Network Security Hacks [Electronic resources]

Andrew Lockhart

نسخه متنی -صفحه : 158/ 150
نمايش فراداده

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z]

packages (compromised), finding with RPM

packet sniffers

examining SSH connection tunneled through HTTP

rpcapd remote capture device, using with

WinDump

PacketFilter (PF)

authenticated gateway, creating

blocking packets used for operating-system probes

pf.conf file, editing

defining table of IP addresses

macros

options

packet-filtering rules

traffic normalization rules

SnortSam, using with

paging file (Windows), clearing at shutdown

PAM (pluggable authentication modules)

pam_access module

pam_limits module

pam_stack module

pam_time module

partitions (disk), imaging

passwd program, SUID or SGID bit

passwords [See also authentication]

command execution without password

patch utility, applying grsecurity patch to kernel

patching system security holes, automation of

PaX (grsecurity)

Pcap-formatted files, creating with Barnyard

Perl modules, necessary for swatch tool

Perl scripts, running through CGI interface

Perl, sensor agents for SnortCenter

permissions

creating flexible hierarchies with POSIX ACLs

world- and group-writable

PF [See PacketFilter]

pfctl command

PHP

libraries for SnortCenter

programs, running through CGI interface

Sebek package, use by

using with ACID

PHPlot

PIDs (process IDs)

listing for listening services

stunnel PID file

ping program

finding system MAC address

monitoring statistics from web server

pipe action, swatch

PIX firewall, using with SnortSam

pluggable authentication modules [See PAM]

pluto

Point-to-Point Tunneling Protocol [See PPTP tunneling]

poisioning the ARP cache

policies, systrace

automated generation of

POP, encrypting with SSL

POP3 traffic, encrypting and forwarding with SSH

PoPToP (PPTP server)

connecting to with Windows machine

port forwarding

honeyd, using with

httptunnel, using

SSH, using as SOCKS proxy

SSH, using for

stunnel, using

port security (Ethernet switches)

ports

monitor port

open, listing for Windows systems

scanning for listening services

SnortSam port option

specifying for packets in Snort rules

portscan and stream4 preprocessors, Snort 2nd

POST method requests, scanning by mod_security

PPP tunnels, setting up with PPTP tunneling

PPP, using with SSH to create secure VPN tunnel

PPTP (Point-to-Point Tunneling Protocol) tunneling

priorities, for logging

configuring for syslog-ng

process accounting

ac command

lastcomm command

summarizing with sa command

processes

increasing security with grsecurity

listing for listening services

listing for open files on Windows

listing for running services on Windows

memory address space layouts, randomization with grsecurity

proftpd, using with MySQL authentication source

promiscuous mode (network interfaces)

detecting to prevent intrusion

detection with chkrootkit

monitoring with rpcapd

ProPolice

protocol analyzers [See Ethereal protocol analyzer ntop tool]

protocols

for Snort rule application

specifying protocol for Snort rule

stateless

proxies

httptunnel connections through web proxy

squid proxy over SSH

SSH, using as SOCKS proxy

whois proxy, geektools.com

proxy arp

pseudo-TTY interfaces, PPP daemons operating over

psk.txt file (racoon)