[...]... .10 6 Countermeasures 11 4 Chapter 9: Network Infrastructure 11 7 Network Infrastructure Vulnerabilities 11 9 Choosing Tools 12 0 Scanners .12 0 Vulnerability assessment 12 1 Scanning, Poking, and Prodding 12 1 Port scanners .12 1 SNMP scanning 12 9 Banner grabbing 13 0 Firewall rules 13 1 Looking... Hacking 16 5 Chapter 11 : Windows 16 7 Windows Vulnerabilities 16 8 Choosing Tools 16 8 Essential tools 16 9 Free Microsoft tools 16 9 All-in-one assessment tools 17 0 Task-specific tools .17 0 Information Gathering 17 1 System scanning 17 1 NetBIOS 17 4 RPC 17 7 Enumeration... analyzer 13 4 The MAC-daddy attack .14 0 Denial of service 14 4 General network defenses 14 6 xi xii Hacking For Dummies Chapter 10 : Wireless LANs 14 7 Understanding the Implications of Wireless Network Vulnerabilities 14 7 Choosing Your Tools 14 8 Wireless LAN Discovery .15 1 Checking for worldwide recognition .15 1 Scanning... 15 2 Wireless Network Attacks 15 4 Encrypted traffic .15 5 Countermeasures 15 6 Rogue networks 15 8 Countermeasures 15 9 Physical-security problems 16 0 Countermeasures 16 0 Vulnerable wireless workstations 16 1 Countermeasures 16 1 Default configuration settings 16 2 Countermeasures 16 3 Part IV: Operating System Hacking. .. 210 Countermeasures 210 General Security Tests 211 Patching Linux . 212 Distribution updates 213 Multiplatform update managers 213 Chapter 13 : Novell NetWare 215 NetWare Vulnerabilities 215 Choosing Tools 216 Getting Started 216 Server access methods . 217 Port scanning . 217 ... 17 7 Enumeration .17 8 Countermeasures 17 8 Null Sessions .17 9 Hacks 17 9 Countermeasures 18 4 Share Permissions .18 6 Windows defaults 18 6 Testing 18 7 General Security Tests 18 9 Windows Update 18 9 Microsoft Baseline Security Analyzer (MBSA) .19 0 LANguard 19 1 Chapter 12 : Linux ... 13 Application and other specialized attacks .13 Obeying the Ethical hacking Commandments 14 Working ethically 14 Respecting privacy 14 Not crashing your systems 15 The Ethical hacking Process 15 Formulating your plan 15 Selecting tools 17 Executing the plan .19 Evaluating results 20 Moving on .20 x Hacking. .. the Foundation for Ethical Hacking 7 Chapter 1: Introduction to Ethical Hacking 9 How Hackers Beget Ethical Hackers .9 Defining hacker 9 Ethical Hacking 10 1 .10 Understanding the Need to Hack Your Own Systems 11 Understanding the Dangers Your Systems Face .12 Nontechnical attacks 12 Network-infrastructure attacks 13 Operating-system... password -hacking countermeasures 91 Password-protected files 95 Other ways to crack passwords 97 Securing Operating Systems 10 1 Windows .10 1 Linux and UNIX 10 2 Part III: Network Hacking 10 3 Chapter 8: War Dialing 10 5 War Dialing 10 5 Modem safety .10 5 General telephone-system vulnerabilities 10 6... 315 Keeping Up with Other Security Issues 316 Part VII: The Part of Tens 317 Chapter 20: Ten Tips for Getting Upper Management Buy-In 319 Cultivate an Ally and Sponsor 319 Don’t Be a FUDdy Duddy 319 Demonstrate How the Organization Can’t Afford to Be Hacked 320 Outline the General Benefits of Ethical Hacking .320 xv xvi Hacking For Dummies Show How Ethical Hacking . Network Hacking 10 3 Chapter 8: War Dialing 10 5 Chapter 9: Network Infrastructure 11 7 Chapter 10 : Wireless LANs 14 7 Part IV: Operating System Hacking 16 5 Chapter 11 : Windows 16 7 Chapter 12 : Linux 19 3 Chapter. . . . . .11 7 Network Infrastructure Vulnerabilities 11 9 Choosing Tools 12 0 Scanners 12 0 Vulnerability assessment 12 1 Scanning, Poking, and Prodding 12 1 Port scanners 12 1 SNMP scanning 12 9 Banner. scanning 17 1 NetBIOS 17 4 RPC 17 7 Enumeration 17 8 Countermeasures 17 8 Null Sessions 17 9 Hacks 17 9 Countermeasures 18 4 Share Permissions 18 6 Windows defaults 18 6 Testing 18 7 General Security Tests 18 9 Windows