CEHV8 - References
CEHV8 - References
References
Module 01: Introduction to Ethical Hacking
1. Zero-day attacks are meaner, more rampant than we ever thought, from
http://arstechnica.com/security/2012/ 10/zero-day-attacks-are-meaner-and-more-plentiful-than-
thought/.
2. SECURITY POLICY: TARGET, CONTENT, & LINKS, from
http://csrc.nist.gov/nissc/1998/proceedings/paperG4.pdf.
3. Anatomy of the Hack - Hands-on Security, from http://www.slideshare.net/NewBU/anatomy-of-the-
hack-handson-security-information-assurance-dub.
4. Hacker methodology, from http://www.hackersecuritymeasures.com/.
5. Ethical Hacking, from www.securedeath.com.
6. C. C. Palmer, Ethical hacking from http://researchweb.watson.ibm.com/journal/sj/403/palmer.html.
7. An Overview of Computer Security, from
www.cc.gatech.edu/classes/AY2005/cs4803cns_fall/security_overview.ppt.
8. Dr. Death, (2006), Ethical Hacking, from http://www.securedeath.com.
9. Ethical Hacking, from http://neworder.box.sk/news/921.
10. How are Penetrating Testing conducted?, from www.corsaire.com.
11. Ethical Hacking: The Security J ustification Redux, from
http://www.sosresearch.org/publications/ISTAS02ethicalhack.PDF.
12. Ethical Hacking, from www.sosresearch.org/publications.
13. Ethical Hacking, from www.research.ibm.com.
14. Covering Tracks, from http://rootprompt.org.
15. Attack, from http://www.linuxsecurity.com/content/view/17/70/.
16. Security Issues in Wireless MAGNET at Networj Layer, from
http://csce.unl.edu/~jaljaroo/publications/TR02-10-07.pdf.
17. Glossary of Security and Internet terms, from
http://wssg.berkeley.edu/Securitylnfrastructure/glossary.html.
18. Glossary of Vulnerability Testing Terminology, from
http://www.ee.oulu.fi/research/ouspg/sage/glossary/.
19. Information about hackers, from http://www.antionline.com/.
20. Information about hackers, from http://w2.eff.org/Net_culture/Hackers/.
21. LEX LUTHOR, information about hackers, from http://bak.spc.org/dms/archive/britphrk.txt.
22. Information about hackers, from http://directory.google.com/Top/Computers/Hacking/.
23. Information about hackers, from http://directory.google.com/Top/Computers/Security/Hackers/.
24. Information about hackers, from http://bak.spc.org/dms/archive/profile.html.
References Page 2976 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
25. Information about hackers, from
http://dir.yahoo.com/Computers_and_lnternet/Security_and_Encryptior1/Hacking/.
Module 02: Footprinting and Reconnaissance
26. Search Operators, from http://www.googleguide.com/advanced_operators.html.
27. The Complete Windows Trojans Paper, from
http://www.windowsecurity.com/whitepapers/trojans/The_Complete_Windows_Trojans_Paper.html.
28. Naples, (2008), Information Gathering Tools, Available from
http://it.toolbox.com/wiki/index.php/lnformation_Gathering_Tools.
29. Extract Website Information from archive.org, Available from www.archive.org.
30. Footprinting, from
http://www.ethicalhacker.net/component/option,com_smf/ltemid,49/topic,228.msg672.
31. Simson Garfinkel and David Cox, (2009), Finding and Archiving the Internet Footprint,
http://simson.net/clips/academic/2009.BL.lnternetFootprint.pdf.
32. CHAPTER 2 [FOOTPRINTING], from http://www.ecqurity.com/wp/footprinting-encored.pdf.
33. Donna F. Cavallini and Sabrina 1. PACIFICI, Got COMPETITIVE INTELLIGENCE,
http://www.llrx.com/features/gotci.ppt.
34. Spammers & hackers: using the APNIC Whois Database to find in their network, from
http://www.apnic.net/info/faq/abuse/using_whois.html.
35. P. Mockapetris, (1987), DOMAIN NAMES - CONCEPTS AND FACILITIES, from
h tt p ://www. i e tf. 0 rg/ rf c/ rf c 1034. txt.
36. Manic Velocity, Footprinting And The Basics Of Hacking, from
http://web.textfiles.com/hacking/footprinting.txt.
37. Dean, (2001), Windows 2000 Command Prompt Troubleshooting Tools, from
http://www.pcmech.com/show/troubleshoot/192/.
38. nslookup Command, from
http://publib. boulder. ibm.com/infocenter/pseries/v5r3/index.jsp?topic=/com.ibm.aix.doc/cmds/aixcmd
s4/nslookup.htm.
39. The nslookup Manual Page, from http://www.stopspam.org/usenet/mmf/man/nslookup.html.
40. Bob Hillery, (2001), Neohapsis Archives - Incidents list - Re: Finding out who owns ..., from
http://archives.neohapsis.com/archives/incidents/2001-01/0032.html.
41. Ryan Spangler, (2003), Analysis of Remote Active Operating System Fingerprinting Tools, from
http://www.packetwatch.net/documents/papers/osdetection.pdf.
42. Ryan Spangler, (2003), Analysis of Remote Active Operating System Fingerprinting Tools, from
http://www.securiteam.com/securityreviews/5ZP010UAAI.html.
43. Fingerprint methodology: 1PID sampling, from http://www.insecure.org/nmap/nmap-fingerprinting-
old.html.
44. Fyodor, (1998), Remote OS detection via TCP/IP Stack Fingerprinting, from
http://www.donkboy.com/html/fingerprt.htm.
45. Remote OS Detection, from http://nmap.org/book/osdetect.html.
46. Regional Internet Registry, from http://en.wikipedia.org/wiki/Regional_lnternet_Registry.
47. Boy Scouts, Fingerprinting from http://onin.eom/fp/fpmeritbdg.html#top.
48. The Hacker's Choice, from http://freeworld.thc.org/welcome/.
49. THC Fuzzy Fingerprint, from http://freeworld.thc.org/thc-ffp/.
References Page 2977 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
50. Katherine Knickerbocker, CJ 625 Student Paper, from http://all.net/CID/Attack/papers/Spoofing.html.
51. Arik R. J ohnson, What is competitive intelligence? How does competitive ..., from
http://aurorawdc.com/whatisci.htm.
52. Guangliang (Benny), (2006), Spamming and hacking, from
http://www.apnic.net/info/faq/abuse/using_whois.html.
53. Dhillon, (2006), Footprinting: The Basics of Hacking: Hack In The Box, from
http://www.hackinthebox.org/modules.php?op=modload&name=News&file=article&sid=5359&mode=t
hread&order=0&thold=0.
54. Roshen, (2006), Paladion - Customers - Success Stories - Penetration Testing, from
http://paladion.net/pentration_testing.php.
55. Paul Thompson, (2006), Cognitive Hacking and Digital Government: Digital Identity, from
http://www.ists.dartmouth.edu/library/chd0803.pdf.
56. Greg Sandoval, (2006), MPAA accused of hiring a hacker, from
http://news.com.com/MPAA+accused+of+hiring+a+hacker/2100-1030_3-6076665.html.
57. Kurt Seifried, (2005), Closet20001213 Backdoors, Back Channels and HTTP(S), from
http://www.seif ried.org/security/index.php/Closet20001213_Backdoors,_Back_Channels_and_HTTP(S).
58. Happy Browser, (2005), from http://www.hotscripts.com/Detailed/39030.html.
59. Client-server architecture, from http://www.networkintrusion.co.uk/N_scan.htm.
60. Elegant architecture: NASI, from http://www.nessus.org/features/.
61. The Signatures, from http://www.honeynet.org/papers/finger/.
62. Ryan Spangler, (2003), Analysis of Remote Active Operating System Fingerprinting Tools, Nmap tool:
technique, from http://www.securiteam.com/securityreviews/5ZP010UAAI.html.
63. Beware!: War dialing, Sandstorm Sandtrap 1.5 Wardialer Detector Plus 16 and Basic Detectors, from
http://www.data-connect.com/Santstorm_PhoneSweep.htm.
64. Appendix A - Glossary of Terms: IPSEC, from
http://www.imsglobal.org/gws/gwsvlpO/imsgws_securityProfvlpO.html.
65. Def. and info. Vulnerability scanning, from
http://www.webencanto.com/computer_glossary/Communications/Ethics/vulnerability_scanning.html.
66. Footprinting, from http://books.mcgraw-
hill. com/downloads/products//0072193816/0072193816_ch01. pdf].
67. P. Mockapetris, Zvon - RFC 1034 [DOMAIN NAMES - CONCEPTS AND FACILITIES] - DOMAIN..., from
http://www.zvon.org/tmRFC/RFC1034/Output/chapter3.html.
68. Gaurav, (2006), The Domain Name System (DNS), from
http://people.csa.iisc.ernet.in/gaurav/np/rfcs/dns.html.
69. Using the Internet for Competitive Intelligence, from
http://www.cio.com/CIO/arch_0695_cicolumn.html.
70. Reporting network abuse: Spamming and hacking, from
http://www.apnic.net/info/faq/abuse/using_whois.html.
71. Bastian Ballmann, (2011), Information gathering tools, from http://www2.packetstormsecurity.org/cgi-
bin/search/search.cgi?searchvalue=information+gathering&type=archives&[search].x=0&[search].y=0.
72. Google Earth, from http://www.google.com/earth/index.html.
73. pipl,from https://pipl.com/.
74. spokeo, from http://www.spokeo.com.
75. Zaba Search, from http://www.zabasearch.com.
References Page 2978 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
76. 123 People Search, from http://www.123people.com.
77. Zoomlnfo, from http://www.zoominfo.com.
78. PeekYou, from http://www.peekyou.com.
79. Wink People Search, from http://wink.com.
80. Intelius, from http://www.intelius.com.
81. AnyWho, from http://www.anywho.com.
82. PeopleSmart, from http://www.peoplesmart.com.
83. People Lookup, from https://www.peoplelookup.com.
84. WhitePages, from http://www.whitepages.com.
85. Facebook, from https://www.facebook.com/.
86. Linkedln, from http://www.linkedin.com.
87. Google+, from https://plus.google.com.
88. Twitter, from http://twitter.com.
89. Google Finance, from http://finance.google.com/finance.
90. Yahoo Finance, from http://finance.yahoo.com.
91. Zaproxy, from https://code.google.eom/p/zaproxy/downloads/list.
92. Burp Suite, from http://portswigger.net/burp/download.html.
93. Firebug, from https://getfirebug.com/downloads/.
94. HTTrack Website Copier, from http://www.httrack.c0m/page/2/ .
95. BlackWidow, from http://softbytelabs.com/us/downloads.html.
96. Webripper, from http://www.calluna-software.com/Webripper.
97. SurfOffline, from http://www.surfoffline.com/.
98. Website Ripper Copier, from http://www.tensons.com/products/websiterippercopier/.
99. PageNest, from http://www.pagenest.com.
100. Teleport Pro, from http://www.tenmax.com/teleport/pro/download.htm.
101. Backstreet Browser, from http://www.spadixbd.com/backstreet/.
102. Portable Offline Browser, from http://www.metaproducts.com/Portable_Offline_Browser.htm.
103. Offline Explorer Enterprise, from http://www.metaproducts.com/offline_explorer_enterprise.htm.
104. Proxy Offline Browser, from http://www.proxy-offline-browser.com/.
105. GNU Wget, from ftp://ftp.gnu.org/gnu/wget/.
106. iMiser, from http://internetresearchtool.com.
107. Hooeey Webprint, from http://www.hooeeywebprint.com.s3-website-us-east-
l.amazonaws.com/download.html.
108. Wayback Machine, from http://archive.org/web/web.php.
109. WebSite-Watcher, from http://aignes.com/download.htm.
110. eMailTrackerPro, from http://www.emailtrackerpro.com.
111. PoliteMail, from http://www.politemail.com.
112. Email Lookup - Free Email Tracker, from http://www.ipaddresslocation.org.
113. Read Notify, from http://www.readnotify.com.
114. Pointofmail, from http://www.pointofmail.com.
References Page 2979 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
115. DidTheyReadlt, from http://www.didtheyreadit.com.
116. Super Email Marketing Software, from http://www.bulk-email-marketing-software.net.
117. Trace Email, from http://whatismyipaddress.com/trace-email.
118. WhoReadMe, from http://whoreadme.com.
119. MSGTAG, from http://www.msgtag.com/download/free/.
120. GetNotify, from http://www.getnotify.com.
121. Zendio, from http://www.zendio.com/download.
122. G-Lock Analytics, from http://glockanalytics.com.
123. EDGAR Database, from http://www.sec.gov/edgar.shtml.
124. Hoovers, from http://www.hoovers.com.
125. LexisNexis, from http://www.lexisnexis.com.
126. Business Wire, from http://www.businesswire.com.
127. Market Watch, from http://www.marketwatch.com.
128. The Wall Street Transcript, from http://www.twst.com.
129. Upper Marketplace, from http://www.lippermarketplace.com.
130. Euromonitor, from http://www.euromonitor.com.
131. Fagan Finder, from http://www.faganfinder.com.
132. SEC Info, from http://www.secinfo.com.
133. The Search Monitor, from http://www.thesearchmonitor.com.
134. Compete PRO, from http://www.compete.com.
135. Copernic Tracker, from http://www.copernic.com.
136. ABI/INFORM Global, from http://www.proquest.com.
137. SEMRush, from http://www.semrush.com.
138. AttentionMeter, from http://www.attentionmeter.com.
139. J obitorial, from http://www.jobitorial.com.
140. Google Hacking Database, from http://www.hackersforcharity.org.
141. MetaGoofil, from http://www.edge-security.com.
142. Google Hack Honeypot, from http://ghh.sourceforge.net.
143. Goolink Scanner, from http://www.ghacks.net.
144. GMapCatcher, from http://code.google.com.
145. SiteDigger, from http://www.mcafee.com.
146. SearchDiggity, from http://www.stachliu.com.
147. Google Hacks, from http://code.google.com.
148. Google HACK DB, from http://www.secpoint.com.
149. BiLE Suite, from http://www.sensepost.com.
150. Gooscan, from http://www.darknet.org.uk.
151. WHOIS Lookup at DomainTools.com, from http://whois.domaintools.com/.
152. Domain Dossier, from http://centralops.net/co.
153. SmartWhois, from http://www.tamos.com/download/main/index.php.
154. CountryWhois, from http://www.tamos.com/products/countrywhois/.
References Page 2980 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
155. Whois Analyzer Pro, from http://www.whoisanalyzer.com/download.opp.
156. LanWhols, from http://lantricks.com/download/.
157. HotWhois, from http://www.tialsoft.com/download/?url=http://www.tialsoft.com/hwhois.exe.
158. Batch IP Converter, from http://www.networkmost.com/download.htm.
159. Whois 2010 Pro, from http://lapshins.com/.
160. CallerIP, from http://www.callerippro.com/download.html.
161. ActiveWhois, from http://www.johnru.com/.
162. Whois Lookup Multiple Addresses, from http://www.sobolsoft.com/.
163. WhoisThisDomain, from http://www.nirsoft.net/utils/whois_this_domain.html.
164. SmartWhois, from http://smartwhois.com.
165. Whois, from http://tools.whois.net.
166. Better Whois, from http://www.betterwhois.com.
167. DNSstuff, from http://www.dnsstuff.com.
168. Whois Source, from http://www.whois.se.
169. Network Solutions Whois, from http://www.networksolutions.com.
170. Web Wiz, from http://www.webwiz.co.uk/domain-tools/whois-lookup.htm.
171. WebToolHub, from http://www.webtoolhub.com/tn561381-whois-lookup.aspx.
172. Network-Tools.com, from http://network-tools.com.
173. Ultra Tools, from https://www.ultratools.com/whois/home.
174. dnsstuff, from http://www.dnsstuff.com/.
175. network-tools, from http://network-tools.com/.
176. DNS Queries, from http://www.dnsqueries.com/en/.
177. DIG, from http://www.kloth.net/services/dig.php.
178. myDNSTools, from http://www.mydnstools.info/nslookup.
179. DNSWatch, from http://www.dnswatch.info.
180. DomainTools, from http://www.domaintools.com.
181. Professional Toolset, from http://www.dnsstuff.com/tools.
182. DNS, from http://e-dns.org.
183. DNS Records, from http://network-tools.com.
184. DNS Lookup Tool, from http://www.webwiz.co.uk/domain-tools/dns-records.htm.
185. DNSData View, from http://www.nirsoft.net.
186. DNS Query Utility, from http://www.webmaster-toolkit.com.
187. WHOIS-RWS, from http://whois.arin.net/ui.
188. Netcraft, from http://searchdns.netcraft.com/Phost.
189. Shodan, from http://www.shodanhq.com/.
190. Path Analyzer Pro, from http://www.pathanalyzer.com/download.opp.
191. VisualRoute 2010, from http://www.visualroute.com/download.html.
192. Network Pinger, from http://www.networkpinger.eom/en/downloads/#download.
193. Magic NetTrace, from http://www.tialsoft.com/download/?url=http://www.tialsoft.com/mNTr.exe.
194. GEO Spider, from http://oreware.com/viewprogram.php?prog=22.
References Page 2981 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
195. 3D Traceroute, from http://www.d3tr.de/download.html.
196. vTrace, from http://vtrace.pl/download.html.
197. AnalogX HyperTrace, from
http://www.analogx.com/contents/download/Network/htrace/Freeware.htm.
198. Trout, from http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-
tools/trout.aspx.
199. Network Systems Traceroute, from http://www.net.princeton.edu/traceroute.html.
200. Roadkil's Trace Route, from http://www.roadkil.net/program.php/P27/Trace%20Route
201. Ping Plotter, from http://www.pingplotter.com.
202. myiptest, from http://www.myiptest.com/staticpages/index.php/how-about-you.
203. Maltego, from http://www.paterva.com/web6/products/download4.php.
204. Domain Name Analyzer Pro, from http://www.domainpunch.com/domain-name-analyzer-
pro/download.php.
205. Web Data Extractor, from http://www.webextractor.com.
206. Prefix Whois, from http://pwhois.org.
207. Netmask (IRPAS), from http://www.phenoelit.org/irpas/download.html.
208. Binging, from http://www.blueinfy.com/tools.html.
209. Tctrace (IRPAS), from http://www.phenoelit.org/irpas/download.html.
210. Spiderzilla, from http://spiderzilla.mozdev.org/installation.html.
211. Autonomous System Scanner (ASS) (IRPAS), from http://www.phenoelit.org/irpas/download.html.
212. Sam Spade, from http://www.majorgeeks.com/Sam_Spade_d594.html.
213. DNS DIGGER, from http://www.dnsdigger.com.
214. Robtex, from http://www.robtex.com.
215. Dig Web Interface, from http://www.digwebinterface.com
216. SpiderFoot, from http://sourceforge.net/projects/spiderfoot/?so.urce=dlp.
217. Domain Research Tool, from http://www.domainresearchtool.com.
218. CallerIP, from http://www.callerippro.com/download.html.
219. ActiveWhois, from http://www.johnru.com.
220. Zaba Search, from http://www.zabasearch.com/.
221. yoName, from http://yoname.com.
222. GeoTrace, from http://www.nabber.org/projects/geotrace/.
223. Ping-Probe, from http://www.ping-probe.com/Ping-Probe/index.html.
224. DomainHostingView, from http://www.nirsoft.net.
Module 03: Scanning Networks
225. Explanation of the Three-Way Handshake via TCP/IP, from http://support.microsoft.com/kb/172983.
226. Appendix G. Lists of reserved ports, ICMP types and codes, and Internet protocols, from
http://www.ingate.com/files/422/fwmanual-en/xal0285.html.
227. The Art of Port Scanning - by Fyodor, from http://nmap.org/nmap_doc.html.
228. Methods of IP Network Scanning - Stealth TCP Scanning Methods, from
http://www.c0dewalkers.c0m/c/a/Server-Administrati0n/Meth0ds-0f-IP-Netw0rk-Scanning/3/ .
References Page 2982 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
229. What is Port Scanning and Types of Port Scanning, from http://www.hackillusion.com/what-is-port-
scanning-and-types-of-port-scanning/.
230. UDP Scan, from http://www.networkuptime.com/nmap/page3-10.shtml.
231. Hacking Exposed, from http://www.scribd.com/doc/62708034/Hacking-Exposed-Book.
232. Network Security Assessment, from
https://www.trustmatta.com/downloads/pdf/Matta_IP_Network_Scanning.pdf.
233. Quick-Tip: SSH Tunneling Made Easy, from http://www.revsys.com/writings/quicktips/ssh-tunnel.html.
234. Detecting Spoofed Packets, from http://seclab.cs.ucdavis.edu/papers/DetectingSpoofed-DISCEX.pdf.
235. Scanning modes: FIN, Xmas, Null, from http://www.openxtra.co.uk/support/howto/nmap-scan-
modes.php.
236. Port scanning techniq:sW (Window scan), from http://www.paulisageek.com/nmap/index.html.
237. Prabhaker Mateti, UDP Scanning, from http://www.cs.wright.edu/~pmateti/Courses/499/Probing/.
238. FTP server bounce attack, TCP Fragmenting, Intrusion detection systems use signature-based
mechanisms, from http://www.in-f-or.it/informatica/docs/portscan.pdf.
239. Laura Chappell, (2003), OS Fingerprinting With ICMP: ICMP echo, from
http://www.securitypronews.com/it/security/spn-23-200309290SFingerprintingwithlCMP.html.
240. Scan Type-sF -sX -sN, from http://content.ix2.net/arc/t-4370.html.
241. Unixo3/introduction to Nmap, from http://www.samhart.com/cgi
bin/classnotes/wiki.pl?UNIX03/lntroduction_To_Nmap.
242. Fyodor, (2006), Art of port scanning: Features, Ideal scanning and related IPID games, Nmap: discription,
Fingerprint methadology: IPID samplingBounce attacks worked, Techniqe: TCP reverse ident scanning,
from http://www.insecure.org/nmap/nmap_doc.html.
243. Antirez, hping2(8) - Linux man page: Discription, Hping2 Commands, from
http://www.hping.org/manpage.html.
244. Chris McNab, (2008), Third Party IP Network Scanning Methods, Available from
http://www.c0dewalkers.c0m/c/a/Server-Administrati0n/Third-Party-IP-Netw0rk-Scanning-Meth0ds/.
245. Thierry Lagarde , AutoScan Network, Available from http://autoscan-
network.com/index.php?option=com_content&task=view&id=48<emid=32.
246. Onion Routing, Available from http://dictionary.zdnet.com/definition/onion+routing.html.
247. Van Geelkerken F.W.J , (2006), Digital Mixing (MIX nets), Available from
http://www.iusmentis.com/society/privacy/remailers/onionrouting/.
248. Keith J. J ones, Mike Shema, & Bradley C. J ohnson, Vulnerability Scanners, from
www.foundstone.com/pdf/books/AntiHackerSample.pdf.
249. Examining Port Scan Methods- Analysing Audible Techniques, from http://www.in-f-
or.it/informatica/docs/portscan.pdf.
250. IMS General Web Services Security Profile,
http://www.imsglobal.org/gws/gwsvlpO/imsgws_securityProfvlpO.html.
251. Beware!: War dialing, from http://www.castlecops.com/al361-War_dialing.html.
252. Simson L. Garfinkel, Automatic Parity Detection, from http://archive.cert.uni-
stuttgart.de/archive/bugtraq/1998/12/msg00215.html.
253. Lance Mueller, CREATE A REVERSE SSH TUNNEL,
http://www.lancemueller.com/blog/Create%20Reverse%20SSH%20to%20reach%20servlet%20inside%2
Ofirewall.pdf.
References Page 2983 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
254. Avi Kak, (2010), Port Scanning, Vulnerability Scanning, Packet Sniffing, and Intrusion Detection,
http://cobweb.ecn.purdue.edu/~kak/compsec/NewLectures/Lecture23.pdf.
255. Renaud Deraison, Ron Gula, and Todd Hayton, (2009), Passive Vulnerability Scanning Introduction,
http://nessus.org/whitepapers/passive_scanning_tenable.pdf.
256. Cheng Guang, TCP Analysis Based on Flags, http://www.nordu.net/development/2nd-cnnw/tcp-analysis-
based-on-flags.pdf.
257. Cheng Tang & J onathan Gossels, (1999), Wardialing: Practical Advice to Understand Your Exposure,
http://www.systemexperts.com/assets/tutors/wardial0299.pdf.
258. Network Security Library, from
http://www.windowsecurity.com/whitepapers/misc/Examining_port_scan_methods__Analyzing_Audibl
e_Te.
259. Lance Cottrell, Anonymizer Limitations: Logs, from http://www.livinginternet.eom/i/is_anon.htm.
260. Michel Leconte, (2006), Network security consulting, from http://www.activsupport.com/Small-
Business-Network-Security-Soluti.
261. Angry IP Scanner, from http://angryip.0rg/w/D0wnl0ad.
262. SolarWinds Engineer's Toolset, from http://downloads.solarwinds.com/solarwinds/Release/Toolset/ZP-
Toolset/ZP-Toolset-Ol.html.
263. Colasoft Ping Tool, from http://www.colasoft.com/download/products/download_ping_tool.php.
264. PacketTrap MSP, from http://www.packettrap.com/download?hsCtaTracking=e95ec5b5-069f-4cd5-
962c-9c0e6e32a6da%7C072dfe23-353f-46c2-9ab0-la27d39c01fl.
265. Visual Ping Tester - Standard, from http://www.pingtester.net.
266. Ping Sweep (Integrated into WhatsupGold), from
http://www.whatsupgold.com/products/download/network_management.aspx?k_id=ping-sweep-tool.
267. Ping Scanner Pro, from http://www.digilextechnologies.com.
268. Network Ping, from http://www.greenline-soft.com/product_network_ping/index.aspx.
269. Ultra Ping Pro, from http://ultraping.webs.com/downloads.htm.
270. Ping Monitor, from http://www.niliand.com.
271. PinglnfoView, from http://www.nirsoft.net/utils/multiple_ping_tool.html.
272. Pinkie, from http://www.ipuptime.net/category/download/.
273. Colasoft Packet Builder, from
http://www.colasoft.com/download/products/download_packet_builder.php.
274. NetScanTools Pro, from http://www.netscantools.com/nstprodemorequestform.html.
275. PRTG Network Monitor, from http://www.paessler.com/download/prtg.
276. Global Network Inventory Scanner, from
http://www.magnetosoft.com/products/global_network_inventory/gni_features.htm.
277. Net Tools, from http://mabsoft.com/nettools.htm.
278. SoftPerfect Network Scanner, from http://www.softperfect.com/products/networkscanner/.
279. IP Tools, from http://www.ks-soft.net/ip-tools.eng/downpage.htm.
280. Advanced Port Scanner, from http://www.radmin.com/download/previousversions/portscanner.php.
281. MegaPing, from http://www.magnetosoft.com/products/megaping/megaping_features.htm.
282. Netifera, from http://netifera.com.
283. Network Inventory Explorer, from http://www.10-
strike.com/networkinventoryexplorer/download.shtml.
References Page 2984 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
284. Free Port Scanner, from
http://www.nsauditor.eom/network_tools/free_port_scanner.html#.UWJ RvqLzvrw.
285. ID Serve, from http://www.grc.com.
286. Netcraft, from http://toolbar.netcraft.com.
287. Netcat, from http://sourceforge.net/projects/netcat/files/latest/download?source=files.
288. GFI LanGuard, from http://www.gfi.com/downloads/mirrors.aspx?pid=lanss.
289. SAINT, from http://www.saintcorporation.com/products/software/saintScanner.html.
290. Retina CS, from http://www.beyondtrust.com/Landers/TY-Page-RetinaCSCommunity/index.html.
291. OpenVAS, from http://www.openvas.org.
292. Core Impact Professional, from http://www.coresecurity.com.
293. Security Manager Plus, from http://www.manageengine.com/products/security-
manager/download, html.
294. Nexpose, from http://www.rapid7.com/products/nexpose/compare-downloads.jsp.
295. Shadow Security Scanner, from http://www.safety-lab.com/en/download.htm.
296. QualysGuard, from http://www.qualys.com.
297. Nsauditor Network Security Auditor, from
http://www.nsaudit0r.c0m/netw0rk_security/netw0rk_security_audit0r.html#.UWKEx6Lzvrw.
298. Security Auditor's Research Assistant (SARA), from http://www-arc.com/sara/.
299. LANsurveyor, from
http://www.solarwinds.com/register/MoreSoftware.aspx?External=false&Program=17592&c=70150000
OOOPjNE.
300. OpManager, from http://www.manageengine.com/network-monitoring/download.html.
301. NetworkView, from http://www.networkview.com/html/download.html.
302. The Dude, from http://www.mikrotik.com/thedude.
303. LANState, from http://www.10-strike.com/lanstate/download.shtml.
304. HP Network Node Manager i software, from http://www8.hp.com/us/en/software-
solutions/software. html?compURI=1170657#.
305. FriendlyPinger, from http://www.kilievich.com/fpinger/download.htm.
306. NetMapper, from http://www.opnet.com.
307. Ipsonar, from http://www.lumeta.com/product/product.html.
308. NetBrain Enterprise Suite, from http://www.netbraintech.com/instant-trial/.
309. CartoReso, from http://cartoreso.campus.ecp.fr.
310. Spiceworks-Network Mapper, from http://www.spiceworks.com/download/.
311. Switch Center Enterprise, from http://www.lan-secure.c0m/d0wnl0ads.htrn#netw0rk.
312. NetCrunch, from http://www.adremsoft.com/demo/download-
product. php?product=nc7&file=NCServer7Premium. exe.
313. Proxy Workbench, from http://proxyworkbench.com/.
314. Proxifier, from http://www.proxifier.com/download.htm.
315. Proxy Switcher, from http://www.proxyswitcher.com/.
316. SocksChain, from http://ufasoft.com/socks/.
317. TOR (The Onion Routing), from https://www.torproject.org/download/download.
References Page 2985 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
318. Proxy, from http://www.analogx.com/contents/download/Network/proxy/Freeware.htrn.
319. Proxy Commander, from http://www.dlao.com/proxycmd/.
320. Protoport Proxy Chain, from http://www.protoport.com.
321. Proxy Tool Windows App, from http://webproxylist.com/proxy-tool-windows-app/.
322. Proxy+, from http://www.proxyplus.cz/.
323. Gproxy, from http://gpassl.com/gproxy.php.
324. FastProxySwitch, from http://www.affinity-tools.com/fps/.
325. Fiddler, from http://www.fiddler2.com/fiddler2/version.asp.
326. ProxyFinder Enterprise, from http://www.proxy-tool.com.
327. Socks Proxy Scanner, from http://www.mylanviewer.com.
328. ezProxy, from https://www.0clc.0rg/ezpr0xy/d0wnl0ad.en.h.tml.
329. Charles, from http://www.charlesproxy.com/.
330. J AP Anonymity and Privacy, from http://anon.inf.tu-dresden.de/win/download_en.html.
331. UltraSurf, from http://www.ultrasurf.us.
332. CC Proxy Server, from http://www.youngzsoft.net/ccproxy/proxy-server-download.htm.
333. WideCap, from http://widecap.ru.
334. FoxyProxy Standard, from https://addons.mozilla.org.
335. ProxyCap, from http://www.proxycap.com.
336. Super Network Tunnel, from http://www.networktunnel.net.
337. HTTP-Tunnel, from http://www.http-tunnel.com.
338. Bitvise, from http://www.bitvise.com.
339. Psiphon, from http://psiphon.ca.
340. Your-Freedom, from http://www.your-freedom.net.
341. J ust Ping, from http://www.just-ping.com.
342. WebSitePulse, from http://www.websitepulse.com.
343. G-Zapper, from http://www.dummysoftware.com/gzapper.html.
344. Mowser, from http://www.mowser.com.
345. Spotflux, from http://www.spotflux.com.
346. Anonymous Web Surfing Tool, from http://www.anonymous-surfing.com.
347. U-Surf, from http://ultimate-anonymity.com.
348. Hide Your IP Address, from http://www.hideyouripaddress.net.
349. WarpProxy, from http://silent-surf.com.
350. Anonymizer Universal, from http://www.anonymizer.com.
351. Hope Proxy, from http://www.hopeproxy.com.
352. Guardster, from http://www.guardster.com.
353. Hide My IP, from http://www.privacy-pro.com/features.html.
Module 04: Enumeration
354. rpcinfo, from http://www.usoft.spb.ru/commands/rpcinfo/.
355. RPCCLIENT, from http://www.sarata.com/manpages/manl/rpcclient.html.
References Page 2986 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
356. Enumeration, from http://www.edenofire.com/tutes/hack.php.
357. smtp-user-enum User Documentation, from http://pentestmonkey.net/tools/user-enumeration/smtp-
user-enum.
358. Chris Gates, (2006), Windows Enumeration: USER2SID & SID2USER, from
http://www.windowsecurity.com/whitepaper/Windows-Enumeration-USER2SID-SID2USER.html.
359. What is SNMP?, from http://www.wtcs.org/snmp4tpc/snmp.htm.
360. SNMP, from http://www.cisc0.c0m/univercd/cc/td/d0c/cisintwk/it0_d0c/snmp.htm#xt0cid5.
361. SNMPForDummies, from http://wiki.outboundindex.net/SNMPForDummies.
362. J an van Oorschot, J eroen Wortelboer and Dirk Wisse, (2001), SNMP - The Mission Statement,
http://www.securityfocus.com/infocus/1301.
363. rpcinfo(lM), from http://docs.hp.com/en/B2355-90692/rpcinfo.lM.html.
364. GRAPE- INFO- DOT- COM, from http://www.grape-info.com.
365. J oris Evers, (2006), AT&T hack exposes 19,000 identities, from http://news.cnet.com/2100-1029_3-
6110765.html.
366. SNMP from http://www.iss.net/security_center/advice/Reference/Networking/SNMP/default.htm.
367. Simple Network Management Protocol (SNMP), from
http://www.cisco.com/en/US/docs/internetworking/technology/handbook/SNMP.html.
368. Linux / Unix finger command, from http://www.computerhope.com/unix/ufinger.htm.
369. Chris Gates, (2006), Windows Enumeration: USER2SID & SID2USER
http://www.windowsecurity.com/whitepapers/Windows-Enumeration-USER2SID-SID2USER.html.
370. SuperScan, from http://www.mcafee.com/us/downloads/free-tools/superscan.aspx.
371. Hyena, from http://www.systemtools.com/hyena/trial_download.htm.
372. Winfingerprint, from http://www.winfingerprint.com.
373. NetBIOS Enumerator, from http://nbtenum.sourceforge.net/.
374. PsTools, from http://technet.microsoft.com/en-us/sysinternals/bb897553.aspx.
375. OpUtils, from http://www.manageengine.com/products/oputils/download.html.
376. SolarWind's IP Network Browser, from http://www.solarwinds.com/engineers-toolset/ip-network-
browser.aspx.
377. Getif, from http://www.wtcs.org/snmp4tpc/getif.htm.
378. OiDViEW SNMP MIB Browser, from http://www.oidview.com/mibbrowser.html.
379. iReasoning MIB Browser, from http://ireasoning.com/mibbrowser.shtml.
380. SNScan, from http://www.mcafee.com/us/downloads/free-tools/snscan.aspx.
381. SNMP Scanner, from http://www.secure-bytes.com/SNMP+Scanner.php.
382. SNMP Informant, from http://www.snmp-informant.com/.
383. Net-SNMP, from http://net-snmp.sourceforge.net/download.html.
384. Nsauditor Network Security Auditor, from
http://www.nsaudit0r.c0m/netw0rk_security/netw0rk_security_audit0r.html#.UV7LH5NHLZ4.
385. Spiceworks, from http://www.spiceworks.com/free-snmp-network-management-software/.
386. Enum4linux, from http://labs.portcullis.co.uk/application/enum4linux/.
387. Softerra LDAP Administrator, from http://www.ldapadministrator.com/.
388. J Xplorer, from http://www.jxplorer.org/.
389. LDAP Admin Tool, from http://www.ldapsoft.com/ldapbrowser/ldapadmintool.html.
References Page 2987 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
390. LDAP Account Manager, from https://www.ldap-account-manager.org/lamcms/.
391. LEX - The LDAP Explorer, from http://www.ldapexplorer.com/.
392. LDAP Admin, from http://www.ldapadmin.org/.
393. Active Directory Explorer, from http://technet.microsoft.com/en-us/sysinternals/bb963907.aspx.
394. LDAP Administration Tool, from http://sourceforge.net/projects/ldap-at/.
395. LDAP Search, from http://securityxploded.com/ldapsearch.php.
396. Active Directory Domain Services Management Pack, from http://www.microsoft.com/en-
us/download/details.aspx?id=21357.
397. LDAP Browser/Editor, from http://www.novell.com/coolsolutions/tools/13765.html.
398. NSLookup, from http://www.kloth.net/services/nslookup.php.
Module 05: System Hacking
399. Why Keyloggers are extremely dangerous?, from http://gamecreator.hubpages.com/hub/Why-
Keyloggers-are-extremely-dangerous.
400. Steganography in Depth, from http://www.crcnetbase.com/doi/abs/10.1201/9780203504765.ch4.
401. Detecting spoofed packets, from http://ieeexplore.ieee.0rg/xpl/articleDetails.jsp?arnumber=1194882.
402. NTLM Authentication in J ava, from http://www.luigidragone.com/software/ntlm-authentication-in-java/.
403. A Tutorial Review on Steganography, from http://www.jiit.ac.in/jiit/ic3/IC3_2008/IC3-
2008/APP2_21.pdf.
404. network scanning, from http://searchmidmarketsecurity.techtarget.com/definition/network-scanning.
405. Ricky M. Magalhaes, (2004), Using passwords as a defense mechanism to improve Windows security,
from www.windowsecurity.com/artides/Passwords_lmprove_Windows_Security_Part2.html.
406. Piazza & Peter, (2002), Hybrid threats have rosy future: attacks that combine virus ...,
http://findartides.com/p/articles/mi_hb6380/is_200207/ai_n25618875?tag=content;coll.
407. Andreas Westfeld and Andreas Pfitzmann, Attacks on Steganographic Systems, citeseerx.ist.psu.edu/.
408. DaijiSanai and HidenobuSeki, (2004), Optimized Attack for NTLM2 Session Response
http://www.blackhat.com/presentations/bh-asia-04/bh-jp-04-pdfs/bh-jp-04-seki.pdf.
409. Zhi Wang, Xuxian J iang, Weidong Cui, and Xinyuan Wang, Countering Persistent Kernel Rootkits Through
Systematic Hook Discovery, http://research.microsoft.com/en-us/um/people/wdcui/papers/hookmap-
raid08.pdf.
410. Elia Florio, When Malware Meets Rootkits,
http://www.symantec.com/avcenter/reference/when.malware.meets.rootkits.pdf.
411. Peter Piazza, (2002), SMO: Tech Talk, from http://www.securitymanagement.com/library/001272.html.
412. Brute force attack - Wikipedia, the free encyclopedia, from
http://en.wikipedia.org/wiki/Brute_force_attack.
413. Talk:Brute force attack - Bvio, from http://bvio.ngic.re.kr/Bvio/index.php/Talk:Brute_force_attack.
414. Passwords, from
http://searchsecurity.techtarget.com/searchSecurity/downloads/HackingforDummiesCh07.pdf.
415. Authernative, Inc. | Products | FAQs, from http://www.authernative.com/faqs.shtml.
416. CIAC Notes, from http://www.ciac.org/ciac/notes/Notes03a.shtml.
417. Path: newshost.uwo.caluwovax.uwo.calmneville From: mneville@uwovax ..., from
http://www.uwo.ca/its/doc/newsletters/lnTouch/voll-9495/winl8.txt.
418. The Hack FAQ: Password Basics, from http://www.nmrc.org/pub/faq/hackfaq/hackfaq-04.html.
References Page 2988 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
419. Luigi Dragone, NTLM Authentication in J ava, from http://www.luigidragone.com/networking/ntlm.html.
420. Hardening the Base Windows 2000 Server, from
http://www.microsoft.com/technet/security/prodtech/windows2000/secwin2k/swin2k06.mspx.
421. Bill Wall, Sunbelt TECH BRIEFING, from http://www.stratvantage.com/security/ntpass.htm.
422. Security Options, from
http://www.microsoft.com/technet/security/topics/serversecurity/tcg/tcgch05n.mspx.
423. Technical Explanation of Network SMB Capture, from
http://ebook.coolersky.com/hack/lc5.04_doc/smb_capture.html.
424. Detecting Alternate Data Streams, from
http://www.windowsitpro.com/Article/ArtidelD/16189/16189.html.
425. Bojan Smojver, Linux Today - ZDNet Australia: Threats Move Beyond Linux to Windows,
http://www.linuxtoday.com/security/2002121100426SCSVNT.
426. Neohapsis Archives - NTBugtraq - Proposal for protection from ..., from
http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0245.html.
427. Russell Kay, (2006), Sidebar: A Simple Rootkit Example,
http://www.computerworld.eom/securitytopics/security/hacking/story/0,10801,108116,00. html?from=s
tory_package.
428. Russell Kay, (2006), Rootkits offer the lure of total control, from
http://www.tech world. com/security/features/index.cfm?featureid=2219.
429. Paladion Networks, from http://www.paladion.net/media/insights/ihfaq.htm.
430. NTFS Streams - Everything you need to know (demos and tests included), from
http://www.diamondcs.com.au/streams/streams.htm.
431. H. Carvey, (2002), The Dark Side of NTFS (Microsoft's Scarlet Letter), from
http://www.infosecwriters.com/texts.php?op=display&id=53.
432. Stegonography (a secretly hidden coding that dates back to ancient...), from
http://www.wordinfo.info/words/index/info/view_unit/3403/?letter=S&spage=9.
433. Ravindranath AV, Steganography: Hiding Data in Images, from
http://www.asptoday.com/Content.aspx?id=2347.
434. Paul Robertson, (2005), CS 450 Homework 4, from
http://www.cs.umb.edu/~paulr/CS450/assignments/ass4.html.
435. NBTdeputy (v 1.0.1), from http://www.securityfriday.com/Topics/winxpl.html.
436. Sir Dystic, (2002), NBName, from
http://www.securityfocus.com/comments/tools/1670/12751/threaded.
437. Fred B. Schneider, Authentication, from http://www.cs.cornell.edu/Courses/cs513/2000sp/NL10.html.
438. CS513: System Security - Topic Outline, from
http://www.cs.cornell.edu/courses/cs513/2005fa/02.outline.html.
439. Security Options from
http://www.microsoft.com/technet/security/guidance/serversecurity/tcg/tcgch05n.mspx.
440. Hardening the Base Windows 2000 Server, http://technet.microsoft.com/hi-in/library/cc751216(en-
us).aspx.
441. Brute force attack, from http://www.reference.com/browse/wiki/Brute_force_attack.
442. What is pwdump2, from
http://www.bindview.com/Services/razor/Utilities/Windows/pwdump2_readme.cfm.
443. Derogee, Steganography and Steganalysis, from http://www.liacs.nl/home/tmoerlan/privtech.pdf.
References Page 2989 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
444. Techworld.com - Rootkits offer the lure of total control, from
http://www.tech world. com/websecurity/features/index.cfm?featureid=2219&pagtype=samecatsamech
an.
445. Dasmith, Software Analysis, from http://www.unc.edu/~smithdr/inlsl87/sr.html.
446. Hacking Windows-Specific Services, from
http://awkwardalliteration.com/ebooks/Computers/Hacking%20Exposed-
%20Windows%202003%20Chapter%205.pdf.
447. Ricky M. Magalhaes, (2003), Using passwords as a defense mechanism to improve Windows security,
from http://www.windowsecurity.com/articles/Passwords_lmprove_Windows_Security_Part2.html.
448. Winrtgen, from http://www.oxid.it/projects.html.
449. RainbowCrack, from http://pr0ject-rainb0wcrack.c0m/index.htm#d0wnl0ad.
450. Elcomsoft Distributed Password Recovery, from http://www.elcomsoft.com/edpr.html.
451. Securityoverride, from http://securityoverride.org/default-password-list.
452. Cirt, from http://cirt.net.
453. Default-password, from http://default-password.info.
454. Defaultpassword, from http://www.defaultpassword.us.
455. Passwordsdatabase, from http://www.passwordsdatabase.com.
456. W3dt, from https://w3dt.net/tools/defaultpasswords/.
457. Virus, from http://www.virus.org/default_passwds.
458. Open-sez.me, from http://open-sez.me/passwd.htm.
459. Routerpasswords, from http://www.routerpasswords.com/.
460. Fortypoundhead, from http://www.fortypoundhead.com/tools_dpw.asp.
461. pwdump7, from http://www.tarasco.org/security/pwdump_7/.
462. fgdump, from http://www.foofus.net/~fizzgig/fgdump/.
463. LOphtCrack, from http://www.IOphtcrack.com/download.html.
464. Ophcrack, from http://ophcrack.sourceforge.net/download.php.
465. RainbowCrack, from http://pr0ject-rainb0wcrack.c0m/index.htm#d0wnl0ad.
466. Password Unlocker Bundle, from http://www.passwordunlocker.com/password-recovery-bundle.html.
467. Proactive System Password Recovery, from http://www.elcomsoft.com/pspr.html.
468. J ohn the Ripper, from http://www.openwall.com/john/.
469. Windows Password Cracker, from http://www.windows-password-cracker.com/download.html.
470. WinPassword, from http://lastbit.com/ntpsw/default.asp.
471. Passware Kit Enterprise, from http://www.lostpassword.com/kit-enterprise.htm.
472. PasswordsPro, from http://www.insidepro.com/eng/passwordspro.shtml.
473. LSASecretsView, from http://www.nirsoft.net/utils/lsa_secrets_view.html.
474. LCP, from http://www.lcpsoft.com/english/download.htm.
475. Password Cracker, from http://www.amlpages.com/pwdcrack.shtml.
476. Kon-Boot, from http://www.thelead82.com/kon-boot/konbootWIN.html.
477. Windows Password Recovery Tool, from http://www.windowspasswordsrecovery.com/.
478. Hash Suite, from http://hashsuite.openwall.net/download.
479. SAMInside, from http://www.insidepro.com/eng/saminside.shtml.
References Page 2990 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
480. Windows Password Recovery, from http://www.passcape.com/windows_password_recovery.
481. Password Recovery Bundle, from http://www.top-password.com/password-recovery-bundle.html.
482. krbpwguess, from http://www.cqure.net/wp/tools/password-recovery/krbpwguess/.
483. Windows Password Breaker Enterprise, from http://www.recoverwindowspassword.com/windows-
password-breaker.html.
484. Rekeysoft Windows Password Recovery Enterprise, from http://www.rekeysoft.com/reset-windows-
password.html.
485. Active(Password Changer, from http://www.password-changer.com/.
486. Offline NT Password & Registry Editor, from http://pogostick.net/~pnh/ntpasswd/.
487. Windows Password Reset Kit, from http://www.reset-windows-password.net/.
488. Windows Password Recovery Tool, from http://www.windowspasswordsrecovery.com/.
489. ElcomSoft System Recovery, from http://www.elcomsoft.eom/esr.html#forgot administrator password.
490. Trinity Rescue Kit, from
http://trinityhome.org/Home/index.php?content=TRINITY_RESCUE_KIT_DOWNLOAD&front_id=12&lang
=en&locale=en.
491. Windows Password Recovery Bootdisk, from http://www.rixler.com/windows-password-recovery-
bootdisk.htm.
492. PasswordLastic, from http://www.passwordlastic.com/windows-password-recovery-lastic.
493. Stellar Phoenix Password Recovery, from http://www.stellarinfo.com/password-recovery.htm.
494. Windows Password Recovery Personal, from http://www.windows-passwordrecovery.com/.
495. Windows Administrator Password Reset, from http://www.systoolsgroup.com/windows-adminstrator-
password-reset.html.
496. RemoteExec, from http://www.isdecisions.com/products/remoteexec.
497. PDQ Deploy, from http://www.adminarsenal.com/download-pdq.
498. DameWare NT Utilities, from http://www.dameware.ru/nt_utilities.html.
499. Spytech SpyAgent, from http://www.spytech-web.com/spyagent.shtml.
500. All In One Keylogger, from http://www.relytec.com/.
501. Ultimate Keylogger, from http://www.ultimatekeylogger.com/download/.
502. Advanced Keylogger, from http://www.mykeylogger.com/perfect-keylogger.
503. The Best Keylogger, from http://www.thebestkeylogger.com/.
504. SoftActivity Keylogger, from http://www.softactivity.com/download-al.asp.
505. Elite Keylogger, from http://www.widestep.com/elite-keystroke-recorder-info.
506. Powered Keylogger, from http://www.mykeylogger.com/undetectable-keylogger/.
507. StaffCop Standard, from http://www.staffcop.com/download/.
508. iMonitorPC, from http://www.imonitorpc.com/.
509. PC Activity Monitor Standard, from http://www.pcacme.com/download.html.
510. KeyProwler, from http://keyprowler.com/download.aspx.
511. Keylogger Spy Monitor, from http://ematrixsoft.com/download.php?p=keylogger-spy-monitor-software.
512. REFOG Personal Monitor, from http://www.refog.com/personal-monitor.html.
513. Actual Keylogger, from http://www.actualkeylogger.com/download-free-key-logger.html.
514. Spytector, from http://www.spytector.com/download.html.
References Page 2991 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
515. KidLogger, from http://kidlogger.net/download.html.
516. PC Spy Keylogger, from http://www.pc-spy-keylogger.com.
517. Revealer Keylogger, from http://www.logixoft.com/free-keylogger-download.
518. Spy Keylogger, from http://www.spy-key-logger.com/download.html.
519. Actual Spy, from http://www.actualspy.com/download.html.
520. SpyBuddy2013, from http://www.exploreanywhere.com/products/spybuddy/.
521. Amac Keylogger, from http://www.amackeylogger.com/.
522. Aobo Mac OS X KeyLogger, from http://www.keylogger-mac.com/.
523. Perfect Keylogger for Mac, from http://www.blazingtools.com.
524. Award Keylogger for Mac, from http://www.award-soft.com/content/view/275/136.
525. Mac Keylogger, from http://www.award-soft.com/Mac_Keylogger/.
526. REFOG Keylogger for MAC, from http://www.refog.com/mac-keylogger.html.
527. KidLogger for MAC, from http://kidlogger.net/download.html.
528. MAC Log Manager, from http://www.keylogger.in/keylogger/madogmanager.html.
529. logkext, from https://c0de.g00gle.c0m/p/l0gkext/.
530. Keyboard Spy, from http://alphaomega.software.free.fr/keyboardspy/Keyboard%20Spy.html.
531. FreeMacKeylogger, from http://www.hwsuite.com/free-mac-keylogger/.
532. KeyGrabber, from http://www.keydemon.com.
533. KeyGhost, from http://www.keyghost.com.
534. Activity Monitor, from http://www.softactivity.com/download.asp.
535. Remote Desktop Spy, from http://www.global-spy-software.com/download.php.
536. SSPro, from http://www.gpsoftdev.com/download-monitoring-software/.
537. RecoveryFix Employee Activity Monitor, from http://www.recoveryfix.com/download-employee-
monitoring.html.
538. Employee Desktop Live Viewer, from http://www.nucleustechnologies.com/download-employee-
desktop-live-viewer.php.
539. NetVizor, from http://www.netvizor.net/download.htm.
540. Net Spy Pro, from http://www.net-monitoring-software.com/windows/trial.html.
541. REFOG Employee Monitor, from http://www.refog.com/employee-computer-monitoring-software.html.
542. OsMonitor, from http://www.os-monitor.com/download.htm.
543. LANVisor, from http://www.lanvisor.com/download.htm.
544. Work Examiner Standard, from http://www.workexaminer.com/download.html.
545. Power Spy, from http://ematrixsoft.com/index.php.
546. eBLASTER, from http://www.$pectorsoft.com/products/eBlaster_Windows/index.asp?source=nav-hs-
eBwin.
547. !monitor Employee Activity Monitor, from http://www.employee-monitoring-software.ee/.
548. Employee Monitoring, from http://www.employeemonitoring.net/download.asp.
549. OsMonitor, from http://www.os-monitor.com/download.htm.
550. Ascendant NFM, from http://www.ascendant-security.com/download.shtml.
551. Spylab WebSpy, from http://www.spylab.org/download.htm.
References Page 2992 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
552. Personal Inspector, from http://www.spyarsenal.com/personal-inspector/.
553. CyberSpy, from http://www.cyberspysoftware.com/download.html.
554. AceSpy, from http://www.acespy.com/features.html.
555. EmailObserver, from http://www.softsecurity.com/prod_D7_more.html.
556. Net Nanny Home Suite, from
http://www.netnanny.com/products/netnanny_home_suite/detail/technical.
557. Aobo Filter for PC, from http://www.aobo-porn-filter.com/downloads.
558. CyberSieve, from http://www.softforyou.com/cs-download.php.
559. Child Control, from http://salfeld.com/download/child-control/index.html.
560. SentryPC, from http://www.sentrypc.com/trial.htm.
561. iProtectYou Pro, from http://www.softforyou.com/ip-index.html.
562. K9 Web Protection, from http://wwwl.k9webprotection.com/getk9/download-software.
563. Verity Parental Control Software, from http://www.nchsoftware.com/childmonitoring/index.html.
564. Profil Parental Filter, from http://www.profiltechnology.com/en/home/profil-parental-filter.
565. PC Pandora, from http://www.pcpandora.com/download/.
566. KidsWatch, from http://www.kidswatch.com/.
567. SoftActivity TS Monitor, from http://www.softactivity.com/downloadtsm.aspx.
568. Desktop Spy, from http://www.spyarsenal.com/download.html.
569. IcyScreen, from http://www.16software.com/icyscreen/screenshots.php.
570. Spector Pro, from http://www.spectorsoft.com/products/SpectorPro_Windows/index.asp?source=nav-
hs-ProWin.
571. PC Tattletale, from http://www.pctattletale.com/.
572. Computer Screen Spy Monitor, from http://www.mysuperspy.com/download.htm.
573. PC Screen Spy Monitor, from http://ematrixsoft.com/download.php?p=pc-screen-spy-monitor-software.
574. Kahlown Screen Spy Monitor, from http://www.lesoftrejion.com/.
575. Guardbay Remote Computer Monitoring Software, from http://www.guardbay.com.
576. HT Employee Monitor, from http://www.hidetools.com/employee-monitor.html.
577. Spy Employee Monitor, from http://www.spysw.com/employee-monitor-software.htm.
578. USBSpy, from http://www.everstrike.com/usb-monitor/.
579. USB Monitor, from http://www.hhdsoftware.com/usb-monitor.
580. USB Grabber, from http://usbgrabber.sourceforge.net/.
581. USBTrace, from http://www.sysnudeus.com/usbtrace_download.html.
582. USBDeview, from http://www.nirsoft.net/utils/usb_devices_view.html.
583. Advanced USB Port Monitor, from http://www.aggsoft.com/usb-port-monitor.htm.
584. USB Monitor Pro, from http://www.usb-monitor.com/.
585. USB Activity Monitoring Software, from http://www.datadoctor.org/partition-recovery/downloads.html.
586. Stealth iBot Computer Spy, from
http://www.brickhousesecurity.com/product/stealth+ibot+computer+spy.do.
587. KeyCarbon USB Hardware Keylogger, from http://www.spywaredirect.net/keycarbon-usb.html.
588. USB 2GB Keylogger, from http://diij.com/KL2-Keylogger-2GB-USB-Hardware-keelog/prod_24.html.
References Page 2993 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
589. Spy Voice Recorder, from http://www.mysuperspy.com/recorder.htm.
590. Sound Snooper, from http://www.sound-snooper.com/en/download.php.
591. WebCam Recorder, from http://webcamrecorder.com/.
592. WebcamMagic, from http://www.robomagic.com/webcammagic.htm.
593. MyWebcam Broadcaster, from http://www.eyespyfx.com/broadcast.php.
594. I-Can-See-You, from http://www.internetsafetysoftware.com.
595. Digi-Watcher, from http://www.digi-watcher.com/.
596. NET Video Spy, from http://www.sarbash.com/download.shtml.
597. Eyeline Video Surveillance Software, from http://www.nchsoftware.com/surveillance/index.html.
598. Capturix VideoSpy, from http://www.capturix.com/default.asp?target=consumer&product=cvs.
599. WebCam Looker, from http://felenasoft.com/webcamlooker/en/.
600. SecuritySpy, from http://www.bensoftware.com/securityspy/download.html.
601. iSpy, from http://www.ispyconnect.com/download.aspx.
602. Printer Activity Monitor, from http://www.redline-software.com/eng/products/pam/.
603. Print Monitor Pro, from http://www.spyarsenal.com/printer-monitoring-software/print-monitor-pro/.
604. Accurate Printer Monitor, from http://www.aggsoft.com/printer-monitor.htm.
605. Print Censor Professional, from http://usefuls0ft.c0m/print-cens0r/#.UWPW8J NHLZ4.
606. All-Spy Print, from http://www.all-spy.com/all-spy-print.html.
607. O&K Print Watch, from http://www.prnwatch.com/okpw.html.
608. Print J ob Monitor, from http://www.imonitorsoft.com/product-print-job-monitor.htm.
609. PrintTrak, from http://www.lygil.com/printtrak/printtrak.htm.
610. Printer Admin - Copier Tracking System, from http://www.printeradmin.com/copy-management.htm.
611. Print Inspector, from http://www.softperfect.com/products/pinspector/.
612. Print365, from http://krawasoft.com/index.html.
613. Mobile Spy, from http://www.phonespysoftware.com/.
614. VRS Recording System, from http://www.nch.com.au/vrs/index.html.
615. Modem Spy, from http://www.modemspy.com/en/download.php.
616. MobiStealth Cell Phone Spy, from http://www.mobistealth.com/mobile-phone-spy-software.
617. SPYPhone GOLD, from http://spyera.com/products/spyphone-gold-internet.
618. SpyPhoneTap, from http://www.spyphonetap.com/.
619. FlexiSPY OMNI, from http://www.flexispy.com/en/flexispy-omni-spy-app-cell-phone.htm.
620. SpyBubble, from http://www.spybubble.com/cell-phone-spy.php.
621. MOBILE SPY, from http://www.mobile-spy.com/.
622. StealthGenie, from http://www.stealthgenie.com/.
623. CellSPYExpert, from http://www.cellspyexpert.com/.
624. SPYPhone, from http://spyera.com/products/spy-phone-basic-internet.
625. EasyGPS, from http://www.easygps.com/.
626. FlexiSPY PRO-X, from http://www.flexispy.com/spyphone-call-interceptor-gps-tracker-symbian.htm.
627. GPS TrackMaker Professional, from http://www.trackmaker.com/dwlpage.php.
628. MOBILE SPY, from http://www.mobile-spy.com/.
References Page 2994 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
629. World-Tracker, from http://www.world-tracker.com/v4/.
630. ALL-in-ONE Spy, from http://www.thespyphone.com/allinone.html.
631. Trackstick, from http://www.trackstick.com/download.html.
632. MobiStealth Pro, from http://www.mobistealth.com.
633. mSpy, from http://www.buymspy.com/.
634. GPS Retriever, from http://www.mobilebugstore.com/Blackberry_gps_retriver.aspx.
635. Zemana AntiLogger, from http://www.zemana.com/Download.aspx.
636. Anti-Keylogger, from http://www.anti-keyloggers.com/.
637. PrivacyKeyboard, from http://www.anti-
keylogger.eom/products/privacykeyboard/overview.html#download.
638. DefenseWall HIPS, from http://www.softsphere.com/programs/.
639. KeyScrambler, from http://www.qfxsoftware.com/download.htm.
640. 1Hate Keyloggers, from http://dewasoft.com/privacy/i-hate-keyloggers.htm.
641. SpyShelter STOP-LOGGER, from http://www.spyshelter.com/download-spyshelter.
642. DataGuard AntiKeylogger Ultimate, from http://www.maxsecuritylab.com/dataguard-anti-
keylogger/download-anti-keyloger.php.
643. PrivacyKeyboard, from http://www.privacykeyboard.com/privacy-keyboard.html.
644. Elite Anti Keylogger, from http://www.elite-antikeylogger.com/free-download.html.
645. CoDefender, from https://www.encassa.com/downloads/default.aspx.
646. PC Tools Spyware Doctor, from http://www.pctools.com/spyware-doctor/.
647. SUPERAntiSpyware, from http://superantispyware.com/index.html.
648. Spyware Terminator 2012, from http://www.pcrx.com/spywareterminator/.
649. Ad-Aware Free Antivirus+, from http://www.lavasoft.com/products/ad_aware_free.php.
650. Norton Internet Security, from http://in.norton.com/downloads-trial-norton-internet-security.
651. SpyHunter, from http://www.enigmasoftware.com/products/.
652. Kaspersky Internet Security 2013, from http://www.kaspersky.com/internet-security-free-trial.
653. SecureAnywhere Complete 2012, from http://www.webroot.com/En_US/consumer-products-
secureanywhere-complete.html.
654. MacScan, from http://macscan.securemac.com/.
655. Spybot - Search & Destroy, from http://www.safer-networking.org/dl/.
656. Malwarebytes Anti-Malware PRO, from http://www.malwarebytes.org/products/malwarebytes_pro/.
657. Fu, from http://www.f-secure.com/v-descs/fu.shtml.
658. KBeast, from http://core.ipsecs.com/rootkit/kernel-rootkit/kbeast-vl/.
659. Hacker Defender HxDef Rootkit, from http://vishnuvalentino.com/hacking-tutorial/hacker-defender-
hxdef-rootkit-tutorial-in-10-steps-nostalgia/.
660. Stinger, from http://www.mcafee.com/us/downloads/free-tools/how-to-use-stinger.aspx.
661. UnHackMe, from http://www.greatis.com/unhackme/download.htm.
662. Virus Removal Tool, from http://www.sophos.com/en-us/products/free-tools/virus-removal-tool.aspx.
663. Hypersight Rootkit Detector, from http://northsecuritylabs.com/.
664. Avira Free Antivirus, from http://www.avira.com/en/avira-free-antivirus.
665. SanityCheck, from http://www.resplendence.com/downloads.
References Page 2995 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
666. GMER, from http://www.gmer.net/.
667. Rootkit Buster, from
http://downloadcenter.trendmicro. com/index. php?regs=NABU&dk=result_page&dkval=drop_list&catid
=6&prodid=155.
668. Rootkit Razor, from http://www.tizersecure.com/.
669. RemoveAny, from http://www.free-anti-spy.com/en/index.php.
670. TDSSKiller, from http://support.kaspersky.com/5350?el=88446.
671. Prevx, from http://www.prevx.com/freescan.asp.
672. StreamArmor, from http://securityxploded.com/streamarmor.php.
673. ADS Spy, from http://www.merijn.nu/programs.php#adsspy.
674. ADS Manager, from http://dmitrybrant.com/adsmanager.
675. Streams, from http://technet.microsoft.com/en-us/sysinternals/bb897440.aspx.
676. AlternateStreamView, from http://www.nirsoft.net/utils/alternate_data_streams.html.
677. NTFS-Streams: ADS manipulation tool, from http://sourceforge.net/projects/ntfs-ads/.
678. Stream Explorer, from http://www.rekenwonder.eom/streamexplorer.htm#Streams.
679. ADS Scanner, from http://www.pointstone.com/products/ADS-Scanner/.
680. RKDetector, from http://www.rkdetector.com/.
681. GMER, from http://www.gmer.net/.
682. HijackThis, from http://www.trendmicro.com/us/security/products/index.html.
683. SNOW, from http://www.darkside.com.au/snow/index.html.
684. QuickStego, from http://quickcrypto.com/free-steganography-software.html.
685. Hide In Picture, from http://sourceforge.net/projects/hide-in-picture/.
686. gifshuffle, from http://www.darkside.com.au/gifshuffle/index.html.
687. CryptaPix, from http://www.briggsoft.com/cpix.htm.
688. BMPSecrets, from http://bmpsecrets.com/.
689. OpenPuff, from http://embeddedsw.net/OpenPuff_Steganography_Home.html.
690. OpenStego, from http://openstego.sourceforge.net/.
691. PHP-Class StreamSteganography, from http://www.phpclasses.org/package/6027-PHP-Store-and-
hidden-information-in-PNG-images.html.
692. Red J PEG, from http://www.totalcmd.net/plugring/redjpeg.html.
693. Steganography Studio , from http://stegstudio.sourceforge.net/.
694. Virtual Steganographic Laboratory (VSL), from http://vsl.sourceforge.net/.
695. wbStego, from http://wbstego.wbailer.com/.
696. Merge Streams, from http://www.ntkernel.com/w&p.php?id=23.
697. Office XML, from http://www.irongeek.com/i.php?page=security/ms-office-stego-code.
698. Data Stash, from http://www.skyjuicesoftware.com/software/ds_info.html.
699. FoxHole, from http://foxhole.sourceforge.net.
700. Xidie Security Suite, from http://www.stegano.ro.
701. StegParty, from http://www.fasterlight.com.
702. Hydan, from http://www.crazyboy.com/hydan/.
References Page 2996 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
703. StegJ , from http://sourceforge.net/projects/stegj/files/.
704. StegoStick, from http://stegostick.sourceforge.net/.
705. SNOW, from http://www.darkside.com.au/snow/index.html.
706. OmniHide PRO, from http://omnihide.com/.
707. Our Secret, from http://www.securekit.net/oursecret.htm.
708. RT Steganography, from http://rtstegvideo.sourceforge.net/.
709. Masker, from http://www.softpuls.com/masker/.
710. Max File Encryption, from http://www.softeza.com/fileencryption/.
711. MSU StegoVideo, from http://www.compression.ru/video/stego_video/index_en.html.
712. BDV DataHider, from http://www.bdvnotepad.com/products/bdv-datahider/.
713. StegoStick, from http://stegostick.sourceforge.net/.
714. OpenPuff, from http://embeddedsw.net/OpenPuff_Steganography_Home.html.
715. Stegsecret, from http://stegsecret.sourceforge.net/.
716. PSM Encryptor, from http://demo.powersoftmakers.com/psme.zip.
717. DeepSound, from http://jpinsoft.net/DeepSound/Download.aspx.
718. Mp3stegz, from http://mp3stegz.sourceforge.net/.
719. MAXA Security Tools, from http://www.maxa-tools.com/mst.php?lang=en.
720. BitCrypt, from http://bitcrypt.moshe-szweizer.com/.
721. MP3Stego, from http://www.petitcolas.net/fabien/steganography/mp3stego/.
722. Hide4PGP, from http://www.heinz-repp.onlinehome.de/.
723. CHAOS Universal, from http://safechaos.com/cu.htm.
724. SilentEye, from http://www.silenteye.org/.
725. QuickCrypto, from http://www.quickcrypto.com/download.html.
726. CryptArkan, from
http://www.kuskov.com/component/option,com_remository/ltemid,30/func,fileinfo/id,l/.
727. StegoStick, from http://stegostick.sourceforge.net/.
728. Invisible Secrets 4, from http://www.invisiblesecrets.com/.
729. Folder Lock, from http://www.newsoftwares.net/folderlock/.
730. A+Folder Locker, from http://www.giantmatrix.com/products/aplus-folder-locker/.
731. Toolwiz BSafe, from http://www.toolwiz.com/products/toolwiz-bsafe/.
732. Hide Folders 2012, from http://fspro.net/hide-folders/.
733. GiliSoft File Lock Pro, from http://www.gilisoft.com/product-file-lock-pro.htm.
734. Universal Shield, from http://www.everstrike.com/shield.htm.
735. WinMend Folder Hidden, from http://www.winmend.com/folder-hidden/.
736. Encrypted Magic Folders , from http://www.pc-magic.c0m/des.htm#emf.
737. QuickCrypto, from http://www.quickcrypto.com/download.html.
738. Max Folder Secure, from http://www.maxfoldersecure.com/.
739. Spam Mimic, from http://www.spammimic.com/.
740. Sams Big G Play Maker, from http://www.scramdisk.clara.net/.
741. Gargoyle Investigator Forensic Pro, from http://wetst0netech.c0m/pr0duct/2/d0wnl0ads.
References Page 2997 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
742. XStegsecret, from http://stegsecret.sourceforge.net/.
743. Stego Suite, from http://www.wetst0netech.c0m/pr0duct/l/d0wnl0ads.
744. StegAlyzerAS, from http://www.sarc-wv.com/products/stegalyzeras/.
745. StegAlyzerRTS, from http://www.sarc-wv.com/products/stegalyzerrts/.
746. StegSpy, from http://www.spy-hunter.com/stegspy.
747. StegAlyzerSS, from http://www.sarc-wv.com/products/stegalyzerss/.
748. StegMarkSDK, from http://www.datamark.com.sg/downloads-sdk.htm.
749. Steganography Studio, from http://stegstudio.sourceforge.net/.
750. Virtual Steganographic Laboratory (VSL), from http://vsl.sourceforge.net/.
751. Stegdetect, from http://www.outguess.org/detection.php.
752. Auditpol, from http://technet.microsoft.com/en-us/library/cc755264(v=ws.l0).aspx.
753. CCIeaner, from http://www.piriform.com/download.
754. MRU-Blaster, from http://www.brightfort.com/mrublaster.html.
755. Wipe, from http://privacyroot.com/software/www/en/wipe.php.
756. Tracks Eraser Pro, from http://www.acesoft.net/features.htm.
757. BleachBit, from http://bleachbit.sourceforge.net/news/bleachbit-093.
758. AbsoluteShield Internet Eraser Pro, from http://www.internet-track-eraser.com/ineteraser.php.
759. Clear My History, from http://www.hide-my-ip.com/clearmyhistory.shtml.
760. EvidenceEraser, from http://www.evidenceeraser.com/.
761. WinTools.net Professional, from http://www.wintools.net/.
762. RealTime Cookie & Cache Cleaner (RtC3), from http://www.kleinsoft.co.za/buy.html.
763. AdvaHist Eraser, from http://www.advacrypt.cjb.net/.
764. Free Internet Window Washer, from http://www.eusing.com/Window_Washer/Window_Washer.htm.
Module 06: Trojans and Backdoors
765. Placing Backdoors through Firewalls, from http://www.cyberwarzone.com/cyberwarfare/placing-
backdoors-through-firewalls.
766. A Deep Look into Netcat - The TCP/IP Swiss Army Knife, from http://www.linux-support.com/cms/a-
deep-look-into-netcat-the-tcpip-swiss-army-knife/.
767. Trojans Revealed: Hackers Center: Internet Security Archive ...,
http://www.hackerscenter.com/archive/view.asp?id=24717.
768. Dancho Danchev, The Complete Windows Trojans Paper, from
http://www.frame4.com/content/pubs/comp_trojans.txt.
769. The corporate threat posed by email Trojans, from http://www.gfisoftware.de/whitepapers/network-
protection-against-trojans.pdf.
770. Trojan Horses, from http://www-i4.informatik.rwth-aachen.de/lufg/teaching/ss2004/dependability-
seminar/paper/final8.pdf.
771. Trojans - and how to protect your network against them, from
http://www.windowsecurity.com/whitepapers/trojans_protect_your_network.html.
772. Fausi Qattan & Fredrik Thernelius, (2004), Master's Thesis, from
http://www.dsv.su.se/research/seclab/pages/pdf-files/04-34.pdf.
773. Malicious Intrusion Techniques, http://www.telecomworx.com/Adobe/Files39087.pdf.
References Page 2998 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
774. Increased use of Trojan Horse Programs, from http://www.niscc.gov.uk/niscc/docs/tn-20040216-
00080.html?lang=en.
775. Anti Trojan source - How to protect your network against trojans ..., from http://news.my-
install.com/news/45/.
776. Dancho Danchev, Trojan White Paper, from http://www.anti-trojan-software-reviews.com/trojan-white-
paper-p2.htm.
777. Trojans, from http://www.emailprivacy.info/trojans.
778. Remote Access Trojan FAQ and Port List Computer Security - Network ..., from
http://www.infosyssec.com/infosyssec/trojanportlist.html.
779. WINSNORT.com: Intrusion Detection, from
http://www.winsnort.com/modules.php?op=modload&name=FAQ&file=index&myfaq=yes&id_cat=13.
780. Trojan Horse Computer Infection Symptoms, from http://hacker-eliminator.com/trojansymptoms.html.
781. LockDown Millennium Advanced Online Help, from
http://lockdowncorp.com/manual/TrojanlnfectionSymptoms.htm.
782. Commodon Communications - Threats to your Security on the Internet, from
http://www.commodon.com/threat/threat-detect.htm.
783. Van Hauser/THC, Placing Backdoors Through Firewalls, from
http://www.cgisecurity.com/lib/placing_backdoors_through_firewalls.txt.
784. Mikejc, (2004), Tech-Recipes.com - Use System File Checker to Solve Problems, from http://www.tech-
recipes.com/windows_tips602.html.
785. Exploring the Explodable, from http://www.guninski.com/browsers.html.
786. David Wells, (1996), Wrappers, from http://www.objs.com/survey/wrap.htm.
787. Milly, Steve A., Stan, Ojatex, Gordon, Darius and Buzz, (2000), WordPad, from www.pc-
help.org/security/scrap.htm.
788. Trojans FAQ http://www.windowsecurity.com/faqs/Trojans/.
789. Information on Computer Viruses, from http://www-rohan.sdsu.edu/viruses.html.
790. Advanced Network Configuration and Troubleshooting, from http://snow.nl/dist/xhtmlc/ch05s02.html.
791. Tom Armstrong, (2001), Netcat - The TCP/IP Swiss Army Knife, from
http://rn.nu/program/util/netcat/netcat.html.
792. Microsoft - Windows File, from Protection, from
http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-
us/system_file_protection.mspx?mfr=true.
793. Scott W. Hotaling's, Placing Backdoors Through Firewalls, from http://masc2279.no-ip.org/gadgets-
toys/internet/placing-backdoors-through-firewalls.
794. How to block ICMP tunneling?, from https://listserv.icsalabs.com/pipermail/firewall-wizards/1999-
J uly/006060.html.
795. Newbie: Security, from http://www.unixgeeks.org/security/newbie/security/firewall.html.
796. Phrack Magazine 00. Volume Seven, Issue Forty-Nine File 06 o f..., from
http://www.phrack.org/phrack/49/P49-06.
797. Dancho Danchev dancho, The Complete Windows Trojans Paper, from
http://www.astalavista.com/index.php?section=directory&linkid=640.
798. Declan McCullagh, (2006), Case 2:00-cr-00170-WHA-VPM, from
http://www.politechbot.com/docs/feds.trojan.hacking.brief.082406.pdf.
799. TCPView, from http://technet.microsoft.com/en-us/sysinternals/bb897437.aspx.
References Page 2999 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
800. CurrPorts, from http://www.nirsoft.net/utils/cports.html.
801. Process Monitor, from http://technet.microsoft.com/en-in/sysinternals/bb896645.aspx.
802. What's Running, from http://www.whatsrunning.net/.
803. PrcView, from http://www.teamcti.com.
804. Winsonar, from http://www.fewbyte.com/winsonar.html.
805. HiddenFinder, from http://www.wenpoint.com/download/.
806. Autoruns for Windows, from http://technet.microsoft.com/en-us/sysinternals/bb963902.aspx.
807. KillProcess, from http://orangelampsoftware.com/products_killprocess.php.
808. Security Task Manager, from http://www.neuber.com/taskmanager/.
809. Yet Another (remote) Process Monitor, from http://yaprocmon.sourceforge.net/.
810. MONIT, from http://mmonit.com/monit/.
811. OpManager, from http://www.manageengine.com/network-monitoring/process-monitoring.html.
812. jv l6 PowerTools 2012, from http://www.macecraft.com/jvl6-powertools-2012/.
813. PC Tools Registry Mechanic, from http://www.pctools.com/registry-mechanic/.
814. Reg Organizer, from http://www.chemtable.com/organizer.htm.
815. Registry Shower, from http://www.registryshower.com/download.htm.
816. Comodo Cloud Scanner, from http://www.comodo.com/home/internet-security/cloud-scanner.php.
817. Buster Sandbox Analyzer, from http://bsa.isoftware.nl/.
818. All-Seeing Eyes, from http://www.fortego.com/en/ase.html.
819. MJ Registry Watcher, from http://www.jac0bsm.c0m/mjs0ft.htm#rgwtchr.
820. Active Registry Monitor, from http://www.devicelock.com/arm/.
821. SpyMe Tools, from http://www.lcibrossolutions.com/spyme_tools.htm.
822. Regshot, from http://regshot.sourceforge.net/.
823. Registry Live Watch, from http://leelusoft.blogspot.in/2009/ll/registry-live-watch-10.html.
824. DriverView, from http://www.nirsoft.net/utils/driverview.html.
825. Driver Detective, from http://www.drivershq.com/.
826. Unknown Device Identifier, from http://www.zhangduo.com/udi.html.
827. DriverGuide Toolkit, from http://www.driverguidetoolkit.com/.
828. DriverMax, from http://www.innovative-sol.com/drivermax/index.htm.
829. Driver Magician, from http://www.drivermagician.com/.
830. Driver Reviver, from http://www.reviversoft.com/driver-reviver/.
831. DriverScanner, from http://www.uniblue.com/software/driverscanner/.
832. Double Driver, from http://www.boozet.org/dd.htm.
833. My Drivers, from http://www.zhangduo.com/driverbackup.html.
834. DriverEasy, from http://www.drivereasy.com/.
835. Windows Service Manager (SrvMan), from http://tools.sysprogs.org/srvman/.
836. SMART Utility, from http://www.thewindowsclub.com/smart-a-utility-for-tweaking-windows-7-vista-xp-
services.
837. Netwrix Service Monitor, from http://www.netwrix.com/windows_services_monitoring_freeware.html.
838. Vista Services Optimizer, from http://www.smartpcutilities.com/servicesoptimizer.html.
References Page 3000 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
839. ServiWin, from http://www.nirsoft.net/utils/serviwin.html.
840. Windows Service Manager Tray, from http://winservicemanager.codeplex.com/.
841. AnVirTask Manager, from http://www.anvir.com/download.htm.
842. Process Hacker, from http://processhacker.sourceforge.net/downloads.php.
843. Free Windows Service Monitor Tool, from http://www.manageengine.com/free-windows-service-
monitor/free-windows-service-monitor-index.html.
844. Overseer Network Monitor, from http://www.overseer-network-monitor.com/Download.aspx.
845. Total Network Monitor, from http://www.softinventive.com/products/total-network-monitor/.
846. Starter, from http://codestuff.tripod.com/products_starter.html.
847. Security AutoRun, from http://tcpmonitor.altervista.org/startup-manager/.
848. Absolute Startup manager, from http://www.absolutestartup.com/.
849. ActiveStartup, from http://www.hexilesoft.com/activestartup.html.
850. StartEd Lite, from http://www.outertech.com/en/windows-startup.
851. Startup Inspector, from http://www.windowsstartup.com/startupinspector.php.
852. Program Starter, from http://www.ab-tools.com/de/software/programmstarter/.
853. Disable Startup, from http://www.disablestartup.com/.
854. StartupMonitor, from http://www.mlin.net/StartupMonitor.shtml.
855. Chameleon Startup Manager, from http://www.chameleon-managers.com/downloads.php.
856. Startup Booster, from http://www.smartpctools.com/startup_booster/.
857. FCIV, from http://www.microsoft.com/en-us/download/details.aspx?id=11533.
858. Tripwire, from http://www.tripwire.com/it-security-software/security-configuration-management/file-
integrity-monitoring/.
859. FastSum, from http://www.fastsum.com/download.php.
860. WinMD5, from http://www.blisstonia.eom/software/WinMD5/#download.
861. Advanced Checksum Verifier (ACSV), from http://www.irnis.net/.
862. Fsum Fronted, from http://fsumfe.sourceforge.net/.
863. Verisys, from http://www.ionx.co.uk/products/verisys.
864. AFICK (Another File Integrity Checker), from http://afick.sourceforge.net/.
865. File Integrity Monitoring, from http://www.ncircle.com/index.php?s=products_ccm_file-integrity-
monitoring.
866. Attribute Manager, from http://www.miklsoft.com/attrman/index.html.
867. PA File Sight, from http://www.poweradmin.com/file-sight/index3.aspx.
868. CSP File Integrity Checker, from http://www.tandemsecurity.com/solution_14.php.
869. ExactFile, from http://www.exactfile.com/downloads/.
870. OSSEC, from http://www.ossec.net/?page_id=19.
871. Windows Defender, from http://www.microsoft.com/en-in/download/details.aspx?id=17.
872. McAfee AntiVirus Plus, from http://home.mcafee.com/store/free-antivirus-trials.
873. Norton AntiVirus, from http://us.norton.com/downloads-trial-norton-
antivirus?inid=us_hho_topnav_download_detail_nav.
874. Trojan Horse Construction Kit, from
http://www.pestpatrol.eom/zks/pestinfo/t/trojan_horse_construction_kit.asp.
References Page 3001 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
875. Progenic Mail Trojan Construction Kit - PMT, from
http://www.simovits.com/trojans/tr_data/y2630.html.
876. Pandora's Box, from http://greece.mrdonn.org/greekgods/pandora.html.
877. TrojanHunter, from http://www.trojanhunter.com/trojanhunter/.
878. Emsisoft Anti-Malware, from http://www.emsisoft.in/en/software/antimalware/.
879. Anti-Trojan Shield (ATS), from http://www.atshield.com/?r=download.
880. Spyware Doctor, from http://www.pctools.com/spyware-doctor/download/?src=lp_sd.
881. Anti Malware BOCIean, from http://www.comodo.com/home/internet-security/anti-malware.php.
882. Anti Hacker, from http://www.hide-my-ip.com/antihacker.shtml.
883. XoftSpySE, from http://www.paretologic.com/xoftspy/se/newlp/xray/.
884. SPYWAREfighter, from http://www.spamfighter.com/SPYWAREfighter/.
885. Anti Trojan Elite, from http://www.remove-trojan.com/index_ate.php.
886. SUPERAntiSpyware, from http://www.superantispyware.com/index.html.
887. Trojan Remover, from http://www.simplysup.com/tremover/download.html.
888. Twister Antivirus, from http://www.filseclab.com/en-us/.
Module 07: Viruses and Worms
889. Types of Virus, from
http://www.mindpride.net/root/Extras/Viruses/virus_protection_and_removal_ii.htm.
890. Vulnerabilities in Network Infrastructures and Prevention/Containment Measures, from
http://proceedings.informingscience.org/lnSITE2012/lnSITE12p053-067Awodele0012.pdf.
891. Terminology, from http://www.f-secure.com/en/web/labs_global/terminology-f.
892. Virus Protection, from
http://www.mindpride.net/root/Extras/Viruses/virus_protection_and_removal_iii.htm.
893. Paul Boutin, (2003), An inside view of the worm that crashed the Internet in 15 minutes, founder from
http://www.wired.com/wired/archive/ll.07/slammer.html.
894. Case Study: Microsoft Network Hacked by QAZ Trojan, from http://www.msnbc.com/msn/482011.asp
Oct. 29, 2000.
895. Mark Russinovich, (2008), TCPView for Windows v2.53, from
http://www.sysinternals.com/Utilities/TcpView.html.
896. Mark Russinowich and Bryce Cogswell, (2008), Autoruns for windows (v 9.32), from
http://www.sysinternals.com/Utilities/Autoruns.html.
897. Merijn, (2005), Hijack This (System Checker) (v 1.99.1), from
http://www.majorgeeks.com/download.php?det=3155.
898. Norman Book on Computer Viruses, from http://download.norman.no/manuals/eng/BOOKON.PDF.
899. Carey Nachenberg, Understanding and Managing Polymorphic Viruses from
http://www.symantec.com/avcenter/reference/striker.pdf.
900. The Spread of the Sapphire/Slammer Worm, from
http://www.caida.org/publications/papers/2003/sapphire/sapphire.html.
901. Mike Gunderloy, (2003), Microsoft Certified Professional Magazine Online | Newsletters, vol 2 #8, from
http://mcpmag. com/newsletter/article. asp?EditorialslD=153.
902. R. A. Hettinga, (2003), Random Scanning Worms and Sapphire/Slammer's PRNG, from http://www.mail-
archive. com/[email protected]/msg03503.html.
References Page 3002 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
903. Information on a virus on campus, http://security.uwo.ca/antivirus/infoHistory.html.
904. Virus History The Senior Most Virus!!, from www.optusnet.com.au/learning/email/virus.
905. Computer Knowledge Virus Tutorial, from www.mpl.org.eg/doc/eBOOKs/vtutor.pdf.
906. Dr. Alan Solomon and Robert M. Slade, 1990 - VX BBS & Little Black Book (AT&T Attack), 1991 - Tequila,
2001 - Gnuman, Winux Windows/Linux Virus, 2004 - Trojan.Xombe, Randex, Bizex, Witty, from
www.cknow.com/vtutor/HistoryofViruses.html.
907. Michelangelo, DAME, & VCL, from http://library.thinkquest.org/04oct/00460/malwareHistory.html.
908. Honeypots, Honeynets, and Intrusion Detection, from http://www.honeypots.net/.
909. Featured Files, from http://packetstormsecurity.org/.
910. BinText, from http://www.mcafee.com/apps/free-tools/termsofuse.aspxPurh/us/downloads/free-
tools/bintext.aspx.
911. UPX, from http://upx.sourceforge.net/#downloadupx.
912. Process Explorer, from http://technet.microsoft.com/en-in/sysinternals/bb896653.aspx.
913. RegShot, from http://regshot.sourceforge.net/.
914. OllyDbg, from http://www.ollydbg.de/.
915. ProcDump, from http://technet.microsoft.com/en-us/sysinternals/dd996900.aspx.
916. IDA Pro, from https://www.hex-rays.com/products/ida/support/download_demo.shtml.
917. VirusTotal, from https://www.virustotal.com/en/.
918. Anubis: Analyzing Unknown Binaries, from http://anubis.iseclab.org.
919. Avast! Online Scanner, from http://onlinescan.avast.com.
920. Malware Protection Center, from http://www.microsoft.com/security/portal/.
921. ThreatExpert, from http://www.threatexpert.com.
922. Dr. Web Online Scanners, from http://vms.drweb.com.
923. Metascan Online, from http://www.metascan-online.com/.
924. Bitdefender QuickScan, from http://www.bitdefender.com/scanner/online/free.html.
925. GFI SandBox, from http://www.gfi.com/malware-analysis-tool.
926. UploadMalware.com, from UploadMalware.com.
927. Fortinet, from http://www.fortiguard.com/antivirus/virus_scanner.html.
928. Immunet, from http://www.immunet.com/free/index.html.
929. AVG Antivirus, from http://free.avg.com/in-en/homepage.
930. BitDefender, from http://www.bitdefender.com/Downloads/.
931. Kaspersky Anti-Virus, from http://www.kaspersky.com/trials.
932. Trend Micro Internet Security Pro, from http://apac.trendmicro.com.
933. Norton AntiVirus, from http://us.norton.com/downloads-trial-norton-
antivirus?inid=us_hho_topnav_download_detail_nav.
934. F-Secure Anti-Virus, from http://www.f-secure.com/en/web/home_global/anti-virus.
935. Avast Pro Antivirus, from http://www.avast.com/pro-antivirus.
936. McAfee AntiVirus Plus 2013, from http://home.mcafee.com/store/free-antivirus-trials.
937. ESET Smart Security 6, from http://www.eset.eom/download/home/detail/family/5/.
938. Total Defense Internet Security Suite, from http://www.totaldefense.com/shop/total-defense-internet-
security-suite.aspx.
References Page 3003 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
939. What's Running, from http://www.whatsrunning.net/.
940. Winsonar, from http://www.fewbyte.com/winsonar.html.
941. Reg Organizer, from http://www.chemtable.com/organizer.htm.
942. Windows Service Manager (SrvMan), from http://tools.sysprogs.org/srvman/.
943. ServiWin, from http://www.nirsoft.net/utils/serviwin.html.
944. Starter, from http://codestuff.tripod.com/products_starter.html.
945. Security AutoRun, from http://tcpmonitor.altervista.org/startup-manager/.
946. FCIV, from http://www.microsoft.com/en-u$/download/details.aspx?id=11533.
Module 08: Sniffing
947. What is Sniffer and how to detect sniffing in computer network, from
http://www.aboutonlinetips.com/sniffer-types-and-protecting-against-sniffing/.
948. Anatomy of an ARP Poisoning Attack, from http://www.unitedsystemsok.com/anatomy-of-an-arp-
poisoning-attack.
949. What is ARP?, from http://www.antiarp.com/english_94.html.
950. Modeling and Analysis of Wireless LAN Traffic, from
http://www.dmclab.hanyang.ac.kr/files/publication/journals/international/200911_08.pdf.
951. Dynamic ARP Inspection (DAI), from http://daxm.net/ccienotes/20100131/dynamic-arp-inspection-dai.
952. Overview of Layer 2 Switched Networks and Communication, from
http://www.sakunsharma.in/2011/07/overview-layer-2-switched-networks-communication/.
953. Application Protocol IPv6, from
http://www.ciscoexpo.ru/dub/sites/default/files/seminar_attachments/ipv6.pdf.
954. Dynamic Host Configuration Protocol, from http://www.ietf.org/rfc/rfc2131.txt.
955. Understanding,Preventing,Defending Against Layer 2 Attacks, from
http://www.sanog.org/resources/sanogl5/sanogl5-yusuf-l2-security.pdf.
956. A New Scheme to Check ARP Spoofing: Prevention of MAN-IN-THE-MIDDLE Attack, from
http://www.ijcsit.com/docs/Volume%202/vol2issue4/ijcsit2011020420.pdf.
957. LAYER 2 ATTACKS & MITIGATION TECHNIQUES, from http://www.sanog.org/resources/sanog7/yusuf-L2-
attack-mitigation.pdf.
958. Chris Martin, What is Sniffer and how to detect Sniffing in computer network, Available from
http://74.125.153.132/search?q=cache:Tu6yfsiaY3AJ :www.aboutonlinetips.com/sniffer-types-and-
protecting-against-sniffing/+wire+sniffing+techniques&cd=25&hl=en&ct=clnk&gl=in&client=fi refox-a.
959. Adam Barth, Secure content sniffing for Web browsers or How to stop papers from reviewing
themselves, Available from http://www.adambarth.com/papers/2009/barth-caballero-song.pdf.
960. Undetectable sniffing on Ethernet, Available from http://www.askapache.com/security/sniffing-on-
ethernet-undetected.html.
961. Suhas A Desai, (2007), Techniques for Preventing Sniffing, Packet Sniffing: Sniffing Tools Detection
Prevention Methods, Available from http://e-articles.info/e/a/title/Packet-Sniffing:-Sniffing-Tools-
Detection-Prevention-Methods/.
962. Suhas A Desai, (2007), Tool to Detect Sniffers, Packet Sniffing: Sniffing Tools Detection Prevention
Methods, Available from http://e-articles.info/e/a/title/Packet-Sniffing:-Sniffing-Tools-Detection-
Prevention-Methods/.
963. Identifying Nonessential Services and Attacks >Attacks, from
http://www.informit.com/articles/article.asp?p=98121&seqNum=2.
References Page 3004 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
964. ARP cache poisoning /ARP spoofing, from http://su2.info/doc/arpspoof.php.
965. Network management, network discovery, SNMP, MIB and WMI browsers, from
www.networkview.com/html/features.html.
966. Address Resolution Protocol (ARP), from www.erg.abdn.ac.uk/users/gorry/course/inet-pages/arp.html.
967. Angela D. Orebaugh, (2004), Top Ten Ethereal Tips and Tricks, from
http://www.onlamp.eom/pub/a/security/2004/05/13/etherealtips.html.
968. Packages, from http://packages.debian.org/.
969. Network Protocol Analysis, from http://www.maatec.com/.
970. The Hacker's Ethic, from http://web.textfiles.com/ezines/HWA/hwa-hn34.txt.
971. J aromil, Dyne:ll GNU/Linux User's Guide, from http://dynebolic.org/dynebolic-man.pdf.
972. Address Resolution Protocol (arp), from www.erg.abdn.ac.uk/users/gorry/course/inet-pages/arp.html.
973. Adam Barth, J uan Caballero and Dawn Song, Secure Content Sniffing for Web Browsers, or How to Stop
Papers from Reviewing Themselves, http://www.adambarth.com/papers/2009/barth-caballero-
song.pdf.
974. Alberto Ornaghi and Marco Valleri, Man in the middle attacks,
http://www.blackhat.com/presentations/bh-europe-03/bh-europe-03-valleri.pdf.
975. Tom Olzak, (2006), DNS Cache Poisoning: Definition and Prevention,
http://adventuresinsecurity.com/Papers/DNS_Cache_Poisoning.pdf.
976. Sean Whalen, (2001), An Introduction to Arp Spoofing,
http://www.rootsecure.net/content/downloads/pdf/arp_spoofing_intro.pdf.
977. Daiji Sanai, (2001), Detection of Promiscuous Nodes using ARP packets,
http://www.securityfriday.com/promiscuous_detection_01.pdf.
978. Network management, network discovery, SNMP, MIB and WMI browsers, from
www.networkview.com/html/what_s_new.html.
979. Source Address Spoofing, from
http://www.networkcomputing.com/shared/article/showArticle.jhtml?articleld=8702815&dassroom.
980. Keith Brown, (1999), Security Briefs, from
http://www.microsoft.com/msj/0299/security/security0299.aspx.
981. Corey Nachreiner, (2005), Anatomy of an ARP Poisoning Attack, from
http://www.watchguard.com/infocenter/editorial/135324.asp.
982. macof, from http://www.monkey.org.
983. Yersinia, from http://www.yersinia.net/download.htm.
984. Dhcpstarv, from http://dhcpstarv.sourceforge.net/.
985. Gobbler, from http://gobbler.sourceforge.net/.
986. Cain & Abel, from http://www.oxid.it/cain.html.
987. WinArpAttacker, from http://www.xfocus.org/index.html.
988. Ufasoft Snif, from http://ufasoft.com/sniffer/.
989. XArp, from http://www.chrismc.de/development/xarp/index.html.
990. SMAC, from http://www.klcconsulting.net/smac/index.html#download.
991. Cascade Pilot, from http://www.riverbed.com/products-solutions/products/performance-
management/network-infrastructure/High-Speed-Packet-Analysis.html.
992. Tcpdump, from http://www.tcpdump.org/.
993. WinDump, from http://www.winpcap.org/windump/default.htm.
References Page 3005 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
994. Capsa Network Analyzer, from http://www.colasoft.com/download/products/capsa_free.php.
995. OmniPeek Network Analyzer, from
http://www.wildpackets.com/products/omnipeek_network_analyzer.
996. Observer, from http://www.networkinstruments.com/products/observer/index.php?tab=download.
997. Sniff-O-Matic, from http://www.kwakkelflap.com/sniffer.html.
998. J itBit Network Sniffer, from http://www.jitbit.com/networksniffer/.
999. MSN Sniffer 2, from http://www.msnsniffer.com/download/index.htm.
1000. Ace Password Sniffer, from http://www.effetech.com/aps/.
1001. RSA NetWitness Investigator, from http://www.emc.c0m/security/rsa-netwitness.htm#lfreeware.
1002. Big-Mother, from http://www.tupsoft.com/download.htm.
1003. EtherDetect Packet Sniffer, from http://www.etherdetect.com/download.htm.
1004. dsniff, from http://monkey.org/~dugsong/dsniff/.
1005. EffeTech HTTP Sniffer, from http://www.effetech.com/download/.
1006. Ntop, from http://www.ntop.org/products/ntop/.
1007. Ettercap, from http://ettercap.sourceforge.net/downloads.html.
1008. SmartSniff, from http://www.nirsoft.net/utils/smsniff.html.
1009. EtherApe, from http://etherape.sourceforge.net/.
1010. Network Probe, from http://www.objectplanet.com/probe/.
1011. Snort, from http://www.snort.org/.
1012. Sniffem, from http://www.sniff-em.com/download.shtml.
1013. MaaTec Network Analyzer, from http://www.maatec.com/mtna/download.html.
1014. Alchemy Network Monitor, from http://www.mishelpers.com/network_monitor/index.html.
1015. CommView, from http://www.tamos.com/download/main/index.php.
1016. NetResident, from http://www.tamos.com/products/netresident/.
1017. AIM Sniffer, from http://www.effetech.com/aim-sniffer/index.htm.
1018. Netstumbler, from http://www.netstumbler.com/downloads/.
1019. IE HTTP Analyzer, from http://www.ieinspector.com/httpanalyzer/.
1020. MiniStumbler, from http://www.netstumbler.com/downloads.
1021. PacketMon, from http://www.analogx.com/contents/download/Network/pmon/Freeware.htm.
1022. NADetector, from http://www.nsauditor.com/network_monitoring/nadetector_traffic_analyzer.html.
1023. Microsoft Network Monitor, from http://www.microsoft.com/en-us/download/details.aspx?id=4865.
1024. NetworkMiner, from http://www.netresec.com/?page=NetworkMiner.
1025. Network Security Toolkit, from http://www.networksecuritytoolkit.org/nst/index.html.
1026. Ethereal, from http://www.ethereal.com/.
1027. KSniffer, from http://ksniffer.sourceforge.net/index.php?section=download.
1028. IPgrab, from http://ipgrab.sourceforge.net/.
1029. WebSiteSniffer, from http://www.nirsoft.net/utils/web_site_ sniffer.html.
1030. ICQ Sniffer, from http://www.etherboss.com/icq/download.htm.
1031. URL Helper, from http://www.urlhelper.com/index.htm.
1032. WebCookiesSniffer, from http://www.nirsoft.net/utils/web_cookies_sniffer.html.
References Page 3006 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1033. York, from http://thesz.diecru.eu/content/york.php.
1034. IP Traffic Spy, from http://www.networkdls.com/Software/View/IP_Traffic_Spy/.
1035. SniffPass, from http://www.nirsoft.net/utils/password_sniffer.html.
1036. Cocoa Packet Analyzer, from http://www.tastycocoabytes.com/cpa/.
1037. vxSniffer, from http://www.cambridgevx.com/vxsniffer.html.
1038. PromqryUI, from http://www.microsoft.com/en-us/download/details.aspx?id=16883.
Module 09: Social Engineering
1039. The use of Detailed Explanation of the the the the the working principle of of the port scanning tool and
the the NMAP, from http://www.boxueshe.org/read.php?tid=36
1040. Sarah Granger, (2002), Social Engineering Fundamentals, Available from
www.securityfocus.com/infocus/1533.
1041. Mika Tolvanen, (2006), F-Secure Trojan Information Pages, Available from http://www.f-secure.com/v-
descs/redbrowser_a.shtml.
1042. Dancho Danchev, (2009), Social Engineering by a fake SMS spying tool, Available from
http://blogs.zdnet.com/security/?p=3162.
1043. Growth on Use of Social Networking Sites, Available from
http://www.pewinternet.0rg/~/media/Files/Reports/2009/PIP_Adult_social_networking_data_memo_FI
NAL.pdf.pdf.
1044. Linkedln, Available from http://www.linkedin.com/.
1045. Micha Pekrul, (2009), Rogue Linkedln Profiles Lead To Malware, Available from
http://www.avertlabs.com/research/blog/index.php/2009/01/06/rogue-linkedin-profiles-lead-to-
malware/.
1046. Bogdan Dumitru,(2009), Risks of Social Networking and the Corporate Network, Available from
http://www.itbusinessedge.com/cm/community/features/guestopinions/blog/the-risks-of-social-
networking-and-the-corporate-network/?cs=33877.
1047. Terry Turner, Social Engineering - Can Organizations Win the Battle?, from
http://www.infosecwriters.com/text_resources/pdf/Social_Engineering_Can_Organizations_Win.pdf.
1048. Bruce Schneier, (2005), Schneier on Security: Weakest Link Security, from
http://www.schneier.com/blog/archives/2005/12/weakest_link_se.html.
1049. Sharon Gaudin, Social Engineering: The Human Side Of Hacking, from http://www.crime-
research.org/library/Sharon2.htm.
1050. Social Engineering Hackers-LAN Times 11/6/95, from http://www.security-protocols.com/textfiles/social-
engineering/soc_eng2.html.
1051. Psychology of Social Engineering, from
http://cybercrimes.net/Property/Hacking/Social%20Engineering/PsychSocEng/PsySocEng.html.
1052. Michael L. Snider, Articles, from http://staff.rio.edu/msnider/?cat=7.
1053. Wylie Wong, (2000), Oracle chief defends Microsoft snooping | CNET News.com, from
http://news.com.com/Oracle+chief+defends+Microsoft+snooping/2100-1001_3-242560.html.
1054. Engineering Hackers-LAN, from http://www.security-protocols.com/textfiles/social-
engineering/soc_eng2.html.
1055. Examples of Phishing Emails, from http://www.banksafeonline.org.uk/phishing_examples.html.
1056. Anti-Phishing Resources, from http://www.antiphishing.org/resources.html.
References Page 3007 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1057. Netcraft Toolbar, from http://toolbar.netcraft.com/install.
1058. PhishTank, from http://www.phishtank.com/.
1059. ReadNotify, from http://www.readnotify.com/.
1060. Social Engineering Toolkit (SET), from https://www.trustedsec.com/downloads/social-engineer-toolkit/.
Module 10: Denial-of-Service
1061. Distributed Denial of Service:Taxonomies of Attacks, Tools and Countermeasures, from
http://palms.ee.princeton.edu/PALMSopen/DDoS%20Final%20PDCS%20Paper.pdf.
1062. Denial of Service Attack Detection Techniques, from
https://www.evernote.com/shard/s9/note/blla8c31-8651-4d74-acf9-
Ifblb3c0f090/wishi/crazylazy#st=p&n=blla8c31-8651-4d74-acf9-lfblb3c0f090.
1063. Welcome to the new IP reality, from
http://lukasz.bromirski.net/docs/prezos/confidence2008/new_ip_reality_bp.pdf.
1064. What Happened to Blue Security, from http://slashdot.org/story/06/05/08/142229/what-happened-to-
blue-security.
1065. Remotely Triggered Black Hole Filtering in IP Version 6 for Cisco IOS, Cisco IOS XE, and Cisco IOS XR
Software, from http://www.cisco.com/web/about/security/intelligence/ipv6_ rtbh.html.
1066. Frank Kargl, J orn Maier, Stefan Schlott, and Michael Weber, Protecting Web Servers from Distrubuted
Denial of Service Attacks, from http://wwwl0.org/cdrom/papers/409/.
1067. Denial of Service Attacks, from http://www.cert.org/tech_tips/denial_of_service.html.
1068. Craig A. Huegen, (2000), Smurf Attack Information, from http://www.pentics.net/denial-of-
service/white-papers/smurf.cgi.
1069. Denial of service, from
http://searchappsecurity.techtarget.c0m/sDefinition/0,290660,sid92_gci213591,00.html.
1070. Solucom, VPN (Virtual Private Network) and Internet Firewall..., from
http://www.solucom.com/define.htm.
1071. Vladimir Golubev, (2005), DoS attacks: crime without penalty, http://www.crime-
research.org/artides/1049/.
1072. Gunter Ollmann, (2009), The Botnet vs. Malware Relationship,
http://www.damballa.com/downloads/d_pubs/WP%20Many-to-
many%20Botnet%20Relationships%20%282009-05-21%29.pdf.
1073. Gunter Ollmann, (2009), Botnet Communication Topologies,
http://www.damballa.com/downloads/r_pubs/WP%20Botnet%20Communications%20Primer%20%2820
09-06-04%29.pdf.
1074. Kasey Efaw, Installing Snort 2.8.5.2 on Windows 7,
http://www.sn0rt.0rg/assets/135/lnstalling_Sn0rt_2.8.5.2_0n_Wind0ws_7.pdf.
1075. Renaud BIDOU, Fighting the Botnet Ecosystem, http://www.iv2-
technologies.com/FightingBotnetEcosystem.pdf.
1076. Ping of death, from http://searchsecurity.techtarget.com/sDefinition/0sidl4_gci822096,00.html.
1077. Apostates of Islam :: View topic - FFI down again, from
http://www.apostatesofislam.com/forum/viewtopic.php?t=189&postdays=0&postorder=asc&start=225
&sid=0e55c35186bbe87c48bdfe6f62e0e4a5.
1078. J ason Anderson, An Analysis of Fragmentation Attacks, from http://www-
src.lip6.fr/homepages/Fabrice.Legond-Aubry/www.ouah.org/fragma.html.
References Page 3008 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1079. [PDF] IEEE P1615/D2 Draft Recommended Practice for Network ...,
http://grouper.ieee.org/groups/sub/wgc3/C3TFl%20Documents/drafts/P1615_draft2.pdf.
1080. [DOC] Abstract, from http://www.bridgeport.edu/sed/projects/cs597/Spring_2004/juilan/J ui-
Lan_Network%20Security%20-%20Analysis%20of%20Attack%20and%20Defense%20Strategies.doc.
1081. Mariusz Burdach, (2003), Hardening the TCP/IP stack to SYN attacks, from
http://www.securityfocus.com/infocus/1729.
1082. Citations: TCP SYN Flooding and IP Spoofing Attacks (Researchlndex), from
http://citeseer.ist.psu.edu/context/141856/0-
1083. Lasse Huovinen and J ani Hursti, from Denial of Service Attacks: Teardrop and Land,
http://users.tkk.fi/~lhuovine/study/hacker98/dos.html.
1084. Underground security systems research, from http://www.ussrback.com/Win/.
1085. Stephen Specht & Ruby Lee, (2003), from Taxonomies of Distributed Denial of Service Networks, Attacks
..., from
http://www.princeton.edu/~rblee/ELE572Papers/Fall04Readings/DDoSSurveyPaper_20030516_Final.pdf
1086. David Dittrich, (1999), The DoS Project's "trinoo" distributed denial of service attack tool from
http://www.donkboy.com/html/stuff.htm.
1087. Anti Online's Fight- Back! Computer Security..., from http://www.antionline.com/fight-
back/What_Are_DDOS_Attacks.php.
1088. Sven Dietrich, Analysis of the Shaft distributed Denial of Service tool, from
http://www.securiteam.com/securitynews/5AP0F000IM.html.
1089. Analyzing Distributed Denial Of Service Tools: The Shaft Case, from
http://www.ece.cmu.edu/~adrian/630-f03/readings/shaft.pdf.
1090. Distributed Denial of Service Tools, from http://www.fz-juelich.de/jsc/net/security/infos/DDoS/IN-99-
07.html.
1091. David Moore Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford, and Nicholas, (2003),
Weaver Inside the Slammer Worm, from
http://csdl2. computer. org/persagen/DLAbsToc.jsp?resourcePath=/dl/mags/sp/&toc=comp/mags/sp/20
03/04/j4toc.xml&DOI=10.1109/MSECP.2003.1219056.
1092. RudhraKumar Venkatesan and ShashidharLakkavalli, TCP/IP Vulnerabilities, from
http://islab.oregonstate.edu/koc/ece478/00Report/LV.pdf.
1093. Dave Dittrich, Bugtraq: Analysis of trinOO, from http://seclists.org/lists/bugtraq/1999/Dec/0093.html
1094. Fravia denial of service attack tools, from www.searchlores.org/dodl.htm.
1095. David Dittrich, (1999), Trinoo Analysis, from http://staff.washington.edu/dittrich/misc/trinoo.analysis.
1096. J ohn Michalski, Carrie Price, Eric Stanton, Erik Lee, CHUA, Kuan Seah, Wong, Yip Heng and TAN, and
Chung Pheng, (2002), DYNAT TECHNOLOGIES ASSESSMENT REPORT, from
http://www.sandia.gov/iorta/docs/SAND%202002-3613%20DYNAT.pdf.
1097. <...... A.VERY..THING..IS..POSSIBLE..TO..ZEROGEEK........>, from http://mifwarz.blogspot.com/.
1098. J ason Barlow and Woody Thrower, (2000), TFN2K - An Analysis J ason Barlow and Woody Thrower AXENT
Security..., from http://packetst0rmsecurity.0rg/distributed/TFN2k_Analysis-l.3.txt.
1099. J ason Barlow and Woody Thrower, (2000), TFN2K - An Analysis (Revision : 1.3), from
http://www.symantec.com/avcenter/security/Content/2000_02_10_a.html.
1100. Gary C. Kessler, (2000), Distributed Denial-Of-Service, from
http://www.garykessler.net/library/ddos.html.
References Page 3009 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1101. David Dittrich, (1999), Stacheldraht Analysis,
http://staff.washington.edu/dittrich/misc/stacheldraht.analysis.
1102. Bugtraq: Analysis of the Shaft distributed denial of service tool, from
http://seclists.org/lists/bugtraq/2000/Mar/0215.html.
1103. Sven Dietrich, Neil Long, & David Dittrich, Analyzing Distributed Denial Of Service Tools: The Shaft Case,
from http://www.usenix.org/event/lisa2000/full_papers/dietrich/dietrich_ html/.
1104. IP: new DoS attack, from http://www.interesting-people.org/archives/interesting-
people/200009/msg00006.html.
1105. Dave Farber, (2000), IP: new DoS attack, from
http://www.princeton.edu/~rblee/DDoS%20Survey%20Paper_v7final.doc.
1106. David Dittrich, George Weaver, Sven Dietrich, and Neil Long, The mstream distributed denial of service
attack tool, from http://www.linuxsecurity.c0m/content/view/107513/2/.
1107. The Distributed Reflection DoS Attack, from http://www.grc.com/dos/drdos.htm.
1108. Steve Gibson, (2002), Distributed Reflection Denial of Service Bandwidth Consumption, from http://cs-
www.cs.yale.edu/homes/arvind/cs425/doc/drdos.pdf.
1109. SYN Attack, from www.ieee.org.
1110. Hang Chau, (2004), Network Security - Defense Against D0S/DD0S Attacks, from
http://www.securitydocs.com/library/2576.
1111. Aaron Sullivan, 2001, An Audit of Active Directory Security, from
http://www.securityfocus.com/infocus/1293.
1112. Xatrix Security, from http://www.xatrix.org/download.php?id=28&r=l.
1113. Denail of Service, from http://www.mycert.org.my/network_abuse/dos.html.
1114. Denial of Service Attack in NetBIOS Services, from http://www.kb.cert.org/vuls/id/32650.
1115. J ames Middleton, (2001), Cloaking system poses new security threat, from
http://www.iwr.co.uk/vnunet/news/2114991/cloaking-system-poses-security-threat.
1116. NFR DDOS problems, from http://www.shmoo.com/mail/ids/may01/msg00038.shtml.
1117. Latest Windows Security Articles, from http://www.windowsecurity.com/.
1118. Gregg Keizer, (2006), Massive DoS Attacks Against ISPs On The Rise, from
http://www.informationweek.com/story/showArtide.jhtml?articlelD=192701817&cid=RSSfeed_IWK_Ne
ws.
1119. J ason Barlow and Woody Thrower, AXENT Security, from
http://packetst0rmsecurity.0rg/distributed/TFN2k_Analysis-l.3.txt.
1120. Fabrice LEGOND-AUBRY, An Analysis of Fragmentation Attacks, from http://www-
src.lip6.fr/homepages/Fabrice.Legond-Aubry.
1121. J ui-Lan Lai, Network Security-- Analysis of Attack and Defense, from
http://www.bridgeport.edu/sed/projects/cs597/Spring_2004/juilan/J ui-Lan_Network%20Security%20-
%20Analysis%20of%20Attack%20and%20Defense%20Strategies.doc Strategies.
1122. Targa: [PDF] security, from https://www.cis.strath.ac.uk/~gw/52507/security.pdf.
1123. WORM_MYDOOM.B, Description and solution, from
http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_MYDOO.M.B.
1124. Information on a virus on campus, from http://security.uwo.ca/antivirus/infoHistory.html.
1125. [PDF] Microsoft PowerPoint - ISi_Malware.ppt, from http://www-t.zhwin.ch/it/isi/v/ISi_Malware.pdf.
1126. R. A. Hettinga, (2003), Random Scanning Worms and Sapphire/Slammer's PRNG..., from
http://www.mail-archive.c0m/[email protected]/msg03503.html.
References Page 3010 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1127. Mike Gunderloy, (2003), Microsoft Certified Professional Magazine Online | Newsletters ..., from
http://mcpmag.com/newsletter/artide. asp?EditorialslD=153.
1128. The Spread of the Sapphire/Slammer Worm, from
http://www.caida.org/publications/papers/2003/sapphire/sapphire.html.
1129. Norman Book on Computer Viruses, from http://download.norman.no/manuals/eng/BOOKON.PDF.
1130. IT Architect | Strategies & Issues: Honeypots - Sticking It to, from
http://www.itarchitect.com/article/NMG20030403S0005.
1131. Roger A. Grimes, (2005), Honeypots for Windows, from
http://www.gtpcc.org/gtpcc/honeypotsforwindows.htm.
1132. Honeypots [lnfosecwriters.com], from http://www.infosecwriters.com/texts.php?op=display&id=80.
1133. J .A. Hamilton, Reflection of the Exploit, from
http://www.eng.auburn.edu/users/hamilton/security/SE2/Directed_Reflection_DOS_Hamilton.pdf.
1134. Distributed Reflection Denial of Service Bandwidth Consumption ..., from
http://www.grc.com/files/drdos.pdf.
1135. Kevin Houle & Chad Dougherty, (2000), CERT Incident Note IN-99-07: Distributed Denial of Service Tools,
from http://www.cert.org/incident_notes/IN-2000-05.html.
1136. DDoS Resources, from http://www.anml.iu.edu/ddos/tools.html.
1137. J ason Barlow and Woody Thrower, (2000), AXENT : SWAT : TFN2K - An Analysis, from
http://www.symantec.com/avcenter/security/Content/2000_02_10_a.html.
1138. David Dittrich, (1999), Trinoo Analysis, from http://staff.washington.edu/dittrich/misc/trinoo.analysis.
1139. CERT warns of networked denial of service attacks - Computerworld, from
http://www.computerworld.com/action/pages.do?command=viewPage&pagePath=/404.
1140. Internet security, from
http://www.fsa.ulaval.ca/personnel/vernag/EH/F/manif/lectures/internet_security.htm.
1141. Solucom VPN (Virtual Private Network) and Internet Firewall..., from
http://www.solucom.com/define.htm.
1142. Library Computer and Network Security: Library Security Principles ..., from
http://www.infopeople.org/resources/security/basics/threats_vulnerabilities.html.
1143. Wireless DoS, from
http://www.cisco.c0m/en/US/docs/wireless/technology/wips/deployment/guide/wipsdep.html#wpl50
481.
1144. Gary C. Kessler, (2000), "Defenses Against Distributed Denial of Service Attacks", from
http://www.garykessler.net/library/ddos.html.
1145. Abhishek Singh, (2005), Demystifying Denial-Of-Service attacks, part one, from
http://www.symantec.com/connect/articles/demystifying-denial-service-attacks-part-one.
1146. Denial-of-service attack, from http://en.wikipedia.0rg/wiki/Denial-0f-service_attack#lncidents.
1147. Kevin Poulsen, (2010), New: Cyberattack Against WikiLeaks Was Weak, from
http://www.wired.com/threatlevel/2010/ll/wikileaks-attack/.
1148. PlugBot, from http://theplugbot.com.
1149. Illusion Bot and NetBot Attacker, from .
1150. DoS HTTP, from http://socketsoft.net/products.asp?p=doshttp.
1151. KFSensor, from http://www.keyfocus.net/kfsensor/download/.
1152. FortiDDoS-300A, from http://www.fortinet.com/products/fortiddos/300A.html.
1153. DDoS Protector, from http://www.checkpoint.com/products/ddos-protector/.
References Page 3011 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1154. Cisco Guard XT 5650, from
http://www.cisco.com/en/US/prod/collateral/vpndevc/ps5879/ps6264/ps5888/product_data_sheet090
0aecd800fa55e.html.
1155. Arbor Pravail: Availability Protection System, from http://www.arbornetworks.com/products/pravail.
1156. D-Guard Anti-DDoS Firewall, from http://www.d-guard.com/.
1157. NetFlow Analyzer, from http://www.manageengine.com/products/netflow/download.html.
1158. FortiDDoS, from http://www.fortinet.com/products/fortiddos/.
1159. SDL Regex Fuzzer, from http://www.microsoft.com/en-us/download/confirmation.aspx?id=20095.
1160. DefensePro, from
http://www.radware.com/Products/ApplicationNetworkSecurity/DDoS_Attack_Protection.aspx.
1161. WANGuard Sensor, from https://www.andrisoft.com/store/evaluation-request.
1162. DOSarrest, from http://www.dosarrest.com.
1163. NetScaler Application Firewall, from http://www.citrix.com/products/netscaler-application-delivery-
controller/try. html?ntref=header_try.
1164. Anti DDoS Guardian, from http://www.beethink.com/antiddos.htm.
1165. FortGuard DDoS Firewall, from http://www.fortguard.com/ddosmonitor.html.
1166. DDoSDefend, from http://ddosdefend.com/ddos-protection.html.
1167. Webserver Stress Tool, from http://www.paessler.com/download/webstress.
1168. Web Stress Tester, from http://www.fastream.com/webstresstester.php.
1169. J Meter, from http://jmeter.apache.org/downloadJ meter.cgi.
1170. DoS HTTP, from http://socketsoft.net/products.asp?p=doshttp.
1171. Mail Bomber, from http://www.getfreefile.com/bomber.html.
1172. Advanced Mail Bomber, from http://www.softheap.com/abomber.html.
Module 11: Session Hijacking
1173. Steps in Session Hijacking, from http://www.hackguide4u.com/2010/03/steps-in-session-
hijacking.html.
1174. Session Hijacking, from http://www.imperva.com/resources/glossary/session_hijacking.html.
1175. IP Hijack, from http://dokfleed.net/duh/modules.php?name=News&file=article&sid=3.
1176. Spoofing Vs Hijacking, from http://www.hackguide4u.com/2010/03/spoofing-vs-hijacking.html.
1177. Lee Lawson, (2005), Session Hijacking Packet Analysis, Available from
http://www.securitydocs.com/library/3479.
1178. Dave Dittrich, Session hijack script, Available from http://blinky-lights.org/script.html.
1179. Session hijacking attack, Available from http://www.owasp.org/index.php/Session_hijacking_attack.
1180. Shray Kapoor, Session Hijacking Exploiting TCP, UDP and HTTP Sessions,
http://www.infosecwriters.com/text_resources/pdf/SKapoor_SessionHijacking.pdf.
1181. David Endler, (2001), Brute-Force Exploitation of Web Application Session IDs,
http://www.cgisecurity.com/lib/SessionlDs.pdf.
1182. Robert Auger, Credential and Session Prediction, Available from
http://projects.webappsec.org/Credential-and-Session-Prediction.
1183. Trojan horse, Available from
http://searchsecurity.techtarget.com/sDefinition/0sidl4_gci213221,00.html.
References Page 3012 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1184. J amie.riden, (2008), CLIENT-SIDE ATTACKS, Available from http://www.honeynet.org/node/157.
1185. Lee Lawson, (2005), Session Hijacking Packet Analysis, Available from
http://www.securitydocs.com/library/3479.
1186. Addison Wesley, (2007), Fibre Channel and IP session hijacking assessment exercise, Available from
http://searchstoragechannel.techtarget.com/generic/0,295582,sid98_gcil250226,00.html.
1187. Prevention from Session Hijacking, Available from http://hydtechie.blogspot.com/2008/08/prevention-
from-session-hijacking.html.
1188. Session Hijacking, Available from http://www.cs.binghamton.edu/~steflik/cs455/sessionhijacking.htm.
1189. Hackerthreads.org security: View topic - Network Session Hijacking, from
www.hackerthreads.org/phpbb/viewtopic.php?t=745.
1190. OpenSSH - SwiK swik.net/OpenSSH MOM 2005: IP Security (IPSec), from
www.microsoft.com/technet/prodtechnol/mom/mom2005/Library/39cb2734-506c-4101-887c-
c2d2146621c0.mspx.
1191. Microsoft Security Bulletin (MS99-046): Frequently Asked Questions, from
www.microsoft.com/technet/security/bulletin/fq99-046.mspx.
1192. Laurent J oncheray, Simple Active Attack Against TCP Sequence Number Prediction, from
http://www.cert.org/advisories/CA-2001-09.html.
1193. Term: S/key, from www.webopedia.com.
1194. Attacks against IIS, from
http://www.microsoft.eom/technet/prodtechnol/WindowsServer2003/Library/IIS/0al99196-4ae9-41eb-
b8cl-572251f9f550.mspx?mfr=true.
1195. J oe J enkins, (2000), Internet Security and Your Business - Knowing the Risks, from
http://www.securityfocus.com/infocus/1194.
1196. Webapplication Attacks - Intro, from www.netprotect.ch/downloads/webguide.pdf.
1197. Alexia Tsotsis, (2010), How To Protect Your Login Information From Firesheep, from
http://techcrunch.com/2010/10/25/firesheep/.
1198. zaproxy, from https://code.google.eom/p/zaproxy/downloads/list.
1199. J Hijack, from http://sourceforge.net/projects/jhijack/files/latest/download?source=files.
1200. Hamster, from http://erratasec.blogspot.in/2009/03/hamster-20-and-ferret-20.html.
1201. Ferret, from http://erratasec.blogspot.in/2009/03/hamster-20-and-ferret-20.html.
1202. Surf J ack, from https://code.google.com/p/surfjack/downloads/detail?name=surfjack0.2b.zip.
1203. PerJ ack, from http://packetstormsecurity.org.
1204. Ettercap, from http://sourceforge.net/projects/ettercap/files/latest/download?source=dlp.
1205. WhatsUp Gold Engineer's Toolkit, from
http://www.whatsupgold.com/products/download/network_management.aspx?k_id=ping-sweep-tool.
1206. Hunt, from http://packetstormsecurity.com/files/download/21968/hunt-l.5bin.tgz.
1207. J uggernaut, from http://www.securiteam.com.
1208. TamperlE, from http://www.bayden.com/TamperlE/.
1209. Cookie Cadger, from https://www.cookiecadger.com/?page_id=19.
Module 12: Hacking Webservers
1210. Web Parameter Tampering, from https://www.owasp.org/index.php/Web_Parameter_Tampering.
References Page 3013 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1211. Web Server Security and Database Server Security, from http://www.itura.net/trainir1g/19-web-server-
security-and-database-server-security.pdf.
1212. Configuring and organizing server security information, from
http://www.freepatentsonline.com/7712137.html.
1213. Internet Security, from http://wiki.winf.at/184216 .
1214. Securing applications, from http://www.slideshare.net/florinc/application-security-1831714.
1215. About Securing Applications, from
http://docs.oracle.com/cd/E16348_01/books/SecurHarden/SecurHarden_AppSecur2.html.
1216. Insecure Configuration Management, from
http://www.upenn.edu/computing/security/swat/SWAT_Top_Ten_A10.php .
1217. Server Misconfiguration, from
http://pr0jects.webappsec.0rg/w/page/13246959/Server%20Misc0nfigurati0n.
1218. Repairing system after following directions in attempt to clean virus, from
http://forum.hijackthis.de/archiv/18982-repairing-system-after-following-directions-attempt-clean-
virus.html.
1219. Header Manipulation, from
http://www.hpenterprisesecurity.com/vulncat/en/vulncat/sql/header_manipulation.html.
1220. Cache Poisoning, from https://www.owasp.org/index.php/Cache_Poisoning .
1221. Improving Web Application Security: Threats and Countermeasures, from
http://msdn.microsoft.com/en-us/library/aa302418.aspx.
1222. Best Practices for Applying Service Packs, Hotfixes and Security Patches, from
http://technet.microsoft.com/en-us/library/cc750077.aspx .
1223. Securing Your Web Server, from http://msdn.microsoft.com/en-us/library/ff648653.aspx .
1224. Web Server Security and Database Server Security, from
http://www.acunetix.com/websitesecurity/webserver-security.
1225. Windows IIS Server hardening checklist, from
http://media.techtarget.com/searchSecurity/downloads/Windows_IIS_Server_hardening_checklist.pdf7t
rack=LlAP .
1226. IIS Web Server Security, from http://www.acunetix.com/websitesecurity/iis-security.
1227. WEB SERVER SECURITY AND DATABASE SERVER SECURITY, from http://www.itura.net/training/19-web-
server-security-and-database-server-security.html.
1228. Checklist: Securing Your Web Server, from http://msdn.microsoft.com/en-us/library/ff648198.aspx .
1229. HTTP Response Splitting, Web Cache Poisoning Attacks, and Related Topics, from
http://www.ouah.org/whitepaper_httpresponse.pdf.
1230. Hacking Web Servers, from http://www.scribd.com/doc/35607686/hacking-Module-ll.
1231. Terms used by Microsoft to describe the various software updates released by it, from
http://www.thewindowsclub.com/terms-used-by-microsoft-to-describe-the-various-software-updates-
released-by-it.
1232. Patch Management Best Practices, from http://www.oracle.com/technetwork/systems/articles/patch-
management-jsp-135385.html.
1233. Directory Traversal Attacks, from http://www.acunetix.com/websitesecurity/directory-traversal.
1234. J ason Chan, (2004), Essentials of Patch Management Policy and Practice, from
http://www.patchmanagement.org/pmessentials.asp.
References Page 3014 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1235. Managing Web Server Security, from
www.microsoft.com/technet/prodtechnol/windows2000serv/technologies/iis/maintain/featusability/c0
5iis.mspx.
1236. There are basically three overlapping types of risk:, from http://www.rduonline.com/webpolicy.mgi.
1237. Frank Kargl, J orn Maier, Stefan Schlott, Michael Weber, Protecting Web Servers from Distributed Denial
of Service Attacks, from http://wwwl0.org/cdrom/papers/409/.
1238. TCPflow (Analyzing Tool), from http://www.circlemud.org/.
1239. Radu State, (2008), Hacking Web2, http://www.aims-conference.org/issnsm-2008/01-WebHacking.pdf.
1240. J eremiah Grossman, (2010), 10th Website Security Statistics Report,
http://www.whitehatsec.com/home/assets/presentations/10PPT/PPT_stats0910.pdf.
1241. Reto E. Haeni, (1997), Firewall Penetration Testing,
http://bandwidthco.com/whitepapers/netforensics/penetration/Firewall%20Penetration%20Testing.pdf
1242. AMJ ahangiri, Google Hacking, http://www.alijahangiri.org/publication/Google-Hacking-by-Ali-
J ahangiri.pdf.
1243. Networking the networks, from http://www.terena.org/activities/tf-csirt/iodef/docs/i-
taxonomy_terms.ht.
1244. Network Computing, from
http://www.networkcomputing.com/shared/article/showArticle.jhtml?articleld=8702815&c.
1245. Barry Wheelbarger, Apache Security, from
http://www.cs.uwf.edu/~wilde/StuPres200301/Apache_Security.ppt.
1246. Security issues affecting Apache httpd 2.0.40, from http://www.apacheweek.com/features/security-
V2.0.40.
1247. Apache Web Server for Windows Lets Remote Users Crash the Web Server Application, from
http://www.securitytracker.com/alerts/2001/0ct/1002543.html.
1248. The World Wide Web Security FAQ, from http://www.zentek-international.com/mirrors/www-security-
faq/wwwsfl.html.
1249. HNS Newsletter, from http://www.net-security.org/dl/newsletter/txt/issue066.txt.
1250. Ethel the Blog, from http://stommel.tamu.edu/~baum/ethel/2000_12_03_ethel-archive.html.
1251. Survey and Analysis of Available Tools, from
http://www.securecoding.org/authors/artides/may202003/section7.php.
1252. Information Security Products, from http://www-
935.ibm.com/services/us/index.wss/offerfamily/iss/a 1029097.
1253. Family of Load Balancers, from http://www.redhillnetworks.com/products/webmux/load-balancer.htm.
1254. Advanced Defect Tracking Web Edition, from http://www.borderwave.com/.
1255. Internet Security and Warfare (ISAW), from http://technews-isaw.blogspot.com/.
1256. Experimental Computer System lab, from http://www.ecsl.cs.sunysb.edu/.
1257. An Internet Encyclopedia, from http://www.freesoft.org/CIE/Topics/ssl-draft/3-SPEC.HTM.
1258. Apache httpd 2.0 vulnerabilities, from http://httpd.apache.org/security/vulnerabilities_20.html.
1259. Apache httpd 1.3 vulnerabilities, from http://httpd.apache.org/security/vulnerabilities_13.html.
1260. Web Hosting, E-commerce, and Domain Registration..., from http://www.sidetrips.com/.
1261. Computers, Networking, and Security, from http://www.cromwell-intl.com/.
1262. Tony Bradley, (2006), Secure Internet and Network Security, from http://www.s3kur3.com/.
References Page 3015 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1263. Saumil Shah, (2003), One-way Web Hacking, from http://net-
square.com/papers/one_way/one_way.html.
1264. (2010), Case Study: Congressional Web Site Defacements Follow the State of the Union, from
http://praetorianprefect.eom/archives/2010/ 01/congressional-web-site-defacements-follow-the-state-
of-the-union/.
1265. Definition: WEB-SITES DEFACEMENT, from http://www.freepatentsonline.com/y2010/0107247.html.
1266. Bodvoc, (2010), An Overview of a Web Server, from http://bodvoc.wordpress.com/2010/07/02/an-
overview-of-a-web-server/.
1267. (2009), IIS 7.0 Architecture, from http://www.gandhipritesh.com/2009/05/iis-70-architecture.html.
1268. (2001), Defaced Websites, from http://attrition.org/mirror/attrition/.
1269. Robert Auger, Server Misconfiguration, from http://pr0jects.webappsec.0rg/w/page/13246959/Server
Misconfiguration.
1270. Insecure Configuration Management, from
http://www.owasp.org/index.php/lnsecure_Configuration_Management.
1271. (2009), hostmap 0.2 - Automatic Hostname & Virtual Hosts Discovery Tool, from
http://www.darknet.org.uk/tag/web-server-hacking/.
1272. (2009), reDuh - TCP Redirection over HTTP, from http://www.darknet.org.uk/tag/web-server-hacking/.
1273. httprecon - Advanced Web Server Fingerprinting http://www.darknet.org.uk/tag/web-server-hacking/.
1274. Robert Auger, HTTP Response Splitting http://pr0jects.webappsec.0rg/w/page/13246931/HTTP
Response-Splitting.
1275. HTTP Response Splitting, from http://www.owasp.org/index.php/HTTP_Response_Splitting.
1276. Introduction to HTTP Response Splitting, from
http://www.securiteam.com/securityreviews/5WP0E2KFGK.html.
1277. Tunneling protocol, from http://en.wikipedia.org/wiki/Tunneling_protocol.
1278. Whois, from http://tools.whois.net.
1279. Traceroute, from http://whatismyipaddress.com/traceroute-tool.
1280. ActiveWhois, from http://www.johnru.com/.
1281. Netcraft, from http://searchdns.netcraft.com/7host.
1282. httprecon, from http://www.computec.ch/projekte/httprecon/?s=download.
1283. ID Serve, from http://www.grc.com.
1284. HTTrack Website Copier, from http://www.httrack.c0m/page/2/ .
1285. WebCopier Pro, from http://www.maximumsoft.com/products/wc_pro/overview.html.
1286. BlackWidow, from http://softbytelabs.com/us/downloads.html.
1287. Hamster, from http://erratasec.blogspot.in/2009/03/hamster-20-and-ferret-20.html.
1288. Firesheep, from http://codebutler.github.io/firesheep/.
1289. Brutus, from http://www.hoobie.net/brutus/brutus-download.html.
1290. Metasploit, from http://www.metasploit.com/download/.
1291. WFetch, from http://d0wnl0ad.micr0s0ft.c0m/d0wnl0ad/d/e/5/de5351d6-4463-4cc3-a27c
3e2274263c43/wfetch.exe (http://www.microsoft.com/downloads/details.aspx?FamilylD=56fc92ee-
a71a-4c73-b628-ade629c89499&DisplayLang=en).
1292. Brutus, from http://www.hoobie.net/brutus/brutus-download.html.
1293. Internet Password Recovery Toolbox, from http://www.rixler.com/password_recovery_toolbox.htm.
References Page 3016 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1294. Microsoft Baseline Security Analyzer (MBSA), from http://www.microsoft.com/en-
us/download/details. aspx?id=7558.
1295. Altiris Client Management Suite, from http://www.symantec.com/client-management-suite/trialware.
1296. Prism Patch Manager, from http://www.newboundary.com/products/prism-patch-manager/trial.
1297. MaaS360Patch Analyzer Tool, from http://www.maas360.com/tools-and-trials/downloads/.
1298. Kaseya Security Patch Management, from http://www.kaseya.c0m/features/patch-management.aspx#.
1299. Secunia CSI, from http://secunia.com/products/corporate/csi/.
1300. ZENworksPatch Management, from http://www.novell.com.
1301. LumensionPatch and Remediation, from http://www.lumension.com.
1302. Security Manager Plus, from http://www.manageengine.com/products/security-
manager/download, html.
1303. VMware vCenter Protect, from http://www.shavlik.com/downloads.aspx.
1304. Syhunt Dynamic, from http://www.syhunt.com/?n=Syhunt.Dynamic.
1305. N-Stalker Web Application Security Scanner, from http://www.nstalker.com/products/editions/free/.
1306. Wikto, from http://www.sensepost.com.
1307. Acunetix Web Vulnerability Scanner, from http://www.acunetix.com/vulnerability-
scanner/down load.htm.
1308. HackAlert, from http://www.armorize.com/index.php?link_id=register.
1309. QualysGuard Malware Detection, from http://www.qualys.com/forms/trials/stopmalware/.
1310. Retina CS, from http://www.beyondtrust.com/Landers/TY-Page-RetinaCSCommunity/index.html.
1311. Nscan, from http://nscan.hypermart.net.
1312. NetlQ Secure ConfigurationManager, from https://www.netiq.com/products/secure-configuration-
manager/.
1313. SAINT, from http://www.saintcorporation.com/products/software/saintScanner.html.
1314. HP Weblnspect, from https://download.hpsmartupdate.com/webinspect/.
1315. Arirang, from http://www.monkey.org/~pilot/arirang/.
1316. N-Stalker Web Application Security Scanner, from http://www.nstalker.com/products/editions/free/.
1317. Infiltrator, from http://www.infiltration-systems.com/download.shtml.
1318. WebCruiser, from http://sec4app.com/download.htm.
1319. dotDefender, from http://www.applicure.com/Products/.
1320. Core Impact Professional, from http://www.coresecurity.com.
1321. Immunity CANVAS, from http://www.immunitysec.com/downloads.shtml.
Module 13: Hacking Web Applications
1322. Parameter Tampering, from http://www.imperva.com/resources/glossary/parameter_tampering.html.
1323. Connection String Injection Attacks, from http://msdn.microsoft.com/en-us/library/ms254947.aspx.
1324. A62004 Injection Flaws, from https://www.owasp.org/index.php/A6_2004_lnjection_Flaws.
1325. Connection String Parameter Pollution Attacks, from http://blackhat.com/presentations/bh-dc-
10/Alonso_Chema/Blackhat-DC-2010-Alonso-Connection-String-Parameter-Pollution-wp.pdf.
1326. Session Prediction, from https://www.owasp.org/index.php?title=Session_Prediction&setlang=en.
1327. Buffer Overflow, from http://pr0jects.webappsec.0rg/w/page/13246916/Buffer-0verfl0w.
References Page 3017 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1328. Managed Application Firewall, from
http://www.secureworks.com/resources/articles/other_artides/2010-waf.
1329. Do you write secure code?, from http://www.slideshare.net/yuvalgo/do-you-write-secure-code-by-erez-
metula.
1330. Web Parameter Tampering, from https://www.owasp.org/index.php/Web_Parameter_Tampering.
1331. Path Traversal, from https://www.owasp.org/index.php/Path_traversal.
1332. Top 10 2010-A6-Security Misconfiguration, from https://www.owasp.org/index.php/Top_10_2010-A6-
Security_Misconfiguration.
1333. Common Security Mistakes in Web Applications, from http://roobon.net/2011/06/01/common-security-
mistakes-in-web-applications.
1334. LDAP Injection & BLIND LDAP Injection, from http://www.blackhat.com/presentations/bh-europe-
08/Alonso-Parada/Whitepaper/bh-eu-08-alonso-parada-WP.pdf.
1335. Parameter Manipulation, from http://www.cgisecurity.com/owasp/html/chlls04.html.
1336. Cross-site Scripting (XSS), from https://www.owasp.org/index.php/Cross-site_Scripting_(XSS).
1337. XSS Filter Evasion Cheat Sheet, from
https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet.
1338. Cross-Site Request Forgery (CSRF) Attack Lab, from
http://www.cis.syr.edu/~wedu/seed/Labs/Attacks_CSRF/CSRF.pdf.
1339. Cross-Site Request Forgeries, from http://www.shiflett.org/articles/cross-site-request-forgeries.
1340. Webapplication Attack : DOS and DDOS attack, from
http://funwhichuwant.blogspot.in/2012/ 10/webapplication-attack-dos-and-ddos.html.
1341. Buffer Overflow, from http://pr0jects.webappsec.0rg/w/page/13246916/Buffer%200verfl0w.
1342. Cookie Poisoning, from http://www.imperva.com/resources/glossary/cookie_poisoning.html .
1343. Wen Application Vulnerabilities, from http://www.slideshare.net/technoplex/web-application-
vulnerabilities .
1344. Attacking XML Security Message Oriented Madness, XML Worms and Web Service Security Sanity, from
http://www.slideshare.net/yusufmotiwala/attacking-xml-security.
1345. Managing Web Services, from http://docs.oracle.com/cd/E19316-01/820-4335/gbbjk/index.html.
1346. Web Services Hacking And Hardening, from http://www.slideshare.net/rnewton/web-services-hacking-
and-hardening.
1347. Advanced Web Services Hacking, from http://www.slideshare.net/shreeraj/advanced-web-services-
hacking .
1348. Hacking Web 2.0 - Defending Ajax and Web Service, from http://www.slideshare.net/shreeraj/hacking-
web-20-defending-ajax-and-web-services-hitb-2007-dubai.
1349. All-Purpose Tools, from http://www.securnet.biz/tools.htm.
1350. Error executing child request for Chartlmg.axd, from http://social.msdn.microsoft.com/Forums/en-
US/MSWinWebChart/thread/115d7f31-e4a8-4c09-b558-4db2cfle83e7.
1351. Session Prediction, from https://www.owasp.org/index.php?title=Session_Prediction&setlang=en.
1352. Building Connection Strings, from http://msdn.microsoft.com/en-us/library/ms254947(v=vs.80).aspx .
1353. DOS ATTACKS USING SQL WILDCARDS, from http://hax.tor.hu/read/MSSQL_DoS/wildcard_attacks.pdf.
1354. Understanding Web Services Attacks, from
http://www.datacorn.cz/files_datacom/understanding_webservicesattacks_0.pdf.
1355. Spheon J SOAP - InterOp: MS SOAP ToolKit 3.0 (typed), from
http://soap.fmui.de/interop/interop2OOlMSSOAPToolKitTyped.html.
References Page 3018 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1356. Web Services Attacks & Countermeasures, from
http://www.interop.com/lasvegas/2004/presentations/downloads/sc04_c_sima.pdf.
1357. Testing for HTTP Splitting/Smuggling (OWASP-DV-OI6), from
https://www.owasp.org/index.php/Testing_for_HTTP_Exploit.
1358. Testing for SQL Wildcard Attacks (OWASP-DS-OOl), from
https://www.owasp.org/index.php/Testing_for_SQL_Wildcard_Attacks_(OWASP-DS-001) .
1359. Testing for DoS User Specified Object Allocation (OWASP-DS-004), from
https://www.owasp.org/index. php/Testing_for_DoS_User_Specified_Object_Allocation_(OWASP-DS-
004).
1360. Testing for Storing too Much Data in Session (OWASP-DS-OO8), from
https://www.owasp.org/index.php/Testing_for_Storing_too_Much_Data_in_Session_(OWASP-DS-008).
1361. Testing for Naughty SOAP Attachments, from http://nilminus.wordpress.com/web-application-
penetration-testing/web-services-testing/testing-for-naughty-soap-attachments.
1362. Testing for AJ AX (OWASP-AJ -002), from
https://www.owasp.org/index.php?title=Testing_for_AJ AX_(OWASP-AJ -002)&setlang=es.
1363. Common Web-Based Applications Attacks, Available from
http://www.applicure.c0m/C0mm0n_Web_Based_Applicati0ns_Attacks#2._lnjecti0n_Flaws.
1364. Bart Puype, WGET for Windows (Win32), version 1.11.4, Available from
http://users.ugent.be/~bpuype/wget/.
1365. Andres Riancho, Web Application Attack and Audit Framework, Available from
http://w3af.sourceforge.net/.
1366. Market Leading Protection for Web Applications, Available from
http://www.imperva.com/products/web-application-firewall.html.
1367. Vulnerability, from http://www.citi.umich.edu/projects/itss/lectures/lecture-20.pdf.
1368. DATA IIS Vulnerability, from http://www.ciac.org/ciac/bulletins/k-068.shtml.
1369. RPC DCOM Vulnerability, from http://seclists.org/bugtraq/2003/0ct/0151.html.
1370. ASN Exploits, from www.itworldcanada.com.
1371. [PDF] Introduction to Web Applications and Security, from http://books.mcgraw-
hill.com/downloads/products//007222438X/007222438X_ch01.pdf.
1372. The behaviors and tools of today's hacker, from www.symantec.com/symadvantage/014/hacker.html.
1373. Paper -- Cross Site Scripting, from www.technicalinfo.net/papers/CSS.html.
1374. Host Vulnerability, from http://www.cit.cornell.edu/security/scanning/sample.html.
1375. J oseph Seaman, (2003), Web Application Security from
www.itsa.ufl.edu/slide_shows/2003/WebAppSec.ppt.
1376. Vulnerability Management Commitment and Disclosure Policy, from
http://www.symantec.com/security/.
1377. Bug Tracking Software Links, from http://www.bug-track.com/main/links.jsp.
1378. Mike Benham, (2002), Internet Explorer SSL Vulnerability, from
http://www.securiteam.com/windowsntfocus/5J P0E0081M.html.
1379. The 21 Primary Classes of Web Application Threats, from
www.netcontinuum.com/securityCentral/TopThreatTypes/index.cfm.
1380. Paper: HTML Code Injection and Cross-site scripting, from
http://www.technicalinfo.net/papers/CSS.html.
1381. IS YOUR WEBSITE HACKABLE?, from www.acunetix.com/vulnerability-scanner/wvsbrochure.pdf.
References Page 3019 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1382. Regular Expressions: curl Simplifies Web Retrieval, from
http://www.unixreview.com/documents/s=1820/unil011713175619/0201i.htm.
1383. FWSM URL Filtering Solution TCP ACL Bypass Vulnerability, from www.cisco.com.
1384. Zero Day Exploits: The Holy Grail, from www.netsecurity.about.com.
1385. What is parameter tampering?, from www.imperva.com.
1386. AFITC 2001, from www.whitehatsec.com.
1387. Toelichting aanvalstechnieken, from www.nedsecure.nl.
1388. Cross-Site Scripting, Injection Flaws, OWASP Web Application Security Top Ten List and Buffer Overflow,
from www.owasp.org.
1389. Hacker Protection from SQL Injection - SPI Dynamics, from www.spidynamics.com.
1390. Changing Your Password, How Hackers Get Hold of Passwords, from
www.lockdown.co. uk/?pg=password_guide.
1391. George Shaffer, Modus Operandi of an Attacker Using a Password Cracker, from
http://geodsoft.com/howto/password/cracking_passwords.htm.
1392. Robert J . Shimonski, (2002), Hacking techniques, from www.ibm.com/developerworks/library/s-crack.
1393. Mark Curphey, Query String, from www.cgisecurity.com/owasp/html/chlls04.html.
1394. Edward Skoudis, Authforce, from (2005),
http://searchsecurity.techtarget.com/searchSecurity/downloads/Skoudis_ch07.pdf.
1395. Sarah Granger, (2002), A Guide To Better Password Practices, from
www.securityfocus.com/infocus/1537.
1396. Bad Password Examples, from http://www.spy-hill.com/~myers/help/Passwords.html.
1397. Microsoft Password Checker, from
http://www.microsoft.com/athome/security/privacy/password_checker.mspx.
1398. Mehdi Mousavi, What an ISAPI extension is?, from
http://www.codeproject.com/KB/ISAPI/isapi_extensions.aspx.
1399. Maximum Security - Chapter 10 - Password Crackers, from
http://www.windowsecurity.com/whitepapers/Maximum_Security__Chapter_10__Password_Crackers_.
html.
1400. Patch improves the TCP Initial Sequence Number Randomness, from
http://www.securiteam.com/windowsntfocus/3V5QBQKPPU.html.
1401. Mark Russinovich, (2008), TCP View for Windows, from http://technet.microsoft.com/hi-
in/sysinternals/bb897437(en-us).aspx.
1402. Admin Knowledge Base section, from
http://www.windowsnetworking.com/kbase/WindowsTips/WindowsTips/WindowsNT/AdminTips/Utiliti
es/TCPViewe.
1403. Web Application Security, from http://www.securityfocus.com/archive/107/223386/2001-10-28/2001-
11-02/ 0.
1404. Nikola Strahija, (2002), Introduction to password cracking, from
http://www.xatrix.org/article.php?s=1758.
1405. Password cracking, http://www-128.ibm.com/developerworks/security/library/s-
crack/password_cracking.html.
1406. Password cracker, from
http://searchfinancialsecurity.techtarget.com/sDefinition/0sidl85_gci536994,00.html.
References Page 3020 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1407. David P. Kormann and Aviel D. Rubin, Risks of the Passport Single Signon Protocol, from
http://www.cs.jhu.edu/~rubin/courses/sp03/papers/passport.pdf.
1408. Abel Banda, (2003), ASP.NET Forms Authentication, from
http://www.ondotnet.eom/pub/a/dotnet/2003/01/06/formsauthpl.html.
1409. Erika, (2006), Microsoft Security Bulletin MS02-048, from
http://www.microsoft.com/technet/security/Bulletin/MS02-048.mspx.
1410. J eff Williams, (2006), Cross-Site Scripting, Injection Flaws, OWASP Web Application Security Top Ten List
and Buffer Overflow, from http://www.owasp.org/.
1411. Sarah Granger, (2002), A Guide To Better Password Practices, from
http://www.securityfocus.com/infocus/1537.
1412. Gaining Access Using Application and Operating System Attacks, from
http://searchsecurity.techtarget.com/searchSecurity/downloads/Skoudis_ch07.pdf.
1413. Rob Shimonski, (2002), Hacking techniques, from http://www-128.ibm.com/developerworks/library/s-
crack/.
1414. Password Guidelines, from http://www.lockdown.co.uk/?pg=password_guide.
1415. Biometric Education: Fingerprint, from http://www.barcode.ro/tutorials/biometrics/fingerprint.html.
1416. Kimon Rethis, (2006), Biometrics Authentication, from http://www.csun.edu/.
1417. IPSec Authentication and Authorization Models, from
http://www.ciscopress.com/articles/article.asp?p=421514&seqNum=4%20-%2031k%20-&rl=l.
1418. Digital Certificates, from http://www.bitpipe.com/tlist/Digital-Certificates.html.
1419. J ohn, HTTP Authentication: Basic and Digest Access Authentication, from
h tt p ://www. i etf. 0 rg/ rf c/ rf c 2617. txt.
1420. Authentication, Authorization, and Access Control, from http://httpd.apache.org/docs/.
1421. Functions and Procedures: Basic Authentication, from
http://www.zeitungsjunge.de/delphi/mime/Help/DIMime.htm.
1422. The Cross-Site Scripting (XSS) FAQ, from http://www.cgisecurity.com/xss-faq.html.
1423. Input Validation Cheat Sheet, from http://michaeldaw.org/input_validation_cheat_sheet.
1424. Quick Security Reference - Cross-Site Scripting.docx, from
http://download.microsoft.eom/download/E/E/7/EE7B9CF4-6A59-4832-8EDE
B018175F4610/Quick%20Security%20Reference%20-%20Cross-Site%20Scripting.docx.
1425. Web Application Penetration Testing, from
http://www.owasp.org/index.php/Web_Application_Penetration_Testing.
1426. J eff Orloff, The Big Website Guide to a Hacking Attack, from http://www.applicure.com/blog/big-
website-guide-to-a-hacking-attack.
1427. What is Cross-Site Scripting (XSS)?, from http://www.applicure.com/blog/what-is-cross-site-scripting.
1428. LDAP Filters, from http://www.selfadsi.org/ldap-filter.htm.
1429. Paul Lee, (2002), Cross-site scripting, from http://www.ibm.com/developerworks/tivoli/library/s-
csscript/.
1430. XSS (Cross Site Scripting) Prevention Cheat Sheet, from
http://www.owasp.org/index.php/XSS_%28Cross_Site_Scripting%29_Prevention_Cheat_Sheet.
1431. Amit Klein, (2005), DOM Based Cross Site Scripting or XSS of the Third Kind, from
http://www.webappsec.org/projects/articles/071105.shtml.
1432. Samoa: Formal Tools for Securing Web Services, from http://research.microsoft.com/en-
us/projects/samoa/.
References Page 3021 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1433. RSnake"XSS (Cross Site Scripting) Cheat Sheet Esp: for filter evasion", from http://ha.ckers.org/xss.html.
1434. Microsoft's Anti-Cross Site Scripting Security Runtime Engine Sample - AntiXSS 3.1, from
http://davidhayden.com/blog/dave/archive/2009/09/22/antixsssample.aspx.
1435. Philip Tellis, (2010), Common Security Mistakes in Web Applications, from
http://www.smashingmagazine.com/2010/10/18/common-security-mistakes-in-web-applications/.
1436. J .D. Meier, Alex Mackman, Michael Dunner, Srinath Vasireddy, Ray Escamilla and Anandha Murukan,
(2003), Improving Web Application Security: Threats and Countermeasures, from
http://msdn.microsoft.com/en-us/library/ff649874.aspx.
1437. Alex Homer, Components and Web Application Architecture, from http://technet.microsoft.com/en-
us/library/bb727121.aspx.
1438. Ryan Barnett, (2011), Web-Hacking-lncident-Database, from http://projects.webappsec.org/Web-
Hacking-lncident-Database#TopApplication Weaknesses.
1439. (2009), Path Traversal, from http://www.owasp.org/index.php/Path_Traversal.
1440. (2010), Web Parameter Tampering, from
http://www.owasp.org/index.php/Web_Parameter_Tampering.
1441. Unvalidated Input, from
http://www.0wasp.0rg/index.php/Unvalidated_lnput#Exarnples_and_References.
1442. Kevin Beaver, The importance of input validation, from
http://searchsoftwarequality.techtarget. com/tip/0,289483, sid92_gcil214373_meml, 00. html.
1443. (2010), Validating Input, from
http://developer.apple.eom/library/ios/#documentation/Security/Conceptual/SecureCodingGuide/Articl
es/Validatinglnput.html.
1444. Seth Fogie, (2006), Code Injection Explained, from
http://www.informit.com/guides/content.aspx?g=security&seqNum=226.
1445. Code injection, from http://en.wikipedia.org/wiki/Code_injection.
1446. Injection Prevention Cheat Sheet, from
http://www.owasp.org/index.php/lnjection_Prevention_Cheat_Sheet.
1447. Remote file inclusion, from http://en.wikipedia.org/wiki/Remote_file_inclusion.
1448. Robert Auger, (2011), LDAP Injection, from http://projects.webappsec.org/LDAP-lnjection.
1449. Testing for LDAP Injection (OWASP-DV-OO6), from
http://www.owasp.org/index.php/Testing_for_LDAP_lnjection_%280WASP-DV-006%29.
1450. Shreeraj Shah, (2006), Top 10 Web 2.0 Attack Vectors, from http://www.net-
security.org/article. php?id=949.
1451. Robert Auger, (2010), Threat Classification, from http://projects.webappsec.org/Threat-Classification.
1452. (2006), Preventing HTML form tampering, from http://advosys.ca/papers/web/60-form-tampering.html.
1453. (2010), Cross-site Scripting (XSS), from http://www.owasp.org/index.php/Cross-
$ite_Scripting_%28XSS%29.
1454. Paul Lee, Cross-site scripting, from http://www.ibm.com/developerworks/tivoli/library/s-csscript/.
1455. Cross-site scripting, from http://en.wikipedia.org/wiki/Cross-site_scripting.
1456. DOM Based XSS, from http://www.owasp.org/index.php/DOM_Based_XSS.
1457. Phil Haack, (2009), CSRF Attacks and Web Forms, from http://haacked.com/archive/2009/04/02/csrf-
webforms.aspx.
1458. Chris Shiflettk, (2004), Cross-Site Request Forgeries, from http://shiflett.org/articles/cross-site-request-
forgeries.
References Page 3022 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1459. Robert Auger, (2010), The Cross-Site Request Forgery (CSRF/XSRF) FAQ, from
http://www.cgisecurity.com/csrf-faq.html.
1460. Application Denial of Service, from http://www.owasp.org/index.php/Application_Denial_of_Service.
1461. Cookie Poisoning, from http://www.imperva.com/resources/glossary/cookie_poisoning.html.
1462. Cookie Poisoning howto, from http://forum.intern0t.net/security-tutorials-guides/2270-cookie-
poisoning-how.html.
1463. Broken Authentication and Session Management, from
http://www.owasp.org/index.php/Broken_Authentication_and_Session_Management.
1464. Robert Auger, (2010), Buffer Overflow, from http://pr0jects.webappsec.0rg/w/page/13246916/Buffer
Overflow.
1465. (2009), Buffer Overflow, from http://www.owasp.org/index.php/Buffer_Overflow.
1466. Free XML tools and software, from http://www.garshol.priv.no/download/xmltools/.
1467. SYS-CON tv, (2005), Anatomy of a Web Services Attack, from http://education.sys-con.com/node/80899.
1468. Robert Auger, (2010), Brute Force, from http://pr0jects.webappsec.0rg/w/page/13246915/Brute-F0rce.
1469. Ian de Villiers, sensepost j-baah, from http://www.sensepost.com/labs/tools/pentest/j-baah.
1470. (2009), Session Prediction, from http://www.owasp.org/index.php/Session_Prediction.
1471. Robert Auger, (2010), XPath Injection, from http://projects.webappsec.0rg/w/page/13247005/XPath
Injection.
1472. (2009), XPATH Injection, from http://www.owasp.org/index.php/XPATH_lnjection.
1473. SmartWhois, from http://www.tamos.com/download/main/index.php.
1474. Netcraft, from http://searchdns.netcraft.com/7host.
1475. Whois, from http://tools.whois.net.
1476. DNSstuff, from http://www.dnsstuff.com.
1477. dnsstuff, from http://www.dnsstuff.com/.
1478. network-tools, from http://network-tools.com/.
1479. DNS, from http://e-dns.org.
1480. DomainTools, from http://www.domaintools.com.
1481. WhatsUp PortScanner Tool, from
http://www.whatsupgold.com/products/download/network_management.aspx?k_id=port-scan.
1482. hping, from http://www.hping.org/download.php.
1483. Sandcat Browser, from http://www.syhunt.com/?n=Sandcat.Browser.
1484. Netcat, from http://sourceforge.net/projects/netcat/files/latest/download?source=files.
1485. ID Serve, from http://www.grc.com.
1486. Netcraft, from http://toolbar.netcraft.com.
1487. OWASP Zed Attack Proxy, from
https://code.google.com/p/zaproxy/downloads/detail?name=ZAP_2.0.0_Windows.exe&can=2&q=.
1488. Burp Spider, from http://blog.portswigger.net/2008/ll/mobp-all-new-burp-spider.html.
1489. WebScarab, from https://www.0wasp.0rg/index.php/Categ0ry:0WASP_WebScarab_Pr0ject.
1490. Burp Suite, from http://blog.portswigger.net/2008/ll/mobp-all-new-burp-spider.html.
1491. Brutus, from http://www.hoobie.net/brutus/brutus-download.html.
1492. Sensepost's Crowbar, from http://research.sensepost.com/tools/web/j-baah.
References Page 3023 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1493. UrIScan, from
http://www.microsoft.com/web/gallery/install.aspx?appsxml=&appid=UrlScan%3bUrlScan.
1494. Nikto, from http://www.cirt.net/nikt02.
1495. Nessus, from http://www.tenable.com/products/nessus/select-your-operating-system.
1496. Acunetix Web Vulnerability Scanner, from http://www.acunetix.com/vulnerability-
scanner/download.htm.
1497. Weblnspect, from https://download.hpsmartupdate.com/webinspect/.
1498. HttPrint, from http://net-square.com/httprint.html.
1499. WebScarab, from https://www.0wasp.0rg/index.php/Categ0ry:0WASP_WebScarab_Pr0ject,
1500. GNU Wget, from ftp://ftp.gnu.org/gnu/wget/.
1501. Teleport Pro, from http://www.tenmax.com/teleport/pro/download.htm.
1502. BlackWidow, from http://softbytelabs.com/us/downloads.html.
1503. Brutus, from http://www.hoobie.net/brutus/brutus-download.html.
1504. THC-Hydra, from http://www.thc.org/thc-hydra/.
1505. soapUl, from http://www.soapui.org/.
1506. CookieDigger, from http://www.mcafee.com/apps/free-tools/termsofuse.aspx7urh/us/downloads/free-
tools/cookiedigger.aspx.
1507. WebScarab, from https://www.0wasp.0rg/index.php/Categ0ry:0WASP_WebScarab_Pr0ject.
1508. Instant Source, from http://www.blazingtools.eom/downloads.html#is.
1509. HttpBee, from http://www.o0o.nu/projects/stif.
1510. w3af, from http://w3af.sourceforge.net.
1511. Teleport Pro, from http://www.tenmax.com/teleport/pro/download.htm.
1512. GNU Wget, from ftp://ftp.gnu.org/gnu/wget/.
1513. WebCopier Pro, from http://www.maximumsoft.com/products/wc_pro/overview.html.
1514. HTTrack Website Copier, from http://www.httrack.c0m/page/2/ .
1515. BlackWidow, from http://softbytelabs.com/us/downloads.html.
1516. cURL, from http://curl.haxx.se/download.html.
1517. MileSCAN ParosPro, from
http://www.milescan.com/hk/index.php?option=com_content&view=article&id=15<emid=157.
1518. Acunetix Web Vulnerability Scanner, from http://www.acunetix.com/vulnerability-
scanner/download.htm.
1519. Watcher Web Security Tool, from http://websecuritytool.codeplex.com/downloads/get/62386.
1520. Netsparker, from http://www.mavitunasecurity.com/.
1521. N-Stalker Web Application Security Scanner, from http://www.nstalker.com/products/editions/free/.
1522. VampireScan, from http://www.vampiretech.com/store/?product=vampirescan-cloud-securitystandard-
edition.
1523. SandcatMini, from http://www.syhunt.com/?n=Syhunt.Mini.
1524. Websecurify, from
https://code.google.com/p/websecurify/downloads/detail?name=Websecurify%20Suite%201.0.0.exe&c
an=2&q=.
1525. OWASP ZAP, from
https://code. google. com/p/zaproxy/downloads/detail?name=ZAP_2.0.0_Windows.exe&can=2&q=.
References Page 3024 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1526. NetBrute, from http://www.rawlogic.com/netbrute/.
1527. skipfish, from https://c0de.g00gle.c0m/p/skipfish/.
1528. X5s, from http://xss.codeplex.com/downloads/get/115610.
1529. SecuBat Vulnerability Scanner, from http://secubat.codeplex.com/.
1530. WSSA - Web Site Security Scanning Service, from https://secure.beyondsecurity.com/vulnerability-
scanner-signup?step=l.
1531. SPIKE Proxy, from http://www.immunitysec.com/resources-freesoftware.shtml.
1532. Ratproxy, from https://c0de.g00gle.c0m/p/ratpr0xy/.
1533. Wapiti, from http://wapiti.sourceforge.net/.
1534. Syhunt Hybrid, from http://www.syhunt.com/?n=Syhunt.Dynamic.
1535. WebWatchBot, from
http://www.exclamationsoft.com/ExclamationSoft/download/instructions/html.asp?product=WebWatc
hBot&fe=no.
1536. Exploit-Me, from http://labs.securitycompass.com/exploit-me/.
1537. KeepNI, from http://www.keepni.com/.
1538. WSDigger, from http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-
tools/wsdigger.aspx.
1539. Arachni, from http://arachni-scanner.com/latest.
1540. XSSS, from http://www.sven.de/xsss/.
1541. Vega, from http://www.subgraph.com/vega_download.php.
1542. dotDefender, from http://www.applicure.com/Products/.
1543. ServerDefender VP, from http://www.port80software.com/products/serverdefendervp/try.
1544. Radware's AppWall, from
http://www.radware.com/Products/ApplicationDelivery/AppWall/default.aspx.
1545. Barracuda Web Application Firewall, from
https://www.barracuda.com/products/webapplicationfirewall.
1546. ThreatSentry, from http://www.privacyware.com/TS_Registration.html.
1547. Stingray Application Firewall, from .
1548. QualysGuard WAF, from http://www.qualys.com/forms/web-application-firewall/.
1549. IBM Security AppScan, from http://www-01.ibm.com/software/awdtools/appscan/.
1550. ThreatRadar, from http://www.imperva.com/products/wsc_threatradar-reputation-services.html.
1551. Trustwave WebDefend, from https://www.trustwave.c0m/web-applicati0n-firewall/#0verview.
1552. ModSecurity, from http://www.modsecurity.org/download/.
1553. Cyberoam's Web Application Firewall, from http://www.cyberoam.com/webapplicationfirewall.html.
1554. Burp Proxy, from http://blog.portswigger.net/2008/ll/mobp-all-new-burp-spider.html.
1555. WebScarab, from https://www.0wasp.0rg/index.php/Categ0ry:0WASP_WebScarab_Pr0ject.
1556. TamperlE, from http://www.bayden.com/tamperie/.
1557. Tamper Data, from https://addons.mozilla.org/en-US/firefox/addon/tamper-data/eula/79565?src=dp-
btn-primary.
1558. Amap, from http://www.thc.org/thc-amap/.
1559. Netcat, from http://sourceforge.net/projects/netcat/files/latest/download?source=files.
References Page 3025 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1560. OWASP CAL9000, from https://www.0wasp.0rg/index.php/Categ0ry:0WASP_D0wnl0ad.
1561. Hackvertor, from https://hackvertor.co.uk/public.
1562. BeEF, from http://beefproject.com/.
1563. XSS-Proxy, from http://sourceforge.net/projects/xss-proxy/files/latest/download.
1564. Backframe, from http://www.gnucitizen.org/blog/backframe/.
1565. XSS Assistant, from https://c0de.g00gle.c0m/p/xss-assistant/.
1566. SWFIntruder, from https://code.google.com/p/swfintruder/downloads/detail?name=swfintruder-
0.9.1.tgz&can=2&q=.
1567. Flare, from http://www.nowrap.de/flare.html.
1568. MTASC, from http://www.mtasc.org/.
1569. Flasm, from http://flasm.sourceforge.net/.
1570. swfmill, from http://swfmill.org/.
1571. Debugger Version of Flash Plugin/Player, from
http://www.adobe.eom/support/flashplayer/downloads.html#fpll.
1572. SQLiX, from https://www.0wasp.0rg/index.php/Categ0ry:0WASP_SQLiX_Pr0ject.
1573. sqlninja, from http://sqlninja.sourceforge.net/download.html.
1574. SqlDumper, from http://sqldumper.ruizata.com/.
1575. sqlbftools, from http://packetst0rmsecurity.c0m/files/d0wnl0ad/43795/sqlbft00ls-l.2.tar.gz.
1576. Softerra LDAP Browser, from http://www.ldapadministrator.com/download.htm.
1577. Hibernate, from http://www.hibernate.org/downloads.
1578. NHibernate, from http://nhforge.org/.
1579. Ruby On Rails, from http://rubyinstaller.org/downloads.
1580. String searcher: grep, from http://sourceforge.net/projects/gnuwin32/files/grep/2.5.4/grep-2.5.4-
bin.zip/download?use_mirror=nchc.
1581. wsChess, from http://www.net-square.com/wschess.html.
1582. Soaplite, from http://soaplite.com/download.html.
1583. cURL, from http://curl.haxx.se/download.html.
1584. Perl, from http://www.activestate.com/activeperl/downloads/thank-
you?dl=http://downloads.activestate.com/ActivePerl/releases/5.16.3.1603/ActivePerl-5.16.3.1603-
MSWin32-x64-296746.msi.
1585. UDDI Browser, from
http://sourceforge.net/projects/uddibrowser/files/uddibrowser/UDDI%20Browser%200.2%20Binaries/u
b-0.2-bin. zip/download?use_mirror=nchc&download=.
1586. WSIndex, from http://www.wsindex.org/.
1587. Xmethods, from http://www.xmethods.net/ve2/index.po.
1588. WSDigger, from http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/free-
tools/wsdigger.aspx.
1589. Sprajax, from https://www.0wasp.0rg/index.php/Categ0ry:0WASP_Sprajax_Pr0ject.
Module 14: SQL Injection
1590. Advanced SQL Injection, from http://www.slideshare.net/Sandra4211/advanced-sql-injection-3958094.
1591. Advanced SQL Injection, from http://www.slideshare.net/devteev/advanced-sql-injection-eng.
References Page 3026 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1592. SQL injection, from http://searchsqlserver.techtarget.com/feature/SQL-injection.
1593. SQL Injection, from http://hakipedia.com/index.php/SQL_lnjection.
1594. ERROR SQL INJ ECTION - DETECTION, from http://www.evilsql.com/main/page2.php.
1595. What is SQL Injection?, from http://www.secpoint.com/what-is-sql-injection.html.
1596. Securing Oracle Database from Search Engines Attack, from http://www.ijana.in/papers/V4l2-l.pdf.
1597. Stop SQL Injection Attacks Before They Stop You, from http://msdn.microsoft.com/en-
us/magazine/ccl63917.aspx .
1598. Rise in SQL Injection Attacks Exploiting Unverified User Data Input, from
http://technet.microsoft.com/en-us/security/advisory/954462 .
1599. Injection Protection, from http://msdn.microsoft.com/en-us/library/aa224806(v=sql.80).aspx .
1600. Understanding SQL Injection, from
http://www.cisco.com/web/about/security/intelligence/sql_injection.html.
1601. SQL INJ ECTION - Tutorial, from http://elitezone.forumotion.bz/t77-sql-injection-tutorial.
1602. System testing, from http://en.wikipedia.org/wiki/System_testing.
1603. Testing for SQL Injection (OWASP-DV-005), from
https://www.owasp.org/index.php/Testing_for_SQL_lnjection_(OWASP-DV-005).
1604. SQL Injection Cheat Sheet, from http://ferruh.mavituna.com/sql-injection-cheatsheet-oku/.
1605. SQL Injection Introduction, from http://www.controllingtheinter.net/forums/viewtopic.php?f=45&t=8.
1606. Classification of SQL Injection Attacks, from http://courses.ece.ubc.ca/412/term_project/reports/2007-
fall/Classification_of_SQL_lnjection_Attacks.pdf.
1607. CHAPTER 1: INTRODUCTION, from http://isea.nitk.ac.in/publications/web.pdf.
1608. Dmitry Evteev, (2009), Advanced SQL Injection, from http://www.ptsecurity.com/download/PT-devteev-
Advanced-SQL-lnjection-ENG.zip.
1609. Krzysztof Kotowicz, (2010), SQL Injection: Complete walkthrough (not only) for PHP developers, from
http://www.slideshare.net/kkotowicz/sql-injection-complete-walktrough-not-only-for-php-developers.
1610. Nick Merritt, SQL Injection Attacks, from http://www.evilsql.com/main/pagel.php.
1611. SQL Injection Cheat Sheet, from http://michaeldaw.org/sql-injection-cheat-sheet.
1612. Sagar J oshi, 2005, SQL Injection Attack and Defence, Available from
http://www.securitydocs.com/library/3587.
1613. Kevin Spett, Blind SQL Injection-Are your web applications vulnerable?, from http://www.net-
security.org/dl/articles/Blind_SQLInjection.pdf.
1614. Cameron Hotchkies, (2004), Blind SQL Injection Automation Techniques from
http://www.blackhat.com/presentations/bh-usa-04/bh-us-04-hotchkies/bh-us-04-hotchkies.pdf.
1615. San-Tsai Sun, Ting Han Wei, Stephen Liu, and Sheung Lau, Classification of SQL Injection Attacks, from
http://courses.ece.ubc.ca/412/term_project/reports/2007-
fall/Classification_of_SQL_lnjection_Attacks.pdf.
1616. SQL Injection, from http://msdn.microsoft.com/en-us/library/msl61953.aspx.
1617. SQL INJ ECTION, from http://www.authorstream.com/Presentation/useful-155975-sql-injection-hacking-
computers-22237-education-ppt-powerpoint/.
1618. SQL Injection Cheat Sheet, from http://ferruh.mavituna.com/sql-injection-cheatsheet-
oku/#Unionlnjections.
1619. SQL Injection, from http://hakipedia.com/index.php/SQL_lnjection.
References Page 3027 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1620. K. K. Mookhey and Nilesh Burghate, (2004), Detection of SQL Injection and Cross-site Scripting Attacks,
from http://www.symantec.com/connect/articles/detection-sql-injection-and-cross-site-scripting-
attacks.
1621. Ferruh Mavituna, Deep Blind SQL Injection, from
http://docs. google. com/viewer?a=v&q=cache:uvo9RU3T0v8J :labs, portcullis. co.uk/download/Deep_Blin
d_SQL_lnjection.pdf+deep+blind+sql+injection&hl=en&gl=in&pid=bl&srcid=ADGEESgQ9uwlz-eJ FM-
k3zGP5NJ QmHXmfP7UIWOSNTBIOhAV9h2pUWIvibONoFpuOMndYi_3Y-
KOxT9sizjU2ljvSzVi4w4Xc_rDMKVFNSzpj60kXYsYwUQ480EW9IV-OijwWFwYnOJ W&sig=AHIEtbT-
5rxBYONIb02-gShdro-oVnzYeA.
1622. Debasish Das, Utpal Sharma, and D.K. Bhattacharyya, (2009), An Approach to Detection of SQL Injection
Attack Based on Dynamic Query Matching from
http://www.ijcaonline.org/journal/number25/pxc387766.pdf.
1623. (2010), Quick Security Reference: SQL Injection from
http://download.microsoft.com/download/E/E/7/EE7B9CF4-6A59-4832-8EDE-
B018175F4610/Quick%20Security%20Reference%20-%20SQL%20lnjection.docx.
1624. Ferruh Mavituna, One Click Ownage,Adventures of a lazy pentester, from
http://www.0wasp.0rg/images/8/ 8e/0ne_Click_0wnage-Ferruh_Mavituna.pdf.
1625. Alexander Kornbrust, (2009), ODTUG - SQL Injection Crash Course for Oracle Developers from
http://www.red-database-security.com/wp/00w2009_sql_crashcourse_for_developers.pdf.
1626. Pankaj Sharma,(2005), SQL Injection Techniques & Countermeasures from http://www.cert-
in.org.in/Downloader?pageid=7&type=2&fileName=ciwp-2005-06.pdf.
1627. Pankaj Sharma, (2005), SQL Injection Techniques & Countermeasures, from
http://docs.google.com/viewer?a=v&q=cache:OKkPI9hllR8J :www.cert-
in.org.in/knowledgebase/whitepapers/ciwp-2005-
06.pdf+sql+injection+countermeasures&hl=en&gl=in&pid=bl&srcid=ADGEESjfo76m-
84G_nbZgOQax9yl5HEXkM9ZSyLN-
a0_kJ fDD4v4PLvO41fByd3YJ k3GcTKoczBFU2WiNWNMK13Tc28CJ 4WcO-
2bHXqldlWzR0GGmHSRmT39qkpqM2yhKpmfkQNCe80g&sig=AHIEtbR4WivS8bCzwK13BkKQXXHIepLWq
w.
1628. William G.J . Halfond, J eremy Viegas, & Alessandro Orso, (2006), A Classification of SQL Injection Attack
Techniques and Countermeasures, from
http://www.cc.gatech.edu/~orso/papers/halfond.viegas. orso. ISSSE06.presentation.pdf.
1629. Code Injection, Available from http://www.owasp.org/index.php/Code_lnjection.
1630. Understanding SQL Injection, Available from
http://www.cisco.com/web/about/security/intelligence/sql_injection.html.
1631. VIVEK KUMBHAR, (2009), From Mind To Words, http://blogs.msdn.com/vivekkum/default.aspx.
1632. Reviewing Code for SQL Injection, Available from
http://www.owasp.org/index.php/Reviewing_Code_for_SQL_lnjection.
1633. Cross Site Scripting - OWASP, from www.owasp.org/index.php/Cross_Site_Scripting.
1634. Injection Flaws - OWASP, from www.owasp.org/index.php/lnjection_Flaws.
1635. Application Security Guidelines on Kavi Community, from
http://community.kavi.com/developers/security_standards/.
1636. J. Howard Beales, III, (2003), OWASP Web Application Security Top Ten List, from
www.owasp.org/images/c/ce/OWASP_Top_Ten_2004.doc.
1637. Web Attacks - Cookie poisoning, from www.lodoga.co.uk/attackinfo/thethreat/examples/cook.htm.
1638. Victor Chapela,(2005), Advanced SQL Injection, from
http://www.0wasp.0rg/images/7/ 74/Advanced_SQL_lnjecti0n.ppt.
References Page 3028 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1639. Chema Alonso, (2008), RFD (Remote File Downloading) using Blind SQL Injection Techniques, from
http://www.toorcon.org/tcx/16_Alonso.pdf.
1640. [PPT] AFITC 2001, from www.whitehatsec.com/presentations/AFITC_2001/afitc_2001.ppt.
1641. What is parameter tampering?, from
www.imperva.com/application_defense_center/glossary/parameter_tampering.html.
1642. D.E. Chadbourne, Post office break in..., from http://olduvai.blu.org/pipermail/discuss/2004-
J anuary/043138.htm.
1643. Blind SQL Injection, from http://www.securitydocs.com/library/2651.
1644. J rubner, (2006), 'SQL injection' attacks on the rise in Atlanta, from
http://www.bizjournals.com/atlanta/stories/2006/06/12/story8.html.
1645. BSQLHacker, from http://labs.portcullis.co.uk/application/bsql-hacker/.
1646. Marathon Tool, from http://marathontool.codeplex.com.
1647. SQL Power Injector, from http://www.sqlpowerinjector.com/download.htm.
1648. Havij, from http://www.itsecteam.com.
1649. SQL Brute, from http://www.gdssecurity.c0m/l/t.php.
1650. BobCat, from http://www.northern-monkee.co.uk/pub/bobcat.html.
1651. Sqlninja, from http://sqlninja.sourceforge.net/download.html.
1652. sqlget, from http://www.darknet.org.uk/2007/07/sqlget-vl00-blind-sql-injection-tool-in-perl/.
1653. Absinthe, from http://www.darknet.org.uk/2006/07/absinthe-blind-sql-injection-toolsoftware/.
1654. Blind Sql Injection Brute Forcer, from http://c0de.g00gle.c0m/p/bsqlbf-v2/ .
1655. sqlmap, from http://sqlmap.org/.
1656. SQL Injection Digger, from http://sqid.rubyforge.org.
1657. Pangolin, from http://nosec.org/en/evaluate/.
1658. SQLPAT, from http://www.cqure.net/wp/tools/password-recovery/sqlpat/.
1659. FJ -lnjector Framework, from http://sourceforge.net/projects/injection-fwk/.
1660. Exploiter (beta), from
http://www.ibm.com/developerworks/rational/downloads/08/appscan_exploiter/.
1661. SQLIer, from http://bcable.net/project.php7sqlier.
1662. sqlsus, from http://sqlsus.sourceforge.net.
1663. SQLEXEC() Function, from http://msdn.microsoft.com/en-us/library/lx933c7s(v=vs.80).aspx.
1664. Sqllnjector, from http://www.woanware.co.uk/?page_id=19.
1665. Automagic SQL Injector, from http://www.securiteam.com/tools/6P00L0AEKQ.html.
1666. SQL Inject-Me, from http://labs.securitycompass.com/exploit-me/sql-inject-me/.
1667. NTO SQL Invader, from http://www.ntobjectives.com/go/nto-sql-invader-free-download/.
1668. The Mole, from http://themole.nasel.com.ar/?q=downloads.
1669. Microsoft Source Code Analyzer, from http://www.microsoft.com/en-
us/download/details.aspx?id=16305.
1670. Microsoft UrIScan Filter, from http://www.microsoft.com/en-in/download/details.aspx?id=5728.
1671. dotDefender, from http://www.applicure.com/download-latest.
1672. IBM Security AppScan, from http://www.ibm.eom/developerworks/downloads/r/appscan/.
1673. WebCruiser, from http://sec4app.com/.
References Page 3029 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1674. HP Weblnspect, from http://www.hpenterprisesecurity.com/products/hp-fortify-software-security-
center/hp-webinspect.
1675. SQLDict, from http://ntsecurity.nu/toolbox/sqldict/.
1676. HP Scrawlr, from https://h30406.www3.hp.com/campaigns/2008/wwcampaign/l-57C4K/index.php.
1677. SQL Block Monitor, from http://sql-tools.net/blockmonitor/.
1678. Acunetix Web Vulnerability Scanner, from http://www.acunetix.com/vulnerability-scanner/.
1679. GreenSQL Database Security, from http://www.greensql.com/content/greensql-database-
security#&sliderl=l.
1680. Microsoft Code Analysis Tool .NET (CAT.NET), from http://www.microsoft.com/en-
us/download/details.aspx?id=5570.
1681. NGS SQuirreL Vulnerability Scanners, from http://www.nccgroup.com/en/our-services/security-testing-
audit-compliance/information-security-software/ngs-squirrel-vulnerability-scanners/.
1682. WSSA - Web Site Security Scanning Service, from http://www.beyondsecurity.com/sql-injection.html.
1683. N-Stalker Web Application Security Scanner, from http://www.nstalker.com/products/editions/free/.
Module 15: Hacking Wireless Networks
1684. The ABCs of IEEE 802.11, from http://home.comcast.net/~timgroth/abc.htm.
1685. Wi-Fi Hotspot Networks Sprout Like Mushrooms, from http://spectrum.ieee.org/telecom/wireless/wifi-
hotspot-networks-sprout-like-mushrooms/abc.
1686. A list of wireless network attacks, from http://searchsecurity.techtarget.com/feature/A-list-of-wireless-
network-attacks.
1687. Rogue Access Point Setups on Corporate Networks, from http://www.infosecurity-
magazine.com/view/10516/comment-rogue-access-point-setups-on-corporate-networks-/.
1688. Advanced SQL Injection, from http://blog.pages.kr/1341.
1689. Identifying Rogue Access Points, from http://www.wi-fiplanet.com/tutorials/article.php/1564431.
1690. Bluetooth Security Risks and Tips to Prevent Security Threats, from
http://www.brighthub.com/computing/smb-security/articles/30045.aspx.
1691. Cisco Unified Wireless Network ArchitectureBase Security Features, from
http://www.cisco.com/en/US/docs/solutions/Enterprise/Mobility/emob41dg/ch4_Secu.html.
1692. Tutorial: My Plate is Compatible?, from http://www.aircrack-ng.org/doku.php?id=pt-
br:compatible_cards.
1693. Wireless Networking Security, from http://technet.microsoft.com/en-us/library/bb457019.aspx.
1694. Path Traversal and URIs, from http://phucjimy.wordpress.com/category/document-security/.
1695. How to Cheat at Securing a Wireless Network, from
http://www.sciencedirect.com/science/artide/pii/B9781597490870500572.
1696. Eliminating interference thru Wi-Fi spectrum analysis, from
http://searchmobilecomputing.techtarget.com/tip/Eliminating-interference-thru-Wi-Fi-spectrum-
analysis.
1697. How to Surf Safely on Public Wi-Fi, from http://technology.inc.com/2007/07/01/how-to-surf-safely-on-
public-wi-fi/.
1698. Understanding WiFi Hotspots... from http://www.scambusters.org/wifi.html.
1699. WLAN Glossary, from http://www.lever.co.uk/wlan-glossary.html.
References Page 3030 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1700. Basic Service Set Identity (BSSID), from http://www.interwifi.co.Uk/glossary/b/basic-service-set
identity.html.
1701. DSSS - Direct Sequence Spread Spectrum, from http://www.telec0mabc.c0m/d/dsss.html.
1702. Frequency-hopping spread spectrum, from
https://www.princeton.edu/~achaney/tmve/wikilOOk/docs/Frequency-hopping_spread_spectrum.html
1703. 802.l l x Modules, Dev Kits Can Help Simplify Wireless Design Efforts, from
http://www.digikey.com/us/en/techzone/wireless/resources/articles/802-llx-modules-dev-kits.html.
1704. Antennas, from http://82.157.70.109/mirrorbooks/wireless/0321202171/ch03levlsec3.html.
1705. How 802.11 Wireless Works, from http://technet.microsoft.com/en-
us/library/cc757419%28v=WS.10%29.aspx.
1706. TKIP (Temporal Key Integrity Protocol), from http://www.tech-faq.com/tkip-temporal-key-integrity-
protocol.html.
1707. WPA2, from http://www.wi-fi.org/knowledge-center/glossary/wpa2%E2%84%A2.
1708. Cisco Unified Wireless Network ArchitectureBase Security Features, from
http://www.cisco.com/en/US/docs/solutions/Enterprise/Mobility/emob41dg/ch4_Secu.html.
1709. Understanding WEP Weaknesses, from http://www.dummies.com/how-to/content/understanding-wep-
weaknesses.html.
1710. V.802.11 Wireless LAN, from http://www.apl.jhu.edu/~hhsu/cs771/cs771-ll.pdf.
1711. 7 Things Hackers Hope You Don't Know, from
http://www.esecurityplanet.com/views/article.php/3891716/7-Things-Hackers-Hope-You-Dont-
Know.htm.
1712. Rogue Wireless Access Point, from http://www.tech-faq.com/rogue-wireless-access-point.html.
1713. How to Surf Safely on Public Wi-Fi, from http://technology.inc.com/2007/07/01/how-to-surf-safely-on-
public-wi-fi.
1714. Wireless Network Security Tools, from http://www.wirelessnetworktools.com/index.html.
1715. How to War Drive, from http://www.wikihow.com/War-Drive.
1716. Tools for analyzing WLAN traffic abound, from
http://www.computerworld.com.au/article/273427/tools_analyzing_wlan_traffic_abound/.
1717. Tutorial: Is My Wireless Card Compatible? from http://www.aircrack-
ng.org/doku.php?id=compatible_cards.
1718. MITM Attack, from https://wilder.hq.sk/OpenWeekend-2005/foill4.html.
1719. Security Threats of Smart Phones and Bluetooth, from
http://www.aaronfrench.com/coursefiles/ucommerce/Loo_2009.pdf.
1720. Tips for using Bluetooth Securely, from http://www.brighthub.com/computing/smb-
security/articles/30045.aspx.
1721. Carrumba, (2009), How to Crack WPA/WPA2, from http://www.megapanzer.com/2009/10/02/how-to-
crack-wpawpa2/.
1722. Introduction to Wireless Network, Available from
http://media.wiley.com/product_data/excerpt/02/07645973/0764597302.pdf.
1723. Prabhaker Mateti, Hacking Techniques in Wireless Networks, Available from
http://www.cs.wright.edu/~pmateti/lnternetSecurity/Lectures/WirelessHacks/Mateti-
WirelessHacks.htm.
1724. Cisco Unified Wireless Network ArchitectureBase Security Features, from
http://www.cisco.com/en/US/docs/solutions/Enterprise/Mobility/emob41dg/ch4_Secu.html.
References Page 3031 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1725. (2008), WLAN Security Threats, from
http://enterasys.com/company/literature/WLAN%20Security%20Today-Siemens%20whitepaper_EN.pdf.
1726. Hack Wireless WPA Network, Available from http://mediakey.dk/~cc/hack-wireless-wpa-network/
1727. Hack Wireless WEP Network, Available from http://mediakey.dk/~cc/hack-wireless-network-crack/
1728. Brian Kuebler, Wireless Wrongs; Hacking WiFi, Available from
http://www.abc2news.com/news/local/story/Wireless-Wrongs-Hacking-WiFi/0anuc7U-
kOaxjPcfcjwOuw.cspx.
1729. Tony Northrup , 10 tips for improving your wireless network, Available from
http://www.microsoft.com/athome/setup/wirelesstips.aspx.
1730. Bradley Mitchell, Wired vs. Wireless Networking, Available from
http://c0mpnetw0rking.ab0ut.c0m/cs/h0menetw0rking/a/h0mewiredless.htm.
1731. Wireless Network Image, Available from
http://www.hvitsolutions.com/main/images/building_diagram_wireless.jpg.
1732. Wireless networking standards, Available from http://reviews.cnet.com/4520-7605_7-6871493-2.html.
1733. What are the types of Wireless Networks?, Available from http://www.tech-faq.com/wireless-
networks.shtml.
1734. Different Types of Wireless Network, Available from
http://www.greyfriars.net/gcg/greyweb.nsf/miam/article01.
1735. Hacking Techniques in Wireless Networks, Available from
http://www.mundowifi.com.br/forum/threadll81.html.
1736. Evan Mckinney, Disadvantages of Wireless Networks, Available from
http://www.ehow.com/facts_4809373_disadvantages-wireless-networks.html.
1737. Bradley Mitchell, Wireless Standards - 802.11b 802.11a 802.llg and 802.lln , Available from
http://compnetworking.about.eom/cs/wireless80211/a/aa80211standard.htm.
1738. Wireless Network Devices, Available from http://www.pcrush.com/category/65/Wireless-Network-
Devices.
1739. WEP (wired equivalent privacy), Available from http://www.networkworld.com/details/715.html.
1740. Wi-Fi Protected Access, Available from
http://searchmobilecomputing.techtarget.com/sDefinition/0sid40_gci887323,00.html.
1741. WPA (Wi-Fi Protected Access), Available from http://www.tech-faq.com/wpa-wi-fi-protected-
access.shtml.
1742. Paul Arana, (2006), Benefits and Vulnerabilities of Wi-Fi Protected Access 2 (WPA2), Available from
http://cs.gmu.edu/~yhwangl/INFS612/Sample_Projects/Fall_06_GPN_6_Final_Report.pdf.
1743. The Wi-Fi Protected Access 2 (WPA2)/Wireless Provisioning Services Information Element (WPS IE)
update for Windows XP with Service Pack 2 is available, Available from
http://support.microsoft.com/kb/893357.
1744. TKIP (Temporal Key Integrity Protocol), Available from http://www.tech-faq.com/tkip-temporal-key-
integrity-protocol.shtml.
1745. Renaud Deraison2009) ), Using Nessus to Detect Wireless Access Points, Available from
http://www.nessus.org/whitepapers/wap-id-nessus.pdf.
1746. WLAN Networking / 802.11, Available from http://www.wardrive.net/.
1747. Cracking WEP and WPA Wireless Networks, Available from
http://docs.lucidinteractive.ca/index.php/Cracking_WEP_and_WPA_Wireless_Networks.
1748. Cracking WEP using Backtrack, Available from http://ryanunderdown.com/linux/cracking-wep-using-
backtrack.php.
References Page 3032 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1749. Wireless Hacking, Available from http://www.darknet.org.uk/category/wireless-hacking/.
1750. WiFi Wireless Hacking, Available from http://www.hackerscatalog.com/Products/CD-
ROMS/WiFiHacking.html.
1751. Bradley Morgan, (2006), Wireless Cracking Tools, Available from
http://www.windowsecurity.com/whitepapers/Wireless-Cracking-Tools.html.
1752. What Are Rogue Access Points?, Available from http://www.manageengine.com/products/wifi-
manager/rogue-access-point.html.
1753. Rick Doten, Wireless Security and Wireless Security Monitoring, Available from http://www.issa-
ne.org/documents/ISSARogueAPpresentationBoston.ppt.
1754. Gary Wollenhaupt, How Cell Phone J ammers work, Available from
http://electronics.howstuffworks.com/cell-phone-jammerl.htm.
1755. Brian R. Miller & Booz Allen Hamilton, 2002, Issues in Wireless security, Available from
http://www.acsac.org/2002/case/wed-c-330-Miller.pdf.
1756. J ustin Montgomery, How WPA wireless networks are hacked, and how to protect yourself, Available
from http://tech.blorge.eom/Structure:%20/2009/02/07/how-wpa-wireless-networks-are-hacked-and
how-to-protect-yourself/.
1757. J onathan Hassell, (2004), Wireless Attacks and Penetration Testing, Available from
http://www.securityfocus.com/infocus/1783.
1758. Robert J . Shimonski, (2003), Wireless Attacks Primer, Available from
http://www.windowsecurity.com/articles/Wireless_Attacks_Primer.html.
1759. Wireless Network Attack Methodology, Available from http://www.wirelessnetworktools.com/.
1760. Martin Beck & TUDresden, (2008), Practical attacks against WEP and WPA, Available from
http://dl.aircrack-ng.org/breakingwepandwpa.pdf.
1761. Simple Steps To Basic Wireless Hacking, Available from http://mixeduperic.com/Windows/Hacks/simple-
steps-to-basic-wireless-hacking.html.
1762. LE Webmaster, (2005), Wireless Scanning Wardriving / Warchalking, Available from
http://www.linuxexposed.com/content/view/42/52/.
1763. Finding cloaked access points, (Chapter 9), Available from
http://books. google. com/books?id=wGJ hDNspE3wC&pg=PA333&lpg=PA333&dq=doaked+access+point
&source=bl&ots=ZDkHSykDNV&sig=lsLKIx-
lZcqkhUdrlWpFaqYczyl&hl=en&ei=V8R2Ss35002e6gP59viqCw&sa=X&0i=b00k_result&ct=result&resnu
m=3#v=onepage&q=cloaked%20access%20point&f=false.
1764. Wireless Scanning Wardriving / Warchalking, Available from http://www.it-observer.com/wireless-
scanning-wardriving-warchalking.html.
1765. Zamzom Wireless Network Tool, Available from
http://www.freewarehome.com/index.html?http%3A//www. freewarehome.com/lnternet/Networking/
Network_Monitoring_t.html.
1766. 5 - Wireless Network, Available from http://www.hackingtheuniverse.com/information-security/attack-
vs-defense/attack-vs-defense-on-an-organizational-scale/5-wireless-network.
1767. Hacking the Invisible Network, Available from http://www.net-security.org/dl/articles/Wireless.pdf.
1768. Michael Roche, Wireless Attack Tools, Available from http://www.cse.wustl.edu/~jain/cse571-
07/ftp/wireless_hacking.pdf.
1769. J oshua Wright, Detecting Wireless LAN MAC Address Spoofing, Available from
http://forskningsnett.uninett.no/wlan/download/wlan-mac-spoof.pdf.
1770. How to Break WEP Encryption, Available from http://www.ehow.com/how_2209766_break-wep-
encryption.html.
References Page 3033 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1771. Daniel V. Hoffman, Essential Wireless Hacking Tools, Available from
http://www.ethicalhacker.net/content/view/16/24/.
1772. Protecting your wireless network from hacking, Available from
http://www.businessknowledgesource.com/technology/protecting_your_wireless_network_from_hacki
ng_025027.html.
1773. Eric J anszen, (2002), Understanding Basic WLAN Security Issues, from http://www.wi-
fiplanet.com/tutorials/article.php/953561.
1774. RTX NEWS J ANUARY 2003 NO.l, from
www.rtx.dk/Admin/Public/DWSDownload.aspx?File=Files%2FFiler%2Fannouncements%2Fnewsletter%2
F4_SCREEN.pdf.
1775. Agustina, J .V.Peng Zhang, and Kantola, (2003), Performance evaluation of GSM handover traffic in a
GPRS/GSM network, from
http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?isnumber=27298&arnumber=1214113&count=217&index
=21.
1776. Service set identifier, from
http://searchmobilecomputing.techtarget.com/sDefinition/0sid40_gci853455,00.html.
1777. Antenna Cabling Guide, from http://wireless.gumph.0rg/content/3/ 12/ 011-antenna-cabling.html.
1778. Wireless Security Auditor (WSA), from http://www.research.ibm.com/gsal/wsa/.
1779. NAI's Sniffer Wireless to Support 802.11a and 802.11b Networks, from
http://www.findarticles.c0m/p/articles/mi_zd4168/is_200202/ai_n9515340.
1780. RADIUS Protocol Security and Best Practices, from
http://www.microsoft.com/technet/prodtechnol/windows2000serv/maintain/security/radiussec.mspx.
1781. Wi-Fi Security, from http://main.wi-fi.org/OpenSection/secure.asp?TID=2#Radius.
1782. WarChalking (Screen Shots), from http://www.blackbeltjones.com.
1783. Eavesdropping Detection Audits, from http://www.spybusters.com.
1784. Anton T. Rager, (2001), WEPCrack, AirSnort, from http://wepcrack.sourceforge.net/.
1785. Wireless Communication Policy - Rensselaer Help Desk, from
http://helpdesk.rpi.edu/update.do?artcenterkey=545.
1786. Responsibility for Wireless Access Points, from http://cals.arizona.edu/calsnet/security/ua-wireless-
guidelines.htm.
1787. Telephone tapping or wire tapping, from http://en.wikipedia.org/wiki/Telephone_tapping.
1788. Connie J. Sadler, NetBIOS NULL Sessions, from
http://www.brown.edu/Facilities/CIS/CIRT/help/netbiosnull.html.
1789. The Hacker's Choice, from http://freeworld.thc.org/releases.php?o=l&s=4%20-%2017k.\.
1790. DOS_in_Wireless_Routing_Protocols_Hamilton, from
http://www.eng.auburn.edu/users/hamilton/security/SE2/.
1791. Network Security Library,
http://www.windowsecurity.com/whitepapers/windows_security/The_Unofficial_NT_Hack_FAQ/The_U
nofficial_NT_Hack_FAQ__Section_05.html.
1792. Oren Chapo, (1999), Network Management Protocols, from http://www.chapo.co.il/articles/snmp/.
1793. DaAnZeR, (2004), End to End Security for Windows 2000 Server,
http://www.securitydocs.com/library/2647.
1794. Pascal Etienne, (2001), Weekly Security Tools Digest, from
http://boran.linuxsecurity.com/security/sp/toolsdigest/2001/tools20010426.html.
References Page 3034 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Exam 312-50 Certified Ethical Hacker Ethical Hacking and Countermeasures
References
1795. DumpAcI dumps NTs permissions and audit settings, from
http://www.windowsnetworking.com/kbase/WindowsTips/WindowsNT/AdminTips/Miscellaneous/Dum
pAddumpsNTspermissionsandauditsettings.html.
1796. Windows 2000 Server, from http://technet.microsoft.com/hi-in/windowsserver/2000/default(en-
us).aspx.
1797. Definitions & Terms, from http://www.bytepile.com/definitions-d.php.
1798. VPN & Internet Security Solutions, from http://www.solucom.com/define.htm.
1799. Stephen M. Specht & Ruby B.Lee, Distributed Denial of Service:Taxonomies of Attacks, Tools and
Countermeasures, from
http://palms.ee.princeton.edu/PALMSopen/DDoS%20Final%20PDCS%20Paper.pdf.
1800. Craig A. Huegen, 2005, Denial of Service Attacks: "Smurfing", from
http://www.windowsecurity.com/whitepapers/Denial-of-Service-Attacks-Smurfing.html.
1801. Wireless LAN Security 802.11b and Corporate Networks, from
http://documents.iss.net/whitepapers/wireless_LAN_security.pdf.
1802. The Wireless Intrusion detection system, from http://www.forum-intrusion.com/widz_design.pdf.
1803. Wireless LAN Security, 802.11/Wi-Fi Wardriving & Warchalking, from http://www.wardrive.net/.
1804. J im Geier, (2003), Identifying Rogue Access Points, from http://www.wi-
fiplanet.com/tutorials/article.php/1564431.
1805. Lisa Phifer, Service set identifier,
http://searchmobilecomputing.techtarget.com/sDefinition/0sid40_gci853455,00.html.
1806. WIRELESS COMMUNICATION POLICY, from
http://www.longwood.edu/vpaf/final_policy_base/6000/6124.htm.
1807. Kevin D. Murray, (2006), Security Scrapbook, from http://www.spybusters.com/SS0402.html.
1808. post office break in..., from http://olduvai.blu.org/pipermail/discuss/2004-J anuary/043138.html.
1809. Venky, (2006), Wireless LAN Security, from
http://www.iss.net/documents/whitepapers/wireless_LAN_security.pdf.
1810. WAVEMON, from http://www.janmorgenstern.de/projects-software.html.
1811. Patrik Karlsson, (2002), WaveStumbler, 802.11 Network Mapper, from
http://www.securiteam.com/tools/5GP002K6BM.html.
1812. Egsander, (2006), WIRELESS DATA CONNECTIVITY GUIDELINE, from
http://cals.arizona.edu/calsnet/security/ua-wireless-guidelines.htm.
1813. NPS Information Technology Policy/Standard, from
https://www.nps.navy.mil/ITACS/New05/ITPolicy/NPSITPolicy202.pdf.
1814. Simple Active Attack Against TCP, from https://db.usenix.org/.
1815. Humphrey Cheung, (2005), How To Crack WEP - Part 1: Setup & Network Recon, from
http://www.tomsguide.com/us/how-to-crack-wep,review-451.html.
1816. Humphrey Cheung, (2005), How To Crack WEP - Part 2: Performing the Crack, from
http://www.tomsguide.com/us/how-to-crack-wep,review-459.html.
1817. Humphrey Cheung, (2005), How To Crack WEP - Part 3: Securing your WLAN, from
http://www.tomsguide.com/us/how-to-crack-wep,review-471.html.
1818. Advantages and Disadvantages of WLANs, from http://www.wireless-center.net/Wi-Fi-
Security/Advantages-and-Disadvantages-of-WLANs.html.
1819. Advantages vs. Disadvantages of WiFi, from http://mason.gmu.edu/~fkondolo/page3.
References Page 3035 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1820. Alrady, Howto Use WIFI Hotspots with Security, from http:/ / www.ehow.com/ how_5287862_use-wifi-
hotspots-security.html.
1821. J ames Kendrick, (2010), Smartphone Wi-Fi Usage on the Rise, from
http:/ / jkontherun.com/ 2010/ 08/ 24/ smartphone-wi-fi-usage-on-the-rise/ .
1822. Chris Weber and Gary Bahadur, Wireless Networking Security, from http:/ / technet.microsoft.com/ en-
us/ library/ bb457019.aspx.
1823. Barb Bowman (2003), WPA Wireless Security for Home Networks, from
http:/ / www.microsoft.com/ windowsxp/ using/ networking/ expert/ bowman_03july28.mspx.
1824. (2005), Wi-Fi Adoption, from http:/ / www.businessweek.com/ technology/ tech_stats/ wifi051003.htm.
1825. Christopher Elliott, 6 wireless threats to your business, from http:/ / www.microsoft.com/ business/ en-
us/ resources/ technology/ broadband-mobility/ 6-wireless-threats-to-your-
business.aspx#wirelessthreatstoyourbusiness.
1826. Warchalking Symbols, from http:/ / www.hackerskitchen.com/ mac-old/ wifi/ War_Chalk/ .
1827. The RSN Protocol Process, from http:/ / www.tech-faq.com/ rsn-robust-secure-network.html.
1828. (2003), WEP encryption Process, from http:/ / technet.microsoft.com/ en-
us/library/cc757419%28WS.10%29.aspx.
1829. (2006), WPA2: Second Generation WiFi Security, from
http:/ / pcquest.ciol.com/ content/ technology/ 2006/ 106050803.asp.
1830. The Four-Way Handshake, from http:/ / www.answers.com/ topic/ ieee-802-lli-2004.
1831. Brandon Teska, (2008), How To Crack WPA / WPA2, from
http:/ / www.smallnetbuilder.com/ wireless/ wireless-howto/ 30278-how-to-crack-wpa-wpa2.
1832. Eric Geier, (2010), 7 Things Hackers Hope You Don't Know, from
http:/ / www.esecurityplanet.com/ views/ article.php/ 3891716/ 7-Things-Hackers-Hope-You-Dont-
Know.htm.
1833. "Wireless LAN SecurityChecklist", from http:/ / www.wardrive.net/ .
1834. 802.11 Security Tools, from http:/ / www.wardrive.net/ security/ tools.
1835. Wireless Security Tools, from http:/ / www.corecom.com/ html/ wlan_tools.html.
1836. Lisa Phifer, (2010), Top Ten Free Wi-Fi Security Test Tools, from
http:/ / www.esecurityplanet.com/ views/ article.php/ 3881181/ Top-Ten-Free-Wi-Fi-Security-Test-
Tools.htm.
1837. Free Wireless Security Tools, from http:/ / netsecurity.ab0ut.c0m/ cs/ hackert00ls/ a/ aafreewifi.htm.
1838. Bryan, (2005), Cracking WEP and WPA Wireless Networks, from
http:/ / docs.lucidinteractive.ca/ index.php/ Cracking_WEP_and_WPA_Wireless_Networks#WPA_Crackin.
1839. (2006), A Comprehensive Review of 802.11 Wireless LAN Security and the Cisco Wireless Security Suite,
from http:/ / www.cisco.c0m/ warp/ public/ cc/ pd/ witc/ aol200ap/ prodlit/ wswpf_ wp.htm#wp39475.
1840. (2006), How To Crack WEP and WPA Wireless Networks, from
http:/ / 121space.com/ index.php?showtopic=3376.
1841. Cisco Unified Wireless Network ArchitectureBase Security Features, from
http:/ / www.cisco.c0m/ en/ US/ docs/ solutions/ Enterprise/ Mobility/ emob41dg/ ch4_Secu.html#wpl01898
4.
1842. Wireless DoS, from
http:/ / www.cisco.c0m/ en/ US/ docs/ wireless/ technology/ wips/ deployment/ guide/ wipsdep.html#wpl50
481.
1843. (2009), How to prevent wireless DoS attacks, from
http:/ / searchsecurity.techtarget.com/ generic/ 0,295582,sidl4_ gcill73628_ mem 1,00. html.
References Page 3036 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1844. J im Geier, (2003), Denial of Service a Big WLAN Issue, from
http:/ / www.esecurityplanet.com/ trends/ article.php/ 2200071/ Denial-of-Service-a-Big-WLAN-lssue.htm.
1845. J onathan Hassell, (2004), Wireless Attacks and Penetration Testing (part 1 of 3), from
http:/ / www.symantec.com/ connect/ articles/ wireless-attacks-and-penetration-testing-part-l-3.
1846. (2009), A list of wireless network attacks, from
http:/ / searchsecurity.techtarget. com/ generic/ 0,295582,sidl4_ gcill67611_ mem 1,00. html.
1847. Lisa Phifer, (2009), A wireless network vulnerability assessment checklist, from
http:/ / searchsecurity.techtarget. com/ generic/ 0,295582, sidl4_ gcill67666_ mem 1,00. html.
1848. Lisa Phifer, (2009), Hunting for rogue wireless devices, from
http:/ / searchsecurity.techtarget.com/ generic/ 0,295582,sidl4_ gcill67664_ mem 1,00. html.
1849. PreciousJ ohnDoe, List of Wireless Network Attacks, from http:/ / www.brighthub.com/ computing/ smb-
security/ articles/ 53949.aspx.
1850. Security Disciplines for Objective 3: Detection and Recovery, from
http:/ / www.it.ojp.gov/ documents/ asp/ wireless/ section3-3-l.htm.
1851. (2010), Wireless Sniffer, from http:/ / www.personaltelco.net/ WirelessSniffer.
1852. How to: Sniff Wireless Packets with Wireshark, from
http:/ / www.wirelessnets.com/ resources/ tutorials/ sniff_packets_wireshark.html.
1853. WifiEagle Single- and Dual-Band 802.11 Channel Analyzers, from
http:/ / www.nutsaboutnets.com/ performance-wifi/ products/ product-wifieagle-wifi-channel-
analyzer.htm.
1854. Creating A Cheap Bluetooth Sniffer, from http:/ / thewifihack.com/ blog/ ?p=27.
1855. WLAN Analyzer and Protocol Decoder - CommView for WiFi, from
http:/ / www.tamos.com/ htmlhelp/ commwifi/ packets.htm.
1856. J im Geier, (2002), Understanding 802.11 Frame Types, from http:/ / www.wi-
fiplanet. com/ tutorials/ article. php/1447501/Understanding-80211-Frame-Types.htm.
1857. Laurent Oudot, (2004), Wireless Honeypot Countermeasures, from
http:/ / www.symantec.com/ connect/ articles/ wireless-honeypot-countermeasures.
1858. (2009), Fragmentation Attack, from http:/ / www.aircrack-ng.org/ doku.php?id=fragmentation.
1859. Andrei A. Mikhailovsky, Konstantin V. Gavrilenko, and Andrew Vladimirov, (2004), The Frame of
Deception: Wireless Man-in-the-Middle Attacks and Rogue Access Points Deployment, from
http:/ / www.informit.com/ articles/ article.aspx?p=353735&seqNum=7.
1860. Comment: Rogue Access Point Setups on Corporate Networks, from http:/ / www.infosecurity-
us.com/ view/ 10516/ comment-rogue-access-point-setups-on-corporate-networks-/ .
1861. Kevin Beaver and Peter T. Davis, Understanding WEP Weaknesses, from http:/ / www.dummies.com/ how-
to/ content/ understanding-wep-weaknesses.html.
1862. (2007), Cracking WEP Using Backtrack: A Beginner's Guide, from
http:/ / ryanunderdown.com/ linux/ cracking-wep-using-backtrack.php.
1863. (2009), FakelKEd - Fake IKE Daemon Tool for MI TM, from
http:/ / www.darknet.org.uk/ 2009/ 08/ fakeiked-fake-ike-daemon-tool-for-mitm/ .
1864. Renee Oricchio, How to Surf Safely on Public Wi-Fi, from
http:/ / technology.inc.com/ telecom/ articles/ 200707/ WiFi.html.
1865. Aircrack-ng for Windows - Aircrack, from http:/ / www.wirelessdefence.org/ Contents/ Aircrack-
ng_WinAircrack.htm.
1866. (2010), Crack WEP key via connected client, from http:/ / carpeblunte.com/ .
References Page 3037 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1867. Using Cain and the AirPcap USB adapter to crack WPA/ WPA2, from
http:/ / www.irongeek.com/ i.php?page=videos/ airpcap-cain-wpa-cracking.
1868. WiFi Hopper, from http:/ / wifihopper.com/ overview.html.
1869. PhoneSnoop: Spying on Blackberry Users, from http:/ / www.symantec.com/ connect/ blogs/ phonesnoop-
spying-blackberry-users.
1870. What is BlueJ acking, from http:/ / www.newmobilemedia.com/ bluejacking-2.htm.
1871. , from http:/ / www.oxid.it/ cain.html.
1872. KisMAC, from http:/ / kismac-ng.org/ .
1873. inSSI Der, from http:/ / www.metageek.net/ products/ inssider/ .
1874. Netsurveyor, from http:/ / www.performancewifi.net/ performance-wifi/ products/ netsurveyor-network-
discovery.htm.
1875. Vistumbler, from http:/ / www.vistumbler.net/ .
1876. WirelessMon, from http:/ / www.passmark.com/ products/ wirelessmonitor.htm.
1877. WiFi Hopper, from http:/ / www.wifihopper.com/ download.html.
1878. Wavestumbler, from http:/ / www.cqure.net/ wp/ tools/ other/ wavestumbler/ .
1879. iStumbler, from http:/ / www.istumbler.net/ .
1880. WiFinder, from http:/ / www.pgmsoft.com/ apps/ wifinder_for_android/ .
1881. Meraki WiFi Stumbler, from http:/ / www.meraki.com/ products/ wireless/ wifi-stumbler.
1882. Wellenreiter, from http:/ / wellenreiter.sourceforge.net/ .
1883. AirCheck Wi-Fi Tester, from http:/ / www.flukenetworks.com/ enterprise-network/ network-
testing/ AirCheck-Wi-Fi-Tester.
1884. AirRadar 2, from http:/ / www.koingosw.com/ products/ airradar.php.
1885. Xirrus Wi-Fi I nspector, from http:/ / www.xirrus.com/ Products/ Wi-Fi-lnspector.
1886. Wifi Analyzer, from http:/ / a.farproc.com/ wifi-analyzer.
1887. WiFiFoFum - WiFi Scanner, from http:/ / www.wififofum.net/ downloads.
1888. Network Signal Info, from http:/ / www.kaibits-software.com/ product_netwotksignal.htm.
1889. WiFi Manager, from http:/ / kmansoft.com/ .
1890. OpenSignalMaps, from http:/ / opensignal.com/ .
1891. WI GLE, from http:/ / wigle.net/ gps/ gps/ main/ download/ .
1892. Skyhook, from http:/ / www.skyhookwireless.com/ location-technology/ sdk.php.
1893. jiWire, from http:/ / v4.jiwire.com/ search-hotspot-locations.htm.
1894. WeFi, from http:/ / www.wefi.com/ download/ .
1895. Wireshark, from http:/ / www.wireshark.org/ download.html.
1896. Cascade Pilot, from http:/ / www.riverbed.com/ products-solutions/ products/ performance-
management/ network-infrastructure/ High-Speed-Packet-Analysis.html.
1897. OmniPeek, from http:/ / www.wildpackets.com/ products/ omnipeek_network_analyzer.
1898. Sniffer Portable Professional Analyzer, from
http:/ / www.netscout.com/ products/ enterprise/ Sniffer_Portable_Analyzer/ Sniffer_Portable_Professiona
l_Analyzer/Pages/ default.aspx.
1899. Capsa WiFi, from http:/ / www.colasoft.com/ download/ products/ capsa_free.php.
1900. ApSniff, from http:/ / www.monolith81.de/ apsniff.html.
References Page 3038 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1901. NetworkMiner, from http:/ / www.netresec.com/ ?page=NetworkMiner.
1902. Airscanner Mobile Sniffer, from http:/ / www.airscanner.com/ products/ sniffer/ .
1903. Observer, from http:/ / www.networkinstruments.com/ products/ observer/ index.php?tab=download.
1904. WifiScanner, from http:/ / wifiscanner.sourceforge.net/ .
1905. Mognet, from http:/ / www.monolith81.de/ mognet.html.
1906. I perf, from http:/ / iperf.sourceforge.net/ .
1907. Aircrack-ng, from http:/ / www.aircrack-ng.org/ .
1908. SMAC, from http:/ / www.klcconsulting.net/ smac/ .
1909. KisMAC, from http:/ / kismac-ng.org/ .
1910. Elcomsoft Wireless Security Auditor, from http:/ / www.elcomsoft.com/ ewsa.html.
1911. WepAttack, from http:/ / wepattack.sourceforge.net/ .
1912. Wesside-ng, from http:/ / www.aircrack-ng.org/ doku.php?id=wesside-ng.
1913. WEPCrack, from http:/ / wepcrack.sourceforge.net/ .
1914. WepDecrypt, from http:/ / wepdecrypt.sourceforge.net/ .
1915. Portable Penetrator, from http:/ / www.secpoint.com/ portable-penetrator.html.
1916. CloudCracker, from https:/ / www.cloudcracker.com/ .
1917. coWPAtty, from http:/ / wirelessdefence.org/ Contents/ coWPAttyMain.htm.
1918. Wifite, from https:/ / code.google.com/ p/ wifite/ downloads/ detail?name=wifite-2.0r85.tar.gz.
1919. WepOff, from http:/ / www.ptsecurity.ru/ download/ wepoff.tar.gz.
1920. ApSniff, from http:/ / www.monolith81.de/ apsniff.html.
1921. WiFiFoFum, from http:/ / www.aspecto-software.com/ rw/ applications/ wififofum/ .
1922. WarLinux, from http:/ / sourceforge.net/ projects/ warlinux/ .
1923. MacStumbler, from http:/ / www.macstumbler.com/ .
1924. WiFi-Where, from http:/ / www.threejacks.com/ ?q=node/ 13.
1925. AirFart, from http:/ / airfart.sourceforge.net/ .
1926. AirTraf, from http:/ / airtraf.sourceforge.net/ .
1927. 802.11 Network Discovery Tools, from http:/ / wavelan-tools.sourceforge.net/ .
1928. NetworkManager, from http:/ / projects.gnome.org/ NetworkManager/ .
1929. KWiFiManager, from http:/ / kwifimanager.sourceforge.net/ .
1930. NetworkControl, from http:/ / www.arachnoid.com/ NetworkControl/ index.html.
1931. KOrinoco, from http:/ / korinoco.sourceforge.net/ .
1932. Sentry Edge II, from http:/ / www.tek.com/ document/ news-release/ tektronix-advances-rf-monitoring-
sentry-edge-ii.
1933. WaveNode, from http:/ / www.wavenode.com/ .
1934. xosview, from http:/ / xosview.sourceforge.net/ .
1935. RF Monitor, from http:/ / www.newsteo.com/ gb/ data-logger/ features/ monitoring-software.php.
1936. DTC-340 RFXpert, from http:/ / www.dektec.com/ products/ Apps/ DTC-340/ index.asp.
1937. Home Curfew RF Monitoring System, from
http:/ / solutions.3m.com/ wps/ portal/ 3M/ en_US/ ElectronicMonitoring/ Home/ ProductsServices/ OurProd
ucts/ HomeCurfewRFMonitoringSystem/ .
References Page 3039 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1938. RFProtect Spectrum Analyzer, from http:/ / www.arubanetworks.com/ products/ arubaos/ rfprotect-
spectrum-analyzer/.
1939. AirMagnet WiFi Analyzer, from http:/ / www.flukenetworks.com/ enterprise-network/ wireless-
network/ AirMagnet-WiFi-Analyzer.
1940. OptiView XG Network Analysis Tablet, from http:/ / www.flukenetworks.com/ enterprise-
network/ network-monitoring/ optiview-xg-network-analysis-tablet.
1941. Network Traffic Monitor & Analyzer CAPSA, from http:/ / www.javvin.com/ packet-traffic.html.
1942. Observer, from http ://www. networkinstruments.com/ products/ observer/ index.php?tab=download.
1943. Ufasoft Snif, from http:/ / ufasoft.com/ sniffer/ .
1944. vxSniffer, from http:/ / www.cambridgevx.com/ vxsniffer.html.
1945. OneTouch AT Network Assistant, from http:/ / www.flukenetworks.com/ enterprise-network/ network-
testing/ OneTouch-AT-Network-Assistant.
1946. SoftPerfect Network Protocol Analyzer, from http:/ / www.softperfect.com/ products/ networksniffer/ .
1947. WirelessNetView, from http:/ / www.nirsoft.net/ utils/ wireless_network_view.html.
1948. Airview, from http:/ / airview.sourceforge.net.
1949. RawCap, from http:/ / www.netresec.com/ ?page=RawCap.
1950. Cisco Spectrum Expert, from http:/ / www.cisco.com/ en/ US/ products/ ps9393/ index.html.
1951. AirMedic USB, from http:/ / www.flukenetworks.com/ enterprise-network/ wireless-network/ AirMedic.
1952. AirSleuth-Pro, from http:/ / nutsaboutnets.com/ airsleuth-spectrum-analyzer/ .
1953. BumbleBee-LX Handheld Spectrum Analyzer, from
http:/ / www.bvsystems.com/ Products/ Spectrum/ BumbleBee-LX/ bumblebee-lx.htm.
1954. Wi-Spy, from http:/ / www.metageek.net/ products/ wi-spy/ .
1955. Super Bluetooth Hack, from http:/ / gallery.mobile9.eom/ f/ 317828/ .
1956. BTBrowser, from http:/ / wireless.klings.org/ BTBrowser/ .
1957. BH Bluejack, from http:/ / croozeus.com/ blogs/ ?p=33.
1958. Bluediving, from http:/ / bluediving.sourceforge.net/ .
1959. Blooover, from http:/ / trifinite.org/ trifinite_stuff_blooover.html.
1960. BTScanner, from http:/ / www.pentest.co.uk/ downloads.html?cat=downloads§ion=01_bluetooth.
1961. CI HwBT, from http:/ / sourceforge.net/ projects/ cih-with-bt/ files/ .
1962. BT Audit, from http:/ / trifinite.org/ trifinite_stuff_btaudit.html.
1963. BlueAlert, from http:/ / www.insecure.in/ bluetooth_hacking_02.asp.
1964. AirMagnet WiFi Analyzer, from http:/ / www.flukenetworks.com/ enterprise-network/ wireless-
network/ AirMagnet-WiFi-Analyzer.
1965. AirDefense, from http:/ / www.airdefense.net/ products/ servicesplatform/ index.php.
1966. Adaptive Wireless IPS, from http:/ / www.cisco.com/ en/ US/ products/ ps9817/ index.html.
1967. Aruba RFProtect WI PS, from http:/ / www.arubanetworks.com/ products/ arubaos/ rfprotect-wireless-
intrusion-protection.
1968. Enterasys I ntrusion Prevention System, from http:/ / www.enterasys.com/ products/ advanced-security-
apps/ dragon-intrusion-detection-protection.aspx.
1969. RFProtect Wireless I ntrusion Protection, from
http:/ / www.arubanetworks.com/ products/ arubaos/ rfprotect-wireless-intrusion-protection.
1970. SonicWALL Wireless Networking, from http:/ / o-www.sonicwall.com/ us/ en/ solutions/ 4224.html.
References Page 3040 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
1971. HP TippingPoint IPS, from http:/ / hl7007.wwwl.hp.com/ us/ en/ products/ network-
security/ HP_S_lntrusion_Prevention_System_(I PS)_Series/ index.aspx.
1972. AirTight WI PS, from http:/ / www.airtightnetworks.com/ home/ products/ AirTight-WI PS.html.
1973. Network Box IDP, from http:/ / www.network-box.co.uk/ technology/ threatmanagement/ I DP.
1974. AirMobile Server, from http:/ / www.airmobile.se/ airmobile_server.htm.
1975. WLS Manager, from http:/ / www.airpatrolcorp.com/ products/ wls_manager.php.
1976. Wireless Policy Manager (WPM), from http:/ / airpatrolcorp.com/ airpatrol-products/ wpmwec/ .
1977. ZENworks Endpoint Security Management, from
http:/ / www.novell.com/ products/ zenworks/ endpointsecuritymanagement/ features/ .
1978. AirMagnet Planner, from http:/ / www.flukenetworks.com/ enterprise-network/ wireless-
network/ AirMagnet-Planner.
1979. Cisco Prime I nfrastructure, from http:/ / www.cisco.com/ en/ US/ products/ psl2239/ index.html.
1980. AirTight Planner, from http:/ / www.airtightnetworks.com/ home/ products/ AirTight-Planner.html.
1981. LANPI anner, from http:/ / www.motorola.com/ Business/ US-
EN/ Business+Product+and+Services/Software+and+Applications/WLAN+Management+and+Security+Sof
tware/LANPI anner_US-EN.
1982. RingMaster, from http:/ / www.juniper.net/ us/ en/ products-services/ software/ network-management-
software/ ringmaster/ .
1983. Connect EZ Predictive RF CAD Design, from http:/ / www.connect802.eom/ suite_spot.htm#.
1984. Ekahau Site Survey (ESS), from http:/ / www.ekahau.com/ products/ ekahau-site-survey/ overview.html.
1985. ZonePlanner, from http:/ / www.ruckuswireless.com/ products/ zoneplanner.
1986. Wi-Fi Planning Tool, from http:/ / www.aerohive.com/ planner.
1987. TamoGraph Site Survey, from http:/ / www.tamos.com/ products/ wifi-site-survey/ wlan-planner.php.
1988. OSWA, from http:/ / securitystartshere.org/ page-downloads.htm.
1989. WiFiZoo, from http:/ / c0mmunity.c0rest.c0m/~h0ch0a/ wifiz00/index.html#d0wnl0ad.
1990. Network Security Toolkit, from http:/ / networksecuritytoolkit.org/ nst/ index.html.
1991. Nexpose Community Edition, from http:/ / www.rapid7.com/ products/ nexpose/ compare-downloads.jsp.
1992. WiFish Finder, from http:/ / www.airtightnetworks.com/ home/ resources/ knowledge-center/ wifish-
finder.html.
1993. Penetrator Vulnerability Scanning Appliance, from http:/ / www.secpoint.com/ penetrator.html.
1994. SILICA, from http:/ / www.immunityinc.com/ downloads.shtml.
1995. Wireless Network Vulnerability Assessment, from http:/ / www.secnap.com/ products/ audits/ wireless-
assessment.html.
1996. Karma, from http:/ / www.theta44.org/ karma/ .
1997. Hotspotter, from http:/ / www.wirelessdefence.org/ Contents/ hotspotter.htm.
1998. Airsnarf, from http:/ / airsnarf.shmoo.com/ .
1999. Asleap, from http:/ / www.willhackforsushi.com/ Asleap.html.
2000. THC-LEAP Cracker, from http:/ / wirelessdefence.org/ Contents/ THC-LEAPcracker.htm.
2001. Airsnort, from http:/ / airsnort.shmoo.com/ .
2002. Void 11, from http:/ / www.wirelessdefence.org/ Contents/ VoidllMain.htm.
2003. Technitium MAC Address Changer (TMAC), from http:/ / www.technitium.com/ tmac/ index.html.
References Page 3041 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
Module 16 : Hacking Mobile Platforms
2004. Delivering enterprise information securely on Android and Apple iOS devices, from
http:/ / www.citrix.com/ site/ resources/ dynamic/ additional/ iPad_Technical_Guide_US_WP.pdf.
2005. Understanding the Security Changes in Windows Phone 8, from
http:/ / www.mobilejaw.com/ articles/ 2012/ 08/ understanding-the-security-changes-in-windows-phone-
8/.
2006. HOW TO HACK YOUR ANDROI D PHONE, from http:/ / www.mobilenyou.in/ 2010/ 10/ hack-your-android-
phone.html.
2007. Windows Phone 8, from http:/ / en.wikipedia.org/ wiki/ Windows_Phone_8.
2008. Delivering corporate data securely on employee iPads, from
http:/ / resources.idgenterprise.com/ original/ AST-0043716_iPad_Technical_Guide_US_WP_2_.pdf.
2009. Working guide to Root Android Phones Easy with SuperOneClick, from http:/ / fixlife.in/ 23/ working-guide-
root-android-devices-phones-easy-way-superoneclick.
2010. How to Hack Your Android Phone (and Why You Should Bother), from
http:/ / readwrite.com/ 2010/ 01/ 27/ how_to_hack_your_android_phone.
2011. New Android Trojan Masquerades as Google Library, Taps Device Administration API , from
http:/ / www.netqin.com/ en/ security/ newsinfo_4595_2.html%20.
2012. Security Alert: New SMS Android Trojan -- DroidLive -- Being Disguised as a Google Library, from
http:/ / www.csc.ncsu.edu/ faculty/ jiang/ DroidLive/ .
2013. SuperOneClick, from http:/ / shortfuse.org/ .
2014. Superboot, from http:/ / www.modaco.com/ topic/ 348161-superboot-galaxy-nexus-root-solution/ .
2015. Unrevoked, from http:/ / unrevoked.com/ recovery/ .
2016. Universal Androot, from http:/ / android.org.in/ 2012/ 08/ universal-androot-root-android-in-5-sec/ .
2017. Unlock Root, from http:/ / www.unlockroot.com/ products.html.
2018. DroidSheep, from http:/ / droidsheep.de.
2019. FaceNiff, from http:/ / faceniff.ponury.net.
2020. Google Apps Device Policy, from https:/ / play.google.com.
2021. DroidSheep Guard, from http:/ / droidsheep.de.
2022. X-Ray, from http:/ / www.xray.io.
2023. Android Network Toolkit - Anti, from http:/ / www.zantiapp.com.
2024. Find My Phone, from http:/ / findmyphone.mangobird.com.
2025. Prey Anti-Theft, from http:/ / preyproject.com.
2026. Android Anti Theft Security, from http:/ / www.snuko.com.
2027. Wheres My Droid, from http:/ / wheresmydroid.com.
2028. iHound, from https:/ / www.ihoundsoftware.com.
2029. GadgetTrak Mobile Security, from http:/ / www.gadgettrak.com.
2030. Total Equipment Protection App, from https:/ / protection.sprint.com.
2031. AndroidLost.com, from http:/ / www.androidlost.com.
2032. RedsnOw, from http:/ / blog.iphone-dev.org.
2033. Absinthe, from http:/ / greenpoisOn.com.
2034. SnOwbreeze, from http:/ / www.idownloadblog.com/ download/ .
2035. PwnageTool, from http:/ / blog.iphone-dev.org.
References Page 3042 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
2036. LimeRaln, from http:/ / www.limeraln.com.
2037. J ailbreakme, from http:/ / www.jailbreakme.com.
2038. Blackraln, from http:/ / blackraln.com.
2039. Spirit, from http:/ / spiritjb.com.
2040. Find My iPhone , from https:/ / itunes.apple.com.
2041. iHound, from https:/ / www.ihoundsoftware.com.
2042. GadgetTrak iOS Security, from http:/ / www.gadgettrak.com.
2043. iLocalis, from http:/ / ilocalis.com.
2044. MaaS360 Mobile Device Management (MDM), from http:/ / www.maas360.com.
2045. Citrix XenMobile MDM, from http:/ / www.zenprise.com.
2046. Absolute Manage MDM, from http:/ / www.absolute.com.
2047. SAP Afaria , from http:/ / www.sybase.com.
2048. Device Management Centre, from http:/ / www.sicap.com.
2049. AirWatch, from http:/ / www.air-watch.com.
2050. Good Mobile Manager, from http:/ / wwwl.good.com.
2051. Mobilelron, from http:/ / www.mobileiron.com.
2052. Rule Mobility, from http:/ / www.tangoe.com.
2053. TARMAC, from http:/ / www.tarmac-mdm.com.
2054. MediaContact, from http:/ / www.device-management-software.com.
2055. BullGuard Mobile Security, from http:/ / www.bullguard.com.
2056. Lookout, from https:/ / www.lookout.com.
2057. WI SelD, from http:/ / www.wiseid.mobi.
2058. McAfee Mobile Security, from https:/ / www.mcafeemobilesecurity.com.
2059. AVG AntiVirus Pro for Android, from http:/ / www.avg.com.
2060. avast! Mobile Security, from http:/ / www.avast.com.
2061. Norton Mobile Security, from http:/ / us.norton.com.
2062. ESET Mobile Security, from http:/ / www.eset.com.
2063. Kaspersky Mobile Security, from http:/ / www.kaspersky.com.
2064. F-Secure Mobile Security, from http:/ / www.f-secure.com.
2065. Trend Micro Mobile Security, from http:/ / www.trendmicro.com.
2066. Webroot Secure Anywhere Mobile, from http:/ / www.webroot.com.
2067. NetQin Mobile Security, from http:/ / en.nq.com/ mobilesecurity/ download.
2068. AnDOSid, from http:/ / apps.opera.com/ en_us/ andosid.html.
2069. ComDroid, from http:/ / www.comdroid.org/ .
2070. Woodpecker, from http:/ / www.firmhouse.com/ .
2071. iPhoneSimFree, from http:/ / www.iphonesimfree.com/ .
2072. anySI M, from https:/ / code.google.eom/ p/ devteam-anysim/ downloads/ list.
2073. Metasploit, from http:/ / www.metasploit.com/ .
2074. Cain & Abel, from http:/ / www.oxid.it/ cain.html.
2075. WindowBreak, from http:/ / windowsphonehacker.com/ windowbreak/ .
References Page 3043 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
2076. BBProxy, from http:/ / www.Symantec.com/ security_response/ writeup.jsp?docid=2006-081416-4756-99.
2077. Elcomsoft Phone Password Breaker, from http:/ / www.elcomsoft.com/ eppb.html.
Module 17: Evading IDS, Firewalls, and HoneyPots
2078. I ntrusion Detection System (IDS) Evasion, from
http:/ / complianceandprivacy.com/ WhitePapers/ iDefense-I DS-
Evasion/i Defense_I DSEvasion_20060510.pdf.
2079. Evading NIDS, from
http:/ / www.bandwidthco.com/ sf_whitepapers/ penetration/ Evading%20NI DS%20Revisited.pdf.
2080. I ntrusion detection system evasion techniques, from
http:/ / en.wikipedia.org/ wiki/ lntrusion_detection_system_evasion_techniques.
2081. How to bypass a firewall, from http:/ / www.bit.uni-bonn.de/ Wob/ images/ 49692243.pdf.
2082. Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art,
from http:/ / www.sciencedirect.c0m/ science/ article/ pii/ S092054890500098X.
2083. I nsertion, Evasion, and Denial of Service: Eluding Network I ntrusion Detection, from
http:/ / www.windowsecurity.com/ whitepapers/ intrusion_detection/ lnsertion_Evasion_and_Denial_of_S
ervice_Eluding_Network_lntrusion_Detection_.html.
2084. SmartDefense, from http:/ / www.sciencedirect.com/ science/ article/ pii/ B9781597492454000076.
2085. How to configure I nternet Explorer to use a proxy server, from http:/ / support.microsoft.com/ kb/ 135982.
2086. Defeating Sniffers and I ntrusion Detection Systems, from
http:// www.phrack.org/issues.html?issue=54&id=10.
2087. Techniques used for bypassing firewall systems, from http:/ / www.terena.org/ activities/ tf-
csirt/ meeting9/ gowdiak-bypassing-firewalls.pdf.
2088. Firewalking, from http:/ / www.webopedia.eom/ TERM/ F/ firewalking.html.
2089. IT I nfrastructure Security Plan, from
http:/ / www.sciencedirect.com/ science/ article/ pii/ B9781597490887500098.
2090. What is a firewall? from http:/ / kb.iu.edu/ data/ aoru.html.
2091. Functionalities of Firewalls, from http:/ / www.cs.ucsb.edu/ ~koc/ ns/ projects/ 04Reports/ He.pdf.
2092. Updating snort with a customized controller to thwart port scanning, from
http:/ / www.aloul.net/ Papers/ faloul_ scnlO.pdf.
2093. Firewalls, from http:/ / www.techrepublic.c0m/ i/ tr/ downloads/ home/ 0072260815_chapter_9.pdf.
2094. Firewalking, from http:/ / www.webopedia.eom/ TERM/ F/ firewalking.html.
2095. What is HoneyPot? from http:/ / www.securityhunk.com/ 2010/ 06/ what-is-honeypot.html.
2096. Honeypots - Definitions and Value of Honeypots , from
http:/ / infosecwriters.com/ texts.php?op=display&id=80.
2097. How to Set Up a Honey Pot, from http:/ / www.ehow.com/ how_5245821_set-up-honey-pot.html.
2098. Snort 2.8.5.2 : I ntrusion Detection Tool, from
http:/ / ashwintumma.files.wordpress.com/ 2010/ ll/ is_ snort.pdf.
2099. Writing Snort Rules, from http:/ / paginas.fe.up.pt/ ~mgi98020/ pgr/ writing_snort_rules.htm.
2100. I nsertion, Evasion, and Denial of Service:Eluding Network I ntrusion Detection, from
http:/ / www.creangel.com/ papers/ Eluding%20Network%20lntrusion%20Detection.pdf.
2101. I ntrusion detection system evasion techniques, from
http:/ / en. Wikipedia.org/ w/ index.php?title=lntrusion_detection_system_evasion_techniques&oldid=311
670246.
References Page 3044 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
2102. Evading NIDS, revisited, from http:/ / www.symantec.com/ connect/ articles/ evading-nids-revisited.
2103. How To Access Blocked / Bypass Blocked Websites, from http:/ / www.computingunleashed.com/ how-to-
access-blocked.html.
2104. How do 1use a Proxy Server? from http:/ / whatismyipaddress.com/ using-proxies.
2105. How to configure I nternet Explorer to use a proxy server, from http:/ / support.microsoft.com/ kb/ 135982.
2106. Firewall Fairytales, from http:/ / www.iqmtm.com/ PDF_presentations/ I Q_Firewall_Fairytales_J une2010-
l.pdf.
2107. I ntrusion detection systems IDS, from http:/ / www.geeksgate.com/ blog/ 812.html.
2108. Defending Against Network IDS Evasion, from http:/ / www.raid-
symposium.org/raid99/ PAPERS/ Paxson.pdf.
2109. Sumit Siddharth, (2005), Evading NIDS, revisited, Available from
http:/ / www.securityfocus.com/ infocus/ 1852.
2110. Alexis Lawrence, Howto Set Up a Honey Pot, Available from http:/ / www.ehow.com/ how_5245821_set-
up-honey-pot.html.
2111. GHH, What is GHH?, Available from http:/ / ghh.sourceforge.net/ .
2112. Phrack Magazine Volume Seven, I ssue Forty-Nine File 06 o f ..., from
http:/ / www.phrack.org/ phrack/ 49/ P49-06.
2113. Kasey Efaw, I nstalling Snort 2.8.5.2 on Windows 7,
http:/ / www.sn0rt.0rg/ assets/ 135/ lnstalling_Sn0rt_2.8.5.2_0n_Wind0ws_7.pdf.
2114. (2006), I ntrusion Detection System (IDS) Evasion,
http:/ / complianceandprivacy.com/ WhitePapers/ iDefense-I DS-
Evasion/i Defense_I DSEvasion_20060510.pdf.
2115. Brian Caswell, Writing Snort Rules A quick guide,
http:/ / www.shmoo.com/ ~bmc/ presentations/ 2004/ honeynet/ caswell-writing-snort-rules.ppt.
2116. Unblock Blocked Websites like Myspace, Bebo and Orkut, from http:/ / www.clazh.com/ unblock-blocked-
websites-like-myspace-bebo-and-orkut/ .
2117. Firewalls, from http:/ / hacker-dox.net/ Que-Certified.Ethical.Hacker.E/ 0789735318/ chl0levlsec5.html.
2118. Firewall Basics, http:/ / www.unixgeeks.org/ security/ newbie/ security/ firewall.html.
2119. Honeypots, from http:/ / www.infosecwriters.com/ texts.php?op=display&id=80.
2120. Dale Farris, (2005), Honeypots for Windows, from
http:/ / www.gtpcc.org/ gtpcc/ honeypotsforwindows.htm.
2121. Mike Neuman, (1995), Bugtraq: ANNOUNCE: Freely available TTY monitoring/ control program, from
http:/ / seclists.org/ bugtraq/ 1995/ J un/ 0049.html.
2122. Web Application Attacks, [PDF] Guide, from www.netprotect.ch/ downloads/ webguide.pdf.
2123. David Endler & Michael Sutton, [PPT] iDEFENSE Labs, from www.blackhat.com/ presentations/ bh-usa-
02/endler/ bh-us-02-endler-brute.ppt.
2124. I ntrusion detection, from
http:/ / www.networkworld.com/ links/ Downloads/ Security/ lntrusion_detection/ .
2125. Tony Bradley, Free I ntrusion Detection (IDS) and Prevention (IPS) Software, from
http:/ / netsecurity.ab0ut.c0m/ 0d/ intrusi0ndetecti0nidl/ a/ aafreeids.htm.
2126. AI DE, from http:/ / www.cryptomancer.de/ programme/ aide-en.html.
2127. The Evolution of I ntrusion Detection System, from www.secutityfocus.com/ infocus.
2128. Navy I nformation Assurance Website, from
https:/.. ./ps/ ?t=infosecprodsservices/ infosecprodsservices.tag&bc=/infosecprodsservices/ bc_ids.htnnl.
References Page 3045 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
2129. Firewalking, from http:/ / www.webopedia.eom/ TERM/ F/ firewalking.html.
2130. Vinay, (2009), How to Bypass Firewalls Restrictions using Proxy Servers, from
http:/ / www.ihackintosh.com/ 2009/ 03/ how-to-bypass-firewalls-restrictions-using-proxy-servers/ .
2131. Adam Gowdiak, (2003), Firewall Attack Techniques, from http:/ / www.terena.org/ activities/ tf-
csirt/ meeting9/ gowdiak-bypassing-firewalls.pdf.
2132. How to bypass the firewall (Bypassing from external sources and MI TM attacks), from www.b-it-
center.de/ Wob/ images/ 81134082.ppt.
2133. Bypassing Firewalls, http:/ / flylib.eom/ books/ en/ 3.500.l.95/ l/ .
2134. I ntrusion detection system - EnterpriseNetworkingPlanet, from
http:/ / networking.webopedia.eom/ TERM/ l/ intrusion_detection_system.html.
2135. An I ntroduction to IDS, from www.securityfocus.com/ infocus/ .
2136. Network security, from www.njcpu.net/ security.htm.
2137. Hacking Through IDSs, from www.airscanner.com/ pubs/ ids.pdf.
2138. I NTRUSI ON DETECTI ON -BISS Forums, from www.bluetack.co.uk/ forums/ index.php7showtopic.
2139. iSecurityShop, from www.isecurityshop.com/ .
2140. Enterasys Dragon Host Sensor, from www.enterasys.com/ products/ ids/ DSHSS-xxx/ .
2141. MJ ohnson, Vanguard Security Solutions - Vanguard I ntegrity Professionals, from
www.go2vanguard.com/ software.
2142. Thomas H. Ptacek, I nsertion, Evasion and Denial of Service: Eluding Network I ntrusion Detection, from
www.insecure.org/ stf/ secnet_ids/ secnet_ids.pdf.
2143. I nsertion, Evasion, and Denial of Service,from www.snort.org/ docs/ idspaper/ .
2144. Evading I ntrusion Detection, from www.tux.org/ pub/ tux/ storm/ ids-simple.doc.
2145. IDS: Re: Polymorphic Shellcode detection, from sedists.org/ lists/ focus-ids/ 2003/ May/ 0019.
2146. Hardware Firewalls, from http:/ / cybercoyote.org/ security/ hardware.shtml.
2147. Circuit-Level Gateway, from www.softheap.com/ internet/ circuit-level-gateway.html.
2148. Vicomsoft Firewall Q&A, from www.vicomsoft.com/ knowledge/ reference/ firewallsl.html.
2149. Statoo.htm: some simple stalking tools, from www.searchlores.org/ statoo.htm.
2150. van Hauser, Placing Backdoors Through Firewalls, from www.thc.segfault.net/ download.php?t=p&f=fw-
backd.htm.
2151. J. Christian Smith, (2000), I ntroduction, www.gray-world.net/ papers/ covertshells.txt.
2152. BSD Search.Com - Applications: Networking, from
www.bsdsearch.com/ dir/ / applications/ networking.php.
2153. Peter Kieltyka, I CMP Shell, from icmpshell.sourceforge.net/ .
2154. Measuring Security Threats with Honeypot, from www.honeynet.org/ papers/ individual/ sane-2004.
2155. Lance Spitzner, (2003), Open Source Honeypots: Learning with Honeyd, from
www.securityfocus.com/ infocus/ 1659.
2156. Honeypot Software, Honeypot Products, Deception Software, from
www.honeypots.net/ honeypots/ products.
2157. Measuring Security Threats with Honeypot Technology, from
www.honeynet.org/ papers/ individual/ sane-2004.
2158. Know Your Enemy: Sebek, from www.honeynet.org/ papers/ sebek.pdf.
References Page 3046 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
2159. I ntrusion Detection System (IDS) Evasion, from
http:/ / complianceandprivacy.com/ WhitePapers/ iDefense-I DS-
Evasion/i Defense_I DSEvasion_20060510.pdf.
2160. I ntrusion Detection/ Prevention, from http:/ / www.protectpoint.com/ services_intrusiondetection.htm.
2161. I ntrusion Detection Systems, from
http:/ / www.cra.org/ Activities/ craw/ dmp/ awards/ 2003/ Tan/ research/ rules.html.
2162. Managed Security Services- I ntrusion Detection Programs, from
http:/ / www.gus.net/ lntrusion_Dectection.htm.
2163. Nick DeClario, Keep Out: Host I ntrusion Detection, from
http:/ / www.linuxsecurity.com/ content/ view/ 112852/ 151/ .
2164. Yona Hollander, The Future of Web Server Security, from
http:/ / www.mcafee.com/ us/ local_content/ white_papers/ wp_future.pdf.
2165. Unauthorized remote users can read IIS files, from http:/ / xforce.iss.net/ xforce/ xfdb/ 2663.
2166. J an Meijer, Multiple Microsoft IIS Vulnerabilities, from http:/ / cert-nl.surfnet.nI / s/ 2000/ S-00-35.htm.
2167. Automated Web I nterface Scans IIS for Multiple Vulnerabilities, from
http:/ / www.ciac.org/ ciac/ bulletins/ k-068.shtml.
2168. Mark Burnett, (2001), Running Snort on IIS Web Servers Part 2: Advanced Techniques, from
http:/ / www.securityfocus.com/ infocus/ 1316.
2169. Spanish Honeypot Project, from http:/ / www.honeynet.org.es/ project/ .
2170. Lance Spitzner, 2003, Honeypots, from http:/ / www.ip97.com/ tracking-
hackers.com/ papers/ honeypots.html.
2171. A Virtual Honeypot Framework, from http:/ / www.citi.umich.edu/ techreports/ reports/ citi-tr-03-l.pdf.
2172. What is SPECTER, from http:/ / www.specter.ch/ introduction50.shtml.
2173. Shaheem Motlekar, (2004), Honeypot FAQ, from http:/ / www.tracking-hackers.com/ misc/ faq.html.
2174. Honeytokens: The Other Honeypot, from http:/ / www.securityfocus.com/ infocus/ 1713.
2175. van Hauser, Placing Backdoors Through Firewalls, from
http:/ / www.securitymap.net/ sdm/ docs/ attack/ fw-backd.htm.
2176. Placing Backdoors Through Firewalls, from
http:/ / www.windowsecurity.com/ whitepapers/ Placing_Backdoors_Through_Firewalls.html.
2177. Honeypots: Three new tools related to IDS, forensics, honeypots, from
http:/ / seclists.org/ honeypots/ 2003/ q2/ 0279.html.
2178. Network I ntrusion Detection Using Snort, from
http:/ / www.linuxsecurity.com/ content/ view/ 117497/ 49/ .
2179. I ntrusion Detection, from http:/ / www.ctssg.com/ ids_p.htm.
2180. I NTRUSI ON DETECTI ON, from http:/ / www.pafis.shh.fi/ ~tantit01/ isac2002/ ce03/ password.html.
2181. Paul I nnella, 2001, An I ntroduction to IDS, from http:/ / www.securityfocus.com/ infocus/ 1520.
2182. Ricky M. Magalhaes, (2003), Host-Based IDS vs Network-Based IDS, from
http:/ / www.windowsecurity.com/ articles/ Hids_vs_Nids_Part2.html.
2183. I ntrusion detection system, from
http:/ / www.webopedia.eom/ TERM/ l/ intrusion_detection_system.html.
2184. Paul I nnella, 2001, The Evolution of I ntrusion Detection Systems, from
http:/ / www.securityfocus.com/ infocus/ 1514.
2185. Host, from http:/ / lists.debian.org/ .
References Page 3047 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
2186. Spammers use Word files to bypass filters, from
http:/ / www.zdnet.com.aU/ news/ security/ soa/ Spammers_use_Word_files_to_bypass_filters/ 0,1300617
44,139267487,OO.htm.
2187. Know Your Enemy: Sebek, from http:/ / www.honeynet.org/ papers/ sebek.pdf.
2188. Honeyd - Network Rhapsody for You, from http:/ / www.citi.umich.edU/ u/ provos/ honeyd/ .
2189. SPECTER I ntroduction, from http:/ / www.specter.ch/ introduction50.shtml.
2190. Measuring Security Threats with Honeypot Technology, from
http:/ / www.honeynet.org/ papers/ individual/ sane-2004.pdf.
2191. Lance Spitzner, (2003), SecurityFocus: Honeytokens -The Other Honeypot, from
http:/ / www.securityfocus.com/ infocus/ 1713.
2192. Andrea Barisani, vol5issue6, from http:/ / www.tisc-insight.com/ newsletters/ 56.html.
2193. Peter Kieltyka, (2006), I CMP Shell, from http:/ / icmpshell.sourceforge.net/ .
2194. ntsecurity.nu - ack tunneling, from http:/ / ntsecurity.nu/ papers/ acktunneling/ .
2195. SecuriTeam - ACK Tunneling Trojans, from
http:/ / www.securiteam.com/ securityreviews/ 5OP0P156AE.html.
2196. Placing Backdoors Through Firewalls, from http:/ / www.thc.segfault.net/ papers/ fw-backd.htm.
2197. Mike, Firewalk, from www.blackhat.com/ presentations/ bh-usa-99/ Route/ bh-us-99-schiffman.ppt.
2198. Hardware Firewalls, from http:/ / cybercoyote.org/ security/ hardware.shtml.
2199. Evading I ntrusion Detection, from www.tux.org/ pub/ tux/ storm/ ids-simple.doc.
2200. I nsertion, Evasion, and Denial of Service, from http:/ / www.snort.org/ docs/ idspaper/ .
2201. Securing IT Assets with Linux, from www.bass-inc.com/ presentations/ arp21_2004/ linuxsecurity.ppt.
2202. Linux Security Quick Reference Guide, from http:/ / www.tldp.org/ REF/ ls_quickref/ QuickRefCard.pdf.
2203. Vanguard Security Solutions - Vanguard I ntegrity Professionals, from
http:/ / www.go2vanguard.com/ software/ .
2204. iSecurityShop, from http:/ / www.isecurityshop.com/ .
2205. Going on the Defensive: I ntrusion Detection Systems, from http:/ / www.airscanner.com/ pubs/ ids.pdf.
2206. Network Security, from http:/ / www.njcpu.net/ security.htm.
2207. Tipping Point, from http:/ / hl0163.wwwl.hp.com.
2208. Security Network I ntrusion Prevention System, from http:/ / www-01.ibm.com.
2209. Enterprise, from http:/ / www.tripwire.com/ it-security-software/ security-configuration-
management/ file-integrity-monitoring/ .
2210. Specter, from http:/ / www.specter.com/ default50.htm.
2211. Honeyd, from http:/ / www.honeyd.org/ .
2212. KFSensor, from http:/ / www.keyfocus.net/ kfsensor/ .
2213. Symantec Decoy Server, from http:/ / www.symantec.com/ press/ 2003/ n030623b.html.
2214. Tiny Honeypot, from http:/ / freecode.com/ projects/ thp.
2215. LaBrea, from http:/ / labrea.sourceforge.net/ labrea-info.html.
2216. PatriotBox, from http:/ / www.alkasis.com/ ?action=products&pid=6.
2217. Kojoney, from http:/ / kojoney.sourceforge.net/ .
2218. HoneyBOT, from http:/ / www.atomicsoftwaresolutions.com/ honeybot.php.
2219. Google Hack Honeypot, from http:/ / ghh.sourceforge.net/ .
References Page 3048 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
2220. WinHoneyd, from http:/ / www2.netvigilance.com/ winhoneyd.
2221. HI HAT, from http:/ / hihat.sourceforge.net/ .
2222. Argos, from http:/ / www.few.vu.nl/ argos/ ?page=2.
2223. Glastopf, from http:/ / glastopf.org/ .
2224. Send-Safe Honeypot Hunter, from http:/ / www.send-safe.com/ honeypot-hunter.html.
2225. I BM Security Network I ntrusion Prevention System, from http:/ / www-
01.ibm.com/ software/ tivoli/ products/ security-network-intrusion-prevention/ .
2226. Peek & Spy, from http:/ / networkingdynamics.com/ peek-spy/ peekspy/ .
2227. I NTOUCH I NSA-Network Security Agent, from http:/ / www.ttinet.com/ doc/ insa_vl5_025.html.
2228. Strata Guard, from http:/ / www.stillsecure.com/ strataguard.
2229. I DP8200 I ntrusion Detection and Prevention Appliances, from https:/ / www.juniper.net/ in/ en/ products-
services/ security/ idp-series/ idp8200/ .
2230. OSSEC, from http:/ / www.ossec.net/ ?page_id=19.
2231. Cisco I ntrusion Prevention Systems, from
http:/ / www.cisco.com/ en/ US/ products/ ps5729/ Products_Sub_Category_Home.html.
2232. AI DE (Advanced I ntrusion Detection Environment), from http:/ / aide.sourceforge.net/ .
2233. SNARE (System iNtrusion Analysis & Reporting Environment), from http:/ / www.intersectalliance.com/ .
2234. Vanguard Enforcer, from http:/ / www.go2vanguard.com/ enforcer.php.
2235. Check Point Threat Prevention Appliance, from http:/ / www.checkpoint.com/ products/ threat-
prevention-appliances/ .
2236. fragroute, from http:/ / www.monkey.org/ ~dugsong/ fragroute/ .
2237. Next-Generation I ntrusion Prevention System (NGI PS), from http:/ / www.sourcefire.com/ security-
technologies/ network-security/ next-generation-intrusion-prevention-system.
2238. Outpost Network Security, from http:/ / www.agnitum.com/ products/ networksecurity/ index.php.
2239. Check Point IPS-1, from http:/ / www.checkpoint.com/ products/ ips-l/ .
2240. FortiGate, from http:/ / www.fortinet.com/ solutions/ ips.html.
2241. Enterasys I ntrusion Prevention System, from http:/ / www.enterasys.com/ products/ advanced-security-
apps/ dragon-intrusion-detection-protection.aspx.
2242. StoneGate Virtual IPS Appliance, from http:/ / www.stonesoft.com/ en/ products/ appliances/ virtual-
ips.html.
2243. Cyberoam I ntrusion Prevention System, from http:/ / www.cyberoam.com/ ips.html.
2244. McAfee Host I ntrusion Prevention for Desktops, from http:/ / www.mcafee.com/ us/ products/ host-ips-for-
desktop, aspx.
2245. ZoneAlarm PRO Firewall, from http:/ / www.zonealarm.com/ security/ en-us/ zonealarm-pro-firewall-anti-
spyware.htm.
2246. Check Point Firewall Software Blade, from http:/ / www.checkpoint.com/ products/ firewall-software-
blade/index.html.
2247. eScan Enterprise Edition, from
http:/ / www.escanav.com/ english/ content/ products/ corp_enterprise/ escan_enterprise.asp.
2248. J etico Personal Firewall, from http:/ / www.jetico.com/ firewall-jetico-personal-firewall/ .
2249. Outpost Security Suite, from http:// free.agnitum.eom/#.
2250. Novell BorderManager, from http:/ / www.novell.com/ products/ bordermanager/ .
References Page 3049 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
2251. Firewall UTM, from http:/ / www.esoft.com/ network-security-appliances/ instagate/ .
2252. Sonicwall, from http:/ / www.tribecaexpress.com/ products/ by-manufacturers/ sonicwall-firewalls-
price.htm.
2253. Comodo Firewall, from http:/ / personalfirewall.comodo.com/ .
2254. Online Armor, from http:/ / www.online-armor.com/ products-online-armor-free.php.
2255. FortiGate-5101C, from http:/ / www.fortinet.com/ press_releases/ 120227.html.
2256. proxify, from http:/ / proxify.com.
2257. spysurfing, from http:/ / www.spysurfing.com.
2258. alienproxy, from http:/ / alienproxy.com.
2259. zendproxy, from http:/ / zendproxy.com/ .
2260. anonymouse, from http:/ / anonymouse.org.
2261. anonymizer, from http:/ / www.anonymizer.com.
2262. webproxyserver, from http:/ / www.webproxyserver.net/ .
2263. boomproxy, from http:/ / www.boomproxy.com/ .
2264. Loki I CMP tunneling, from http:/ / www.iss.net/ security_center/ reference/ vuln/ Loki.htm.
2265. AckCmd, from http:/ / ntsecurity.nu/ toolbox/ ackcmd/ .
2266. HTTPTunnel, from http:/ / www.nocrew.org/ software/ httptunnel.html.
2267. Send-Safe Honeypot Hunter, from http:/ / www.send-safe.com/ honeypot-hunter.html.
2268. Traffic IQ Professional, from http:/ / www.idappcom.com/ downloads.php.
2269. tcp-over-dns, from http:/ / analogbit.com/ software/ tcp-over-dns.
2270. Snare Agent for Windows, from http:/ / www.intersectalliance.com/ projects/ BackLogNT/ .
2271. AckCmd, from http:/ / ntsecurity.nu/ toolbox/ ackcmd/ .
2272. Tomahawk, from http:/ / tomahawk.sourceforge.net/ .
2273. Your Freedom, from http:/ / www.your-freedom.net/ index.php?id=downloads.
2274. Atelier Web Firewall Tester, from http:/ / www.atelierweb.com/ products/ firewall-tester/ .
2275. Freenet, from https:/ / freenetproject.org/ .
2276. GTunnel, from http:/ / gardennetworks.org/ download.
2277. Hotspot Shield, from http:/ / www.anchorfree.com/ hotspot-shield-VPN-download-windows.php.
2278. Proxifier, from http:/ / www.proxifier.com/ .
2279. Vpn One Click, from http:/ / www.vpnoneclick.com/ download/ index.html.
2280. Multi-Generator (MGEN), from http:/ / cs.itd.nrl.navy.mil/ work/ mgen/ index.php.
2281. Net-lnspect, from http:/ / search.cpan.org/ ~sullr/ Net-lnspect/ lib/ Net/ lnspect/ L3/ I P.pm.
2282. NConvert, from http:/ / www.xnview.com/ en/ nconvert/ .
2283. fping 3, from http:/ / fping.org/ .
2284. pktgen, from http:/ / www.linuxfoundation.org/ collaborate/ workgroups/ networking/ pktgen.
2285. PacketMaker, from http:/ / www.jdsu.com/ en-us/ Test-and-Measurement/ Products/ a-z-product-
list/Pages/ packetmaker-sas-sata-tester.aspx.
Module 18: Buffer Overflow
2286. Understanding Buffer Overruns, from http:/ / uk.sys-con.com/ node/ 33998.
References Page 3050 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
2287. Exploits: Heap, from http:/ / www.sciencedirect.com/ science/ article/ pii/ B9781597499972500066.
2288. Exploits: Stack, from http:/ / www.sciencedirect.com/ science/ artide/ pii/ B9781597499972500054.
2289. Writing Exploits II, from http:/ / www.sciencedirect.com/ science/ article/ pii/ B9781597499972500091.
2290. Hacking Unix, from
http:/ / media.techtarget.com/ searchEnterpriseLinux/ downloads/ Hacking_Exp_ch7.pdf.
2291. Testing for Stack Overflow, from https:/ / www.owasp.org/ index.php/ Testing_for_Stack_Overflow.
2292. Heap Corruption, from http:/ / www.sciencedirect.com/ science/ article/ pii/ B9781932266672500463.
2293. Buffer Overflow Attacks-Detect, Exploit, Prevent, from
http:/ / newark.pardey.org/ deck/ book/ buffer_overflow_attacks.pdf.
2294. Hack Proofing Your Network-8, from http:/ / forum.slime.com.tw/ threadll7254.html.
2295. Statically Detecting Likely Buffer Overflow Vulnerabilities, from
http:/ / lclint.cs.virginia.edu/ usenix01.html.
2296. Buffer Overflow - OWASP, from www.owasp.org/ index.php/ Buffer_Overflow.
2297. NedSecure Solutions - Toelichting aanvalstechnieken, from
www.nedsecure.nl/ index.php?option=com_content&task=view&id=lll<emid=44&lang=.
2298. Tony Bradley, Zero Day Exploits: The Holy Grail, from
http:/ / netsecurity.ab0ut.c0m/ 0d/ newsandedit0riall/ a/ aazer0day.htrn.
2299. FWSM URL Filtering Solution TCP ACL Bypass Vulnerability [Products ..., from
www.cisco.com/ en/ US/ products/ products_security_advisory09186a0080464d00.shtml.
2300. Roger Gustavsson, (2006), Buffer overflow, from
http:/ / idenet.bth.se/ servlet/ download/ news/ 23644/ Gustavsson+-+Buffer+Overflows.pdf.
2301. Stack Smashing Defense: A Buffer Overflow Lab Exercise, from
http:/ / cisa.umbc.edu/ CDX/ Will/ stack_smash_proposal.pdf.
2302. US-CERT Vulnerability Note VU#726198, from http:/ / www.kb.cert.org/ vuls/ id/ 726198.
2303. David Litchfield, Windows Heap Overflows, www.blackhat.com/ presentations/ win.../ bh-win-04-
litchfield.ppt.
2304. Ronnie J ohndas, Steps I nvolved in Exploiting a Buffer Overflow Vulnerability using a SEH Handler,
http:/ / www.infosecwriters.com/ text_resources/ pdf/ RJ ohndas_Buffer_Overflow_SEH_Handler.pdf.
2305. Microsoft I ndex Server ISAPI Extension Buffer Overflow, from http:/ / www.ciac.org/ ciac/ bulletins/ l-
098.shtml.
2306. Mehdi Mousavi, What an ISAPI extension is?, from
http:/ / www.codeproject.com/ KB/ I SAPI / isapi_extensions.aspx.
2307. Fireproofing Against DoS Attacks, from http:/ / www.networkcomputing.com/ 1225/ 1225f38.html.
2308. Unchecked Buffer in ISAPI Extension Enables Remote Compromise of IIS 5.0 Server, from
http:/ / www.securiteam.com/ windowsntfocus/ 5CP010K4AK.html.
2309. Heap Overrun in HTR Chunked Encoding Could Enable Web Server Compromise, from
http:/ / www.securiteam.com/ windowsntfocus/ 5I P0ClP7FC.html.
2310. Unchecked Buffer in I ndex Server ISAPI Extension Leads to Web Server Compromise, from
http:/ / www.securiteam.com/ windowsntfocus/ 5FP0B2K4KU.html.
2311. Testing for Heap Overflow, from http:/ / www.owasp.org/ index.php/ Testing_for_Heap_Overflow.
2312. Tom Chmielarski, (2010), Enhanced Mitigation Experience Toolkit reduces buffer overflow attacks, from
http:/ / searchmidmarketsecurity.techtarget. com/ tip/ 0,289483, sidl98_ gcil520906,00. html.
2313. ADMmutate, from http:/ / www.ktwo.ca/ security.html.
2314. GDB, from http:/ / www.gnu.org/ software/ gdb/ .
References Page 3051 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
2315. Netcat, from http:/ / netcat.sourceforge.net/ download.php.
2316. LCLint, from http:/ / www.linuxjournal.com/ article/ 3599.
2317. Code::Blocks, from http:/ / www.codeblocks.org/ .
2318. eEye Retina, from http:/ / www.eeye.com/ .
2319. Spike, from http:/ / spike.lazypics.de/ dl_index_en.html.
2320. Brute Force Binary Tester (BFB), from http:/ / bfbtester.sourceforge.net/ .
2321. I mmunity CANVAS, from http:/ / www.immunityinc.com/ products-canvas.shtml.
2322. I mmunity Debugger, from http:/ / www.immunityinc.com/ products-immdbg.shtml.
2323. Splint, from http:/ / www.splint.org/ download.html.
2324. Flawfinder, from http:/ / www.dwheeler.com/ flawfinder/ .
2325. BLAST, from http:/ / mtc.epfl.ch/ software-tools/ blast/ index-epfl.php.
2326. Stack Shield, from http:/ / www.angelfire.com/ sk/ stackshield/ download.html.
2327. Valgrind, from http:/ / valgrind.org/ downloads/ current.html.
2328. PolySpace C Verifier, from http:/ / www.mathworks.in/ products/ polyspace/ .
2329. Insure++, from http:/ / www.parasoft.com/ jsp/ products/ insure.jsp?itemld=63.
2330. /GS, from http:/ / microsoft.com.
2331. BufferShield, from http:/ / www.sys-manage.com/ PR0DUCTS/ BufferShield/ tabid/ 61/ Default.aspx.
2332. DefenseWall, from http:/ / www.softsphere.com/ online-help/ defenceplus/ .
2333. TIED, from
http:/ / www.security.iitk.ac.in/ index.php?page=contents/ projects/ tiedJ ibsafe/ tied_libsafeplus.
2334. LibsafePlus, from
http:/ / www.security.iitk.ac.in/ index.php?page=contents/ projects/ tied_libsafe/ tied_libsafeplus.
2335. Comodo Memory Firewall, from http:/ / www.comodo.com/ news/ press_releases/ 16_01_08.html.
2336. Clang Static Analyzer, from http:/ / clang-analyzer.llvm.org/ .
2337. FireFuzzer, from https:/ / c0de.g00gle.c0m/ p/ firefuzzer/ .
2338. BOON, from http:/ / www.cs.berkeley.edu/ ~daw/ boon/ .
2339. The Enhanced Mitigation Experience Toolkit, from http:/ / www.microsoft.com/ en-
us/download/details.aspx?id=29851.
2340. CodeSonar Static Analysis Tool, from http:/ / www.grammatech.com/ codesonar.
2341. CORE I MPACT Pro, from http:/ / www.coresecurity.com/ core-impact-pro.
Module 19: Cryptography
2342. MD5 - message digest (fingerprint, checksum), from http:/ / www.akadia.com/ services/ md5.html.
2343. Web App Security, from http:/ / www.hackerscenter.com/ archive/ view.asp?id=25264.
2344. Cryptography, from http:/ / www.crcnetbase.com/ doi/ abs/ 10.1201/ 9780203507872.ch6.
2345. I ntegrated Technologies, from http:/ / www.crcnetbase.com/ doi/ abs/ 10.1201/ 9780203330708.ch8.
2346. Cracking S/ MI ME encryption using idle CPU time, from
http:/ / www.securiteam.com/ tools/ 3J 5PRQ0PPQ.html.
2347. Check Point RealSecure Attack Signatures Glossary, from
http:/ / www.checkpoint.com/ support/ technical/ documents/ realsecure/ Attack_Signatures.pdf.
2348. MarkJ Cox, from http:/ / www.awe.com/ mark/ talks/ apachecon2003us.html.
References Page 3052 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
2349. (2001), Announcing the ADVANCED ENCRYPTI ON STANDARD (AES),
http:/ / csrc.nist.gov/ publications/ fips/ fipsl97/ fips-197.pdf.
2350. MI CHAEL WELSCHENBACH, Cryptography in C and C++, Second Edition,
apress.com/ book/ view/ 1590595025.
2351. Rolf Oppliger, (2005), Contemporary Cryptography, http:/ / www.free-ebook-download.net/ technical
book/ 8574-contemporary-cryptography.html.
2352. R. F. Churchhouse, (2001), Codes and ciphers (J ulius Caesar, the Enigma and the internet),
http:/ / ebookee.org/ Codes-and-Ciphers-J ulius-Caesar-the-Enigma-and-the-lnternet_128588.html.
2353. J ohn Talbot and Dominic Welsh, (2006), Complexity and Cryptography an introduction,
http:/ / www.cambridge.org/ gb/ knowledge/ isbn/ itemll72875/ ?site_ locale=en_GB.
2354. BRUCE SCHNEI ER, Applied Cryptography, Second Edition, http:/ / www.schneier.com/ book-applied.html.
2355. J AMES BAMFORD, (2002), Body of Secrets, http:/ / sandiego.indymedia.org/ media/ 2007/ 02/ 125027.pdf.
2356. T. W. Korner, (1998), Coding and Cryptography, http:/ / www.dpmms.cam.ac.uk/ ~twk/ .
2357. Kenneth W. Dam and Herbert S. Lin, (1996), Cryptography's Role In Securing The I nformation Society,
http:/ / www.comms.scitech.susx.ac.uk/ fft/ crypto/ cryptorole.pdf.
2358. Peter Gutmann, Cryptography and Data Security,
http:/ / www.comms.scitech.susx.ac.uk/ fft/ crypto/ CryptoTutorial/ partl.pdf.
2359. Documentation and Encryption, from http:/ / www.linuxsecurity.com/ content/ view/ 17/ 70/ .
2360. J osh Ryder, I ntroduction to Encryption, from http:/ / www.developer.com/ tech/ article.php/ 630681.
2361. Authentication Technologies, from
http:/ / www.techarch.state.ar.us/ domains/ security/ resources/ techlist.htm.
2362. J ari Arkko, Vesa Torvinen, Aki Niemi, (2002), HTTP Authentication with EAP, from
http:/ / www.arkko.com/ publications/ draft-torvinen-http-eap-01.txt.
2363. Ralf J unker, Functions and Procedures: Basic Authentication, from
http:/ / www.zeitungsjunge.de/ delphi/ mime/ Help/ DI Mime.htm.
2364. Authentication, Authorization, and Access Control, from httpd.apache.org/docs.
2365. J ohn Franks, (1999), HTTP Authentication: Basic and Digest Access Authentication, from
http:/ / www.ietf.org/ rfc/ rfc2617.txt.
2366. J eff Kercher, Edward J ezierski, (2001), Authentication in ASP.NET: .NET Security Guidance, from
http:/ / msdn.microsoft. com/ library/ default. asp?url=/ library/ en-us/ dnbda/ html/ authaspdotnet. asp.
2367. Digital Certificates, from www.bitpipe.com/ tlist/ Digital-Certificates.html.
2368. Vijay Bollapragada, I PSec Authentication and Authorization Models, from
www.ciscopress.com/ articles/ article.asp?p=421514&seqNum=4 - 31k -.
2369. Certificate-based Authentication, from http:/ / www.microsoft.com/ technet/ security/ Bulletin/ MS02-
048.mspx.
2370. Abel Banda, (2003), Forms-based Authentication, from
www.ondotnet.com/ pub/ a/ dotnet/ 2003/ 01/ 06/ formsauthpl.html.
2371. Kimon Rethis Biometrics Authentication, from www.csun.edu.
2372. Fingerprint-based I dentification, from www.barcode.ro/ tutorials/ biometrics/ fingerprint.html
2373. Michael Anissimov, Retina Scanning, from www.wisegeek.com/ how-does-a-retinal-scan-work.htm.
2374. Afghan Woman Recognized After 17 Years, from
http:/ / www.ct.gov/ dss/ cwp/view.asp?a=2349&q=304748.
2375. Bill Gates at the RSA Conference 2006, from http:/ / www.microsoft.com/ billgates/ speeches.
References Page 3053 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
2376. Security Awareness is Rising while Security Protections are falling, from
www.miora.com/ articles/ awareness.htm.
2377. Soumyadip Rakshit, Biometric access control, from
http:/ / www.jiskha.com/ science/ biology/ biometrics.html.
2378. Prof. Ausif Mahmood RSA (Rivest, Shamir, and Adleman), from
www.bridgeport.edu/ sed/ projects/ cs597/ Spring_2004/ sbhumana/ index.htm.
2379. BlowFish, from www.answers.com/ topic/ blowfish.
2380. Algorithms and Security, from www.tcuconnect.com/ help/ faq_security.asp.
2381. SHA (Secure Hash Algorithm), from http:/ / www.safeexim.safescrypt.com/ SafeDoXX_User_Manual.pdf.
2382. Christopher Allen, Tim Dierks, SSL Handshake Protocol Flow, from
https:/ / www.ipa.go.jp/ security/ rfc/ RFC2246-07EN.html.
2383. Cryptography Attacks, from www.hack.gr/ users/ dij/ crypto/ overview/ terminology.html.
2384. Cryptography Attacks, from
http:/ / ieeexplore.ieee.org/ iel5/ 10600/ 33508/ 01590056.pdf?isnumber=33508&arnumber=1590056.
2385. What is a hash function?, from http:/ / www.rsa.com/ rsalabs/ node.asp?id=2176.
2386. What is Capstone?, from http:/ / www.rsa.com/ rsalabs/ node.asp?id=2317.
2387. What are RC5 and RC6?, from http:/ / www.rsa.com/ rsalabs/ node.asp?id=2251.
2388. This challenge is no longer active, from http:/ / www.rsa.com/ rsalabs/ node.asp?id=2094.
2389. Dorothy E. Denning & Dennis K. Branstad, 1996, A Taxonomy for Key Escrow Encryption Systems, from
http:/ / www.cosc.georgetown.edu/ ~denning/ crypto/ Taxonomy.html.
2390. Parameter Tampering, from http:/ / www.imperva.com/ resources/ glossary/ parameter_tampering.html.
2391. Pascal Meunier, (2004), Programming I ssues, from
www. cerias. purdue. edu/secprog/ class2/ 7.Canon_&_DT.ppt.
2392. About Secure Shell, from http:/ / www.onsight.com/ faq/ ssh/ ssh-faq-l.html.
2393. PGP Attack FAQ: The asymmetric cipher
http:/ / www.iusmentis.com/ technology/ encryption/ pgp/ pgpattackfaq/ asymmetric/ .
2394. Digital Signature Guidelines, from
Tutorial http:/ / www.abanet.org/ scitech/ ec/ isc/ dsg-tutorial.html.
2395. What is public-key cryptography?, from http:/ / www.rsa.com/ rsalabs/ node.asp?id=2165.
2396. What is Public-Key Cryptography?, from http:/ / www.x5.net/ faqs/ crypto/ q3.html.
2397. Security FAQs, from http:/ / www.tcuconnect.com/ help/ faq_security.asp.
2398. RSA Security- 2.1.1 What is public-key cryptography?, from
http:/ / www.rsasecurity.com/ rsalabs/ node.asp?id=2165.
2399. Mahmood, (2006), Encryption and Decryption using RSA, from
http:/ / www.bridgeport.edu/ sed/ projects/ cs597/ Spring_2004/ sbhumana/ index.htm.
2400. HashCalc, from http:/ / www.slavasoft.com/ hashcalc/ .
2401. MD5 Calculator, from http:/ / www.bullzip.com/ products/ md5/ info.php.
2402. HashMyFiles, from http:/ / www.nirsoft.net/ utils/ hash_my_files.html.
2403. Advanced Encryption Package, from http:/ / www.aeppro.com/ .
2404. BCTextEncoder, from http:/ / www.jetico.com/ encryption-bctextencoder.
2405. CommuniCrypt File Encryption Tools, from http:/ / www.communicrypt.com.
2406. Steganos LockNote, from https:/ / www.steganos.com/ us/ products/ for-free/ locknote/ overview/ .
References Page 3054 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
2407. AxCrypt, from http:/ / www.axantum.com/ axcrypt/ .
2408. AutoKrypt, from http:/ / www.hiteksoftware.com/ autokrypt/ data-encryption-software.htm.
2409. CryptoForge, from http:/ / www.cryptoforge.com/ .
2410. NCrypt XL, from http:/ / www.littlelite.net/ ncryptxl/ .
2411. ccrypt, from http:/ / ccrypt.sourceforge.net/ .
2412. WinAES, from http:/ / fatlyz.com/ en/ winaes/ .
2413. EncryptOnClick, from http:/ / www.2brightsparks.com/ onclick/ eoc.html.
2414. GNU Privacy Guard, from http:/ / www.gnupg.org.
2415. comodo, from http:/ / www.comodo.com/ .
2416. thawte, from http:/ / www.thawte.com/ .
2417. verisign, from http:/ / www.verisign.com.
2418. entrust, from http:/ / www.entrust.net/ .
2419. TrueCrypt, from http:/ / www.truecrypt.org/ .
2420. GiliSoft Full Disk Encryption, from http:/ / www.gilisoft.com/ product-full-disk-encryption.htm.
2421. DriveCrypt, from http:/ / www.securstar.com/ products_drivecrypt.php.
2422. ShareCrypt, from http:/ / www.securstar.com/ products_sharecrypt.php.
2423. PocketCrypt, from http:/ / www.securstar.com/ products_pocketcrypt.php.
2424. Rohos Disk Encryption, from http:/ / www.rohos.com/ products/ rohos-disk-encryption/ .
2425. R-Crypto, from http:/ / www.r-tt.com/ data_security_software/ .
2426. SafeBit Disk Encryption, from http:/ / www.safebit.net/ .
2427. DiskCryptor, from http:/ / diskcryptor.net/ wiki/ Main_Page/ en.
2428. alertsec, from http:/ / www.alertsec.com/ software-overview/ .
2429. Symantec Drive Encryption, from http:/ / www.symantec.com/ whole-disk-encryption.
2430. DriveCrypt Plus Pack, from http:/ / www.securstar.com/ products_drivecryptpp.php.
2431. CrypTool, from http:/ / www.cryptool.org/ en.
2432. CryptoBench, from http:/ / www.addario.org/ cryptobench/ .
2433. J CrypTool, from http:/ / www.cryptool.org/ en/ jcryptool.
2434. Ganzua, from http:/ / ganzua.sourceforge.net/ en/ index.html.
2435. Crank, from http:/ / crank.sourceforge.net/ index.html.
2436. EverCrack, from http:/ / evercrack.sourceforge.net/ .
2437. AlphaPeeler, from http:/ / alphapeeler.sourceforge.net/ indexl.htm.
2438. Draft Crypto Analyzer, from http:/ / www.literatecode.com/ draca.
2439. Linear Hull Cryptanalysis of PRESENT, from http:/ / www.ecrypt.eu.org/ tools/ present-linear-hull.
2440. mediggo, from http:/ / c0de.g00gle.c0m/ p/ medigg0/ .
2441. SubCypher, from http:/ / www.esclepiusllc.com/ index.php?page=subcypher.
2442. MD5 Decrypt, from http:/ / www.md5decrypt.org/ .
2443. MD5Cracker, from http:/ / md5crack.com/ .
2444. MD5 Hash Cracker, from http:/ / www.tmto.org/ pages/ passwordtools/ hashcracker/ .
2445. Hash Cracker, from http:/ / www.hash-cracker.com/ .
2446. MD5Decrypter, from http:/ / www.md5decrypter.com/ .
References Page 3055 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
References
2447. OnlieHashCrack.com, from http:/ / www.onlinehashcrack.com/ index.php.
2448. MD5Decrypter.co.uk, from http:/ / www.md5decrypter.co.uk/ .
2449. Md5.My-Addr.com, from http:/ / md5.my-addr.com/ md5_decrypt-
md5_cracker_online/ md5_decoder_tool.php.
2450. cmd5.org, from http:/ / www.cmd5.org/ .
2451. Crypt and Decrypt Online Tool Conversion, from
http:/ / myeasywww.appspot.com/ utility/ free/ online/ Crypt-and-Decrypt-tool-
online/en?command=UTI LI TY&I D=2.
Module 20: Penetration Testing
2452. Assessing Network Security, from http:/ / www.scribd.com/ doc/ 24594933/ Assessing-Network-Security.
2453. Technical (Bottom-Up) Methodology, from
http:/ / www.crcnetbase.com/ doi/ abs/ 10.1201/ 9780203503041.ch6.
2454. Auditing, from http:/ / www.crcnetbase.com/ doi/ abs/ 10.1201/ 9781420000047.ch3.
2455. Automated Penetration Testing - False Sense of Security, from http:/ / www.it-observer.com/ automated-
penetration-testing-false-sense-security.html.
2456. Application Assessment Questioning, from
http:/ / www.technicalinfo.net/ papers/ AssessmentQuestions.html.
2457. How are Penetrating Testing conducted?, from www.corsaire.com .
2458. Categories of security assessments, from http:/ / safari.oreilly.com/ 0735618682/ part06.
2459. Assessing Network Security, from http:/ / safari.phptr.com/ 0735620334/ ch01levlsec3.
2460. Penetration testing guide, from http:/ / www.penetration-testing.com/ .
2461. COMPUTER SECURI TY PERFORMANCE TESTEXAMPLE, from http:/ / sedists.org/ lists/ pen-
test/ 2003/ Feb/ att-0015/ Pennetration_Test_Agreement_txt.
2462. Service Level Agreements, from http:/ / it.usu.edu/ htm/ hardware/ service-level-agreements.
2463. J eff Forrista, (2001), Fireproofing Against DoS Attacks, from
http:/ / www.networkcomputing.com/ 1225/ 1225f38.html.
2464. Konstantinos Karagiannis, Pen-Test Using FoundScan Hardware Appliances, from
http:/ / www.eweek.com/ cobrand/ 0,3223,a=27473&s=1610&ap=,00.asp.
2465. Pen-Test Using NetRecon, from http:/ / www.net-security.org/ dl/ newsletter/ txt/ issue059.txt.
2466. Pen-Test Using SATAN, SARA and Security Analyzer, from
http:/ / www.ciac.org/ ciac/ ToolsUnixNetSec.html.
2467. E- Commerce Security, from http:/ / netdesignplus.net/ publications/ victor_sawma_thesis.pdf.
2468. Design Guidelines for Secure Web Applications, from http:/ / msdn.microsoft.com/ library/ en-
us/ dnnetsec/ html/ thcmch04.asp?frame=true.
2469. KEN BRANDT, STU GREEN, ENRI QUE ZUNI GA, Activity: Escalating Privileges, from
http:/ / infosecuritymag.techtarget.com/ ar.
2470. The Professional Security Testers (PST) Warehouse: Web Proxy, from
http:/ / www.professionalsecuritytesters.org/ modules.php?name=News&new_topic=16.
2471. Microsoft Security Bulletin (MS99-046) Frequently Asked Questions,
http:/ / www.microsoft.com/ technet/ security/ bulletin/ fq99-046.mspx.
2472. Penetration testing guide, from http:/ / www.penetration-testing.com/ .
2473. Netscape, from http:/ / netscape.aol.com/ .
References Page 3056 Ethical Hacking and Countermeasures Copyright by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
E xa m 3 1 2 - 5 0 C e r ti fi e d E th ic a l H a c k e r E th ic a l H a c k in g a n d C o u n te rm e a s u re s
R e fe re n c e s
2474. Kyle Lai, (2002), Change MAC Address on Win2K & XP, from http:/ / sedists.org/ pen-
test/ 2002/ Nov/ 0025.html.
2475. Anatomy of an ARP Poisoning Attack, from
http:/ / www.watchguard.com/ infocenter/ editorial/ 135324.asp.
2476. Hacking Lexicon, from http:/ / www.cybersoft.com/ whitepapers/ reference/ hacking_lexicon.shtml
2477. I nformation Security Magazine, from
http:/ / infosecuritymag.techtarget.com/ articles/ march01/ features4_battle_plans.shtml.
2478. Finding and Fixing Network Vulnerabilities, from
http:/ / www.eweek.com/ cobrand/ 0,3223,a=27473&s=1610&ap=,00.asp.
2479. Fireproofing against DoS Attacks, from http:/ / www.networkcomputing.com/ 1225/ 1225f38.html.
2480. Get quality service from your suppliers, from
http:/ / www.businesslink.gov.uk/bdotg/ action/ detail?type=RESC>URCES&itemld=1073792560.
2481. Stephen, (2006), USU Help Desk, from http:/ / helpdesk.usu.edu/ content/ hardware/ sla.contracts.php.
2482. Computer Security Performance Test example I ndependent Oversight Cyber Security Performance Test,
from http:/ / seclists.org/ lists/ pen-test/ 2003/ Feb/ att-0015/ Pennetration_Test_Agreement_txt.
2483. Safari Books Online- Microsoft Windows Security Resource Kit, from
http:/ / safari.oreilly.com/ 0735618682/ part06.
2484. Christopher R. Russel, (2001), Penetration Testing with dsniff, from http:/ / www.ouah.org/ dsniffintr.htm.
2485. IDA, from https:/ / www.hex-rays.com/ products/ ida/ index.shtml.
2486. Kismet, from http:/ / www.kismetwireless.net/ download.shtml.
R e fe re n c e s P age 3 0 5 7 E th ic a l H a c k in g a n d C o u n te r m e a s u r e s C o p y r ig h t b y E C -C O U IIC il
A ll R ig h ts R e s e rve d . R e p ro d u c tio n is S tr i c tl y P r o h i b i te d .