Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Share this Page URL
Help

Index > Index - Pg. 140

140 Index Hypertext transfer protocol (HTTP), 55, 78, 79 connection, 63, 64 and SSH, 68 Hypertext transfer protocol secure (HTTPS), 71 and SSH, 68 I ICMP. See Internet control message protocol IDS. See Intrusion detection system Initialization vectors (IV), 128 Institute of Electrical and Electronics Engineers (IEEE) 802 standards, 76, 83, 87, 97 Internet, layers of, 76­80 Internet control message protocol (ICMP), 10 echo reply, 10 echo request, 10 redirect attacks, 105 Internet protocol (IP), 61, 77 Internet relay chat (IRC), 7, 70 Internet service provider (ISP), 79 Intrusion detection system (IDS), 14, 17­18, 45, 55 Intrusion prevention system (IPS), 18, 45, 55 IPS. See Intrusion prevention system Metasploit Framework, 6, 7, 46­49 Meterpreter, 47 MITM attacks. See Man-in-the-middle attacks Modems, 23, 24 banning of, 37­38 detecting for configuration, 30 hardening, 38 reply types, 28­29 sweeping for live, 27­28 vendor supports, 35 Modulation, 23 Morris worm, 8 n Nessus attack scripting language (NASL), 44 Nessus vulnerability scanning, 5, 6, 14, 44­46 Netfilter, 72 Network discovering, 93­95 scanning, 5, 8, 14 Network IDS (NIDS), 17 Network interface card (NIC), 97 Network time protocol (NTP), 4, 70