWq w. William G.J. Halfond, Jeremy Viegas, & Alessandro Orso, (2006), A Classification of SQL Injection Attack Techniques and Countermeasures, from http://www.cc.gatech.edu/~orso/papers/halfond.viegas.orso. ISSSE06.presentation.pdf. Code Injection, Available from http://w w w .ow asp.org/index.php/C ode_lnjection. Understanding SQL Injection, Available from http://w w w .cisco.com /w eb/about/security/intelligence/sql_injection.htm l. VIVEK KUMBHAR, (2009), From Mind To Words, http://blogs.m sdn.com /vivekkum /default.aspx. Reviewing Code for SQL Injection, Available from http://www.owasp.org/index.php/Reviewing_Code_for_SQL_lnjection. Cross Site Scripting - OWASP, from www.owasp.org/index.php/Cross_Site_Scripting. Injection Flaws - OWASP, from www.owasp.org/index.php/lnjection_Flaws. Application Security Guidelines on Kavi Community, from http://com m unity.kavi.com /developers/security_standards/. J. Howard Beales, III, (2003), OWASP Web Application Security Top Ten List, from www.owasp.org/images/c/ce/OWASP_Top_Ten_2004.doc. Web Attacks - Cookie poisoning, from w w w.lodoga.co.uk/attackinfo/thethreat/exam ples/cook.htm . Victor Chapela,(2005), Advanced SQL Injection, from h ttp ://w w w . 0wasp.0 rg/im ages/ 7 / 74 /Advanced_SQL_lnjecti0 n.ppt.

1621.

1622.

1623.

1624. 1625. 1626. 1627.

1628.

1629. 1630. 1631. 1632. 1633. 1634. 1635. 1636. 1637. 1638.

R efere n ce s Page 3028

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

1639. 1640. 1641. 1642. 1643. 1644. 1645. 1646. 1647. 1648. 1649. 1650. 1651. 1652. 1653. 1654. 1655. 1656. 1657. 1658. 1659. 1660. 1661. 1662. 1663. 1664. 1665. 1666. 1667. 1668. 1669. 1670. 1671. 1672. 1673.

Chema Alonso, (2008), RFD (Remote File Downloading) using Blind SQL Injection Techniques, from http://w w w .toorcon.org/tcx/16_Alonso.pdf. [PPT] AFITC 2001, from www.whitehatsec.com/presentations/AFITC_2001/afitc_2001.ppt. What is parameter tampering?, from www.imperva.com/application_defense_center/glossary/parameter_tampering.html. D.E. Chadbourne, Post office break in..., from http://olduvai.blu.org/piperm ail/discuss/2004January/043138.htm. Blind SQL Injection, from http://w w w .securitydocs.com /library/2651. Jrubner, (2006), 'SQL injection' attacks on the rise in Atlanta, from http://w w w .bizjournals.com /atlanta/stories/2006/06/12/story8.htm l. BSQLHacker, from http://labs.portcullis.co.uk/application/bsql-hacker/. Marathon Tool, from http://m arathontool.codeplex.com . SQL Power Injector, from http://w w w .sqlpow erinjector.com /dow nload.htm . Havij, from http://w w w .itsecteam .com . SQL Brute, from http://www.gdssecurity.c 0 m /l/t.p h p . BobCat, from http://w w w .northern-m onkee.co.uk/pub/bobcat.htm l. Sqlninja, from http://sqlninja.sourceforge.net/download.htm l. sqlget, from http://w w w .darknet.org.uk/2007/07/sqlget-vl00-blind-sql-injection-tool-in-perl/. Absinthe, from http://w w w .darknet.org.uk/2006/07/absinthe-blind-sql-injection-toolsoftw are/. Blind Sql Injection Brute Forcer, from h ttp ://c 0 de.g 00 gle.c0 m /p/bsqlbf-v 2/ . sqlmap, from h ttp://sqlm ap.org/. SQL Injection Digger, from http://sqid.rubyforge.org. Pangolin, from http://nosec.org/en/evaluate/. SQLPAT, from http://w w w .cqure.net/w p/tools/passw ord-recovery/sqlpat/. FJ-lnjector Framework, from http://sourceforge.net/projects/injection-fw k/. Exploiter (beta), from http://w w w .ibm .com /developerw orks/rational/dow nloads/08/appscan_exploiter/. SQLIer, from http://bcable.net/project.php7sqlier. sqlsus, from http://sqlsus.sourceforge.net. SQLEXEC() Function, from http://m sdn.m icrosoft.com/en-us/library/lx933c7s(v=vs.80).aspx. Sqllnjector, from http://www.woanware.co.uk/?page_id=19. Automagic SQL Injector, from http://www.securiteam.com/tools/6P00L0AEKQ.html. SQL Inject-Me, from http://labs.securitycompass.com /exploit-m e/sql-inject-me/. NTO SQL Invader, from http://w w w .ntobjectives.com /go/nto-sql-invader-free-dow nload/. The Mole, from http://themole.nasel.com .ar/?q=downloads. Microsoft Source Code Analyzer, from http://w w w .m icrosoft.com /enus/download/details.aspx?id=16305. Microsoft UrIScan Filter, from http://w w w .m icrosoft.com /en-in/download/details.aspx?id=5728. dotDefender, from http://w w w .applicure.com /dow nload-latest. IBM Security AppScan, from http://w w w .ibm .eom /developerw orks/dow nloads/r/appscan/. WebCruiser, from http://sec4app.com /.

R efere n ce s Page 3029

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

1674. 1675. 1676. 1677. 1678. 1679. 1680. 1681. 1682. 1683.

HP Weblnspect, from http://w w w .hpenterprisesecurity.com /products/hp-fortify-softw are-securitycenter/hp-webinspect. SQLDict, from http ://n tse curity.n u/too lb ox/sqld ict/. HP Scrawlr, from https://h30406.www3.hp.com /cam paigns/2008/wwcam paign/l-57C4K/index.php. SQL Block M onitor, from h ttp://sql-tools.net/blockm onitor/. Acunetix Web Vulnerability Scanner, from http://w w w .acunetix.com /vulnerability-scanner/. GreenSQL Database Security, from http://www.greensql.com/content/greensql-databasesecurity#& sliderl=l. Microsoft Code Analysis Tool .NET (CAT.NET), from http://w w w .m icrosoft.com /enus/download/details.aspx?id=5570. NGS SQuirreL Vulnerability Scanners, from http://www.nccgroup.com /en/our-services/security-testingaudit-compliance/information-security-software/ngs-squirrel-vulnerability-scanners/. WSSA - Web Site Security Scanning Service, from http://w w w .beyondsecurity.com /sql-injection.htm l. N-Stalker Web Application Security Scanner, from http://w w w .nstalker.com /products/editions/free/.

M odule 15: Hacking Wireless Networks 1684. 1685. 1686. 1687. 1688. 1689. 1690. 1691. 1692. 1693. 1694. 1695. 1696. The ABCs o f IEEE 802.11, from http://hom e.com cast.net/~tim groth/abc.htm . Wi-Fi Hotspot Networks Sprout Like Mushrooms, from http://spectrum .ieee.org/telecom /wireless/w ifihotspot-networks-sprout-like-mushrooms/abc. A list of wireless network attacks, from http://searchsecurity.techtarget.com /feature/A-list-of-wirelessnetwork-attacks. Rogue Access Point Setups on Corporate Networks, from http://w w w .infosecuritymagazine.com/view/10516/comment-rogue-access-point-setups-on-corporate-networks-/. Advanced SQL Injection, from http://blog.pages.kr/1341. Identifying Rogue Access Points, from http://w w w .w i-fiplanet.com /tutorials/article.php/1564431. Bluetooth Security Risks and Tips to Prevent Security Threats, from http://www.brighthub.com /com puting/sm b-security/articles/30045.aspx. Cisco Unified Wireless Network ArchitectureBase Security Features, from http://www.cisco.com /en/US/docs/solutions/Enterprise/M obility/em ob41dg/ch4_Secu.htm l. Tutorial: My Plate is Compatible?, from http://w w w .aircrack-ng.org/doku.php?id=ptbr:compatible_cards. Wireless Networking Security, from http://technet.m icrosoft.com /en-us/library/bb457019.aspx. Path Traversal and URIs, from http://phucjim y.w ordpress.com /category/docum ent-security/. How to Cheat at Securing a Wireless Network, from http://www.sciencedirect.com/science/artide/pii/B9781597490870500572. Eliminating interference thru Wi-Fi spectrum analysis, from http://searchmobilecomputing.techtarget.com/tip/Elim inating-interference-thru-W i-Fi-spectrumanalysis. How to Surf Safely on Public Wi-Fi, from http://technology.inc.com /2007/07/01/how-to-surf-safely-onpublic-wi-fi/. Understanding WiFi Hotspots... from http://w w w .scam busters.org/w ifi.htm l. WLAN Glossary, from http://w w w .lever.co.uk/w lan-glossary.htm l.

1697. 1698. 1699.

R efere n ce s Page 3030

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

1700. 1701. 1702. 1703. 1704. 1705. 1706. 1707. 1708. 1709. 1710. 1711.

Basic Service Set Identity (BSSID), from http://www.interwifi.co.Uk/glossary/b/basic-service-set identity.htm l. DSSS - Direct Sequence Spread Spectrum, from h ttp ://w w w .te le c 0 mabc.c 0 m /d/dsss.htm l. Frequency-hopping spread spectrum, from https://www.princeton.edu/~achaney/tmve/wikilOOk/docs/Frequency-hopping_spread_spectrum.html 802.l l x Modules, Dev Kits Can Help Simplify Wireless Design Efforts, from http://w w w .digikey.com /us/en/techzone/w ireless/resources/articles/802-llx-m odules-dev-kits.htm l. Antennas, from http://82.157.70.109/m irrorbooks/wireless/0321202171/ch03levlsec3.htm l. How 802.11 Wireless Works, from http://technet.m icrosoft.com /enus/library/cc757419%28v=WS.10%29.aspx. TKIP (Temporal Key Integrity Protocol), from http://w w w .tech-faq.com /tkip-tem poral-key-integrityprotocol.html. WPA2, from http://www.wi-fi.org/knowledge-center/glossary/wpa2%E2%84%A2. Cisco Unified Wireless Network ArchitectureBase Security Features, from http://www.cisco.com /en/US/docs/solutions/Enterprise/M obility/em ob41dg/ch4_Secu.htm l. Understanding WEP Weaknesses, from http://w w w .dum m ies.com /how -to/content/understanding-wepweaknesses.html. V.802.11 Wireless LAN, from http://w w w .apl.jhu.edu/~hhsu/cs771/cs771-ll.pdf. 7 Things Hackers Hope You Don't Know, from http://www.esecurityplanet.com/views/article.php/3891716/7-Things-Hackers-Hope-You-DontKnow.htm. Rogue Wireless Access Point, from http://www.tech-faq.com/rogue-wireless-access-point.htm l. How to Surf Safely on Public Wi-Fi, from http://technology.inc.com /2007/07/01/how-to-surf-safely-onpublic-wi-fi. Wireless Network Security Tools, from http://w w w .w irelessnetw orktools.com /index.htm l. How to War Drive, from http://w w w .w ikihow .com /W ar-D rive. Tools for analyzing WLAN traffic abound, from http://www.com puterworld.com .au/article/273427/tools_analyzing_wlan_traffic_abound/. Tutorial: Is My Wireless Card Compatible? from http://w w w .aircrackng.org/doku.php?id=compatible_cards. MITM Attack, from https://w ilder.hq.sk/O penW eekend-2005/foill4.htm l. Security Threats of Smart Phones and Bluetooth, from http://www.aaronfrench.com /coursefiles/ucom m erce/Loo_2009.pdf. Tips for using Bluetooth Securely, from http://w w w .brighthub.com /com puting/sm bsecurity/articles/30045.aspx. Carrumba, (2009), How to Crack WPA/WPA2, from http://w w w .m egapanzer.com /2009/10/02/how-tocrack-wpawpa 2/. Introduction to Wireless Network, Available from http://m edia.wiley.com /product_data/excerpt/02/07645973/0764597302.pdf. Prabhaker M a te ti, Hacking Techniques in Wireless Networks, Available from http://w w w .cs.wright.edu/~pm ateti/lnternetSecurity/Lectures/W irelessHacks/M atetiWirelessHacks.htm. Cisco Unified Wireless Network ArchitectureBase Security Features, from http://www.cisco.com /en/US/docs/solutions/Enterprise/M obility/em ob41dg/ch4_Secu.htm l.

1712. 1713. 1714. 1715. 1716. 1717. 1718. 1719. 1720. 1721. 1722. 1723.

1724.

R efere n ce s Page 3031

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

1725. 1726. 1727. 1728.

(2008), WLAN Security Threats, from http://enterasys.com/company/literature/WLAN%20Security%20Today-Siemens%20whitepaper_EN.pdf. Hack Wireless WPA Network, Available from http://m ediakey.dk/~cc/hack-wireless-wpa-network/ Hack Wireless WEP Network, Available from http://m ediakey.dk/~cc/hack-wireless-network-crack/ Brian Kuebler, Wireless Wrongs; Hacking WiFi, Available from http://www.abc2news.com/news/local/story/W ireless-Wrongs-Hacking-WiFi/0anuc7UkOaxjPcfcjwOuw.cspx. Tony Northrup , 10 tips for improving your wireless network, Available from http://www .m icrosoft.com /athom e/setup/w irelesstips.aspx. Bradley Mitchell, Wired vs. Wireless Networking, Available from h ttp ://c 0 m pnetw 0 rking.ab 0 ut.c 0 m /cs/h 0 menetw 0 rking/a/h 0 mewiredless.htm. Wireless Network Image, Available from http://www.hvitsolutions.com /m ain/im ages/building_diagram _wireless.jpg. Wireless networking standards, Available from http://reviews.cnet.com/4520-7605_7-6871493-2.htm l. What are the types of Wireless Networks?, Available from http://w w w .tech-faq.com /wirelessnetworks.shtml. Different Types of Wireless Network, Available from http://w w w .greyfriars.net/gcg/greyw eb.nsf/m iam /article 01 . Hacking Techniques in Wireless Networks, Available from h ttp ://w w w .m u n d o w ifi.co m .b r/fo ru m /th re a d ll8 1 .h tm l. Evan Mckinney, Disadvantages of Wireless Networks, Available from http://www.ehow.com/facts_4809373_disadvantages-wireless-networks.html. Bradley Mitchell, Wireless Standards - 802.11b 802.11a 802.l l g and 802.l l n , Available from http://compnetworking.about.eom /cs/wireless80211/a/aa80211standard.htm . Wireless Network Devices, Available from http://w w w .pcrush.com /category/65/W ireless-NetworkDevices. WEP (wired equivalent privacy), Available from http://w w w .netw orkw orld.com /details/715.htm l. Wi-Fi Protected Access, Available from http://searchm obilecom puting.techtarget.com /sDefinition/0 sid40_gci887323,00.html. WPA (Wi-Fi Protected Access), Available from http://w w w .tech-faq.com /w pa-w i-fi-protectedaccess.shtml. Paul Arana, (2006), Benefits and Vulnerabilities of Wi-Fi Protected Access 2 (WPA2), Available from http://cs.gmu.edu/~yhwangl/INFS612/Sample_Projects/Fall_06_GPN_6_Final_Report.pdf. The Wi-Fi Protected Access 2 (WPA2)/Wireless Provisioning Services Information Element (WPS IE) update for Windows XP w ith Service Pack 2 is available, Available from http://support.m icrosoft.com /kb/893357. TKIP (Temporal Key Integrity Protocol), Available from http://w w w .tech-faq.com /tkip-tem poral-keyintegrity-protocol.shtml. Renaud Derai son2009) ), Using Nessus to Detect Wireless Access Points, Available from http://www.nessus.org/whitepapers/wap-id-nessus.pdf. WLAN Networking / 802.11, Available from h ttp ://w w w .w a rd rive .n e t/. Cracking WEP and WPA Wireless Networks, Available from http://docs.lucidinteractive.ca/index.php/Cracking_WEP_and_WPA_Wireless_Networks. Cracking WEP using Backtrack, Available from http://ryanunderdown.com /linux/cracking-wep-usingbacktrack.php.

1729. 1730. 1731. 1732. 1733. 1734. 1735. 1736. 1737. 1738. 1739. 1740. 1741. 1742. 1743.

1744. 1745. 1746. 1747. 1748.

R efere n ce s Page 3032

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

1749. 1750. 1751. 1752. 1753. 1754. 1755. 1756.

Wireless Hacking, Available from http://w w w .darknet.org.uk/category/w ireless-hacking/. WiFi Wireless Hacking, Available from http://www.hackerscatalog.com/Products/CDROMS/WiFiHacking.html. Bradley Morgan, (2006), Wireless Cracking Tools, Available from http://www.windowsecurity.com /whitepapers/W ireless-Cracking-Tools.htm l. What Are Rogue Access Points?, Available from http://w w w .m anageengine.com /products/wifimanager/rogue-access-point.html. Rick Doten, Wireless Security and Wireless Security Monitoring, Available from http://w w w .issane.org/documents/ISSARogueAPpresentationBoston.ppt. Gary Wollenhaupt, How Cell Phone Jammers work, Available from http://electronics.how stuffw orks.com /cell-phone-jam m erl.htm . Brian R. M iller & Booz Allen Hamilton, 2002, Issues in Wireless security, Available from http://www.acsac.org/2002/case/wed-c-330-M iller.pdf. Justin Montgomery, How WPA wireless networks are hacked, and how to protect yourself, Available from http://tech.blorge.eom/Structure:% 20/2009/02/07/how-wpa-wireless-networks-are-hacked-and how-to-protect-yourself/. Jonathan Hassell, (2004), Wireless Attacks and Penetration Testing, Available from http://w w w .securityfocus.com /infocus/1783. Robert J. Shimonski, (2003), Wireless Attacks Primer, Available from http://www.windowsecurity.com /articles/W ireless_Attacks_Prim er.htm l. Wireless Network Attack Methodology, Available from http://w w w .w irelessnetw orktools.com /. Martin Beck & TUDresden, (2008), Practical attacks against WEP and WPA, Available from http://dl.aircrack-ng.org/breakingwepandwpa.pdf. Simple Steps To Basic Wireless Hacking, Available from http://m ixeduperic.com/W indows/Hacks/simplesteps-to-basic-wireless-hacking.html. LE W ebm aster, (2005), Wireless Scanning Wardriving / Warchalking, Available from http://w w w .linuxexposed.com /content/view /42/52/. Finding cloaked access points, (Chapter 9 ), Available from h ttp ://b oo ks.google. com/books?id=wGJhDNspE3wC&pg=PA333&lpg=PA333&dq=doaked+access+point &source=bl&ots=ZDkHSykDNV&sig=lsLKIxlZcqkhUdrlWpFaqYczyl&hl=en&ei=V8R2Ss35002e6gP59viqCw&sa=X&0i=b00k_result&ct=result&resnu m=3#v=onepage&q=cloaked%20access%20point&f=false. Wireless Scanning Wardriving / Warchalking, Available from http://w w w .it-observer.com /w irelessscanning-wardriving-warchalking.html. Zamzom Wireless Network Tool, Available from http://w w w .freew arehom e.com /index.htm l?http% 3A//w w w .freew arehom e.com /lnternet/Netw orking/ N etwork_M onitoring_t.htm l. 5 - Wireless Network, Available from http://w w w .hackingtheuniverse.com /inform ation-security/attackvs-defense/attack-vs-defense-on-an-organizational-scale/5-wireless-network. Hacking the Invisible Network, Available from http://w w w .net-security.org/dl/articles/W ireless.pdf. Michael Roche, Wireless Attack Tools, Available from http://www.cse.wustl.edu/~jain/cse57107/ftp/wireless_hacking.pdf. Joshua Wright, Detecting Wireless LAN MAC Address Spoofing, Available from http://forskningsnett.uninett.no/w lan/dow nload/wlan-m ac-spoof.pdf. How to Break WEP Encryption, Available from http://www.ehow.com /how_2209766_break-wepencryption.html.

1757. 1758. 1759. 1760. 1761. 1762. 1763.

1764. 1765.

1766. 1767. 1768. 1769. 1770.

R efere n ce s Page 3033

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures


R eferences

Exam 312-50 Certified Ethical Hacker

1771. 1772.

Daniel V. Hoffman, Essential Wireless Hacking Tools, Available from http://w w w .ethicalhacker.net/content/view /16/24/. Protecting your wireless network from hacking, Available from http://www.businessknowledgesource.com/technology/protecting_your_wireless_network_from_hacki ng_025027.html. Eric Janszen, (2002), Understanding Basic WLAN Security Issues, from h ttp ://w w w .w ifiplanet.com /tutorials/article.php/953561. RTX NEWS JANUARY 2003 N O .l, from www.rtx.dk/Admin/Public/DWSDownload.aspx?File=Files%2FFiler%2Fannouncements%2Fnewsletter%2 F4_SCREEN.pdf. Agustina, J.V.Peng Zhang, and Kantola, (2003), Performance evaluation of GSM handover traffic in a GPRS/GSM network, from http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?isnumber=27298&arnumber=1214113&count=217&index =21 . Service set identifier, from http://searchm obilecom puting.techtarget.com /sDefinition/0 sid40_gci853455,00.html. Antenna Cabling Guide, from http://wireless.gum ph. 0 rg /co nten t/ 3 / 12/ 011 -antenna-cabling.html. Wireless Security Auditor (WSA), from http://w w w .research.ibm .com /gsal/w sa/. NAI's Sniffer Wireless to Support 802.11a and 802.11b Networks, from http://www.findarticles.c0m /p/articles/m i_zd4168/is_200202/ai_n9515340. RADIUS Protocol Security and Best Practices, from http://w w w .m icrosoft.com /technet/prodtechnol/w indow s 2000 serv/maintain/security/radiussec.mspx. Wi-Fi Security, from http://main.wi-fi.org/OpenSection/secure.asp?TID=2#Radius. WarChalking (Screen Shots), from http://w w w .blackbeltjones.com . Eavesdropping Detection Audits, from http://w w w .spybusters.com . Anton T. Rager, (2001), WEPCrack, AirSnort, from http://w epcrack.sourceforge.net/. Wireless Communication Policy - Rensselaer Help Desk, from http://helpdesk.rpi.edu/update.do?artcenterkey=545. Responsibility fo r Wireless Access Points, from http://cals.arizona.edu/calsnet/security/ua-wirelessguidelines.htm. Telephone tapping or wire tapping, from http://en.wikipedia.org/w iki/Telephone_tapping. Connie J. Sadler, NetBIOS NULL Sessions, from http://www.brown.edu/Facilities/CIS/CIRT/help/netbiosnull.htm l. The Hacker's Choice, from h ttp ://fre ew orld.thc.org/releases.php?o=l&s=4%20-%2017k.\. DOS_in_Wireless_Routing_Protocols_Hamilton, from http://www.eng.auburn.edu/users/ham ilton/security/SE2/. Network Security Library, http://www.windowsecurity.com/whitepapers/windows_security/The_Unofficial_NT_Hack_FAQ/The_U nofficial_NT_Hack_FAQ__Section_05.html. Oren Chapo, (1999), Network Management Protocols, from http://w w w .chapo.co.il/articles/snm p/. DaAnZeR, (2004), End to End Security for Windows 2000 Server, http://w w w .securitydocs.com /library/2647. Pascal Etienne, (2001), Weekly Security Tools Digest, from http://boran.linuxsecurity.com /security/sp/toolsdigest/2001/tools20010426.htm l.

1773. 1774.

1775.

1776. 1777. 1778. 1779. 1780. 1781. 1782. 1783. 1784. 1785. 1786. 1787. 1788. 1789. 1790. 1791.

1792. 1793. 1794.

R efere n ce s Page 3034

E th ica l H ackin g a n d C o u n te rm e a s u re s Copyright by

EC -C O U IIC il

All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical H acking a n d C o u n te rm e a s u re s R efe re n c e s

Exam 3 1 2 -5 0 C ertified Ethical H acker

1795.

DumpAcI dumps NTs permissions and audit settings, from http://www.windowsnetworking.com/kbase/W indowsTips/W indowsNT/AdminTips/Miscellaneous/Dum pAddumpsNTspermissionsandauditsettings.html. Windows 2000 Server, from http://technet.m icrosoft.com /hi-in/w indow sserver/2000/default(enus).aspx. Definitions & Terms, from http://w w w .bytepile.com /definitions-d.php. VPN & Internet Security Solutions, from http://w w w .solucom .com /define.htm . Stephen M. Specht & Ruby B.Lee, Distributed Denial of Service:Taxonomies of Attacks, Tools and Countermeasures, from http://palms.ee.princeton.edu/PALMSopen/DDoS%20Final%20PDCS%20Paper.pdf. Craig A. Huegen, 2005, Denial of Service Attacks: "Smurfing", from http://www.windowsecurity.com /whitepapers/Denial-of-Service-Attacks-Smurfing.html. Wireless LAN Security 802.11b and Corporate Networks, from http://documents.iss.net/whitepapers/wireless_LAN_security.pdf. The Wireless Intrusion detection system, from http://w w w .forum -intrusion.com /w idz_design.pdf. Wireless LAN Security, 802.11/Wi-Fi Wardriving & Warchalking, from h ttp ://w w w .w a rd rive .n e t/. Jim Geier, (2003), Identifying Rogue Access Points, from h ttp ://w w w .w ifiplanet.com /tutorials/article.php/1564431. Lisa Phifer, Service set identifier, http://searchm obilecom puting.techtarget.com /sDefinition/0 sid40_gci853455,00.html. WIRELESS COMMUNICATION POLICY, from http://w w w .longw ood.edu/vpaf/final_policy_base/6000/6124.htm . Kevin D. Murray, (2006), Security Scrapbook, from http://www.spybusters.com/SS0402.html. post office break in..., from http://olduvai.blu.org/piperm ail/discuss/2004-January/043138.htm l. Venky, (2006), Wireless LAN Security, from http://www.iss.net/docum ents/whitepapers/wireless_LAN_security.pdf. WAVEMON, from http://w w w .janm orgenstern.de/projects-softw are.htm l. Patrik Karlsson, (2002), WaveStumbler, 802.11 Network Mapper, from http://www.securiteam.com /tools/5GP002K6BM .html. Egsander, (2006), WIRELESS DATA CONNECTIVITY GUIDELINE, from http://cals.arizona.edu/calsnet/security/ua-wireless-guidelines.htm. NPS Information Technology Policy/Standard, from https://www.nps.navy.mil/ITACS/New05/ITPolicy/NPSITPolicy202.pdf. Simple Active Attack Against TCP, from https://db.usenix.org/. Humphrey Cheung, (2005), How To Crack WEP - Part 1: Setup & Network Recon, from http://www.tom sguide.com /us/how-to-crack-wep,review-451.htm l. Humphrey Cheung, (2005), How To Crack WEP - Part 2: Performing the Crack, from http://www.tom sguide.com /us/how-to-crack-wep,review-459.htm l. Humphrey Cheung, (2005), How To Crack WEP - Part 3: Securing your WLAN, from http://www.tom sguide.com /us/how-to-crack-wep,review-471.htm l. Advantages and Disadvantages of WLANs, from http://w w w .w ireless-center.net/W i-FiSecurity/Advantages-and-Disadvantages-of-WLANs.html. Advantages vs. Disadvantages of WiFi, from http://m ason.gm u.edu/~fkondolo/page3.

1796. 1797. 1798. 1799.

1800. 1801. 1802. 1803. 1804. 1805. 1806. 1807. 1808. 1809. 1810. 1811. 1812. 1813. 1814. 1815. 1816. 1817. 1818. 1819.

R e fe re n c e s Page 3 0 3 5

Ethical H acking a n d C o u n te rm e a s u re s C opyright by EC-COUIICil All Rights R eserved. R ep ro d u ctio n is Strictly P ro h ib ite d .

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1820.

Alrady, H o w to Use WIFI H otspots w ith Security, from http://w w w .ehow .com /how _5287862_use-w ifihotspots-security.htm l.

1821.

James Kendrick, (2010), Sm artphone W i-Fi Usage on the Rise, from http ://jkontherun .com /2010/08/24/sm artphone-w i-fi-usage-on-the-rise/.

1822.

Chris W e b er and Gary Bahadur, W ireless N etw orking Security, from http ://techn et.m icrosoft.com /enus/library/bb457019.aspx. Barb Bow m an (2003), W P A W ireless Security fo r Hom e N etw orks, from http ://w w w .m icro so ft.com /w in do w sxp /using /netw orkin g/expert/bo w m an_ 03ju ly28 .m spx. (2005), W i-Fi A dop tion, from http://w w w .b usinessw eek.com /tech nology/tech_stats/w ifi0 510 03.htm . Christopher Elliott, 6 w ireless threats to your business, from http://w w w .m icrosoft.com /business/enus/re so urces/technology/broadband-m obility/6-w ireless-threats-to-yourbusiness.aspx# w irelessthreatstoyourbusiness.

1823.

1824. 1825.

1826. 1827. 1828.

W archalking Symbols, from http ://w w w .h ackerskitchen .co m /m ac-old/w ifi/W ar_C halk/. The RSN Protocol Process, from http ://w w w .tech-faq .com /rsn -rob ust-secu re-netw ork.htm l. (2003), W EP encryption Process, from http://techn et.m icrosoft.com /enus/library/cc757419% 28W S.10% 29.aspx. (2006), W PA2: Second G eneration W iFi Security, from http ://pcqu est.ciol.com /con tent/technolog y/200 6/1 060 508 03.asp. The Four-W ay Handshake, from h ttp ://w w w .a n sw e rs.co m /to p ic/ie e e -8 0 2 -lli-2 0 0 4 . Brandon Teska, (2008), How To Crack W P A / W PA2, from http ://w w w .sm a lln e tb u ild e r.co m /w ireless/w ireless-h o w to /3 027 8-h o w -to-cra ck-w p a -w p a 2. Eric Geier, (2010), 7 Things Hackers Hope You Don't Know, from http://w w w .esecurityplanet.com /view s/article.php/3891716/7-Things-H ackers-H ope-You-D ontKnow.htm .

1829.

1830. 1831.

1832.

1833. 1834. 1835. 1836.

"W ireless LAN SecurityChecklist", from http ://w w w .w a rd rive.n et/. 802.11 Security Tools, from h ttp ://w w w .w a rd rive.n et/secu rity/too ls. W ireless Security Tools, from h ttp ://w w w .co reco m .co m /h tm l/w la n _to o ls.h tm l. Lisa Phifer, (2010), Top Ten Free W i-Fi Security Test Tools, from http://w w w .esecurityplanet.com /view s/article.php/3881181/Top-Ten-Free-W i-Fi-Security-TestTools.htm .

1837. 1838.

Free W ireless Security Tools, from http://netsecurity.ab 0 ut.c 0 m /cs/hackert 00 ls/a /a a freew ifi.h tm . Bryan, (2005), Cracking W EP and W P A W ireless Networks, from http ://docs.lucidinteractive.ca/index.php/Cracking_W EP_and_W PA _W ireless_N etw orks# W PA _Crackin. (2006), A Com prehensive Review o f 802.11 W ireless LAN Security and the Cisco W ireless Security Suite, from http ://w w w .cisco .c0 m /w a rp /p u b lic/cc/p d /w itc/a o l2 0 0 a p /p ro d lit/w sw p f_ w p .h tm # w p 3 9 4 7 5 . (2006), H ow To Crack W EP and W P A W ireless N etw orks, from http://121space.com /index.php?show topic= 3376.

1839.

1840.

1841.

Cisco U nified W ireless N etw ork A rch ite ctu re Base Security Features, from h ttp ://w w w .cisco .c0m /en/U S /do cs/so lu tio ns/E nterprise/M o b ility/em o b 41d g/ch4 _Secu .htm l# w pl01 898 4.

1842.

W ireless DoS, from http ://w w w .cisco .c0m /en/U S /do cs/w ire less/techno lo gy/w ip s/d eplo ym ent/g uid e/w ip sd ep.htm l# w pl50 481.

1843.

(2009), H ow to prevent w ireless DoS attacks, from http://searchsecurity.techtarget.com /generic/0,295582,s id l4 _ g c ill7 3 6 2 8 _ m e m 1,00. htm l.

References Page 3036

Ethical Hacking and C ounterm easures Copyright by EC-COUIICil All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1844.

Jim Geier, (2003), Denial of Service a Big W LAN Issue, from http ://w w w .esecurityplanet.com /trends/article.php/2200071/D enial-of-Service-a-Big-W LA N -lssue.htm .

1845.

Jonathan Hassell, (2004), W ireless Attacks and Penetration Testing (part 1 of 3), from http ://w w w .sym antec.co m /co nnect/articles/w ireless-attacks-and -pen etratio n-testin g-p art-l-3.

1846.

(2009), A list o f w ireless netw ork attacks, from http://searchsecurity.techtarget.c o m /g e n e ric/0 ,2 9 5 5 8 2 ,sid l4 _ g c ill6 7 6 1 1 _ m e m 1,00. htm l. Lisa Phifer, (2009), A w ireless netw ork vuln erability assessm ent checklist, from http://searchsecurity.techtarget.com /generic/0,295582, s id l4 _ g c ill6 7 6 6 6 _ m e m 1,00. htm l. Lisa Phifer, (2009), Hunting fo r rogue w ireless devices, from http://searchsecurity.techtarget.com /generic/0,295582,s id l4 _ g c ill6 7 6 6 4 _ m e m 1,00. htm l. PreciousJohnDoe, List o f W ireless N etw ork Attacks, from http ://w w w .b righ thu b.com /com putin g/sm b security/articles/53949.aspx.

1847.

1848.

1849.

1850.

Security D isciplines fo r O bjective 3: D etection and Recovery, from h ttp ://w w w .it.o jp .g o v/d o cu m en ts/a sp /w ireless/se ction 3-3-l.h tm .

1851. 1852.

(2010), W ireless Sniffer, from http ://w w w .p erso naltelco .ne t/W irelessSniffe r. How to: Sniff W ireless Packets w ith W ireshark, from http ://w w w .w irelessnets.co m /reso urces/tu to rials/sniff_ packets_w ireshark.htm l.

1853.

W ifiEagle Single- and Dual-Band 802.11 Channel Analyzers, from http ://w w w .n utsaboutnets.com /perform ance-w ifi/p rod ucts/product-w ifieagle-w ifi-chann elanalyzer.htm .

1854. 1855.

Creating A Cheap Bluetooth Sniffer, from http ://thew ifihack.com /blog/?p= 27. W LAN A nalyzer and Protocol D ecoder - Com m V iew fo r W iFi, from h ttp ://w w w .ta m o s.co m /h tm lh elp/co m m w ifi/pa ckets.h tm . Jim Geier, (2002), Understanding 802.11 Frame Types, from http://w w w .w ifiplanet. com /tutorials/article. php/1447501/U nderstanding-80211-Fram e-Types.htm . Laurent Oudot, (2004), W ireless H oneypot Counterm easures, from h ttp ://w w w .sym antec.com /connect/articles/w ireless-honeyp ot-counterm easures. (2009), Fragm entation Attack, from http://w w w .aircrack-ng.org/doku.php?id= fragm entation. Andrei A. M ikhailovsky, Konstantin V. G avrilenko, and A nd rew Vladim irov, (2004), The Frame of Deception: W ireless M a n -in -th e-M id d le A ttacks and Rogue Access Points D eploym ent, from http ://w w w .inform it.com /articles/article.aspx?p= 353735& seqN um = 7.

1856.

1857.

1858. 1859.

1860.

Com m ent: Rogue Access Point Setups on Corporate Networks, from http://w w w .infosecu rityus.com /view /10516/com m ent-rogue-access-point-setups-on-corporate-netw orks-/. Kevin Beaver and Peter T. Davis, Understanding W EP W eaknesses, from http ://w w w .d um m ies.com /how to/content/understanding-w ep-w eaknesses.htm l. (2007), Cracking W EP Using Backtrack: A Beginner's Guide, from http://ryanunderdow n.com /linux/cracking-w ep-using-backtrack.php. (2009), FakelKEd - Fake IKE Daem on Tool fo r M ITM , from http ://w w w .d arknet.org.uk/2009/08/fakeiked-fake-ike-daem on-tool-for-m itm /.

1861.

1862.

1863.

1864.

Renee Oricchio, How to Surf Safely on Public W i-Fi, from http ://techn olo gy.inc.co m /te leco m /articles/2 007 07 /W iFi.htm l. Aircrack-ng fo r W ind ow s - Aircrack, from http ://w w w .w irelessdefence.org/Contents/A ircrackng_W inAircrack.htm . (2010), Crack W EP key via connected client, from http ://ca rp eb lu n te.co m /.

1865.

1866.

References Page 3037

Ethical Hacking and C ounterm easures Copyright by EC-COUIICil All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1867.

Using Cain and the AirPcap USB adapter to crack W P A /W PA 2, from http://w w w .irongeek.com /i.php?page= videos/airpcap-cain-w pa-cracking.

1868. 1869.

W iFi Hopper, from http ://w ifih o p p e r.com /o verview .h tm l. PhoneSnoop: Spying on Blackberry Users, from http ://w w w .sym antec.com /connect/b logs/ph onesn oop spying-blackberry-users.

1870. 1871. 1872. 1873. 1874.

W hat is BlueJacking, from http ://w w w .n ew m obilem ed ia.com /bluejackin g-2.htm . , from http ://w w w .o xid.it/ca in .htm l. KisM AC, from http://kism ac-ng.org/. inSSIDer, from h ttp ://w w w .m etag eek.n et/prod ucts/inssid er/. N etsurveyor, from h ttp ://w w w .p erform an cew ifi.net/p erfo rm ance-w ifi/pro ducts/netsu rveyo r-netw o rkdiscovery.htm . Vistum bler, from h ttp ://w w w .vistu m b ler.n et/. W irele ssM on , from h ttp ://w w w .p assm ark.co m /pro du cts/w ire lessm on ito r.htm . W iFi Hopper, from h ttp ://w w w .w ifih o p p er.co m /d o w n lo a d .h tm l. W avestum bler, from h ttp ://w w w .cq u re .n e t/w p /to o ls/o th er/w a v estu m b ler/. iStum bler, from http ://w w w .istu m b le r.n et/. W iFinder, from http ://w w w .p gm so ft.com /a pp s/w ifin d er_fo r_a n d ro id/. M eraki W iFi Stum bler, from http ://w w w .m era ki.co m /p rod ucts/w ireless/w ifi-stum b le r. W ellenreiter, from h ttp ://w e llenreiter.so urce forg e.ne t/. AirCheck W i-Fi Tester, from h ttp ://w w w .flukenetw orks.com /enterprise-netw o rk/netw o rktesting/AirCheck-W i-Fi-Tester. AirRadar 2, from http ://w w w .ko in go sw .co m /pro ducts/airrad ar.php. Xirrus W i-Fi Inspector, from http ://w w w .xirru s.co m /Prod ucts/W i-Fi-lnsp ecto r. W ifi Analyzer, from http://a.farpro c.co m /w ifi-analyzer. W iFiFoFum - W iFi Scanner, from http ://w w w .w ififo fu m .n et/d o w n lo a d s. N etw ork Signal Info, from http://w w w .kaibits-so ftw are.co m /pro duct_netw otksignal.h tm . W iFi Manager, from http ://km anso ft.co m /. OpenSignalM aps, from http ://op ensig nal.com /. WIGLE, from h ttp ://w igle.net/gp s/g ps/m ain/do w nlo ad/. Skyhook, from http ://w w w .skyhookw ireless.com /location -tech nology/sdk.p hp. jiW ire, from http://v4 .jiw ire.com /search-hotspot-locations.htm . W eFi, from h ttp ://w w w .w efi.co m /d o w n lo a d /. W ireshark, from h ttp ://w w w .w ireshark.o rg /do w nlo ad.htm l. Cascade Pilot, from http ://w w w .riverb ed.co m /pro ducts-so lutio n s/p ro d ucts/perfo rm ancem anagem ent/netw ork-infrastructure/H igh-Speed-Packet-Analysis.htm l. Om niPeek, from http ://w w w .w ild packets.co m /p ro d ucts/o m nipeek_netw ork_analyzer. Sniffer Portable Professional Analyzer, from http://w w w .netscou t.com /products/enterp rise/Sniffer_ Portable_A n alyzer/Sniffer_Portab le_ Professiona l_Analyzer/Pages/default.aspx.

1875. 1876. 1877. 1878. 1879. 1880. 1881. 1882. 1883.

1884. 1885. 1886. 1887. 1888. 1889. 1890. 1891. 1892. 1893. 1894. 1895. 1896.

1897. 1898.

1899. 1900.

Capsa W iFi, from h ttp ://w w w .co laso ft.com /do w nlo ad/p ro d ucts/capsa_ fre e.p hp. ApSniff, from http ://w w w .m o n o lith 8 1.de/a p sn iff.h tm l.

References Page 3038

Ethical Hacking and C ounterm easures Copyright by EC-COUIICil All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1901. 1902. 1903. 1904. 1905. 1906. 1907. 1908. 1909. 1910. 1911. 1912. 1913. 1914. 1915. 1916. 1917. 1918. 1919. 1920. 1921. 1922. 1923. 1924. 1925. 1926. 1927. 1928. 1929. 1930. 1931. 1932.

N etw o rkM in er, from http ://w w w .n etresec.co m /?pag e= N etw o rkM iner. Airscanner M o b ile Sniffer, from h ttp ://w w w .airscanner.co m /pro ducts/sniffer/. Observer, from http ://w w w .n etw o rkinstrum en ts.co m /p ro d ucts/o bserver/index.p hp?tab= d o w n lo ad. W ifiScanner, from http ://w ifiscanner.sourceforge.net/. M ognet, from h ttp ://w w w .m o no lith8 1.de/m o gne t.htm l. Iperf, from http ://ip erf.so urcefo rge.net/. Aircrack-ng, from http://w w w .aircrack-ng.org/. SM AC, from http://w w w .klcconsulting.net/sm ac/. KisMAC, from http://kism ac-ng.org/. Elcom soft W ireless Security A uditor, from http ://w w w .elco m soft.co m /ew sa.h tm l. W epA ttack, from http ://w epattack.so urcefo rge.net/. W esside-ng, from http://w w w .aircrack-ng.org/doku.php?id= w esside-ng. W EPCrack, from http://w epcrack.sourceforg e.net/. W epD ecrypt, from http ://w epdecrypt.sourceforge.net/. Portable Penetrator, from http ://w w w .secp o in t.com /p o rta b le-p e n etra tor.h tm l. CloudCracker, from http s://w w w .clo ud cracker.co m /. coW PAtty, from h ttp ://w irele ssd efen ce.o rg /C o n ten ts/co W P A ttyM a in .h tm . W ifite, from http s://co de.google.com /p/w ifite/dow nloads/detail?nam e= w ifite-2.0r85.tar.gz. W epO ff, from h ttp ://w w w .p tsecurity.ru /do w nlo ad/w ep off.tar.g z. ApSniff, from http ://w w w .m o n o lith 8 1.de/a p sn iff.h tm l. W iFiFoFum , from http ://w w w .a sp ecto -so ftw a re.co m /rw /a p p lica tio n s/w ififofu m /. W arLinux, from h ttp ://so urcefo rg e.n et/p rojects/w arlinu x/. M acStum bler, from http ://w w w .m acstu m bler.co m /. W iFi-W here, from http://w w w .threejacks.com /?q= node/13. AirFart, from http ://airfart.so urcefo rge.net/. AirTraf, from h ttp ://airtraf.so urcefo rge.net/. 802.11 N etw ork Discovery Tools, from http ://w avelan-tools.sourceforg e.net/. N etw orkM anager, from h ttp ://pro jects.gn o m e.org /N etw o rkM anager/. KW iFiM anager, from http ://kw ifim an ager.sourceforg e.net/. N etw orkC ontrol, from http ://w w w .a ra ch n o id.co m /N etw o rkC o n trol/in de x.h tm l. KOrinoco, from h ttp ://ko rin oco .so urcefo rg e.n et/. Sentry Edge II, from http://w w w .tek.com /docum en t/new s-release/tektronix-advances-rf-m onitoringsentry-edge-ii.

1933. 1934. 1935. 1936. 1937.

W aveN ode, from http ://w w w .w aveno de .co m /. xosview, from http ://xosview .sourceforg e.net/. RF M o n ito r, from http ://w w w .n ew steo.co m /g b/d ata-lo gg er/featu res/m o nitoring-so ftw are.p hp. DTC-340 RFXpert, from http://w w w .dektec.com /produ cts/A pps/D T C -340/index.asp. Hom e Curfew RF M o n ito rin g System, from http ://so lu tio n s.3m .co m /w ps/po rta l/3M /en _ U S /E lectro n icM o n ito rin g/H o m e/Pro du ctsS ervices/O u rPro d ucts/H om eCurfew R FM onitoringS ystem /.

References Page 3039

Ethical Hacking and C ounterm easures Copyright by EC-COUIICil All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1938.

RFProtect Spectrum Analyzer, from http ://w w w .arub anetw o rks.co m /pro ducts/arubao s/rfp rotectspectrum -analyzer/.

1939.

A irM a g n et W iFi Analyzer, from h ttp ://w w w .flukenetw orks.com /enterprise-netw o rk/w irelessnetw ork/A irM agnet-W iFi-A nalyzer.

1940.

OptiView XG N etw ork Analysis Tablet, from http ://w w w .flukenetw orks.com /enterprisenetw ork/netw ork-m onitoring/optiview -xg-netw ork-analysis-tablet. N etw ork Traffic M o n ito r & A nalyzer CAPSA, from http ://w w w .javvin .com /p acket-traffic.htm l. Observer, from http ://www. netw o rkinstrum ents.com /products/observer/index.php?tab= dow nload. Ufasoft Snif, from h ttp ://ufa so ft.co m /sniffer/. vxSniffer, from http://w w w .cam bridgevx.com /vxsniffer.htm l. OneTouch AT N etw ork Assistant, from h ttp ://w w w .flukenetw orks.com /enterprise-netw o rk/netw o rktesting/O neTouch-AT-N etw ork-Assistant.

1941. 1942. 1943. 1944. 1945.

1946. 1947. 1948. 1949. 1950. 1951. 1952. 1953.

SoftPerfect N etw ork Protocol Analyzer, from http ://w w w .so ftp e rfect.co m /p rod u cts/n e tw o rksn iffer/. W irelessN etView , from http ://w w w .n irso ft.n et/u tils/w ire less_ n etw o rk_view .h tm l. Airview , from http ://airview .sourceforg e.net. RawCap, from http://w w w .netresec.com /?page= Raw Cap. Cisco Spectrum Expert, from http://w w w .cisco .co m /en/U S/p ro d ucts/ps939 3/index.h tm l. AirMedic USB, from http ://w w w .flu ken etw orks.com /en terp rise-n e tw o rk/w ireless-n e tw o rk/A irM ed ic. AirSleuth-Pro, from http://nutsaboutnets.com /airsleu th-spectrum -analyzer/. Bum bleBee-LX Handheld Spectrum Analyzer, from http ://w w w .bvsystem s.com /Produ cts/S pectrum /Bu m bleBee-LX/bum blebee-lx.htm . Wi-Spy, from h ttp ://w w w .m etag eek.n et/prod ucts/w i-spy/. Super Bluetooth Hack, from h ttp ://gallery.m ob ile9.eom /f/317828/. BTBrowser, from http://w ireless.klings.org/B TBrow ser/. BH Bluejack, from http://croozeus.com /blogs/?p= 33. Bluediving, from http ://bluedivin g.sourceforge.net/. Blooover, from h ttp ://trifin ite.o rg /trifin ite _ stu ff_ b lo o o ver.h tm l. BTScanner, from http ://w w w .pentest.co.u k/dow nloads.h tm l?cat= dow nloads& section = 01_bluetooth. CIHwBT, from h ttp ://so urcefo rg e.n et/p rojects/cih-w ith-bt/files/. BT Audit, from h ttp ://trifin ite.o rg /trifin ite _ stu ff_ b ta u d it.h tm l. BlueAlert, from http ://w w w .insecure.in/bluetooth_hacking_02.asp. A irM a g n et W iFi Analyzer, from h ttp ://w w w .flukenetw orks.com /enterprise-netw o rk/w irelessnetw ork/A irM agnet-W iFi-A nalyzer. AirD efense, from h ttp ://w w w .aird efen se.net/pro ducts/servicesp latfo rm /in dex.ph p. Adaptive W ireless IPS, from http ://w w w .cisco .co m /en/U S/p ro d ucts/ps981 7/index.h tm l. Aruba RFProtect WIPS, from http ://w w w .arub anetw orks.com /products/arubaos/rfp rotect-w irelessintrusion-protection.

1954. 1955. 1956. 1957. 1958. 1959. 1960. 1961. 1962. 1963. 1964.

1965. 1966. 1967.

1968.

Enterasys Intrusion Prevention System, from http://w w w .enterasys.com /products/advanced-securityapps/dragon-intrusion-detection-protection.aspx. RFProtect W ireless Intrusion Protection, from h ttp ://w w w .arub anetw o rks.co m /pro ducts/arubao s/rfp rotect-w irele ss-intru sio n-pro te ction. SonicW ALL W ireless N etw orking, from http://o-w w w .so nicw all.co m /us/en/solutio ns/42 24.htm l.

1969.

1970.

References Page 3040

Ethical Hacking and C ounterm easures Copyright by EC-COUIICil All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

1971.

HP TippingPoint IPS, from h ttp ://h l7 0 0 7 .w w w l.h p .co m /u s/e n /p ro d u cts/n e tw o rk security/H P_S_lntrusion_Prevention_System _(IPS)_Series/index.aspx.

1972. 1973. 1974. 1975. 1976. 1977.

AirTight WIPS, from http://w w w .airtightnetw orks.com /hom e/products/A irT ig ht-W IPS.h tm l. N etw ork Box IDP, from http://w w w .n etw ork-b ox.co.u k/techn ology/threatm anagem ent/ID P. A irM o b ile Server, from http ://w w w .airm o bile .se /airm o b ile_serve r.htm . WLS M anager, from h ttp ://w w w .airp atro lco rp.com /pro du cts/w ls_ m anag er.ph p. W ireless Policy M anager (W PM ), from http ://a irp a tro lco rp .co m /a irp a tro l-p ro d u cts/w p m w ec/. ZENworks Endpoint Security M anagem ent, from h ttp ://w w w .n ovell.co m /p ro d ucts/zenw o rks/end po in tsecuritym anage m ent/features/. A irM a g n et Planner, from http ://w w w .flukenetw orks.com /enterprise-netw ork/w irelessnetw ork/A irM agnet-Planner. Cisco Prim e Infrastructure, from h ttp ://w w w .cisco .co m /e n /U S /p ro d u cts/p sl2 2 3 9 /in d ex.h tm l. AirTight Planner, from http ://w w w .airtightnetw o rks.co m /ho m e/pro ducts/A irT ig ht-Plan ner.htm l. LANPIanner, from http://w w w .m otorola.com /Business/U SEN/Business+Product+and+Services/Software+and+Applications/W LAN+Managem ent+and+Security+Sof tw are/LANPIanner_US-EN.

1978.

1979. 1980. 1981.

1982.

RingM aster, from http://w w w .ju nip er.net/us/en/products-services/softw are/netw ork-m anag em entsoftw are/ringm aster/. Connect EZ Predictive RF CAD Design, from http://w w w .connect802.eom /suite_spot.htm # . Ekahau Site Survey (ESS), from http://w w w .ekahau .com /p rod ucts/ekahau-site-survey/overview .htm l. ZonePlanner, from http ://w w w .ruckusw ireless.co m /pro ducts/zo n eplanner. W i-Fi Planning Tool, from http ://w w w .a ero h ive .co m /p la n n er. Tam oGraph Site Survey, from h ttp ://w w w .tam o s.co m /p ro d ucts/w ifi-site-survey/w lan-p lann er.ph p. OSW A, from http ://securitystartshere.org/page-dow n loads.htm . W iFiZoo, from http ://c 0 m m unity.c 0 rest.c 0 m/~h 0 ch 0 a /w ifiz 00 /index.htm l# d 0 w n l 0 a d . N etw ork Security Toolkit, from http ://n etw o rksecu rityto o lkit.o rg /n st/in d e x.h tm l. Nexpose Com m unity Edition, from http://w w w .rapid7 .co m /p ro d ucts/nexpo se/com pare-d o w nlo ads.jsp. W iFish Finder, from http://w w w .airtightnetw o rks.co m /ho m e/reso urces/kno w ledge-center/w ifishfinder.htm l.

1983. 1984. 1985. 1986. 1987. 1988. 1989. 1990. 1991. 1992.

1993. 1994. 1995.

Penetrator V u lne rab ility Scanning Appliance, from h ttp ://w w w .secp o in t.com /p e n etra to r.h tm l. SILICA, from h ttp ://w w w .im m unityin c.co m /d ow nlo a ds.sh tm l. W ireless N etw ork V u lne rab ility Assessm ent, from http ://w w w .secnap.com /p rodu cts/audits/w irelessassessm ent.htm l. Karma, from http ://w w w .theta44.org /karm a/. Hotspotter, from h ttp ://w w w .w irelessd efence.org /C o nte nts/ho tspo tte r.htm . Airsnarf, from http ://airsnarf.shm o o .co m /. Asleap, from h ttp ://w w w .w illhackfo rsu shi.co m /A sleap.h tm l.

1996. 1997. 1998. 1999.

2000 . THC-LEAP Cracker, from http://w irelessdefence.org/Contents/T H C-LEA Pcracker.htm . 2001 . Airsnort, from http ://airsno rt.sh m o o .co m /. 2002 . Void 11, from h ttp ://w w w .w ire le s sd e fe n c e .o rg /C o n te n ts /V o id llM a in .h tm .
2003. Technitium M A C A ddress Changer (TMAC), from h ttp ://w w w .tech n itiu m .co m /tm a c/in de x.h tm l.

References Page 3041

Ethical Hacking and C ounterm easures Copyright by EC-COUIICil All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

M o d u le 16 : Hacking M o b ile Platfo rm s 2004. Delivering enterprise inform ation securely on A ndroid and A pple iOS devices, from http ://w w w .citrix.co m /site/reso u rces/dynam ic/ad dition al/iPad _T ech nical_G uide_ U S_W P .p df. Understanding the Security Changes in W ind ow s Phone 8, from http://w w w .m obilejaw .com /articles/2012/08/understanding-the-security-changes-in-w indow s-phone-

2005.

8 /.
2006. HOW TO HACK YOUR ANDROID PHONE, from http://w w w .m obilen you.in /2010/10/hack-your-androidphone.htm l. W ind ow s Phone 8, from h ttp ://en.w ikipe dia .o rg/w iki/W ind ow s_Pho ne _8. Delivering corporate data securely on em ployee iPads, from http ://resources.idgenterprise.com /original/A ST-0043716_iPad_Technical_G uide_U S_W P_2_.pdf. W orking guide to Root A ndroid Phones Easy w ith SuperOneClick, from http://fixlife.in/23/w orking-guideroot-android-devices-phones-easy-w ay-superoneclick. How to Hack Your A ndroid Phone (and W hy You Should Bother), from h ttp ://read w rite .co m /2 010 /01 /27/ho w _ to _h ack_ yo ur_an droid_ pho n e.

2007. 2008.

2009.

2010 .

2011 . N ew A ndroid Trojan M asquerades as G oogle Library, Taps Device A dm in istratio n API, from
http://w w w .n etqin.com /en /security/new sinfo_4595_2.htm l% 20.

2012 . Security Alert: New SM S A nd ro id Trojan -- DroidLive -- Being Disguised as a Google Library, from
http ://w w w .csc.ncsu.edu/faculty/jiang/D roidLive/. 2013. 2014. 2015. 2016. 2017. 2018. 2019. SuperOneClick, from http ://shortfuse.org/. Superboot, from h ttp ://w w w .m odaco.com /topic/348161-su perboot-galaxy-nexu s-root-solution/. Unrevoked, from http ://unrevoked .co m /reco very/. Universal A ndroot, from h ttp ://android .org.in/2012/08/universal-androot-root-an droid -in-5-sec/. Unlock Root, from http ://w w w .u n lo ckro o t.co m /p ro d u cts.h tm l. DroidSheep, from http ://dro id sheep.de. FaceNiff, from h ttp ://faceniff.po nury.net.

2020 . G oogle A pps Device Policy, from https://play.google.com . 2021 .


DroidSheep Guard, from http ://dro id sheep.de.

2022 . X-Ray, from http ://w w w .xray.io .


2023. 2024. 2025. 2026. 2027. 2028. 2029. 2030. 2031. 2032. 2033. 2034. 2035. A ndroid N etw ork Toolkit - Anti, from http ://w w w .zan tiapp .com . Find M y Phone, from http ://find m ypho n e.m ango b ird.co m . Prey Anti-Theft, from h ttp ://preyproject.com . And ro id Anti Theft Security, from http ://w w w .snuko.com . W heres M y Droid, from h ttp ://w h ere sm yd ro id.co m . iHound, from http s://w w w .iho u ndso ftw are.co m . GadgetTrak M o b ile Security, from http ://w w w .gadgettrak.com . Total Equipm ent Protection App, from http s://pro tection .sprint.co m . AndroidLost.com , from http ://w w w .and roidlo st.co m . RedsnOw, from http://blog.iphone-dev.org. Absinthe, from http://greenpoisO n.com . SnO w b reeze, from http ://w w w .id o w n lo a d b lo g .com /d o w n lo a d /. PwnageTool, from http://blog.iphone-dev.org.

References Page 3042

Ethical Hacking and C ounterm easures Copyright by EC-COUIICil All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

2036. 2037. 2038. 2039. 2040. 2041. 2042. 2043. 2044. 2045. 2046. 2047. 2048. 2049. 2050. 2051. 2052. 2053. 2054. 2055. 2056. 2057. 2058. 2059. 2060. 2061. 2062. 2063. 2064. 2065. 2066. 2067. 2068. 2069. 2070. 2071. 2072. 2073. 2074. 2075.

Lim eR a ln , from h ttp ://w w w .lim e ra ln .c o m . Jailbreakm e, from http ://w w w .jailb reakm e.com . B lackra ln , from h ttp ://b la ck ra ln .c o m . Spirit, from http ://spiritjb.com . Find M y iPhone , from http s://itun es.apple.com . iHound, from http s://w w w .iho u ndso ftw are.co m . GadgetTrak iOS Security, from http://w w w .gadgettrak.com . iLocalis, from http ://ilo calis.co m . M aaS360 M o b ile Device M anagem ent (M D M ), from http://w w w .m aas360.com . Citrix X e n M o b ile M D M , from http ://w w w .zenprise.co m . Absolute M anage M D M , from http ://w w w .ab so lute.co m . SAP A faria , from http://w w w .sybase.com . Device M anag em ent Centre, from http ://w w w .sicap .com . AirW atch, from http ://w w w .air-w atch.co m . Good M o b ile M a n a g e r, from h ttp ://w w w l.g o o d .c o m . M o b ilelro n , from http ://w w w .m o b ileiron .co m . Rule M o b ilit y , from http://w w w .tangoe.com . TARM AC, from http ://w w w .tarm ac-m d m .co m . M ediaC ontact, from http://w w w .device-m anagem ent-softw are.com . BullGuard M o b ile Security, from http ://w w w .b ullg uard .com . Lookout, from h ttp s://w w w .lo o ko ut.com . WISelD, from h ttp ://w w w .w iseid .m o b i. M cA fee M o b ile Security, from http s://w w w .m cafeem obilesecurity.com . AVG A ntiV irus Pro fo r A ndroid, from http://w w w .avg.com . avast! M o b ile S e c u rity , from http://w w w .avast.com . N orton M o b ile Security, from http ://us.norton.com . ESET M o b ile Security, from http ://w w w .eset.com . Kaspersky M o b ile Security, from http://w w w .kaspersky.com . F-Secure M o b ile S e c u rity , from http ://w w w .f-secure.com . Trend M icro M o b ile S ecu rity, from http ://w w w .tre n d m icro .co m . W e b ro o t Secure A nyw here M o b ile, from http ://w w w .w eb ro o t.co m . N etQ in M o b ile Security, from http ://en .n q.co m /m o b ilesecu rity/d ow n lo a d. AnDOSid, from http ://apps.op era.com /en _us/andosid .htm l. Com Droid, from h ttp ://w w w .co m d ro id.o rg /. W oodpecker, from http ://w w w .firm h o u se.co m /. iPhoneSim Free, from http ://w w w .iph on esim free.co m /. anySIM, from http s://code.google.eom /p /devteam -an ysim /dow nloads/list. M etasp loit, from h ttp ://w w w .m eta splo it.co m /. Cain & A b e l, from http ://w w w .o xid.it/cain .htm l. W indow Break, from h ttp ://w ind ow spho ne hacke r.co m /w ind o w b reak/.

References Page 3043

Ethical Hacking and C ounterm easures Copyright by EC-COUIICil All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

2076. 2077.

BBProxy, from http://w w w .Sym antec.com /security_response/w riteup.jsp?docid= 2006-081416-4756-99. Elcom soft Phone Password B re a k e r, from http ://w w w .e lco m soft.co m /epp b.h tm l.

M o d u le 17: Evading IDS, Firew alls, and H oneyPots 2078. Intrusion D etection System (IDS) Evasion, from http://com plianceandprivacy.com /W hitePapers/iD efense-ID SEvasion/i Defense_IDSEvasion_20060510.pdf. 2079. Evading NIDS, from http://w w w .bandw idthco.com /sf_w hitepapers/penetration/Evading% 20N ID S% 20R evisited.pdf. 2080. Intrusion detection system evasion techniques, from http ://en.w ikipedia.o rg/w iki/lntrusio n_ detectio n_system _evasio n_ techn iq ues. 2081. 2082. How to bypass a firew all, from http://w w w .b it.un i-b o nn.de/W o b/im ag es/4 969 224 3.pdf. W ired and w ireless intrusion detection system: Classifications, good characteristics and state-of-the-art, from http://w w w .scien cedirect.c0m /science/article/pii/S 092 054 89 050 009 8X . 2083. Insertion, Evasion, and Denial of Service: Eluding N etw ork Intrusion D etection, from http://w w w .w indow secu rity.com /w h itepap ers/intrusion_ detection/lnsertion _E vasion_ and_ D enial_of_S ervice_Eluding_N etw ork_lntrusion_D etection_.htm l. 2084. 2085. 2086. Sm artDefense, from h ttp ://w w w .scien cedirect.com /scien ce/article/p ii/B 9 781 59 749 245 400 007 6. How to configure Internet Explorer to use a proxy server, from http ://sup po rt.m icro so ft.co m /kb/135 982. Defeating Sniffers and Intrusion D etection Systems, from http://w w w .phrack.org/issues.htm l?issue= 54& id= 10. 2087. Techniques used fo r bypassing firew all systems, from http ://w w w .terena.org /activities/tfcsirt/m eeting9/gow diak-bypassing-firew alls.pdf. Firewalking, from http ://w w w .w eb o ped ia.eo m /T ER M /F/firew alking.htm l. IT Infrastructure Security Plan, from h ttp ://w w w .scien ce direct.com /scien ce/article/p ii/B 9 781 59 749 088 750 009 8. W hat is a firew all? from h ttp ://kb .iu.e du/d ata/aoru.htm l. Functionalities o f Firewalls, from http://w w w .cs.ucsb.edu/~ koc/ns/projects/04Reports/H e.pdf. Updating snort w ith a custom ized co n tro ller to thw art port scanning, from http ://w w w .a lo u l.n et/P a p ers/fa lou l_ scn lO .p d f. Firewalls, from http ://w w w .techrepu blic.c0 m /i/tr/d o w n lo a ds/ho m e /007 22 608 15_ ch a pter_ 9.pdf. Firewalking, from http ://w w w .w eb o ped ia.eo m /T ER M /F/firew alking.htm l. W hat is H oneyPot? from http ://w w w .securityh unk.co m /2 010 /06 /w hat-is-ho neypo t.htm l. Honeypots - D efinitions and Value o f H oneypots , from http://infosecw riters.com /texts.php?op= display& id= 80. How to Set Up a Honey Pot, from h ttp ://w w w .ehow .com /how _5 245 821 _set-up -honey-p ot.htm l. Snort 2.8.5.2 : Intrusion D etection Tool, from h ttp ://a sh w in tu m m a .file s.w o rd p re ss.co m /2 0 1 0 /ll/is_ sn o rt.p d f. W riting Snort Rules, from http://paginas.fe.up.pt/~ m gi98020/pgr/w riting_snort_rules.htm .

2088. 2089.

2090. 2091. 2092.

2093. 2094. 2095. 2096.

2097. 2098.

2099.

2100 . Insertion, Evasion, and Denial of Service:Eluding N etw ork Intrusion Detection, from
http://w w w .creangel.com /papers/Eluding% 20N etw ork% 20lntrusion% 20D etection.pdf.

2101 . Intrusion detection system evasion techniques, from


http ://e n .W ikipedia.org/w /index.php?title= lntrusion_detection_system _evasion_techniques& oldid= 311 670246.

References Page 3044

Ethical Hacking and C ounterm easures Copyright by EC-COUIICil All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

2102 .
2103.

Evading NIDS, revisited, from http ://w w w .sym antec.com /connect/articles/evading -nid s-revisited. How To Access Blocked / Bypass Blocked W ebsites, from http ://w w w .com putingunleash ed.com /how -toaccess-blocked.htm l. How do 1use a Proxy Server? from http ://w hatism yipaddress.com /using-proxies. How to configure Internet Explorer to use a proxy server, from http ://sup po rt.m icro so ft.co m /kb/135 982. Firewall Fairytales, from http://w w w .iqm tm .com /PD F_presentations/IQ _Firew all_Fairytales_June2010l.p d f.

2104. 2105. 2106.

2107. 2108.

Intrusion detection system s IDS, from http://w w w .geeksgate.com /blog/812.htm l. Defending Against N etw ork IDS Evasion, from http://w w w .raidsym posium .org/raid99/PAPERS/Paxson.pdf.

2109.

Sum it Siddharth, (2005), Evading NIDS, revisited, Available from h ttp ://w w w .securityfocus.com /infocus/185 2.

2110 . Alexis Lawrence, H o w to Set Up a Honey Pot, Available from http ://w w w .ehow .com /how _5245821_setup-honey-pot.htm l.

2111 . GHH, W h at is GHH?, A vailable from http://ghh.sourceforge.net/. 2112 .


2113. Phrack M agazine Volum e Seven, Issue Forty-N ine File 06 o f ..., from http://w w w .phrack.org/phrack/49/P49-06. Kasey Efaw, Installing Snort 2.8.5.2 on W indow s 7, http://w w w .sn0rt.0rg/assets/135/lnstalling_Sn0rt_2.8.5.2_0n_W ind0w s_7.pdf. (2006), Intrusion D etection System (IDS) Evasion, http://com plianceandprivacy.com /W hitePapers/iD efense-ID SEvasion/i Defense_IDSEvasion_20060510.pdf. 2115. Brian Caswell, W riting Snort Rules A quick guide, http ://w w w .shm oo.com /~ b m c/presentations/2004/honeynet/casw ell-w riting-snort-rules.pp t. 2116. U nblock Blocked W ebsites like M yspace, Bebo and Orkut, from http://w w w .clazh.com /unblock-blockedw ebsites-like-m yspace-bebo-and-orkut/. Firewalls, from http://hacker-dox.n et/Q ue-C ertified.E th ica l.H a cke r.E /0 7 8 9 7 3 5 3 1 8 /ch l0 lev lsec5 .h tm l. Firewall Basics, http ://w w w .u nixgeeks.o rg /security/n ew bie/secu rity/firew all.htm l. Honeypots, from http://w w w .infosecw riters.com /texts.php?op= display& id= 80. Dale Farris, (2005), H oneypots fo r W indow s, from http ://w w w .g tp cc.org /gtpcc/honeyp otsforw in dow s.h tm . M ike Neum an, (1995), Bugtraq: AN NOUNCE: Freely available TTY m onitoring/control program, from http://seclists.org/bugtraq/1995/Jun/0049.htm l.

2114.

2117. 2118. 2119.

2120 . 2121 .

2122 . W eb A pp licatio n Attacks, [PDF] Guide, from w w w .netpro tect.ch/d o w n lo a ds/w ebg uide.pd f.
2123. David Endler & M ichael Sutton, [PPT] iDEFENSE Labs, from w w w .blackhat.com /presentations/bh-usa-

02 /endler/bh-us-02-endler-brute.ppt.
2124. Intrusion detection, from http ://w w w .n etw o rkw o rld .co m /lin ks/D o w n lo a d s/S ecu rity/ln tru sio n _d ete ctio n /. Tony Bradley, Free Intrusion D etection (IDS) and Prevention (IPS) Softw are, from http://netsecurity.ab 0 ut.c 0 m / 0 d /in tru si 0 n d ete cti 0 n id l/a /a a fre e id s .h tm . AIDE, from h ttp ://w w w .cryp to m ancer.de/pro gram m e/aide-en.htm l. The Evolution o f Intrusion D etection System, from w w w .secutityfocu s.co m /info cus. Navy Inform ation Assurance W ebsite, from https:/.. ./ps/?t=infosecprodsservices/infosecprodsservices.tag&bc= /infosecprodsservices/bc_ids.htnnl.

2125.

2126. 2127. 2128.

References Page 3045

Ethical Hacking and C ounterm easures Copyright by EC-COUIICil All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

2129. 2130.

Firewalking, from h ttp ://w w w .w eb o ped ia.eo m /T ER M /F/firew alking.htm l. Vinay, (2009), How to Bypass Firew alls Restrictions using Proxy Servers, from http://w w w .ihackintosh.com /2009/03/how -to-bypass-firew alls-restrictions-using-proxy-servers/. Adam Gow diak, (2003), Firew all A ttack Techniques, from http ://w w w .terena.org /activities/tfcsirt/m eeting9/gow diak-bypassing-firew alls.pdf.

2131.

2132.

How to bypass the firew all (Bypassing from external sources and M ITM attacks), from w w w .b-itcenter.de/W ob/im ages/81134082.ppt.

2133. 2134.

Bypassing Firew alls, h ttp ://fly lib .e o m /b o o k s /e n /3 .5 0 0 .l.9 5 /l/. Intrusion detection system - EnterpriseN etw orkingPlanet, from http ://netw o rking .w eb op ed ia.eo m /T ER M /l/in trusio n_d etectio n_system .htm l. An Introduction to IDS, from w w w .securityfo cu s.co m /in fo cus/. N etw ork security, from w w w .njcpu.net/secu rity.htm . Hacking Through IDSs, from w w w .airscann er.co m /p ubs/id s.pd f. INTRUSION DETECTION -BISS Forums, from w w w .bluetack.co.uk/forum s/ind ex.php 7sh ow topic. iSecurityShop, from w w w .isecuritysho p.com /. Enterasys Dragon Host Sensor, from w w w .enterasys.com /products/ids/D SH SS-xxx/. M Johnson, Vanguard Security Solutions - Vanguard Integrity Professionals, from w w w .go2vanguard.com /softw are. Thom as H. Ptacek, Insertion, Evasion and Denial o f Service: Eluding N etw ork Intrusion Detection, from w w w .insecure.org/stf/secnet_ids/secn et_ids.pdf. Insertion, Evasion, and Denial o f Service,from w w w .sno rt.o rg /do cs/id sp ap er/. Evading Intrusion D etection, from w w w .tux.o rg/p ub/tux/storm /id s-sim p le.d oc. IDS: Re: Polym orphic Shellcode detection, from sedists.org/lists/focus-id s/20 03 /M ay/001 9. Hardw are Firewalls, from http ://cyb ercoyote.org /secu rity/hard w are.shtm l. Circuit-Level Gateway, from w w w .so fth eap.com /internet/circuit-level-gatew ay.htm l. Vicom soft Firew all Q&A, from w w w .vico m so ft.co m /k n o w le d g e /re fe re n ce /fire w a llsl.h tm l. Statoo.htm : som e sim ple stalking tools, from w w w .searchlores.org/statoo.htm . van Hauser, Placing Backdoors Through Firewalls, from w w w .thc.segfault.net/dow nload.php?t= p& f= fw backd.htm.

2135. 2136. 2137. 2138. 2139. 2140. 2141.

2142.

2143. 2144. 2145. 2146. 2147. 2148. 2149. 2150.

2151. 2152.

J. Christian Smith, (2000), Introduction, w w w .gray-w orld .n et/p apers/covertshells.txt. BSD Search.Com - A pplications: N etw orking, from w w w .bsdse arch.com /dir//app licatio ns/netw o rking .p hp.

2153. 2154. 2155.

Peter Kieltyka, ICMP Shell, from icm pshell.sourceforge.net/. M easuring Security Threats w ith Honeypot, from w w w .ho neynet.o rg/p apers/in dividual/sane-20 04. Lance Spitzner, (2003), Open Source Honeypots: Learning w ith Honeyd, from w w w .securityfocu s.com /in focus/16 59. H oneypot Software, H oneypot Products, D eception Softw are, from w w w .h o n eypo ts.n et/h o n eypo ts/p ro d u cts. M easuring Security Threats w ith H oneypot Technology, from w w w .ho neynet.o rg/p apers/in dividual/sane-20 04.

2156.

2157.

2158.

Know Your Enemy: Sebek, from w w w .honeynet.org/p apers/seb ek.p df.

References Page 3046

Ethical Hacking and C ounterm easures Copyright by EC-COUIICil All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

2159.

Intrusion D etection System (IDS) Evasion, from http://com plianceandprivacy.com /W hitePapers/iD efense-ID SEvasion/i Defense_IDSEvasion_20060510.pdf.

2160. 2161.

Intrusion D etection/Prevention, from http ://w w w .p ro tectp o int.co m /services_intrusio nd ete ctio n .htm . Intrusion D etection Systems, from h ttp ://w w w .cra.o rg/A ctivities/craw /dm p/aw ard s/200 3/T an /research/rules.htm l. M anaged Security Services- Intrusion D etection Programs, from http ://w w w .g us.net/ln trusio n_D ectectio n.htm . Nick DeClario, Keep O u t : Host Intrusion D etection, from http ://w w w .lin uxse curity.co m /co nte nt/view /112 85 2/15 1/. Yona Hollander, The Future o f W eb Server Security, from h ttp ://w w w .m cafe e.co m /us/lo cal_co ntent/w hite_ pap ers/w p_ fu ture.pd f.

2162.

2163.

2164.

2165. 2166. 2167.

U nauthorized rem ote users can read IIS files, from http://xforce.iss.net/xforce/xfdb/2663. Jan M eijer, M u ltip le M icro so ft IIS V u lnerabilities, from http://cert-nl.surfnet.nI/s/2000/S-00-35.htm . Autom ated W eb Interface Scans IIS fo r M u ltip le V u lnerabilities, from http ://w w w .ciac.org /ciac/b ulletins/k-068.shtm l. M ark Burnett, (2001), Running Snort on IIS W eb Servers Part 2: Advanced Techniques, from http ://w w w .securityfocus.com /infocus/131 6. Spanish H oneypot Project, from http ://w w w .h on eynet.org .es/p roject/. Lance Spitzner, 2003, Honeypots, from http://w w w .ip97.com /trackinghackers.com /papers/honeypots.htm l. A V irtual H oneypot Fram ework, from h ttp ://w w w .citi.u m ich .e d u /te ch re p o rts/re p o rts/citi-tr-0 3 -l.p d f. W hat is SPECTER, from http ://w w w .specter.ch/intro du ction 50.shtm l. Shaheem M o tlekar, (2004), H oneypot FAQ, from http ://w w w .tracking-h ackers.com /m isc/faq .htm l. Honeytokens: The O ther Honeypot, from http ://w w w .securityfocus.com /infocus/171 3. van Hauser, Placing Backdoors Through Firewalls, from http://w w w .securitym ap.net/sd m /d ocs/attack/fw -b ackd .htm .

2168.

2169. 2170.

2171. 2172. 2173. 2174. 2175.

2176.

Placing Backdoors Through Firewalls, from http ://w w w .w indow secu rity.com /w h itepap ers/Placin g_B ackd oors_Throug h_Firew alls.htm l.

2177.

Honeypots: Three new tools related to IDS, forensics, honeypots, from h ttp ://seclists.org /honeyp ots/2003/q 2/0279.htm l. N etw ork Intrusion D etection Using Snort, from http ://w w w .lin uxse curity.co m /co nte nt/view /117 49 7/49 /. Intrusion D etection, from http://w w w .ctssg.com /ids_p.htm . INTRUSION DETECTION, from http://w w w .pafis.shh.fi/~ tantit01/isac2002/ce03/passw ord.htm l. Paul Innella, 2001, An Introduction to IDS, from h ttp ://w w w .securityfocus.com /infocus/152 0. Ricky M. M agalhaes, (2003), Host-Based IDS vs N etw ork-Based IDS, from http://w w w .w indo w secu rity.co m /articles/H id s_vs_ N id s_P art2.h tm l. Intrusion detection system, from http ://w w w .w eb o ped ia.eo m /T ER M /l/intrusio n_ detectio n_syste m .h tm l. Paul Innella, 2001, The Evolution o f Intrusion D etection Systems, from h ttp ://w w w .securityfocus.com /infocus/151 4. Host, from http://lists.d eb ian.org /.

2178.

2179. 2180. 2181. 2182.

2183.

2184.

2185.

References Page 3047

Ethical Hacking and C ounterm easures Copyright by EC-COUIICil All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

2186.

Spam m ers use W ord files to bypass filters, from http ://w w w .zdnet.com .aU /new s/security/soa/Spam m ers_use_W ord_files_to_bypass_filters/0,1300617 44,139267487,OO.htm.

2187. 2188. 2189. 2190.

Know Your Enemy: Sebek, from http ://w w w .h on eynet.org /pap ers/sebek.pd f. Honeyd - N etw ork Rhapsody fo r You, from h ttp ://w w w .citi.um ich.edU /u/pro vo s/ho neyd /. SPECTER Introduction, from http ://w w w .specter.ch/intro du ction 50.shtm l. M easuring Security Threats w ith H oneypot Technology, from http://w w w .h on eynet.org /pap ers/ind ivid ual/sane-200 4.pdf. Lance Spitzner, (2003), SecurityFocus: H oneytokens -The O ther Honeypot, from http ://w w w .securityfocus.com /infocus/171 3. Andrea Barisani, vol5issue6, from h ttp ://w w w .tisc-in sig ht.co m /n ew sletters/5 6.h tm l. Peter Kieltyka, (2006), ICMP Shell, from http ://icm p shell.sou rceforge.net/. ntsecurity.nu - ack tunneling, from http ://ntsecurity.nu/p apers/acktunneling/. SecuriTeam - ACK Tunneling Trojans, from http ://w w w .securiteam .com /secu rityreview s/5O P0P156A E .htm l. Placing Backdoors Through Firewalls, from http ://w w w .thc.segfault.net/p apers/fw -b ackd .htm . M ike, Firewalk, from w w w .blackhat.com /presentations/bh-usa-99/R oute/bh-us-99-schiffm an.ppt. Hardw are Firewalls, from http ://cyb ercoyote.org /secu rity/hard w are.shtm l. Evading Intrusion D etection, from w w w .tux.o rg/p ub/tux/storm /id s-sim p le.d oc.

2191.

2192. 2193. 2194. 2195.

2196. 2197. 2198. 2199.

2200 . Insertion, Evasion, and Denial o f Service, from http ://w w w .sno rt.o rg/do cs/idspap er/. 2201 . Securing IT Assets w ith Linux, from w w w .bass-inc.com /p resen tations/arp 21_2004/linuxsecurity.pp t. 2202 .
2203. Linux Security Q uick Reference Guide, from http://w w w .tldp.org/R EF/ls_quickref/Q uickR efC ard.pdf. Vanguard Security Solutions - Vanguard Integrity Professionals, from http://w w w .g o2vanguard .com /softw are/. 2204. 2205. 2206. 2207. 2208. 2209. iSecurityShop, from http ://w w w .isecu ritysh op .co m /. Going on the Defensive: Intrusion D etection Systems, from http ://w w w .airscanner.com /pub s/ids.p df. N etw ork Security, from http://w w w .n jcp u.net/security.htm . Tipping Point, from h ttp ://h l0 1 6 3 .w w w l.h p .c o m . Security N etw ork Intrusion Prevention System, from http ://w w w -01 .ibm .co m . Enterprise, from http ://w w w .tripw ire.com /it-security-softw are/security-configu rationm anagem ent/file-integrity-m onitoring/.

2210 . Specter, from h ttp ://w w w .specter.co m /d efault50 .htm . 2211 . 2212 .
2213. 2214. 2215. 2216. 2217. 2218. 2219. Honeyd, from http ://w w w .h on eyd.o rg/. KFSensor, from h ttp ://w w w .keyfo cus.net/kfsensor/. Sym antec Decoy Server, from h ttp ://w w w .sym antec.com /p ress/2003/n030623b .htm l. Tiny Honeypot, from h ttp ://free co d e.co m /pro jects/th p. LaBrea, from http ://lab rea.so urcefo rge.net/lab rea-in fo .htm l. PatriotBox, from http://w w w .alkasis.com /?action= products& pid= 6. Kojoney, from http://kojoney.sourceforg e.n et/. HoneyBOT, from h ttp ://w w w .a to m icso ftw a reso lu tio n s.co m /h o n e yb o t.ph p. G oogle Hack Honeypot, from http://ghh.sourceforge.net/.

References Page 3048

Ethical Hacking and C ounterm easures Copyright by EC-COUIICil All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

2220 . W inH oneyd, from h ttp ://w w w 2.netvigilan ce.co m /w inho neyd. 2221 .
HI HAT, from h ttp ://hih at.so urcefo rg e.n et/.

2222 . Argos, from http://w w w .few .vu.nl/argos/?page= 2.


2223. 2224. 2225. Glastopf, from http ://glastop f.org/. Send-Safe H oneypot Hunter, from http ://w w w .send -safe.com /honeyp ot-hu nter.htm l. IBM Security N etw ork Intrusion Prevention System, from http://w w w -

01 .ibm .co m /so ftw are/tivo li/pro du cts/security-netw o rk-in trusio n-p reven tio n/.
2226. 2227. 2228. 2229. Peek & Spy, from http://netw orkingdynam ics.com /peek-spy/peekspy/. INTOUCH INSA-Netw ork Security Agent, from h ttp ://w w w .ttin e t.co m /d o c/in sa _ v l5 _ 0 2 5 .h tm l. Strata Guard, from h ttp ://w w w .stillsecu re.co m /stratag uard. IDP8200 Intrusion D etection and Prevention Appliances, from http s://w w w .juniper.net/in/en/p rod uctsservices/security/idp-series/idp8200/. 2230. 2231. OSSEC, from http://w w w .ossec.net/?page_id= 19. Cisco Intrusion Prevention Systems, from http ://w w w .cisco.com /en/U S/products/ps5729/Produ cts_Sub_C ategory_H om e.htm l. 2232. 2233. 2234. 2235. AIDE (Advanced Intrusion D etection Environm ent), from http ://aid e.sourceforge.net/. SNARE (System iN trusion Analysis & Reporting Environm ent), from h ttp ://w w w .intersectalliance.com /. Vanguard Enforcer, from http://w w w .go2vanguard.com /en forcer.php. Check Point Threat Prevention Appliance, from h ttp ://w w w .checkp oint.co m /p ro d ucts/th reatprevention-appliances/. 2236. 2237. fragroute, from http://w w w .m onkey.org/~ dugsong/fragroute/. N ext-G eneration Intrusion Prevention System (NGIPS), from http://w w w .sourcefire.com /securitytechno lo gies/netw ork-security/next-generation-intrusion-prevention-system . O utpost N etw ork Security, from http ://w w w .ag nitum .co m /p ro d ucts/netw orksecurity/index.p hp. Check Point IPS-1, from h ttp ://w w w .ch e ck p o in t.co m /p ro d u cts/ip s-l/. FortiGate, from http ://w w w .fo rtin et.co m /so lu tion s/ip s.h tm l. Enterasys Intrusion Prevention System, from http://w w w .enterasys.com /products/advanced-securityapps/dragon-intrusion-detection-protection.aspx. StoneG ate Virtual IPS Appliance, from h ttp ://w w w .sto neso ft.com /en/pro ducts/ap pliances/virtu alips.html. Cyberoam Intrusion Prevention System, from http ://w w w .cybero am .com /ips.htm l. M cA fee Host Intrusion Prevention fo r Desktops, from http://w w w .m cafee.com /us/products/host-ips-fordesktop, aspx. ZoneAlarm PRO Firewall, from http ://w w w .zonealarm .com /security/en-us/zonealarm -pro-firew all-antispyw are.htm . Check Point Firewall Softw are Blade, from h ttp ://w w w .checkp oint.co m /p ro d ucts/firew all-so ftw areblade/index.htm l. 2247. eScan Enterprise Edition, from http://w w w .escanav.com /english/content/products/corp_enterp rise/escan_ enterp rise.asp. Jetico Personal Firew all, from http ://w w w .je tico .co m /firew all-je tico-perso nal-firew all/. O utpost Security Suite, from http://free.agnitum .eom /# . Novell BorderM anager, from h ttp ://w w w .n ovell.co m /p ro d ucts/bo rderm a n ag er/.

2238. 2239. 2240. 2241.

2242.

2243. 2244.

2245.

2246.

2248. 2249. 2250.

References Page 3049

Ethical Hacking and C ounterm easures Copyright by EC-COUIICil All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

2251. 2252.

Firewall UTM , from http ://w w w .esoft.com /netw ork-secu rity-ap pliances/instagate/. Sonicwall, from http ://w w w .tribecaexpress.com /products/by-m anufacturers/sonicw all-firew allsprice.htm . Com odo Firew all, from h ttp ://perso n a lfirew a ll.co m o do .co m /. Online Arm or, from http ://w w w .o nline-arm o r.co m /p ro d ucts-o nline-arm or-free.php. FortiGate-5101C, from http ://w w w .fo rtinet.co m /p ress_releases/120 22 7.h tm l. proxify, from http ://pro xify.co m . spysurfing, from http://w w w .spysurfing.com . alienproxy, from http ://alienp ro xy.co m . zendproxy, from http ://zend proxy.com /. anonym ouse, from http ://anonym ouse.org. anonym izer, from h ttp ://w w w .ano n ym izer.co m . w ebproxyserver, from h ttp ://w w w .w eb pro xyserver.net/. boom proxy, from http ://w w w .b o om pro xy.co m /. Loki ICMP tunneling, from h ttp ://w w w .iss.net/security_ center/referen ce/vuln /Lo ki.htm . AckCm d, from http ://n tsecu rity.n u /to o lb o x/a ckcm d/. HTTPTunnel, from http ://w w w .n ocrew .o rg /so ftw a re/h ttp tu n n el.h tm l. Send-Safe H oneypot Hunter, from http ://w w w .send -safe.com /honeyp ot-hu nter.htm l. Traffic IQ Professional, from h ttp ://w w w .ida p pco m .co m /do w n lo a ds.ph p. tcp-over-dns, from http ://analo g bit.co m /so ftw are/tcp-o ver-dn s. Snare Agent fo r W indow s, from http ://w w w .intersectalliance.com /projects/B ackLogN T/. AckCm d, from http ://n tsecu rity.n u /to o lb o x/a ckcm d/. Tom ahaw k, from http ://to m ah aw k.so urceforg e.net/. Your Freedom , from h ttp ://w w w .your-freedom .net/index.p hp?id= dow nload s. A te lier W eb Firewall Tester, from http ://w w w .a telierw eb .co m /p ro d u cts/firew a ll-tester/. Freenet, from h ttp s://freenetpro ject.o rg/. GTunnel, from http ://garden netw o rks.o rg/d o w nlo ad. H otspot Shield, from http://w w w .anch orfree.co m /ho tspo t-shield-V PN -do w nlo ad-w in do w s.php. Proxifier, from http ://w w w .p ro xifier.co m /. Vpn One Click, from http ://w w w .vpn o neclick.co m /d ow nlo a d/ind ex.htm l. M u lti-G en era to r (M GEN), from http://cs.itd .nrl.navy.m il/w ork/m g en/ind ex.p hp. N et-lnspect, from http ://search.cpan.org/~ sullr/N et-lnspect/lib/N et/lnspect/L3/IP.pm . NConvert, from h ttp ://w w w .xnvie w .co m /en/nco nvert/. fping 3, from http ://fping.o rg /. pktgen, from http ://w w w .lin uxfo und a tio n.o rg/co lla b o ra te/w o rkg ro up s/n etw o rking/pktg en. PacketM aker, from http ://w w w .jdsu.com /en-us/T est-and-M easurem ent/Products/a-z-productlist/Pages/packetm aker-sas-sata-tester.aspx.

2253. 2254. 2255. 2256. 2257. 2258. 2259. 2260. 2261. 2262. 2263. 2264. 2265. 2266. 2267. 2268. 2269. 2270. 2271. 2272. 2273. 2274. 2275. 2276. 2277. 2278. 2279. 2280. 2281. 2282. 2283. 2284. 2285.

M o d u le 18: B u ffer O v e rflo w 2286. Understanding Buffer Overruns, from http://uk.sys-con.com /node/33998.

References Page 3050

Ethical Hacking and C ounterm easures Copyright by EC-COUIICil All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

2287. 2288. 2289. 2290.

Exploits: Heap, from http://w w w .scien cedirect.co m /scien ce/article/p ii/B 9 781 59 749 997 250 006 6. Exploits: Stack, from http ://w w w .scien ce direct.co m /scien ce/a rtide/p ii/B 978 159 749 997 250 005 4. W riting Exploits II, from http://w w w .scien cedirect.co m /scien ce/article/p ii/B 9 781 59 749 997 250 009 1. Hacking Unix, from http ://m edia.techtarget.com /searchEnterpriseLinux/dow nloads/H acking_Exp_ch7.pdf.

2291. 2292. 2293.

Testing fo r Stack O verflow , from https://w w w .ow asp.org/index.php/T esting_for_Stack_O verflow . Heap Corruption, from http ://w w w .scien cedirect.com /scien ce/article/p ii/B 9 781 93 226 667 250 046 3. Buffer O verflow A tta cks-D etect, Exploit, Prevent, from http ://new ark.pardey.org/deck/book/bu ffer_ overflow _ attacks.pd f. Hack Proofing Your N etw ork-8, from h ttp ://fo ru m .s lim e .co m .tw /th re a d ll7 2 5 4 .h tm l. Statically Detecting Likely Buffer O verflow V ulnerabilities, from http ://lclint.cs.virginia.edu/usenix01.htm l.

2294. 2295.

2296. 2297.

Buffer O verflow - OW ASP, from w w w .o w asp.org /in dex.php /B u ffer_ O verflo w . NedSecure Solutions - Toelichting aanvalstechnieken, from w w w .ned secu re .n l/in d ex.ph p ?o p tio n = co m _ con ten t& task= view & id= lll& ltem id = 44 & la n g = . Tony Bradley, Zero Day Exploits: The Holy Grail, from http://netsecurity.ab 0 ut.c 0 m / 0 d /new sand ed it 0 ria ll/a /a a z e r 0 day.htrn.

2298.

2299.

FW SM URL Filtering Solution TCP ACL Bypass V u lnerab ility [Products ..., from w w w .cisco.com /en/U S /products/products_secu rity_advisory09186a0080464d00.shtm l.

2300.

Roger G ustavsson, (2006), Buffer overflow , from http://idenet.bth.se/servlet/dow nload/new s/23644/G ustavsson+ -+ Buffer+ O verflow s.pdf. Stack Sm ashing Defense: A Buffer O verflo w Lab Exercise, from http ://cisa.um bc.edu/CD X /W ill/stack_sm ash_proposal.pdf. US-CERT V u ln e ra b ility N ote VU#726198, from http ://w w w .kb.cert.org/vu ls/id /72 619 8. David Litchfield, W ind ow s Heap O verflow s, w w w .blackhat.com /presentations/w in.../bh-w in-04litchfield.ppt. Ronnie Johndas, Steps Involved in Exploiting a Buffer O verflow V u ln e ra b ility using a SEH Handler, http ://w w w .infosecw riters.com /text_resources/pdf/R Johndas_Buffer_O verflow _SEH _H andler.pdf. M icro so ft Index Server ISAPI Extension Buffer O verflow , from http://w w w .ciac.org /ciac/b ulletins/l098.shtm l. M ehdi M ousavi, W hat an ISAPI extension is?, from http://w w w .codeproject.com /KB/ISAPI/isapi_extensions.aspx.

2301.

2302. 2303.

2304.

2305.

2306.

2307. 2308.

Fireproofing A gainst DoS Attacks, from http ://w w w .n etw o rkco m p uting .co m /1 225 /12 25f3 8.h tm l. Unchecked Buffer in ISAPI Extension Enables Rem ote Com prom ise o f IIS 5.0 Server, from http://w w w .securiteam .com /w ind ow sntfocu s/5C P010 K 4A K .htm l. Heap Overrun in HTR Chunked Encoding Could Enable W eb Server C om prom ise, from h ttp ://w w w .securitea m .com /w ind o w sntfo cu s/5IP0 C lP 7FC .htm l. Unchecked Buffer in Index Server ISAPI Extension Leads to W eb Server C om prom ise, from http://w w w .securiteam .com /w ind ow sntfocu s/5FP0B 2K 4 K U .htm l.

2309.

2310.

2311. 2312.

Testing fo r Heap O verflow , from http ://w w w .ow asp.org/index.php/Testing_for_H eap_O verflow . Tom Chm ielarski, (2010), Enhanced M itigatio n Experience Toolkit reduces buffer overflow attacks, from http ://searchm idm arketsecurity.techtarg et.co m /tip /0 ,289483, s id l9 8 _ g c il5 2 0 9 0 6 ,00. htm l. A D M m utate , from http ://w w w .ktw o .ca/security.htm l. GDB, from http ://w w w .g nu.org /softw are/g db /.

2313. 2314.

References Page 3051

Ethical Hacking and C ounterm easures Copyright by EC-COUIICil All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

2315. 2316. 2317. 2318. 2319. 2320. 2321. 2322. 2323. 2324. 2325. 2326. 2327. 2328. 2329. 2330. 2331. 2332. 2333.

Netcat, from h ttp ://netcat.so urcefo rge.net/d o w nlo ad.php. LCLint, from http ://w w w .lin uxjo urnal.co m /article /35 99. Code::Blocks, from http ://w w w .codeblocks.org /. eEye Retina, from h ttp ://w w w .eeye.co m /. Spike, from http ://spike.lazypics.de/dl_index_en.htm l. Brute Force Binary Tester (BFB), from http ://bfbtester.so urceforge.net/. Immunity CANVAS, from http://w w w .im m unityin c.com /p rod ucts-can vas.shtm l. Immunity Debugger, from http ://w w w .im m unityin c.co m /p ro d ucts-im m db g.shtm l. Splint, from http ://w w w .splin t.o rg/do w n lo a d .h tm l. Flaw finder, from http ://w w w .d w h eeler.co m /fla w fin d er/. BLAST, from http ://m tc.epfl.ch/so ftw are-too ls/b last/ind ex-epfl.ph p. Stack Shield, from http ://w w w .ang elfire.co m /sk/stackshield /do w nlo ad.htm l. Valgrind, from http ://valgrin d.org /do w nload s/current.htm l. PolySpace C V erifier, from h ttp ://w w w .m athw o rks.in/p ro d ucts/po lyspace/. Insure++, from http ://w w w .parasoft.com /jsp/products/insure.jsp?item ld= 63. /GS, from h ttp ://m icro so ft.co m . BufferShield, from http ://w w w .sys-m anage.com /PR 0D U CT S/BufferShield/tabid/61/D efault.aspx. DefenseW all, from h ttp ://w w w .so ftsp here.co m /o nline -help/d efencep lu s/. TIED, from h ttp ://w w w .security.iitk.ac.in /in dex.ph p?pag e= co ntents/p ro jects/tie dJib safe/tied_ libsafe plus.

2334.

LibsafePlus, from http://w w w .security.iitk.ac.in /in dex.ph p?page= contents/projects/tied_libsafe/tied_libsafeplus.

2335. 2336. 2337. 2338. 2339.

Com odo M e m o ry Firewall, from http ://w w w .com od o.com /new s/press_releases/1 6_0 1_0 8.htm l. Clang Static Analyzer, from http://clang-analyzer.llvm .org/. FireFuzzer, from https://c 0 de.g 00 gle.c 0 m /p /fire fu zzer/. BOON, from http://w w w .cs.berkeley.edu/~ daw /boon/. The Enhanced M itigatio n Experience Toolkit, from http ://w w w .m icrosoft.com /enus/dow nload/details.aspx?id= 29851. CodeSonar Static Analysis Tool, from http ://w w w .g ram m atech.co m /co d eso nar. CORE IMPACT Pro, from h ttp ://w w w .co resecu rity.co m /co re-im p act-p ro .

2340. 2341.

M o d u le 19: Cryp tog rap hy 2342. 2343. 2344. 2345. 2346. M D 5 - message digest (fingerprint, ch e ck su m ), from http ://w w w .akadia.com /services/m d 5.h tm l. W eb App Security, from http://w w w .hackerscenter.com /archive/view .asp?id= 25264. Cryptography, from http ://w w w .crcnetbase.com /doi/abs/10.1201/9780203507872.ch6. Integrated Technologies, from http://w w w .crcnetbase.com /doi/abs/10.1201/9780203330708.ch8. Cracking S/M IM E encryption using idle CPU tim e, from h ttp ://w w w .securiteam .com /tools/3J5PR Q 0PPQ .htm l. Check Point RealSecure A ttack Signatures Glossary, from http://w w w .checkp oint.co m /supp o rt/technical/d o cu m ents/realsecu re/A ttack_S ig natures.p df. 2348. M a rk J Cox, from http://w w w .aw e.com /m ark/talks/ap ach econ200 3us.htm l.

2347.

References Page 3052

Ethical Hacking and C ounterm easures Copyright by EC-COUIICil All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

2349.

(2001), Announcing the ADVAN CED ENCRYPTION STANDARD (AES), h ttp ://csrc.n ist.go v/p u blica tio n s/fip s/fipsl9 7/fips-197 .p df.

2350.

MICHAEL W ELSCHENBACH, Cryptography in C and C++, Second Edition, apress.com /book/view /1590595025.

2351.

Rolf O ppliger, (2005), Contem porary Cryptography, http ://w w w .free-e bo o k-do w nload .ne t/technical book/8574-contem porary-cryptography.htm l. R. F. Churchhouse, (2001), Codes and ciphers (Julius Caesar, the Enigma and the internet), http://ebookee.org/Codes-and-Ciphers-Julius-Caesar-the-Enigm a-and-the-lnternet_128588.htm l. John Talbot and D om inic W elsh, (2006), Com plexity and Cryptography an introduction, http ://w w w .ca m b rid g e.o rg /g b /kn o w led g e/isb n /ite m ll7 2 8 7 5 /?site_ lo ca le= en _ G B . BRUCE SCHNEIER, Applied Cryptography, Second Edition, http ://w w w .schneier.co m /b o ok-ap plie d.h tm l. JAM ES BAM FORD , (2002), Body o f Secrets, http://sandiego.indym edia.org/m edia/2007/02/125027.pdf. T. W. Korner, (1998), Coding and Cryptography, http://w w w .dpm m s.cam .ac.uk/~ tw k/. Kenneth W. Dam and H erbert S. Lin, (1996), Cryptography's Role In Securing The Inform ation Society, http://w w w .com m s.scitech.susx.ac.uk/fft/crypto/cryptorole.pdf.

2352.

2353.

2354. 2355. 2356. 2357.

2358.

Peter G utm ann, Cryptography and Data Security, h ttp ://w w w .co m m s.scitech.susx.a c.uk/fft/cryp to /C rypto T uto ria l/pa rtl.p df.

2359. 2360. 2361.

D ocum entation and Encryption, from h ttp ://w w w .lin u xse cu rity.co m /co n te n t/view /17/70/. Josh Ryder, Introduction to Encryption, from http ://w w w .d evelo p er.co m /tech/article .ph p/6 306 81. Authenticatio n Technologies, from h ttp ://w w w .techarch.state.ar.u s/d om ain s/security/resources/techlist.h tm .

2362.

Jari Arkko, Vesa Torvinen, Aki Niem i, (2002), HTTP A uthenticatio n w ith EAP, from http ://w w w .arkko.com /pu blications/draft-torvinen-h ttp-eap -01 .txt. Ralf Junker, Functions and Procedures: Basic A uthentication, from h ttp ://w w w .ze itung sjung e.de/d elphi/m im e /H elp/D IM im e.htm . A uthentication, A uthorization, and Access Control, from httpd.apache.org/docs. John Franks, (1999), HTTP Authentication: Basic and Digest Access A uthentication, from http ://w w w .ietf.o rg /rfc/rfc26 17.txt. Jeff Kercher, Edward Jezierski, (2001), A uthenticatio n in ASP.NET: .NET Security Guidance, from http ://m sd n.m icro so ft.com /lib rary/default. asp ?url= /library/en-us/dnbda/htm l/authaspdotnet. asp. Digital Certificates, from w w w .bitp ip e.co m /tlist/D ig ita l-C ertifica te s.h tm l. Vijay Bollapragada, IPSec A uthenticatio n and A utho rizatio n M odels, from w w w .ciscopress.com /articles/article.asp?p= 421514& seqN um = 4 - 31k -. Certificate-based A uthentication, from http ://w w w .m icro so ft.com /technet/se cu rity/B u lletin/M S02 048.mspx. Abel Banda, (2003), Form s-based A uthentication, from w w w .o n d o tn e t.co m /p u b /a /d o tn e t/2 0 0 3 /0 1 /0 6 /fo rm sa u th p l.h tm l.

2363.

2364. 2365.

2366.

2367. 2368.

2369.

2370.

2371. 2372. 2373. 2374.

Kimon Rethis Biom etrics A uthentication, from w w w .csun.edu. Fingerprint-based Identification, from w w w .barcod e.ro /tutorials/bio m etrics/fing erp rint.htm l M ichael Anissim ov, Retina Scanning, from w w w .w isegeek.com /how -does-a-retinal-scan-w ork.htm . Afghan W om an Recognized A fte r 17 Years, from http://w w w .ct.gov/dss/cw p/view .asp?a= 2349& q= 304748. Bill Gates at the RSA Conference 2006, from http ://w w w .m icro so ft.com /billg ates/sp eeches.

2375.

References Page 3053

Ethical Hacking and C ounterm easures Copyright by EC-COUIICil All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

2376.

Security A w areness is Rising w hile Security Protections are falling, from w w w .m io ra.co m /articles/aw aren ess.htm .

2377.

Soum yadip Rakshit, Biom etric access control, from http ://w w w .jiskha.co m /science/b io lo gy/bio m etrics.htm l.

2378.

Prof. A u sif M ahm o o d RSA (Rivest, Shamir, and Adlem an), from w w w .bridgeport.edu/sed/projects/cs597/Spring_2004/sbh um ana/index.htm . BlowFish, from w w w .a n sw ers.com /top ic/b lo w fish . Algorithm s and Security, from w w w .tcuco nnect.co m /help/faq _secu rity.asp. SHA (Secure Hash Algorithm ), from http ://w w w .safeexim .safescrypt.com /SafeD oX X _U ser_M anual.pdf. Christopher A llen, Tim Dierks, SSL Handshake Protocol Flow, from https://w w w .ipa.go.jp/security/rfc/R FC2246-07EN .htm l. Cryptography Attacks, from w w w .hack.gr/users/d ij/crypto/overview /term ino lo g y.htm l. Cryptography Attacks, from http ://ieeexplore.ieee.org/iel5/10600/33508/01590056.pdf?isnum ber= 33508& arnum ber= 1590056.

2379. 2380. 2381. 2382.

2383. 2384.

2385. 2386. 2387. 2388. 2389.

W hat is a hash function?, from http://w w w .rsa.com /rsalabs/node.asp?id= 2176. W hat is Capstone?, from http://w w w .rsa.com /rsalabs/node.asp?id= 2317. W hat are RC5 and RC6?, from http://w w w .rsa.com /rsalabs/node.asp?id= 2251. This challenge is no longer active, from http://w w w .rsa.com /rsalabs/node.asp?id= 2094. D orothy E. Denning & Dennis K. Branstad, 1996, A Taxonom y fo r Key Escrow Encryption Systems, from http://w w w .cosc.georgetow n.edu/~ denning/crypto/T axonom y.htm l. Param eter Tam pering, from http://w w w .im p erva.com /resources/glossary/param eter_tam pering .htm l. Pascal M eunier, (2004), Program m ing Issues, from w w w. cerias. purdue. edu/secprog/class2/7.Canon_& _D T.ppt.

2390. 2391.

2392. 2393.

Abo ut Secure Shell, from http ://w w w .o n sig h t.co m /fa q /ssh /ssh -fa q -l.h tm l. PGP A ttack FAQ: The asym m etric cipher h ttp ://w w w .iusm entis.co m /techno lo gy/en cryptio n/p gp /pg pattackfaq/asym m etric/. Digital Signature G uidelines, from Tutorial http://w w w .ab anet.o rg/scitech/ec/isc/d sg-tuto rial.htm l. W hat is public-key cryptography?, from http://w w w .rsa.com /rsalabs/node.asp?id= 2165. W hat is Public-Key Cryptography?, from http ://w w w .x5.n et/faq s/crypto /q3.htm l. Security FAQs, from http ://w w w .tcuconnect.com /help /faq_ security.asp. RSA Security- 2.1.1 W hat is public-key cryptography?, from http://w w w .rsasecurity.com /rsalabs/node.asp?id= 2165. M ahm ood, (2006), Encryption and D ecryption using RSA, from http ://w w w .b ridg eport.ed u/sed/p rojects/cs597/Spring_2004/sbhum ana/index.h tm . HashCalc, from http ://w w w .slavasoft.com /h ashcalc/. M D 5 Calculator, from http ://w w w .b u llzip .co m /p ro d u cts/m d 5 /in fo .p h p . HashM yFiles, from http ://w w w .n irso ft.net/utils/h ash_ m y_files.htm l. Advanced Encryption Package, from h ttp ://w w w .a ep pro .co m /. BCTextEncoder, from http ://w w w .je tico .co m /encryptio n-b ctexten co d er. Com m uniCrypt File Encryption Tools, from http ://w w w .co m m unicrypt.co m . Steganos LockNote, from h ttp s://w w w .stegano s.co m /u s/p ro d ucts/fo r-free/lo ckno te/overview /.

2394.

2395. 2396. 2397. 2398.

2399.

2400. 2401. 2402. 2403. 2404. 2405. 2406.

References Page 3054

Ethical Hacking and C ounterm easures Copyright by EC-COUIICil All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

2407. 2408. 2409. 2410. 2411. 2412. 2413. 2414. 2415. 2416. 2417. 2418. 2419. 2420. 2421. 2422. 2423. 2424. 2425. 2426. 2427. 2428. 2429. 2430. 2431. 2432. 2433. 2434. 2435. 2436. 2437. 2438. 2439. 2440. 2441. 2442. 2443. 2444. 2445. 2446.

AxCrypt, from http ://w w w .axan tum .com /axcrypt/. AutoKrypt, from http ://w w w .h itekso ftw are.co m /auto kryp t/d ata-e ncryptio n -so ftw are.h tm . CryptoForge, from h ttp ://w w w .cryp to fo rge.co m /. NCrypt XL, from h ttp ://w w w .littlelite.n et/n cry p txl/. ccrypt, from http ://ccrypt.sourceforge.net/. W inAES, from h ttp ://fatlyz.co m /en /w inaes/. EncryptOnClick, from http ://w w w .2 brig htsparks.com /onclick/eoc.htm l. GNU Privacy Guard, from http://w w w .gnupg.org. com odo, from h ttp ://w w w .co m o d o .co m /. thaw te, from h ttp ://w w w .th a w te.co m /. verisign, from http://w w w .verisign.com . entrust, from h ttp ://w w w .e n tru st.n et/. TrueCrypt, from http ://w w w .tru ecryp t.o rg/. G iliSoft Full Disk Encryption, from h ttp ://w w w .g iliso ft.co m /pro duct-full-d isk-encryp tio n.htm . DriveCrypt, from http ://w w w .securstar.co m /pro ducts_ drivecryp t.php. ShareCrypt, from http://w w w .securstar.com /products_ sharecryp t.php. PocketCrypt, from http ://w w w .securstar.co m /pro ducts_ po cketcryp t.php. Rohos Disk Encryption, from http ://w w w .ro ho s.com /pro du cts/ro ho s-disk-encryptio n/. R-Crypto, from h ttp ://w w w .r-tt.co m /data_se curity_so ftw are/. SafeBit Disk Encryption, from h ttp ://w w w .safebit.net/. DiskCryptor, from h ttp ://d iskcryp to r.n et/w iki/M a in _ P a g e/en . alertsec, from http ://w w w .a lertsec.co m /so ftw a re -o ve rview /. Sym antec Drive Encryption, from http ://w w w .sym antec.co m /w ho le-disk-en cryptio n. DriveCrypt Plus Pack, from h ttp ://w w w .securstar.co m /pro ducts_ drivecryp tp p.php. CrypTool, from h ttp ://w w w .cryp to o l.o rg/e n. CryptoBench, from h ttp ://w w w .ad dario .o rg /crypto ben ch/. JCrypTool, from h ttp ://w w w .cryp to o l.o rg/e n /jcryp to o l. Ganzua, from http://ganzu a.sourceforge.net/en/index.htm l. Crank, from http://crank.sourceforge.net/index.htm l. EverCrack, from http ://evercrack.sourceforge.net/. AlphaPeeler, from h ttp ://a lp h a p ee ler.so u rcefo rg e.n et/in d exl.h tm . Draft Crypto Analyzer, from http ://w w w .litera te co d e.co m /dra ca . Linear Hull Cryptanalysis o f PRESENT, from h ttp ://w w w .ecrypt.eu .o rg /too ls/p resen t-lin ear-hull. mediggo, from http ://c 0 de.g 00 gle.c 0 m /p/m edigg 0/ . SubCypher, from http://w w w .esclepiusllc.com /index.php?page= subcypher. M D 5 Decrypt, from h ttp ://w w w .m d5d ecryp t.o rg /. M D 5Cracker, from h ttp ://m d5 crack.co m /. M D 5 Hash Cracker, from http://w w w .tm to.org/p ages/passw ord tools/hashcracker/. Hash Cracker, from http://w w w .hash-cracker.com /. M D 5D ecrypter, from h ttp ://w w w .m d5d ecryp ter.co m /.

References Page 3055

Ethical Hacking and C ounterm easures Copyright by EC-COUIICil All Rights Reserved. Reproduction is S trictly Prohibited.

Ethical Hacking and Counterm easures References

Exam 312-50 Certified Ethical Hacker

2447. 2448. 2449.

OnlieHashCrack.com , from http://w w w .onlinehashcrack.com /ind ex.php. M D 5D ecrypter.co.uk, from http ://w w w .m d5d ecryp ter.co .uk/. M d 5.M y-A ddr.com , from http://m d5.m y-addr.com /m d5_decryptm d5_cracker_online/m d5_decoder_tool.php. cmd5.org, from http ://w w w .cm d 5.o rg /. Crypt and Decrypt Online Tool Conversion, from http://m yeasyw w w .app spot.com /u tility/free/on line/C rypt-and-D ecryp t-toolonline/en?command=UTILITY&ID=2.

2450. 2451.

M o d u le 20: P en etra tio n Testing 2452. 2453. Assessing N etw ork Security, from http ://w w w .scribd.com /doc/24594933/Assessing-N etw ork-Security. Technical (Bottom -Up) M ethod ology, from http ://w w w .crcnetbase.com /doi/abs/10.1201/9780203503041.ch6. Auditing, from http ://w w w .crcnetbase.com /doi/abs/10.1201/9781420000047.ch3. Autom ated Penetration Testing - False Sense of Security, from http ://w w w .it-ob server.com /au tom atedpenetration-testing-false-sense-security.htm l. A pplication Assessm ent Questioning, from http://w w w .technicalinfo .net/p apers/A ssessm entQ uestio ns.htm l. How are Penetrating Testing conducted?, from w w w .corsaire.com . Categories o f security assessments, from http ://safari.oreilly.com /0 735 618 682 /part06. Assessing N etw ork Security, from h ttp ://sa fa ri.ph p tr.co m /073 562 033 4/ch 0 1le vlse c3. Penetration testing guide, from http ://w w w .p enetration -te sting .co m /. CO M PU TER SECURITY PERFORM ANCE TESTEXAMPLE, from http://sedists.org/lists/pen test/2003/Feb/att-0015/Pennetration_T est_A greem ent_txt. 2462. 2463. Service Level Agreem ents, from http://it.usu.edu/h tm /hardw are/service-level-agreem ents. Jeff Forrista, (2001), Fireproofing Against DoS Attacks, from http ://w w w .n etw o rkco m p uting .co m /1 225 /12 25f3 8.h tm l. 2464. Konstantinos Karagiannis, Pen-Test Using FoundScan H ardw are Appliances, from http ://w w w .ew eek.co m /co brand /0,3223,a=27473&s=1610&ap=,00.a sp. Pen-Test Using NetRecon, from http ://w w w .n et-security.o rg /dl/new sletter/txt/issu e05 9.txt. Pen-Test Using SATAN, SARA and Security Analyzer, from http ://w w w .ciac.org/ciac/T oolsU nixN etSec.htm l. E- Com m erce Security, from http://netdesig nplus.net/pu blications/victor_saw m a_thesis.pd f. Design G uidelines fo r Secure W eb Applications, from http ://m sd n.m icrosoft.com /lib rary/enus/dnnetsec/htm l/thcm ch04.asp?fram e= true. 2469. KEN BRANDT, STU GREEN, ENRIQUE ZUNIGA, Activity: Escalating Privileges, from http ://infosecuritym ag.techtarget.com /ar. 2470. The Professional Security Testers (PST) W arehouse: W eb Proxy, from http://w w w .professionalsecuritytesters.org/m odules.php?nam e= N ew s& new _topic= 16. 2471. M icro so ft Security Bulletin (M S99-046) Frequently Asked Questions, http ://w w w .m icro so ft.com /technet/se cu rity/b ulletin/fq99 -04 6.m sp x. Penetration testing guide, from http ://w w w .p enetration -te sting .co m /. Netscape, from http ://netscape.aol.com /.

2454. 2455.

2456.

2457. 2458. 2459. 2460. 2461.

2465. 2466.

2467. 2468.

2472. 2473.

References Page 3056

Ethical Hacking and C ounterm easures Copyright by EC-COUIICil All Rights Reserved. Reproduction is S trictly Prohibited.

E th ic a l H a c k in g a n d C o u n t e r m e a s u r e s R e fe re n c e s

E x a m 3 1 2 - 5 0 C e r t if ie d E th ic a l H a c k e r

2474.

Kyle Lai, (2002), Change M A C A ddress on W in2K & XP, from http ://sed ists.org/p entest/2002/N ov/0025.htm l.

2475.

A natom y o f an ARP Poisoning Attack, from http ://w w w .w atch guard.com /info center/edito rial/13 532 4.asp.

2476. 2477.

Hacking Lexicon, from http://w w w .cybersoft.com /w h itepapers/reference/h acking_lexicon.shtm l Inform ation Security Magazine, from http ://infosecuritym ag.techtarg et.com /articles/m arch01/features4_battle_plans.shtm l.

2478.

Finding and Fixing N etw ork V ulnerabilities, from http://w w w .ew eek.com /cobrand/0,3223,a= 27473& s= 1610& ap= ,00.asp.

2479. 2480.

Fireproofing against DoS Attacks, from http ://w w w .n etw o rkco m p uting .co m /1 225 /12 25f3 8.h tm l. Get quality service from your suppliers, from http://w w w .businesslink.gov.uk/bdotg/action/detail?type= RESC>URCES&item ld=1073792560.

2481. 2482.

Stephen, (2006), USU Help Desk, from http ://helpdesk.usu.edu/content/hardw are/sla.con tracts.ph p. Com puter Security Perform ance Test exam ple Independent Oversight Cyber Security Perform ance Test, from h ttp ://seclists.org /lists/pen -test/2003/Feb/att-0015/Pen netration_Test_A greem ent_txt.

2483.

Safari Books Online- Microsoft Windows Security Resource Kit, from h ttp ://safari.oreilly.com /0735618682/part06.

2484. 2485. 2486.

Christopher R. Russel, (2001), Penetration Testing w ith dsniff, from http ://w w w .o uah .o rg/d sniffintr.htm . IDA, from http s://w w w .hex-rays.com /produ cts/ida/ind ex.shtm l. Kismet, from http ://w w w .kism e tw ireless.ne t/d o w n lo ad .sh tm l.

R e fe re n c e s P a g e 3 0 5 7

E th ic a l H a c k in g a n d C o u n t e r m e a s u r e s C o p y r ig h t

b y E C - C O U I I C il

A l l R i g h t s R e s e r v e d . R e p r o d u c t i o n is S t r i c t l y P r o h i b i t e d .

You might also like