More Related Content
Similar to Ce hv8 references
Similar to Ce hv8 references (20)
Ce hv8 references
- 1. Ethical Hacking and Countermeasures
References
Exam 312-50 Certified Ethical Hacker
M o d u le 01: Introduction to Ethical Hacking
1.
Zero-day attacks are meaner, more ram pant than w e ever thought, from
http://arstechnica.com/security/ 2 0 1 2 / 10 /zero-day-attacks-are-meaner-and-more-plentiful-thanthought/.
2.
SECURITY POLICY: TARGET, CONTENT, & LINKS, from
http://csrc.nist.gov/nissc/1998/proceedings/paperG4.pdf.
3.
Anatom y of the Hack - Hands-on Security, from http://www.slideshare.net/NewBU/anatomy-of-thehack-handson-security-information-assurance-dub.
4.
Hacker methodology, from http://w w w.hackersecuritym easures.com /.
5.
Ethical Hacking, from w w w .secured eath.co m .
6.
C. C. Palmer, Ethical hacking from http://researchweb.watson.ibm .com /journal/sj/403/palm er.htm l.
7.
An O verview of Com puter Security, from
www.cc.gatech.edu/classes/AY2005/cs4803cns_fall/security_overview.ppt.
8.
Dr. Death, (2006), Ethical Hacking, from http://w w w .securedeath.com .
9.
Ethical Hacking, from http://neworder.box.sk/news/921.
10.
How are Penetrating Testing conducted?, from w w w .corsaire.co m .
11.
Ethical Hacking: The Security Justification Redux, from
http://www.sosresearch.org/publications/ISTAS02ethicalhack.PDF.
12.
Ethical Hacking, from w ww.sosresearch.org/publications.
13.
Ethical Hacking, from w w w .research.ibm .com .
14.
Covering Tracks, from http://rootprom pt.org.
15.
Attack, from http://www.linuxsecurity.com /content/view/17/70/.
16.
Security Issues in W ireless M A G N ET at Networj Layer, from
http://csce.unl.edu/~jaljaroo/publications/TR02-10-07.pdf.
17.
Glossary of Security and Internet terms, from
http://wssg.berkeley.edu/Securitylnfrastructure/glossary.htm l.
18.
Glossary of Vulnerability Testing Terminology, from
http://www.ee.oulu.fi/research/ouspg/sage/glossary/.
19.
Information about
hackers, from http://w w w .antionline.com /.
20.
Information about
hackers, from http://w2.eff.org/Net_culture/Hackers/.
21.
LEX LUTHOR, information about hackers, from http://bak.spc.org/dms/archive/britphrk.txt.
22.
Information about
hackers, from http://directory.google.com/Top/Computers/Hacking/.
23.
Information about
hackers, from http://directory.google.com/Top/Computers/Security/Hackers/.
24.
Information about
hackers, from http://bak.spc.org/dms/archive/profile.html.
References Page 2976
Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 2. Ethical Hacking and Countermeasures
References
25.
Exam 312-50 Certified Ethical Hacker
Information about hackers, from
http://dir.yahoo.com /Com puters_and_lnternet/Security_and_Encryption/Hacking/.
M o d u le 02: Footprinting and Reconnaissance
26.
Search Operators, from http://w w w.googleguide.com /advanced_operators.htm l.
27.
The Complete W indow s Trojans Paper, from
http://w w w .w indow security.com /w hitepapers/trojans/The_C om plete_W indow s_Trojans_Paper.htm l.
28.
Naples, (2008), Information Gathering Tools, Available from
http://it.toolbox.com /wiki/index.php/lnform ation_Gathering_Tools.
29.
30.
Extract W ebsite Information from archive.org, Available from w w w .archive.org .
Footprinting, from
http://www.ethicalhacker.net/com ponent/option,com _sm f/ltem id,49/topic,228.m sg672.
31.
Simson Garfinkel and David Cox, (2009), Finding and Archiving the Internet Footprint,
http://simson.net/clips/academic/2009.BL.lnternetFootprint.pdf.
32.
33.
CHAPTER 2 [FOOTPRINTING], from http://www.ecqurity.com /wp/footprinting-encored.pdf.
Donna F. Cavallini and Sabrina 1 PACIFICI, Got COM PETITIVE INTELLIGENCE,
.
http://www.llrx.com /features/gotci.ppt.
34.
Spam m ers & hackers: using the APNIC W hois Database to find in their network, from
http://www.apnic.net/info/faq/abuse/using_whois.htm l.
35.
P. Mockapetris, (1987), DOM AIN N A M ES - CONCEPTS AND FACILITIES, from
htt p ://w w w .ie tf.0 rg/ rf c/ rf c 1034. txt.
36.
M anic Velocity, Footprinting And The Basics Of Hacking, from
http://web.textfiles.com/hacking/footprinting.txt.
37.
Dean, (2001), W indow s 2000 Command Prom pt Troubleshooting Tools, from
http://www.pcm ech.com /show/troubleshoot/192/.
38.
nslookup Command, from
http://publib. boulder. ibm.com/infocenter/pseries/v5r3/index.jsp?topic=/com.ibm.aix.doc/cmds/aixcmd
s4/nslookup.htm.
39.
40.
The nslookup M anual Page, from http://www.stopspam .org/usenet/m m f/m an/nslookup.htm l.
Bob Hillery, (2001), Neohapsis Archives - Incidents list - Re: Finding out w ho owns ..., from
http://archives.neohapsis.com/archives/incidents/2001-01/0032.html.
41.
Ryan Spangler, (2003), Analysis of Rem ote Active Operating System Fingerprinting Tools, from
http://w w w.packetw atch.net/docum ents/papers/osdetection.pdf.
42.
Ryan Spangler, (2003), Analysis of Rem ote Active Operating System Fingerprinting Tools, from
http://w w w.securiteam .com /securityreviews/5ZP010UAAI.htm l.
43.
Fingerprint methodology: IPID sampling, from http://www.insecure.org/nmap/nmap-fingerprintingold.html.
44.
Fyodor, (1998), Rem ote OS detection via TCP/IP Stack Fingerprinting, from
http://www.donkboy.com /htm l/fingerprt.htm .
45.
Rem ote OS Detection, from http://nmap.org/book/osdetect.html.
46.
Regional Internet Registry, from http://en.wikipedia.org/wiki/Regional_lnternet_Registry.
47.
Boy Scouts, Fingerprinting from http://onin.eom/fp/fpmeritbdg.html#top.
48.
The Hacker's Choice, from http://freeworld.thc.org/welcom e/.
49.
THC Fuzzy Fingerprint, from http://freeworld.thc.org/thc-ffp/.
References Page 2977
Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 3. Ethical Hacking and Countermeasures
References
Exam 312-50 Certified Ethical Hacker
50.
Katherine Knickerbocker, CJ625 Student Paper, from http://all.net/CID/Attack/papers/Spoofing.html.
51.
Arik R. Johnson, W h a t is com petitive intelligence? How does com petitive ..., from
http://aurorawdc.com /whatisci.htm .
52.
Guangliang (Benny), (2006), Spamming and hacking, from
http://www.apnic.net/info/faq/abuse/using_whois.htm l.
53.
Dhillon, (2006), Footprinting: The Basics of Hacking: Hack In The Box, from
http://www.hackinthebox.org/modules.php?op=modload&name=News&file=article&sid=5359&mode=t
hread&order= 0 &thold= 0 .
54.
Roshen, (2006), Paladion - Customers - Success Stories - Penetration Testing, from
http://paladion.net/pentration_testing.php.
55.
Paul Thompson, (2006), Cognitive Hacking and Digital Governm ent: Digital Identity, from
http://www.ists.dartm outh.edu/library/chd0803.pdf.
56.
Greg Sandoval, (2006), M PA A accused of hiring a hacker, from
http://news.com.com/MPAA+accused+of+hiring+a+hacker/2100-1030_3-6076665.html.
57.
Kurt Seifried, (2005), Closet20001213 Backdoors, Back Channels and HTTP(S), from
http://www.seif ried.org/security/index.php/Closet20001213_Backdoors,_Back_Channels_and_HTTP(S).
58.
Happy Browser, (2005), from http://www.hotscripts.com /Detailed/39030.htm l.
59.
Client-server architecture, from http://w w w.netw orkintrusion.co.uk/N_scan.htm .
60.
Elegant architecture: NASI, from http://www.nessus.org/features/.
61.
The Signatures, from http://www.honeynet.org/papers/finger/.
62.
Ryan Spangler, (2003), Analysis of Rem ote Active Operating System Fingerprinting Tools, Nmap t o o l:
technique, from http://w w w.securiteam .com /securityreviews/5ZP010UAAI.htm l.
63.
Bew are!: W a r dialing, Sandstorm Sandtrap 1.5 W ard ia le r Detector Plus 16 and Basic Detectors, from
http://w w w .data-connect.com /Santstorm _PhoneSw eep.htm .
64.
Appendix A - Glossary of Terms: IPSEC, from
http://www.im sglobal.org/gws/gwsvlpO/im sgws_securityProfvlpO .htm l.
65.
Def. and info. Vulnerability scanning, from
http://www.webencanto.com /com puter_glossary/Com m unications/Ethics/vulnerability_scanning.htm l.
66.
Footprinting, from http://books.mcgrawhill. com/downloads/products//0072193816/0072193816_ch01. pdf].
67.
P. Mockapetris, Zvon - RFC 1034 [DO M AIN N A M ES - CONCEPTS AND FACILITIES] - DOMAIN..., from
http://www.zvon.org/tmRFC/RFC1034/Output/chapter3.html.
68.
Gaurav, (2006), The Domain Name System (DNS), from
http://people.csa.iisc.ernet.in/gaurav/np/rfcs/dns.html.
69.
Using the Internet for Com petitive Intelligence, from
http://www.cio.com /CIO/arch_0695_cicolum n.htm l.
70.
Reporting network abuse: Spamming and hacking, from
http://www.apnic.net/info/faq/abuse/using_whois.htm l.
71.
Bastian Ballmann, (2011), Information gathering tools, from http://www2.packetstormsecurity.org/cgibin/search/search.cgi?searchvalue=information+gathering&type=archives&[search].x= 0 &[search].y= 0 .
72.
Google Earth, from http://www.google.com /earth/index.htm l.
73.
pipl,from https://pipl.com/.
74.
spokeo, from http://w w w.spokeo.com .
75.
Zaba Search, from http://w w w.zabasearch.com .
References Page 2978
Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 4. Ethical Hacking and Countermeasures
References
Exam 312-50 Certified Ethical Hacker
76.
123 People Search, from http://w w w.123people.com .
77.
Zoomlnfo, from http://w w w.zoom info.com .
78.
PeekYou, from http://w w w .peekyou.com .
79.
W in k People Search, from http://wink.com .
80.
Intelius, from http://w w w.intelius.com .
81.
A n yW ho , from http://w w w .anyw ho.com .
82.
PeopleSm art, from http://w w w .peoplesm art.com .
83.
People Lookup, from https://w ww .peoplelookup.com .
84.
W hitePages, from http://w w w .w hitepages.com .
85.
Facebook, from https://w ww .facebook.com /.
86.
Linkedln, from http://w w w.linkedin.com .
87.
Google+, from https://plus.google.com.
88.
Twitter, from http://twitter.com .
89.
Google Finance, from http://finance.google.com /finance.
90.
Yahoo Finance, from http://finance.yahoo.com .
91.
Zaproxy, from https://code.google.eom/p/zaproxy/downloads/list.
92.
Burp Suite, from http://portswigger.net/burp/download.htm l.
93.
Firebug, from https://getfirebug.com/downloads/.
94.
HTTrack W eb site Copier, from http://w w w.httrack.c 0 m/page/ 2 /.
95.
BlackW idow , from http://softbytelabs.com /us/downloads.htm l.
96.
W ebripper, from http://w w w.calluna-software.com /W ebripper.
97.
SurfOffline, from http://w w w.surfoffline.com /.
98.
W ebsite Ripper Copier, from http://w w w.tensons.com /products/w ebsiterippercopier/.
99.
PageNest, from http://w w w .pagenest.com .
100.
Teleport Pro, from http://w w w.tenm ax.com /teleport/pro/download.htm .
101.
Backstreet Browser, from http://www.spadixbd.com /backstreet/.
102.
Portable Offline Browser, from http://w w w .m etaproducts.com /Portable_O ffline_Brow ser.htm .
103.
Offline Explorer Enterprise, from http://w w w .m etaproducts.com /offline_explorer_enterprise.htm .
104.
Proxy Offline Browser, from http://www.proxy-offline-browser.com/.
105.
GNU W get, from ftp://ftp.gnu.org/gnu/wget/.
106.
iMiser, from http://internetresearchtool.com .
107.
Hooeey W ebprint, from http://www.hooeeywebprint.com.s3-website-us-eastl.am azonaws.com /dow nload.htm l.
108.
W ayback M achine, from http://archive.org/web/web.php.
109.
W ebSite-W atcher, from http://aignes.com /download.htm .
110.
eM ailTrackerPro, from http://w w w .em ailtrackerpro.com .
111.
PoliteM ail, from http://w w w .politem ail.com .
112.
Email Lookup - Free Email Tracker, from http://w w w.ipaddresslocation.org.
113.
Read Notify, from http://w w w .readnotify.com .
114.
Pointofmail, from http://w w w .pointofm ail.com .
References Page 2979
Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 5. Ethical Hacking and Countermeasures
References
Exam 312-50 Certified Ethical Hacker
115.
DidTheyReadlt, from http://w w w .didtheyreadit.com .
116.
Super Email M arketing Softw are, from http://www.bulk-email-marketing-software.net.
117.
Trace Email, from http://whatismyipaddress.com/trace-email.
118.
W h o R e a d M e , from http://w horeadm e.com .
119.
MSGTAG, from http://www.m sgtag.com /download/free/.
120.
GetNotify, from http://w w w .getnotify.com .
121.
Zendio, from http://w w w.zendio.com /download.
122.
G-Lock Analytics, from http://glockanalytics.com.
123.
EDGAR Database, from http://w w w .sec.gov/edgar.shtm l.
124.
Hoovers, from http://w w w .hoovers.com .
125.
LexisNexis, from http://www.lexisnexis.com .
126.
Business W ire , from http://w w w.businesswire.com .
127.
M arket W atch, from http://w w w .m arketw atch.com .
128.
The W all Street T ra n scrip t, from http://w w w .tw st.com .
129.
Upper M arketplace, from http://w w w .lipperm arketplace.com .
130.
Eurom onitor, from http://w w w .eurom onitor.com .
131.
Fagan Finder, from http://w w w.faganfinder.com .
132.
SEC Info, from http://w w w .secinfo.com .
133.
The Search Monitor, from http://w w w .thesearchm onitor.com .
134.
Compete PRO™, from http://w w w .com pete.com .
135.
Copernic Tracker, from http://w w w.copernic.com .
136.
ABI/IN FO RM Global, from http://w w w .proquest.com .
137.
SEM Rush, from http://w w w.sem rush.com .
138.
AttentionM eter, from http://w w w .attentionm eter.com .
139.
Jobitorial, from http://w w w .jobitorial.com .
140.
Google Hacking Database, from http://w w w.hackersforcharity.org.
141.
M etaGoofil, from http://www.edge-security.com .
142.
Google Hack Honeypot, from http://ghh.sourceforge.net.
143.
Goolink Scanner, from http://w w w.ghacks.net.
144.
GM apCatcher, from http://code.google.com.
145.
SiteDigger, from http://w w w .m cafee.com .
146.
SearchDiggity, from http://w w w.stachliu.com .
147.
Google Hacks, from http://code.google.com.
148.
Google HACK DB, from http://w w w .secpoint.com .
149.
BiLE Suite, from http://w w w.sensepost.com .
150.
Gooscan, from http://w w w.darknet.org.uk.
151.
W H O IS Lookup at DomainTools.com, from http://whois.dom aintools.com /.
152.
Domain Dossier, from http://centralops.net/co.
153.
Sm artW hois, from http://www.tam os.com /download/m ain/index.php.
154.
CountryW hois, from http://www.tam os.com /products/countrywhois/.
References Page 2980
Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 6. Ethical Hacking and Countermeasures
References
Exam 312-50 Certified Ethical Hacker
155.
W h o is Analyzer Pro, from http://w w w.whoisanalyzer.com /dow nload.opp.
156.
LanWhols, from http://lantricks.com/download/.
157.
HotW hois, from http://w w w.tialsoft.com /download/?url=http://ww w .tialsoft.com /hwhois.exe.
158.
Batch IP Converter, from http://w w w .netw orkm ost.com /dow nload.htm .
159.
W hois 2010 Pro, from http://lapshins.com/.
160.
CallerIP, from http://w w w.callerippro.com /dow nload.htm l.
161.
ActiveW hois, from http://w w w.johnru.com /.
162.
W h o is Lookup M ultiple Addresses, from http://www.sobolsoft.com /.
163.
WhoisThisDom ain, from http://w w w.nirsoft.net/utils/w hois_this_dom ain.htm l.
164.
Sm artW hois, from http://sm artwhois.com .
165.
W hois, from http://tools.whois.net.
166.
Better W hois, from http://w w w .betterw hois.com .
167.
DNSstuff, from http://w w w.dnsstuff.com .
168.
W hois Source, from http://www.whois.se.
169.
N etw ork Solutions Whois, from http://w w w.netw orksolutions.com .
170.
W e b Wiz, from http://www.webwiz.co.uk/domain-tools/whois-lookup.htm.
171.
W ebToolHub, from http://www.webtoolhub.com/tn561381-whois-lookup.aspx.
172.
Network-Tools.com, from http://network-tools.com.
173.
Ultra Tools, from https://w ww .ultratools.com /w hois/hom e.
174.
dnsstuff, from http://w w w.dnsstuff.com /.
175.
network-tools, from http://network-tools.com/.
176.
DNS Queries, from http://www.dnsqueries.com /en/.
177.
DIG, from http://www.kloth.net/services/dig.php.
178.
myDNSTools, from http://www.m ydnstools.info/nslookup.
179.
DN SW atch, from http://w w w .dnsw atch.info.
180.
DomainTools, from http://w w w.dom aintools.com .
181.
Professional Toolset, from http://www.dnsstuff.com /tools.
182.
DNS, from http://e-dns.org.
183.
DNS Records, from http://network-tools.com.
184.
DNS Lookup Tool, from http://www.webwiz.co.uk/domain-tools/dns-records.htm.
185.
DNSData View, from http://w w w .nirsoft.net.
186.
DNS Query Utility, from http://w w w.webm aster-toolkit.com .
187.
W H O IS-RW S, from http://whois.arin.net/ui.
188.
Netcraft, from http://searchdns.netcraft.com /Phost.
189.
Shodan, from http://w w w.shodanhq.com /.
190.
Path Analyzer Pro, from http://w w w.pathanalyzer.com /dow nload.opp.
191.
VisualRoute 2010, from http://w w w .visualroute.com /dow nload.htm l.
192.
N etw ork Pinger, from http://w w w.netw orkpinger.eom /en/dow nloads/#dow nload.
193.
Magic NetTrace, from http://w w w.tialsoft.com /download/?url=http://ww w .tialsoft.com /m NTr.exe.
194.
GEO Spider, from http://oreware.com /viewprogram .php?prog=22.
References Page 2981
Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 7. Ethical Hacking and Countermeasures
References
Exam 312-50 Certified Ethical Hacker
195.
3D Traceroute, from http://w w w .d3tr.de/dow nload.htm l.
196.
vTrace, from http://vtrace.pl/download.htm l.
197.
AnalogX HyperTrace, from
http://w w w.analogx.com /contents/dow nload/N etwork/htrace/Freeware.htm .
198.
Trout, from http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/freetools/trout.aspx.
199.
N etw ork Systems Traceroute, from http://w w w .net.princeton.edu/traceroute.htm l.
200.
Roadkil's Trace Route, from http://www.roadkil.net/program .php/P27/Trace%20Route
201.
Ping Plotter, from http://w w w .pingplotter.com .
202.
myiptest, from http://www.myiptest.com/staticpages/index.php/how-about-you.
203.
Maltego, from http://w w w.paterva.com /web6/products/download4.php.
204.
Domain Name Analyzer Pro, from http://www.domainpunch.com/domain-name-analyzerpro/download.php.
205.
W e b Data Extractor, from http://w w w .w ebextractor.com .
206.
Prefix W hois, from http://pwhois.org.
207.
Netmask (IRPAS), from http://w w w.phenoelit.org/irpas/dow nload.htm l.
208.
Binging, from http://w w w.blueinfy.com /tools.htm l.
209.
Tctrace (IRPAS), from http://w w w.phenoelit.org/irpas/dow nload.htm l.
210.
Spiderzilla, from http://spiderzilla.mozdev.org/installation.html.
211.
Autonom ous System Scanner (ASS) (IRPAS), from http://w w w.phenoelit.org/irpas/dow nload.htm l.
212.
Sam Spade, from http://w w w.m ajorgeeks.com /Sam _Spade_d594.htm l.
213.
DNS DIGGER, from http://www.dnsdigger.com .
214.
Robtex, from http://w w w.robtex.com .
215.
Dig W e b Interface, from http://w w w.digw ebinterface.com
216.
SpiderFoot, from http://sourceforge.net/projects/spiderfoot/?so.urce=dlp.
217.
Domain Research Tool, from http://w w w .dom ainresearchtool.com .
218.
CallerIP, from http://w w w.callerippro.com /dow nload.htm l.
219.
ActiveW hois, from http://w w w .johnru.com .
220.
Zaba Search, from http://www.zabasearch.com /.
221.
yoNam e, from http://yonam e.com .
222.
GeoTrace, from http://www.nabber.org/projects/geotrace/.
223.
Ping-Probe, from http://www.ping-probe.com/Ping-Probe/index.html.
224.
DomainHostingView, from http://w w w .nirsoft.net.
M o d u le 03: Scanning N etw orks
225.
Explanation of the Three-W ay Handshake via TCP/IP, from http://support.microsoft.com/kb/172983.
226.
Appendix G. Lists of reserved ports, ICM P types and codes, and Internet protocols, from
http://www.ingate.com /files/422/fwm anual-en/xal0285.htm l.
227.
228.
The Art of Port Scanning - by Fyodor, from http://nm ap.org/nm ap_doc.htm l.
M ethods of IP N etw ork Scanning - Stealth TCP Scanning Methods, from
http://w w w .c 0 dewalkers.c 0 m/c/a/Server-Administrati0 n /M eth 0 ds-0 f-IP-Netw 0 rk-Scanning/ 3 /.
References Page 2982
Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 8. Ethical Hacking and Countermeasures
References
229.
Exam 312-50 Certified Ethical Hacker
W h a t is Port Scanning and Types of Port Scanning, from http://www.hackillusion.com/what-is-portscanning-and-types-of-port-scanning/.
230.
UDP Scan, from http://www.networkuptim e.com /nm ap/page3-10.shtm l.
231.
Hacking Exposed, from http://www.scribd.com/doc/62708034/Hacking-Exposed-Book.
232.
N etw ork Security Assessment, from
https://w w w .trustm atta.com /dow nloads/pdf/M atta_IP_N etw ork_Scanning.pdf.
233.
Quick-Tip: SSH Tunneling M ade Easy, from http://www.revsys.com/writings/quicktips/ssh-tunnel.html.
234.
Detecting Spoofed Packets, from http://seclab.cs.ucdavis.edu/papers/DetectingSpoofed-DISCEX.pdf.
235.
Scanning modes: FIN, Xmas, Null, from http://www.openxtra.co.uk/support/howto/nmap-scanmodes.php.
236.
Port scanning techniq:sW (W in d o w scan), from http://www.paulisageek.com /nm ap/index.htm l.
237.
Prabhaker M ateti, UDP Scanning, from http://www.cs.wright.edu/~pmateti/Courses/499/Probing/.
238.
FTP server bounce attack, TCP Fragmenting, Intrusion detection systems use signature-based
mechanisms, from http://www.in-f-or.it/informatica/docs/portscan.pdf.
239.
Laura Chappell, (2003), OS Fingerprinting W ith ICM P: ICM P echo, from
http://www.securitypronews.com /it/security/spn-23-200309290SFingerprintingwithlCMP.htm l.
240.
241.
Scan Type-sF -sX -sN, from http://content.ix2.net/arc/t-4370.html.
Unixo3/introduction to Nmap, from http://www.sam hart.com /cgi־
bin/classnotes/wiki.pl?UNIX03/lntroduction_To_Nm ap.
242.
Fyodor, (2006), Art of port scanning: Features, Ideal scanning and related IPID games, Nmap: discription,
Fingerprint methadology: IPID samplingBounce attacks worked, Techniqe: TCP reverse ident scanning,
from http://w w w.insecure.org/nm ap/nm ap_doc.htm l.
243.
Antirez, hping2(8) - Linux man page: Discription, Hping2 Commands, from
http://www.hping.org/m anpage.htm l.
244.
Chris McNab, (2008), Third Party IP N etw ork Scanning Methods, Available from
http://w w w .c 0 dewalkers.c 0 m/c/a/Server-Administrati0 n/Third-Party-IP-Netw 0 rk-Scanning-Meth 0 ds/.
245.
Thierry Lagarde , AutoScan Network, Available from http://autoscannetwork.com/index. php?option=com_content&task=view&id=48<emid=32.
246.
Onion Routing, Available from http://dictionary.zdnet.com/definition/onion+routing.html.
247.
Van Geelkerken F.W .J, (2006), Digital Mixing (M IX nets), Available from
http://www.iusm entis.com /society/privacy/rem ailers/onionrouting/.
248.
Keith J. Jones, M ike Shema, & Bradley C. Johnson, Vulnerability Scanners, from
w ww.foundstone.com /pdf/books/AntiHackerSam ple.pdf.
249.
Examining Port Scan Methods- Analysing Audible Techniques, from http://www.in-for.it/informatica/docs/portscan.pdf.
250.
IM S General W e b Services Security Profile,
http://w w w.im sglobal.org/gws/gw svlpO/im sgw s_securityProfvlpO .htm l.
251.
Bew are!: W a r dialing, from http://w w w.castlecops.com /al361-W ar_dialing.htm l.
252.
Simson L. Garfinkel, Autom atic Parity Detection, from http://archive.cert.unistuttgart.de/archive/bugtraq/1998/12/msg00215.html.
253.
Lance M ueller, CREATE A REVERSE SSH TUNNEL,
http ://w w w .lancem ueller.com /blog/C reate%20Reverse%20SSH %20to%20reach%20servlet%20inside%2
Ofirewall.pdf.
References Page 2983
Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 9. Ethical Hacking and Countermeasures
References
254.
Exam 312-50 Certified Ethical Hacker
Avi Kak, (2010), Port Scanning, Vulnerability Scanning, Packet Sniffing, and Intrusion Detection,
http://cobweb.ecn.purdue.edu/~kak/com psec/NewLectures/Lecture23.pdf.
255.
Renaud Deraison, Ron Gula, and Todd Hayton, (2009), Passive Vulnerability Scanning Introduction,
http://nessus.org/whitepapers/passive_scanning_tenable.pdf.
256.
Cheng Guang, TCP Analysis Based on Flags, http://www.nordu.net/development/2nd-cnnw/tcp-analysisbased-on-flags.pdf.
257.
Cheng Tang & Jonathan Gossels, (1999), Wardialing: Practical Advice to Understand Your Exposure,
http://www.system experts.com /assets/tutors/wardial0299.pdf.
258.
N etw ork Security Library, from
http://w w w.window security.com /w hitepapers/m isc/Exam ining_port_scan_m ethods__ Analyzing_Audibl
e_Te.
259.
Lance Cottrell, Anonym izer Limitations: Logs, from http://www.livinginternet.eom /i/is_anon.htm .
260.
Michel Leconte, (2006), N etw ork security consulting, from http://www.activsupport.com/SmallBusiness-Network-Security-Soluti.
261.
262.
Angry IP Scanner, from http://angryip. 0 rg/w/D 0 w n l 0 a d .
SolarW inds Engineer's Toolset, from http://downloads.solarwinds.com/solarwinds/Release/Toolset/ZPToolset/ZP-Toolset-Ol.html.
263.
264.
Colasoft Ping Tool, from http://w w w.colasoft.com /dow nload/products/dow nload_ping_tool.php.
PacketTrap M SP, from http://www.packettrap.com/download?hsCtaTracking=e95ec5b5-069f-4cd5962c-9c0e6e32a6da%7C072dfe23-353f-46c2-9ab0-la27d39c01fl.
265.
266.
Visual Ping Tester - Standard, from http://w w w .pingtester.net.
Ping Sw eep (Integrated into W hatsupG old), from
http://www.whatsupgold.com /products/download/network_m anagem ent.aspx?k_id=ping-sweep-tool.
267.
Ping Scanner Pro, from http://www.digilextechnologies.com .
268.
N etw ork Ping, from http://www.greenline-soft.com /product_network_ping/index.aspx.
269.
Ultra Ping Pro, from http://ultraping.webs.com /downloads.htm .
270.
Ping Monitor, from http://w w w.niliand.com .
271.
PinglnfoView, from http://w w w.nirsoft.net/utils/m ultiple_ping_tool.htm l.
272.
Pinkie, from http://w w w.ipuptim e.net/category/download/.
273.
Colasoft Packet Builder, from
http://w w w.colasoft.com /dow nload/products/dow nload_packet_builder.php.
274.
NetScanTools Pro, from http://w w w.netscantools.com /nstprodem orequestform .htm l.
275.
PRTG N etw ork M onitor, from http://w w w.paessler.com /dow nload/prtg.
276.
Global Network Inventory Scanner, from
http://w w w .m agnetosoft.com /products/global_network_inventory/gni_features.htm .
277.
Net Tools, from http://m absoft.com /nettools.htm .
278.
SoftPerfect Netw ork Scanner, from http://w w w.softperfect.com /products/netw orkscanner/.
279.
IP Tools, from http://www.ks-soft.net/ip-tools.eng/downpage.htm.
280.
Advanced Port Scanner, from http://www.radm in.com /dow nload/previousversions/portscanner.php.
281.
MegaPing, from http://www.m agnetosoft.com /products/m egaping/m egaping_features.htm .
282.
Netifera, from http://netifera.com .
283.
N etw ork Inventory Explorer, from http://www.10strike.com /networkinventoryexplorer/download.shtm l.
References Page 2984
Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 10. Ethical Hacking and Countermeasures
References
284.
Exam 312-50 Certified Ethical Hacker
Free Port Scanner, from
http://w w w .nsauditor.eom /netw ork_tools/free_port_scanner.htm l#.U W JRvqLzvrw .
285.
ID Serve, from http://w w w.grc.com .
286.
Netcraft, from http://toolbar.netcraft.com .
287.
Netcat, from http://sourceforge.net/projects/netcat/files/latest/download?source=files.
288.
GFI LanGuard, from http://www.gfi.com/downloads/mirrors.aspx?pid=lanss.
289.
SAINT, from http://w w w.saintcorporation.com /products/software/saintScanner.htm l.
290.
Retina CS, from http://www.beyondtrust.com/Landers/TY-Page-RetinaCSCommunity/index.html.
291.
OpenVAS, from http://w w w .openvas.org.
292.
Core Impact Professional, from http://w w w .coresecurity.com .
293.
Security M anager Plus, from http://www.manageengine.com/products/securitymanager/download, html.
294.
Nexpose, from http://www.rapid7.com /products/nexpose/com pare-downloads.jsp.
295.
Shadow Security Scanner, from http://www.safety-lab.com /en/download.htm .
296.
QualysGuard, from http://w w w.qualys.com .
297.
Nsauditor Netw ork Security Auditor, from
http://w w w.nsaudit 0 r.c 0 m /netw 0 rk_security/netw 0 rk_security_audit 0 r.htm l#.UW KEx 6 Lzvrw.
298.
299.
Security Auditor's Research Assistant (SARA), from http://www-arc.com /sara/.
LANsurveyor, from
http://www.solarwinds.com/register/MoreSoftware.aspx?External=false&Program=17592&c=70150000
OOOPjNE.
300.
OpM anager, from http://www.m anageengine.com /network-m onitoring/download.htm l.
301.
N etw orkView , from http://w w w .netw orkview .com /htm l/dow nload.htm l.
302.
The Dude, from http://w w w.m ikrotik.com /thedude.
303.
LANState, from http://www.10-strike.com /lanstate/download.shtm l.
304.
HP Network Node M anager i software, from http://w w w 8 .hp.com/us/en/softwaresolutions/software. html?compURI=1170657#.
305.
FriendlyPinger, from http://www.kilievich.com /fpinger/download.htm .
306.
N etM apper, from http://w w w .opnet.com .
307.
Ipsonar, from http://w w w.lum eta.com /product/product.htm l.
308.
NetBrain Enterprise Suite, from http://www.netbraintech.com /instant-trial/.
309.
CartoReso, from http://cartoreso.cam pus.ecp.fr.
310.
Spiceworks-Network M apper, from http://w w w.spicew orks.com /dow nload/.
311.
Switch Center Enterprise, from http://www.lan-secure.c 0 m/d 0 w n l 0 ads.htrn#netw 0 rk.
312.
NetCrunch, from http://www.adrem soft.com /dem o/downloadproduct. php?product=nc7&file=NCServer7Premium. exe.
313.
Proxy W orkbench, from http://proxyworkbench.com/.
314.
Proxifier, from http://w w w.proxifier.com /dow nload.htm .
315.
Proxy Switcher, from http://w w w.proxysw itcher.com /.
316.
SocksChain, from http://ufasoft.com/socks/.
317.
TOR (The Onion Routing), from https://w ww .torproject.org/download/dow nload.
References Page 2985
Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 11. Ethical Hacking and Countermeasures
References
Exam 312-50 Certified Ethical Hacker
318.
Proxy, from http://www.analogx.com /conter 1
ts/download/N etw ork/proxy/Freeware.htm .
319.
Proxy Commander, from http://www.dlao.com /proxycm d/.
320.
Protoport Proxy Chain, from http://w w w .protoport.com .
321.
Proxy Tool W indow s App, from http://webproxylist.com/proxy-tool-windows-app/.
322.
Proxy+, from http://www.proxyplus.cz/.
323.
Gproxy, from http://gpassl.com /gproxy.php.
324.
FastProxySwitch, from http://www.affinity-tools.com/fps/.
325.
Fiddler, from http://www.fiddler2.com /fiddler2/version.asp.
326.
ProxyFinder Enterprise, from http://www.proxy-tool.com .
327.
Socks Proxy Scanner, from http://w w w .m ylanview er.com .
328.
ezProxy, from https://w ww . 0 clc.0 rg/ezpr0 xy/d 0 w n l 0 ad.en.h.tm l.
329.
Charles, from http://www.charlesproxy.com /.
330.
JA P Anonym ity and Privacy, from http://anon.inf.tu-dresden.de/win/download_en.htm l.
331.
UltraSurf, from http://w w w.ultrasurf.us.
332.
CC Proxy Server, from http://www.youngzsoft.net/ccproxy/proxy-server-download.htm.
333.
W ideCap, from http://w idecap.ru.
334.
FoxyProxy Standard, from https://addons.mozilla.org.
335.
ProxyCap, from http://w w w.proxycap.com .
336.
Super N etw ork Tunnel, from http://w w w .netw orktunnel.net.
337.
HTTP-Tunnel, from http://www.http-tunnel.com .
338.
Bitvise, from http://w w w .bitvise.com .
339.
Psiphon, from http://psiphon.ca.
340.
Your-Freedom, from http://w w w.your-freedom .net.
341.
Just Ping, from http://www.just-ping.com.
342.
W ebSitePulse, from http://w w w .w ebsitepulse.com .
343.
G-Zapper, from http://w w w.dum m ysoftw are.com /gzapper.htm l.
344.
M ow ser, from http://w w w .m ow ser.com .
345.
Spotflux, from http://w w w.spotflux.com .
346.
Anonym ous W e b Surfing Tool, from http://www.anonym ous-surfing.com .
347.
U-Surf, from http://ultim ate-anonym ity.com .
348.
Hide Your IP Address, from http://w w w .hideyouripaddress.net.
349.
W arpProxy, from http://silent-surf.com.
350.
Anonymizer Universal, from http://w w w.anonym izer.com .
351.
Hope Proxy, from http://w w w.hopeproxy.com .
352.
Guardster, from http://w w w.guardster.com .
353.
Hide M y IP, from http://www.privacy-pro.com /features.htm l.
M o d u le 04: Enum eration
354.
rpcinfo, from http://www.usoft.spb.ru/com m ands/rpcinfo/.
355.
RPCCLIENT, from http://w w w .sarata.com /m anpages/m anl/rpcclient.htm l.
References Page 2986
Ethical Hacking and Countermeasures Copyright © by EC-C0l1nCil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 12. Ethical Hacking and Countermeasures
References
Exam 312-50 Certified Ethical Hacker
356.
Enum eration, from http://w w w.edenofire.com /tutes/hack.php.
357.
smtp-user-enum User Docum entation, from http://pentestmonkey.net/tools/user-enumeration/smtpuser-enum.
358.
Chris Gates, (2006), W indow s Enum eration: USER2SID & SID2USER, from
http://w w w.window security.com /w hitepaper/W indow s-Enum eration-USER2SID-SID2USER.htm l.
359.
W h a t is S N M P ?, from http://www.wtcs.org/snm p4tpc/snm p.htm .
360.
SN M P, from http://w w w.cisc 0 .c0 m/univercd/cc/td/d 0 c/cisintwk/it 0 _ d 0 c/snmp.htm#xt 0 cid 5 .
361.
SN M PForDum m ies, from http://w iki.outboundindex.net/SNM PForDum m ies.
362.
Jan van Oorschot, Jeroen W orte lb o e r and Dirk W isse, (2001), S N M P - The Mission Statem ent,
http://www.securityfocus.com/infocus/1301.
363.
rp c in fo (lM ), from http://docs.hp.com /en/B2355-90692/rpcinfo.lM.htm l.
364.
GRAPE- INFO- DOT- COM, from http://www.grape-info.com .
365.
Joris Evers, (2006), AT&T hack exposes 19,000 identities, from http://news.cnet.com/2100-1029_36110765.html.
366.
S N M P from http://w w w .iss.net/security_center/advice/Reference/N etw orking/SN M P/default.htm .
367.
Simple Netw ork M anagem ent Protocol (SN M P), from
http://www.cisco.com /en/US/docs/internetworking/technology/handbook/SNM P.htm l.
368.
Linux / Unix finger command, from http://www.com puterhope.com /unix/ufinger.htm .
369.
Chris Gates, (2006), W in d o w s Enum eration: USER2SID & SID2USER
http://w w w.window security.com /w hitepapers/W indows-Enum eration-USER2SID-SID2USER.htm l.
370.
SuperScan, from http://www.m cafee.com /us/downloads/free-tools/superscan.aspx.
371.
Hyena, from http://w w w.system tools.com /hyena/trial_dow nload.htm .
372.
Winfingerprint, from http://w w w.winfingerprint.com .
373.
N etBIO S Enum erator, from http://nbtenum .sourceforge.net/.
374.
PsTools, from http://technet.microsoft.com/en-us/sysinternals/bb897553.aspx.
375.
OpUtils, from http://www.m anageengine.com /products/oputils/download.htm l.
376.
SolarW ind 's IP Netw ork Browser, from http://www.solarwinds.com/engineers-toolset/ip-networkbrowser, aspx.
377.
Getif, from http://www.wtcs.org/snm p4tpc/getif.htm .
378.
O iD ViEW S N M P M IB Browser, from http://w w w .oidview .com /m ibbrow ser.htm l.
379.
iReasoning M IB Browser, from http://ireasoning.com /m ibbrowser.shtm l.
380.
SNScan, from http://www.mcafee.com/us/downloads/free-tools/snscan.aspx.
381.
S N M P Scanner, from http://www.secure-bytes.com /SNM P+Scanner.php.
382.
S N M P Informant, from http://www.snm p-inform ant.com /.
383.
Net-SNMP, from http://net-snm p.sourceforge.net/download.htm l.
384.
Nsauditor Netw ork Security Auditor, from
http://w w w.nsaudit 0 r.c 0 m /netw 0 rk_security/netw 0 rk_security_audit 0 r.htm l#.UV 7 LH 5 NHLZ 4 .
385.
Spiceworks, from http://www.spiceworks.com/free-snmp-network-management-software/.
386.
Enum4linux, from http://labs.portcullis.co.uk/application/enum4linux/.
387.
Softerra LDAP Administrator, from http://w w w.ldapadm inistrator.com /.
388.
JXplorer, from http://www.jxplorer.org/.
389.
LDAP Admin Tool, from http://w w w.ldapsoft.com /ldapbrowser/ldapadm intool.htm l.
References Page 2987
Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 13. Ethical Hacking and Countermeasures
References
Exam 312-50 Certified Ethical Hacker
390.
LDAP Account M anager, from https://www.ldap-account-manager.org/lamcms/.
391.
LEX - The LDAP Explorer, from http://w w w.ldapexplorer.com /.
392.
LDAP Admin, from http://www.ldapadm in.org/.
393.
Active Directory Explorer, from http://technet.microsoft.com/en-us/sysinternals/bb963907.aspx.
394.
LDAP Administration Tool, from http://sourceforge.net/projects/ldap-at/.
395.
LDAP Search, from http://securityxploded.com/ldapsearch.php.
396.
Active Directory Domain Services M anagem ent Pack, from http://www.microsoft.com/enus/download/details.aspx?id=21357.
397.
LDAP Browser/Editor, from http://www.novell.com /coolsolutions/tools/13765.htm l.
398.
NSLookup, from http://www.kloth.net/services/nslookup.php.
M o d u le 05: System Hacking
399.
W h y Keyloggers are extrem ely dangerous?, from http://gamecreator.hubpages.com/hub/WhyKeyloggers-are-extremely-dangerous.
400.
Steganography in Depth, from http://www.crcnetbase.com/doi/abs/10.1201/9780203504765.ch4.
401.
Detecting spoofed packets, from http://ieeexplore.ieee.0rg/xpl/articleDetails.jsp?arnumber=1194882.
402.
NTLM Authentication in Java, from http://www.luigidragone.com/software/ntlm-authentication-in-java/.
403.
A Tutorial Review on Steganography, from http://www.jiit.ac.in/jiit/ic3/IC3_2008/IC32008/APP2_21.pdf.
404.
405.
network scanning, from http://searchm idm arketsecurity.techtarget.com /definition/network-scanning.
Ricky M. Magalhaes, (2004), Using passwords as a defense mechanism to improve W indow s security,
from w w w .w ind ow security.com /artid es/Passw ord s_lm p rove_W ind ow s_Security_Part2 .htm l.
406.
Piazza & Peter, (2002), Hybrid threats have rosy future: attacks that combine virus ...,
http://findartides.com /p/articles/m i_hb6380/is_200207/ai_n25618875?tag=content;coll.
407.
408.
Andreas W estfeld and Andreas Pfitzmann, Attacks on Steganographic Systems, citeseerx.ist.psu.edu/.
DaijiSanai and HidenobuSeki, (2004), Optimized Attack for NTLM2 Session Response
http://www.blackhat.com/presentations/bh-asia-04/bh-jp-04-pdfs/bh-jp-04-seki.pdf.
409.
Zhi W ang, Xuxian Jiang, W eidong Cui, and Xinyuan W ang, Countering Persistent Kernel Rootkits Through
System atic Hook Discovery, http://research.microsoft.com/en-us/um/people/wdcui/papers/hookmapraid08.pdf.
410.
Elia Florio, W hen M alw are M eets Rootkits,
http://w w w .sym antec.com /avcenter/reference/w hen.m alw are.m eets.rootkits.pdf.
411.
412.
Peter Piazza, (2002), SM O : Tech Talk, from http://www.securitym anagem ent.com /library/001272.htm l.
Brute force attack - Wikipedia, the free encyclopedia, from
http://en.wikipedia.org/w iki/Brute_force_attack.
413.
414.
Talk:Brute force attack - Bvio, from http://bvio.ngic.re.kr/Bvio/index.php/Talk:Brute_force_attack.
Passwords, from
http://searchsecurity.techtarget.com /searchSecurity/downloads/HackingforDum m iesCh07.pdf.
415.
Authernative, Inc. | Products | FAQs, from http://w w w.authernative.com /faqs.shtm l.
416.
CIAC Notes, from http://www.ciac.org/ciac/notes/Notes03a.shtm l.
417.
Path: new shost.uw o.caluw ovax.uw o.calm neville From: m neville@ uw ovax ..., from
http://w w w.uwo.ca/its/doc/newsletters/lnTouch/voll-9495/w inl8.txt.
418.
The Hack FAQ: Password Basics, from http://www.nmrc.org/pub/faq/hackfaq/hackfaq-04.html.
References Page 2988
Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 14. Ethical Hacking and Countermeasures
References
419.
420.
Exam 312-50 Certified Ethical Hacker
Luigi Dragone, NTLM Authentication in Java, from http://www.luigidragone.com /networking/ntlm .htm l.
Hardening the Base W indow s 2000 Server, from
http://www.m icrosoft.com /technet/security/prodtech/windows2000/secwin2k/swin2k06.m spx.
421.
Bill W all, Sunbelt TECH BRIEFIN G, from http://w w w.stratvantage.com /security/ntpass.htm .
422.
Security Options, from
http://www.microsoft.com/technet/security/topics/serversecurity/tcg/tcgch05n.mspx.
423.
Technical Explanation of N etw ork S M B Capture, from
http://ebook.coolersky.com /hack/lc5.04_doc/sm b_capture.htm l.
424.
Detecting Alternate Data Streams, from
http://www.windowsitpro.com /Article/ArtidelD/16189/16189.htm l.
425.
Bojan Smojver, Linux Today - ZDNet Australia: Threats M ove Beyond Linux to W indow s,
http://www.linuxtoday.com/security/2002121100426SCSVNT.
426.
Neohapsis Archives - NTBugtraq - Proposal for protection from ..., from
http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0245.html.
427.
Russell Kay, (2006), Sidebar: A Simple Rootkit Example,
http://www.computerworld.eom/securitytopics/security/hacking/story/0,10801,108116,00.html?from=s
tory_package.
428.
Russell Kay, (2006), Rootkits offer the lure of total control, from
http://www.tech world. com/security/features/index.cfm?featureid=2219.
429.
430.
Paladion Networks, from http://www.paladion.net/m edia/insights/ihfaq.htm .
NTFS Stream s - Everything you need to know (demos and tests included), from
http://www.diam ondcs.com .au/stream s/stream s.htm .
431.
H. Carvey, (2002), The Dark Side of NTFS (M icrosoft's Scarlet Letter), from
http://www.infosecwriters.com /texts.php?op=display&id=53.
432.
Stegonography (a secretly hidden coding that dates back to a n c ie n t...), from
http://www.wordinfo.info/words/index/info/view_unit/3403/?letter=S&spage=9.
433.
Ravindranath AV, Steganography: Hiding Data in Images, from
http://www.asptoday.com /Content.aspx?id=2347.
434.
Paul Robertson, (2005), CS 450 Hom ework 4, from
http://www.cs.umb.edu/~paulr/CS450/assignments/ass4.html.
435.
NBTdeputy (v 1.0.1), from http://w w w.securityfriday.com /Topics/w inxpl.htm l.
436.
Sir Dystic, (2002), N BN am e, from
http://www.securityfocus.com/comments/tools/1670/12751/threaded.
437.
Fred B. Schneider, Authentication, from http://www.cs.cornell.edu/Courses/cs513/2000sp/NL10.html.
438.
CS513: System Security - Topic Outline, from
http://www.cs.cornell.edu/courses/cs513/2005fa/02.outline.html.
439.
Security Options from
http://www.microsoft.com/technet/security/guidance/serversecurity/tcg/tcgch05n.mspx.
440.
Hardening the Base W in d o w s 2000 Server, http://technet.microsoft.com/hi-in/library/cc751216(enus).aspx.
441.
Brute force attack, from http://w w w .reference.com /brow se/w iki/Brute_force_attack.
442.
W h a t is pwdump2, from
http://w w w.bindview.com /Services/razor/Utilities/W indow s/pwdum p2_readm e.cfm .
443.
Derogee, Steganography and Steganalysis, from http://www.liacs.nl/hom e/tm oerlan/privtech.pdf.
References Page 2989
Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 15. Ethical Hacking and Countermeasures
References
444.
Exam 312-50 Certified Ethical Hacker
Techworld.com - Rootkits offer the lure of total control, from
http://www.tech world. com /websecurity/features/index.cfm ?featureid=2219&pagtype=sam ecatsam ech
an.
445.
446.
Dasmith, Softw are Analysis, from http://www.unc.edu/~sm ithdr/inlsl87/sr.htm l.
Hacking Windows-Specific Services, from
http://awkwardalliteration.com/ebooks/Computers/Hacking%20Exposed%20W indow s% 202003%20Chapter%205.pdf.
447.
Ricky M. Magalhaes, (2003), Using passwords as a defense mechanism to improve W indow s security,
from http ://w w w .w indow security.com /articles/Passw ords_lm prove_W indow s_Security_Part2.htm l.
448.
W inrtgen, from http://www.oxid.it/projects.htm l.
449.
RainbowCrack, from http://pr 0 ject-rainb 0 w crack.c 0 m/index.htm#d 0 w n l 0 a d .
450.
Elcomsoft Distributed Password Recovery, from http://w w w.elcom soft.com /edpr.htm l.
451.
Securityoverride, from http://securityoverride.org/default-password-list.
452.
Cirt, from http://cirt.net.
453.
Default-password, from http://default-password.info.
454.
Defaultpassword, from http://w w w.defaultpassw ord.us.
455.
Passwordsdatabase, from http://w w w.passwordsdatabase.com .
456.
W 3dt, from https://w3dt.net/tools/defaultpasswords/.
457.
Virus, from http://w w w.virus.org/default_passw ds.
458.
Open-sez.me, from http://open-sez.me/passwd.htm.
459.
Routerpasswords, from http://w w w.routerpasswords.com /.
460.
Fortypoundhead, from http://w w w .fortypoundhead.com /tools_dpw .asp.
461.
pwdump7, from http://www.tarasco.org/security/pwdum p_7/.
462.
fgdump, from http://www.foofus.net/~fizzgig/fgdump/.
463.
LOphtCrack, from http://www.IOphtcrack.com /download.htm l.
464.
Ophcrack, from http://ophcrack.sourceforge.net/download.php.
465.
RainbowCrack, from http://pr 0 ject-rainb 0 w crack.c 0 m/index.htm#d 0 w n l 0 a d .
466.
Password Unlocker Bundle, from http://www.passwordunlocker.com /password-recovery-bundle.htm l.
467.
Proactive System Password Recovery, from http://w w w.elcom soft.com /pspr.htm l.
468.
John the Ripper, from http://w w w.openwall.com /john/.
469.
W indow s Password Cracker, from http://www.windows-password-cracker.com /download.htm l.
470.
W inPassw ord, from http://lastbit.com /ntpsw/default.asp.
471.
Passware Kit Enterprise, from http://www.lostpassword.com /kit-enterprise.htm .
472.
PasswordsPro, from http://www.insidepro.com /eng/passwordspro.shtm l.
473.
LSASecretsView, from http://w w w.nirsoft.net/utils/lsa_secrets_view.htm l.
474.
LCP, from http://www.lcpsoft.com /english/download.htm .
475.
Password Cracker, from http://www.am lpages.com /pwdcrack.shtm l.
476.
Kon-Boot, from http://w w w.thelead82.com /kon-boot/konbootW IN.htm l.
477.
W indow s Password Recovery Tool, from http://w w w .w indow spassw ordsrecovery.com /.
478.
Hash Suite, from http://hashsuite.openw all.net/download.
479.
SAM Inside, from http://www.insidepro.com /eng/sam inside.shtm l.
References Page 2990
Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 16. Ethical Hacking and Countermeasures
References
Exam 312-50 Certified Ethical Hacker
480.
W indow s Password Recovery, from http://w w w .passcape.com /w indow s_passw ord_recovery.
481.
Password Recovery Bundle, from http://www.top-password.com/password-recovery-bundle.html.
482.
krbpwguess, from http://www.cqure.net/wp/tools/password-recovery/krbpwguess/.
483.
W indow s Password Breaker Enterprise, from http://www.recoverw indowspassw ord.com /window spassword-breaker.html.
484.
Rekeysoft W indow s Password Recovery Enterprise, from http://www.rekeysoft.com/reset-windowspassword.html.
485.
Active(® Password Changer, from http://www.password-changer.com /.
486.
Offline NT Password & Registry Editor, from http://pogostick.net/~pnh/ntpasswd/.
487.
W indow s Password Reset Kit, from http://www.reset-windows-password.net/.
488.
W indow s Password Recovery Tool, from http://w w w .w indow spassw ordsrecovery.com /.
489.
ElcomSoft System Recovery, from http://www.elcom soft.eom /esr.htm l#forgot adm inistrator password.
490.
Trinity Rescue Kit, from
http://trinityhom e.org/Hom e/index.php?content=TRINITY_RESCUE_KIT_DOW NLOAD&front_id=12&lang
=en&locale=en.
491.
W indow s Password Recovery Bootdisk, from http://www.rixler.com/windows-password-recoverybootdisk.htm.
492.
PasswordLastic, from http://www.passwordlastic.com/windows-password-recovery-lastic.
493.
Stellar Phoenix Password Recovery, from http://www.stellarinfo.com /password-recovery.htm .
494.
W indow s Password Recovery Personal, from http://w w w.window s-passw ordrecovery.com /.
495.
W indow s Adm inistrator Password Reset, from http://www.systoolsgroup.com/windows-adminstratorpassword-reset.html.
496.
RemoteExec, from http://www.isdecisions.com /products/rem oteexec.
497.
PDQ Deploy, from http://www.adm inarsenal.com /download-pdq.
498.
D am eW are NT Utilities, from http://w w w .dam ew are.ru/nt_utilities.htm l.
499.
Spytech SpyAgent, from http://www.spytech-web.com /spyagent.shtm l.
500.
All In One Keylogger, from http://w w w .relytec.com /.
501.
Ultim ate Keylogger, from http://w w w.ultim atekeylogger.com /dow nload/.
502.
Advanced Keylogger, from http://www.m ykeylogger.com /perfect-keylogger.
503.
The Best Keylogger, from http://w w w.thebestkeylogger.com /.
504.
SoftActivity Keylogger, from http://www.softactivity.com /download-al.asp.
505.
Elite Keylogger, from http://www.widestep.com/elite-keystroke-recorder-info.
506.
Pow ered Keylogger, from http://www.m ykeylogger.com /undetectable-keylogger/.
507.
StaffCop Standard, from http://w w w.staffcop.com /dow nload/.
508.
iM onitorPC, from http://w w w.im onitorpc.com /.
509.
PC Activity M onitor Standard, from http://w w w .pcacm e.com /dow nload.htm l.
510.
KeyProw ler, from http://keyprowler.com /download.aspx.
511.
Keylogger Spy Monitor, from http://ematrixsoft.com/download.php?p=keylogger-spy-monitor-software.
512.
REFOG Personal M onitor, from http://www.refog.com /personal-m onitor.htm l.
513.
Actual Keylogger, from http://www.actualkeylogger.com/download-free-key-logger.html.
514.
Spytector, from http://w w w.spytector.com /download.htm l.
References Page 2991
Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 17. Ethical Hacking and Countermeasures
References
Exam 312-50 Certified Ethical Hacker
515.
KidLogger, from http://kidlogger.net/download.htm l.
516.
PC Spy Keylogger, from http://www.pc-spy-keylogger.com.
517.
Revealer Keylogger, from http://www.logixoft.com/free-keylogger-download.
518.
Spy Keylogger, from http://www.spy-key-logger.com/download.html.
519.
Actual Spy, from http://w w w.actualspy.com /download.htm l.
520.
SpyBuddy® 2013, from http://www.exploreanywhere.com /products/spybuddy/.
521.
Amac Keylogger, from http://w w w.am ackeylogger.com /.
522.
Aobo M ac OS X KeyLogger, from http://www.keylogger-mac.com/.
523.
Perfect Keylogger for Mac, from http://www.blazingtools.com .
524.
Award Keylogger for Mac, from http://www.award-soft.com /content/view/275/136.
525.
M ac Keylogger, from http://w w w.award-soft.com /M ac_Keylogger/.
526.
REFOG Keylogger for MAC, from http://www.refog.com /m ac-keylogger.htm l.
527.
KidLogger for MAC, from http://kidlogger.net/download.htm l.
528.
MAC Log Manager, from http://www.keylogger.in/keylogger/m adogm anager.htm l.
529.
logkext, from https://c 0 de.g 0 0 gle.c 0 m/p/l0 gkext/.
530.
Keyboard Spy, from http://alphaom ega.softw are.free.fr/keyboardspy/Keyboard%20Spy.htm l.
531.
FreeMacKeylogger, from http://www.hwsuite.com/free-mac-keylogger/.
532.
KeyGrabber, from http://w w w .keydem on.com .
533.
KeyGhost, from http://w w w.keyghost.com .
534.
Activity Monitor, from http://w w w.softactivity.com /download.asp.
535.
Rem ote Desktop Spy, from http://www.global-spy-software.com /download.php.
536.
SSPro, from http://www.gpsoftdev.com /download-m onitoring-software/.
537.
RecoveryFix Em ployee Activity M onitor, from http://www.recoveryfix.com /download-em ployeemonitoring.html.
538.
Em ployee Desktop Live View er, from http://www.nucleustechnologies.com /download-em ployeedesktop-live-viewer.php.
539.
NetVizor, from http://w w w .netvizor.net/dow nload.htm .
540.
Net Spy Pro, from http://www.net-m onitoring-software.com /windows/trial.htm l.
541.
REFOG Em ployee M onitor, from http://www.refog.com /em ployee-com puter-m onitoring-software.htm l.
542.
OsMonitor, from http://www.os-m onitor.com /download.htm .
543.
LANVisor, from http://w w w.lanvisor.com /download.htm .
544.
W o rk Examiner Standard, from http://w w w.workexam iner.com /dow nload.htm l.
545.
Pow er Spy, from http://ematrixsoft.com/index.php.
546.
eBLASTER, from http://www.spectorsoft.com /products/eBlaster_Windows/index.asp?source=nav-hseBwin.
547.
!m onitor Em ployee Activity M onitor, from http://www.em ployee-m onitoring-software.ee/.
548.
Em ployee Monitoring, from http://w w w .em ployeem onitoring.net/dow nload.asp.
549.
OsMonitor, from http://www.os-m onitor.com /download.htm .
550.
Ascendant N FM , from http://www.ascendant-security.com /download.shtm l.
551.
Spylab W ebSpy, from http://w w w.spylab.org/dow nload.htm .
References Page 2992
Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 18. Ethical Hacking and Countermeasures
References
Exam 312-50 Certified Ethical Hacker
552.
Personal Inspector, from http://www.spyarsenal.com /personal-inspector/.
553.
CyberSpy, from http://w w w .cyberspysoftw are.com /dow nload.htm l.
554.
AceSpy, from http://w w w.acespy.com /features.htm l.
555.
EmailObserver, from http://w w w .softsecurity.com /prod_D 7_m ore.htm l.
556.
Net Nanny Home Suite, from
http://w w w.netnanny.com /products/netnanny_hom e_suite/detail/technical.
557.
Aobo Filter for PC, from http://www.aobo-porn-filter.com /downloads.
558.
CyberSieve, from http://www.softforyou.com /cs-download.php.
559.
Child Control, from http://salfeld.com/download/child-control/index.html.
560.
SentryPC, from http://w w w.sentrypc.com /trial.htm .
561.
iProtectYou Pro, from http://www.softforyou.com /ip-index.htm l.
562.
K9 W e b Protection, from http://w w w l.k9w ebprotection.com /getk9/dow nload-softw are.
563.
Verity Parental Control Softw are, from http://www.nchsoftware.com /childm onitoring/index.htm l.
564.
Profil Parental Filter, from http://www.profiltechnology.com /en/hom e/profil-parental-filter.
565.
PC Pandora, from http://w w w.pcpandora.com /download/.
566.
KidsWatch, from http://w w w.kidswatch.com /.
567.
SoftActivity TS Monitor, from http://w w w.softactivity.com /downloadtsm .aspx.
568.
Desktop Spy, from http://w w w.spyarsenal.com /dow nload.htm l.
569.
IcyScreen, from http://www.16software.com /icyscreen/screenshots.php.
570.
Spector Pro, from http://www.spectorsoft.com /products/SpectorPro_Windows/index.asp?source=navhs-ProWin.
571.
PC Tattletale, from http://w w w .pctattletale.com /.
572.
Computer Screen Spy Monitor, from http://w w w.m ysuperspy.com /dow nload.htm .
573.
PC Screen Spy M onitor, from http://ematrixsoft.com/download.php?p=pc-screen-spy-monitor-software.
574.
Kahlown Screen Spy Monitor, from http://w w w.lesoftrejion.com /.
575.
Guardbay Rem ote Com puter Monitoring Softw are, from http://w w w.guardbay.com .
576.
HT Em ployee Monitor, from http://w w w.hidetools.com /em ployee-m onitor.htm l.
577.
Spy Em ployee Monitor, from http://www.spysw.com /em ployee-m onitor-software.htm .
578.
USBSpy, from http://www.everstrike.com /usb-m onitor/.
579.
USB Monitor, from http://www.hhdsoftware.com /usb-m onitor.
580.
USB Grabber, from http://usbgrabber.sourceforge.net/.
581.
USBTrace, from http://w w w .sysnudeus.com /usbtrace_dow nload.htm l.
582.
USBD eview , from http://w w w.nirsoft.net/utils/usb_devices_view.htm l.
583.
Advanced USB Port Monitor, from http://www.aggsoft.com/usb-port-monitor.htm.
584.
USB M onitor Pro, from http://www.usb-monitor.com/.
585.
USB Activity Monitoring Softw are, from http://www.datadoctor.org/partition-recovery/downloads.htm l.
586.
Stealth iBot Com puter Spy, from
http://www.brickhousesecurity.com/product/stealth+ibot+computer+spy.do.
587.
KeyCarbon USB Hardware Keylogger, from http://www.spywaredirect.net/keycarbon-usb.htm l.
588.
USB 2GB Keylogger, from http://diij.com/KL2-Keylogger-2GB-USB-Hardware-keelog/prod_24.html.
References Page 2993
Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 19. Ethical Hacking and Countermeasures
References
Exam 312-50 Certified Ethical Hacker
589.
Spy Voice Recorder, from http://w w w.m ysuperspy.com /recorder.htm .
590.
Sound Snooper, from http://www.sound-snooper.com /en/download.php.
591.
W ebC am Recorder, from http://w ebcam recorder.com /.
592.
W ebcam M agic, from http://w w w.robom agic.com /w ebcam m agic.htm .
593.
M yW eb cam Broadcaster, from http://w w w.eyespyfx.com /broadcast.php.
594.
I-Can-See-You, from http://w w w .internetsafetysoftw are.com .
595.
Digi-Watcher, from http://www.digi-watcher.com /.
596.
NET Video Spy, from http://w w w.sarbash.com /download.shtm l.
597.
Eyeline Video Surveillance Softw are, from http://w w w.nchsoftware.com /surveillance/index.htm l.
598.
Capturix VideoSpy, from http://www.capturix.com /default.asp?target=consum er&product=cvs.
599.
W ebC am Looker, from http://felenasoft.com /webcam looker/en/.
600.
SecuritySpy, from http://w w w.bensoftware.com /securityspy/download.htm l.
601.
iSpy, from http://www.ispyconnect.com /download.aspx.
602.
Printer Activity Monitor, from http://www.redline-software.com /eng/products/pam /.
603.
Print M onitor Pro, from http://www.spyarsenal.com/printer-monitoring-software/print-monitor-pro/.
604.
Accurate Printer Monitor, from http://www.aggsoft.com /printer-m onitor.htm .
605.
Print Censor Professional, from http://usefuls 0 ft.c 0 m/print-cens 0 r/ # .U W P W 8 JNH LZ 4 .
606.
All-Spy Print, from http://www.all-spy.com/all-spy-print.html.
607.
O &K Print W atch, from http://w w w .prnw atch.com /okpw .htm l.
608.
Print Job Monitor, from http://www.imonitorsoft.com/product-print-job-monitor.htm.
609.
PrintTrak, from http://www.lygil.com /printtrak/printtrak.htm .
610.
Printer Admin - Copier Tracking System, from http://w w w.printeradm in.com /copy-m anagem ent.htm .
611.
Print Inspector, from http://www.softperfect.com /products/pinspector/.
612.
Print365, from http://krawasoft.com /index.htm l.
613.
M obile Spy, from http://w w w .phonespysoftw are.com /.
614.
VRS Recording System, from http://www.nch.com .au/vrs/index.htm l.
615.
M odem Spy, from http://w w w.m odem spy.com /en/dow nload.php.
616.
M obiStealth Cell Phone Spy, from http://www.mobistealth.com/mobile-phone-spy-software.
617.
SPYPhone GOLD, from http://spyera.com/products/spyphone-gold-internet.
618.
SpyPhoneTap, from http://w w w.spyphonetap.com /.
619.
FlexiSPY O M N I, from http://www.flexispy.com/en/flexispy-omni-spy-app-cell-phone.htm.
620.
SpyBubble, from http://www.spybubble.com/cell-phone-spy.php.
621.
M O BILE SPY, from http://www.m obile-spy.com /.
622.
StealthGenie, from http://w w w.stealthgenie.com /.
623.
CellSPYExpert, from http://www.cellspyexpert.com /.
624.
SPYPhone, from http://spyera.com/products/spy-phone-basic-internet.
625.
EasyGPS, from http://www.easygps.com /.
626.
FlexiSPY PRO-X, from http://www.flexispy.com/spyphone-call-interceptor-gps-tracker-symbian.htm.
627.
GPS TrackM aker Professional, from http://w w w.trackm aker.com /dwlpage.php.
628.
M O BILE SPY, from http://www.m obile-spy.com /.
References Page 2994
Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 20. Ethical Hacking and Countermeasures
References
Exam 312-50 Certified Ethical Hacker
629.
World-Tracker, from http://www.world-tracker.com /v4/.
630.
ALL-in-ONE Spy, from http://w w w.thespyphone.com /allinone.htm l.
631.
Trackstick, from http://w w w.trackstick.com /download.htm l.
632.
M obiStealth Pro, from http://w w w .m obistealth.com .
633.
mSpy, from http://w w w.buym spy.com /.
634.
GPS Retriever, from http://w w w.m obilebugstore.com /Blackberry_gps_retriver.aspx.
635.
Zemana AntiLogger, from http://www.zem ana.com /Download.aspx.
636.
Anti-Keylogger, from http://www.anti-keyloggers.com/.
637.
PrivacyKeyboard, from http://www.antikeylogger.eom /products/privacykeyboard/overview.htm l#download.
638.
DefenseW all HIPS, from http://www.softsphere.com /program s/.
639.
KeyScrambler, from http://w w w.qfxsoftw are.com /dow nload.htm .
640.
1 Hate Keyloggers, from http://dewasoft.com/privacy/i-hate-keyloggers.htm.
641.
SpyShelter STOP-LOGGER, from http://www.spyshelter.com /download-spyshelter.
642.
DataGuard AntiKeylogger Ultim ate, from http://www.maxsecuritylab.com/dataguard-antikeylogger/download-anti-keyloger.php.
643.
PrivacyKeyboard, from http://www.privacykeyboard.com /privacy-keyboard.htm l.
644.
Elite Anti Keylogger, from http://www.elite-antikeylogger.com /free-download.htm l.
645.
CoDefender, from https://www.encassa.com /downloads/default.aspx.
646.
PC Tools Spyw are Doctor, from http://www.pctools.com /spyware-doctor/.
647.
SU PERAntiSpyw are, from http://superantispyware.com /index.htm l.
648.
Spyw are Term inator 2012, from http://w w w.pcrx.com /spywareterm inator/.
649.
Ad-Aware Free Antivirus+, from http://w w w .lavasoft.com /products/ad_aw are_free.php.
650.
Norton Internet Security, from http://in.norton.com/downloads-trial-norton-internet-security.
651.
SpyHunter, from http://w w w.enigm asoftw are.com /products/.
652.
Kaspersky Internet Security 2013, from http://www.kaspersky.com/internet-security-free-trial.
653.
SecureA nyw here Complete 2012, from http://www.webroot.com /En_US/consum er-productssecureanywhere-com plete.htm l.
654.
MacScan, from http://m acscan.securem ac.com /.
655.
Spybot - Search & Destroy, from http://www.safer-networking.org/dl/.
656.
M alw arebytes Anti-M alw are PRO, from http://w w w.m alwarebytes.org/products/m alw arebytes_pro/.
657.
Fu, from http://www.f-secure.com/v-descs/fu.shtml.
658.
KBeast, from http://core.ipsecs.com/rootkit/kernel-rootkit/kbeast-vl/.
659.
Hacker Defender HxDef Rootkit, from http://vishnuvalentino.com/hacking-tutorial/hacker-defenderhxdef-rootkit-tutorial-in-1 0 -steps-nostalgia/.
660.
Stinger, from http://www.mcafee.com/us/downloads/free-tools/how-to-use-stinger.aspx.
661.
UnHackM e, from http://w w w.greatis.com /unhackm e/dow nload.htm .
662.
Virus Removal Tool, from http://www.sophos.com/en-us/products/free-tools/virus-removal-tool.aspx.
663.
Hypersight Rootkit Detector, from http://northsecuritylabs.com /.
664.
Avira Free Antivirus, from http://www.avira.com /en/avira-free-antivirus.
665.
SanityCheck, from http://w w w.resplendence.com /downloads.
References Page 2995
Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 21. Ethical Hacking and Countermeasures
References
666.
667.
Exam 312-50 Certified Ethical Hacker
G M ER , from http://w w w.gm er.net/.
Rootkit Buster, from
http://dow nloadcenter.trendm icro.com/index. php?regs=NABU&dk=result_page&dkval=drop_list&catid
=6&prodid=155.
668.
Rootkit Razor, from http://www.tizersecure.com /.
669.
Rem oveAny, from http://www.free-anti-spy.com/en/index.php.
670.
TDSSKiller, from http://support.kaspersky.com/5350?el=88446.
671.
Prevx, from http://w w w.prevx.com /freescan.asp.
672.
Stream Arm or, from http://securityxploded.com /stream arm or.php.
673.
ADS Spy, from http://www.m erijn.nu/program s.php#adsspy.
674.
ADS M anager, from http://dm itrybrant.com /adsm anager.
675.
Streams, from http://technet.microsoft.com/en-us/sysinternals/bb897440.aspx.
676.
AlternateStream View , from http://w w w .nirsoft.net/utils/alternate_data_stream s.htm l.
677.
NTFS-Streams: ADS manipulation tool, from http://sourceforge.net/projects/ntfs-ads/.
678.
Stream Explorer, from http://w w w.rekenw onder.eom /stream explorer.htm #Stream s.
679.
ADS Scanner, from http://www.pointstone.com /products/ADS-Scanner/.
680.
RKDetector, from http://w w w.rkdetector.com /.
681.
G M ER , from http://w w w.gm er.net/.
682.
HijackThis, from http://www.trendm icro.com /us/security/products/index.htm l.
683.
SN O W , from http://www.darkside.com .au/snow/index.htm l.
684.
QuickStego, from http://quickcrypto.com/free-steganography-software.html.
685.
Hide In Picture, from http://sourceforge.net/projects/hide-in-picture/.
686.
gifshuffle, from http://www.darkside.com .au/gifshuffle/index.htm l.
687.
CryptaPix, from http://www.briggsoft.com /cpix.htm .
688.
BM PSecrets, from http://bmpsecrets.com/.
689.
OpenPuff, from http://em beddedsw .net/O penPuff_Steganography_H om e.htm l.
690.
OpenStego, from http://openstego.sourceforge.net/.
691.
PHP-Class Stream Steganography, from http://www.phpclasses.org/package/6027-PHP-Store-andhidden-information-in-PNG-images.html.
692.
Red JPEG , from http://www.totalcm d.net/plugring/redjpeg.htm l.
693.
Steganography Studio
694.
Virtual Steganographic Laboratory (VSL), from http://vsl.sourceforge.net/.
695.
wbStego, from http://wbstego.wbailer.com /.
696.
Merge Streams, from http://w w w.ntkernel.com /w&p.php?id=23.
697.
Office XML, from http://www.irongeek.com/i.php?page=security/ms-office-stego-code.
698.
Data Stash, from http://w w w.skyjuicesoftware.com /software/ds_info.htm l.
699.
FoxHole, from http://foxhole.sourceforge.net.
700.
Xidie Security Suite, from http://w w w .stegano.ro.
701.
StegParty, from http://w w w.fasterlight.com .
702.
Hydan, from http://www.crazyboy.com /hydan/.
References Page 2996
, from http://stegstudio.sourceforge.net/.
Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 22. Ethical Hacking and Countermeasures
References
Exam 312-50 Certified Ethical Hacker
703.
StegJ, from http://sourceforge.net/projects/stegj/files/.
704.
StegoStick, from http://stegostick.sourceforge.net/.
705.
SN O W , from http://www.darkside.com .au/snow/index.htm l.
706.
OmniHide PRO, from http://om nihide.com /.
707.
Our Secret, from http://w w w.securekit.net/oursecret.htm .
708.
RT Steganography, from http://rtstegvideo.sourceforge.net/.
709.
Masker, from http://www.softpuls.com /m asker/.
710.
Max File Encryption, from http://www.softeza.com /fileencryption/.
711.
M SU StegoVideo, from http://w w w.com pression.ru/video/stego_video/index_en.htm l.
712.
BDV DataHider, from http://www.bdvnotepad.com /products/bdv-datahider/.
713.
StegoStick, from http://stegostick.sourceforge.net/.
714.
OpenPuff, from http://em beddedsw .net/O penPuff_Steganography_H om e.htm l.
715.
Stegsecret, from http://stegsecret.sourceforge.net/.
716.
PSM Encryptor, from http://dem o.powersoftm akers.com /psm e.zip.
717.
DeepSound, from http://jpinsoft.net/DeepSound/Download.aspx.
718.
Mp3stegz, from http://mp3stegz.sourceforge.net/.
719.
M AXA Security Tools, from http://www.maxa-tools.com/mst.php?lang=en.
720.
BitCrypt, from http://bitcrypt.moshe-szweizer.com/.
721.
MP3Stego, from http://www.petitcolas.net/fabien/steganography/m p3stego/.
722.
Hide4PGP, from http://www.heinz-repp.onlinehom e.de/.
723.
CHAOS Universal, from http://safechaos.com/cu.htm.
724.
SilentEye, from http://w w w.silenteye.org/.
725.
QuickCrypto, from http://w w w.quickcrypto.com /dow nload.htm l.
726.
CryptArkan, from
http://www.kuskov.com /com ponent/option,com _rem ository/ltem id,30/func,fileinfo/id,l/.
727.
StegoStick, from http://stegostick.sourceforge.net/.
728.
Invisible Secrets 4, from http://www.invisiblesecrets.com /.
729.
Folder Lock, from http://w w w .new softw ares.net/folderlock/.
730.
A+ Folder Locker, from http://www.giantmatrix.com/products/aplus-folder-locker/.
731.
Toolwiz BSafe, from http://www.toolwiz.com/products/toolwiz-bsafe/.
732.
Hide Folders 2012, from http://fspro.net/hide-folders/.
733.
GiliSoft File Lock Pro, from http://www.gilisoft.com/product-file-lock-pro.htm.
734.
Universal Shield, from http://w w w.everstrike.com /shield.htm .
735.
W in M e n d Folder Hidden, from http://www.winm end.com /folder-hidden/.
736.
Encrypted Magic Folders , from http://www.pc-magic.c 0 m /des.htm #em f.
737.
QuickCrypto, from http://w w w.quickcrypto.com /dow nload.htm l.
738.
Max Folder Secure, from http://w w w.m axfoldersecure.com /.
739.
Spam Mimic, from http://www.spam m im ic.com /.
740.
Sams Big G Play M aker, from http://www.scram disk.clara.net/.
741.
Gargoyle Investigator™ Forensic Pro, from http://w etst 0 netech.c 0 m/pr 0 duct/ 2 /d 0 w n l 0 ads.
References Page 2997
Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 23. Ethical Hacking and Countermeasures
References
Exam 312-50 Certified Ethical Hacker
742.
XStegsecret, from http://stegsecret.sourceforge.net/.
743.
Stego Suite, from http ://w w w .w etst 0 netech.c 0 m/pr 0 d u ct/l/d 0 w n l 0 ads.
744.
StegAlyzerAS, from http://www.sarc-wv.com/products/stegalyzeras/.
745.
StegAlyzerRTS, from http://www.sarc-wv.com/products/stegalyzerrts/.
746.
StegSpy, from http://www.spy-hunter.com /stegspy.
747.
Steg A lyzerSS, from http://www.sarc-wv.com/products/stegalyzerss/.
748.
Steg M arkSD K , from http://www.datam ark.com .sg/downloads-sdk.htm .
749.
Steganography Studio, from http://stegstudio.sourceforge.net/.
750.
Virtual Steganographic Laboratory (VSL), from http://vsl.sourceforge.net/.
751.
Stegdetect, from http://w w w.outguess.org/detection.php.
752.
Auditpol, from http://technet.microsoft.com/en-us/library/cc755264(v=ws.l0).aspx.
753.
CCIeaner, from http://w w w .piriform .com /dow nload.
754.
MRU-Blaster, from http://w w w.brightfort.com /m rublaster.htm l.
755.
W ipe, from http://privacyroot.com /softw are/w ww /en/wipe.php.
756.
Tracks Eraser Pro, from http://w w w .acesoft.net/features.htm .
757.
BleachBit, from http://bleachbit.sourceforge.net/news/bleachbit-093.
758.
AbsoluteShield Internet Eraser Pro, from http://www.internet-track-eraser.com /ineteraser.php.
759.
Clear M y History, from http://www.hide-my-ip.com/clearmyhistory.shtml.
760.
EvidenceEraser, from http://w w w .evidenceeraser.com /.
761.
W inTools.net Professional, from http://w w w .w intools.net/.
762.
RealTime Cookie & Cache Cleaner (R tC 3 ), from http://www.kleinsoft.co.za/buy.htm l.
763.
AdvaHist Eraser, from http://w w w.advacrypt.cjb.net/.
764.
Free Internet W in d o w W asher, from h ttp ://w w w .eusing .com /W indow _W ash er/W indow _W asher.htm .
M od ule 06: Trojans and Backdoors
765.
Placing Backdoors through Firewalls, from http://www.cyberwarzone.com /cyberwarfare/placingbackdoors-through-firewalls.
766.
A Deep Look into Netcat - The TCP/IP Swiss Arm y Knife, from http://www.linux-support.com/cms/adeep-look-into-netcat-the-tcpip-swiss-army-knife/.
767.
Trojans Revealed: Hackers Center: Internet Security Archive ...,
http://www.hackerscenter.com /archive/view.asp?id=24717.
768.
Dancho Danchev, The Com plete W indow s Trojans Paper, from
http://www.fram e4.com /content/pubs/com p_trojans.txt.
769.
The corporate threat posed by email Trojans, from http://www.gfisoftware.de/whitepapers/networkprotection-against-trojans.pdf.
770.
Trojan Horses, from http://www-i4.informatik.rwth-aachen.de/lufg/teaching/ss2004/dependabilitysem inar/paper/final 8 .pdf.
771.
Trojans - and how to protect your network against them, from
http://w w w .w indow security.com /w hitepapers/trojans_protect_your_netw ork.htm l.
772.
Fausi Qattan & Fredrik Thernelius, (2004), M aster's Thesis, from
http://www.dsv.su.se/research/seclab/pages/pdf-files/04-34.pdf.
773.
Malicious Intrusion Techniques, http://www.telecom worx.com /Adobe/Files39087.pdf.
References Page 2998
Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 24. Ethical Hacking and Countermeasures
References
774.
Exam 312-50 Certified Ethical Hacker
Increased use of Trojan Horse Programs, from http://www.niscc.gov.uk/niscc/docs/tn-2004021600080.html?lang=en.
775.
Anti Trojan source - How to protect your network against trojans ..., from http://news.myinstall.com/news/45/.
776.
Dancho Danchev, Trojan W h ite Paper, from http://www.anti-trojan-software-reviews.com/trojan-whitepaper-p 2 .htm.
777.
778.
Trojans, from http://w w w.em ailprivacy.info/trojans.
Rem ote Access Trojan FAQ and Port List Com puter Security - N etw ork ..., from
http://www.infosyssec.com /infosyssec/trojanportlist.htm l.
779.
W IN SN O RT.com : Intrusion Detection, from
http://www.winsnort.com /m odules.php?op=m odload&nam e=FAQ&file=index&m yfaq=yes&id_cat=13.
780.
Trojan Horse Com puter Infection Symptoms, from http://hacker-elim inator.com /trojansym ptom s.htm l.
781.
LockDown M illennium Advanced Online Help, from
http://lockdowncorp.com /m anual/TrojanlnfectionSym ptom s.htm .
782.
Commodon Communications - Threats to your Security on the Internet, from
http://w w w.com m odon.com /threat/threat-detect.htm .
783.
Van Hauser/THC, Placing Backdoors Through Firewalls, from
http://www.cgisecurity.com /lib/placing_backdoors_through_firewalls.txt.
784.
Mikejc, (2004), Tech-Recipes.com - Use System File Checker to Solve Problems, from http://www.techrecipes.com /windows_tips602.htm l.
785.
Exploring the Explodable, from http://www.guninski.com /browsers.htm l.
786.
David W ells, (1996), W rappers, from http://w w w.objs.com /survey/wrap.htm .
787.
Milly, Steve A., Stan, Ojatex, Gordon, Darius and Buzz, (2000), W ord Pad , from www.pchelp.org/security/scrap.htm.
788.
Trojans F A Q http://www.windowsecurity.com /faqs/Trojans/.
789.
Information on Com puter Viruses, from http://www-rohan.sdsu.edu/viruses.htm l.
790.
Advanced Netw ork Configuration and Troubleshooting, from http://snow.nl/dist/xhtmlc/ch05s02.html.
791.
Tom Armstrong, (2001), N etcat - The TCP/IP Swiss Arm y Knife, from
http://rn.nu/program/util/netcat/netcat.html.
792.
Microsoft - W indow s File, from Protection, from
http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/enus/system _file_protection.m spx?m fr=true.
793.
Scott W . Hotaling's, Placing Backdoors Through Firewalls, from http://masc2279.no-ip.org/gadgetstoys/internet/placing-backdoors-through-firewalls.
794.
How to block ICM P tunneling?, from https://listserv.icsalabs.com/pipermail/firewall-wizards/1999July/006060.html.
795.
796.
Newbie: Security, from http://www.unixgeeks.org/security/newbie/security/firewall.htm l.
Phrack Magazine 0 0 . Volum e Seven, Issue Forty-Nine File 06 o f ..., from
http://www.phrack.org/phrack/49/P49-06.
797.
Dancho Danchev dancho, The Complete W indow s Trojans Paper, from
http://www.astalavista.com /index.php?section=directory&linkid=640.
798.
Declan McCullagh, (2006), Case 2:00-cr-00170-WHA-VPM, from
http://www.politechbot.com /docs/feds.trojan.hacking.brief.082406.pdf.
799.
TCPView, from http://technet.microsoft.com/en-us/sysinternals/bb897437.aspx.
References Page 2999
Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 25. Ethical Hacking and Countermeasures
References
Exam 312-50 Certified Ethical Hacker
800.
CurrPorts, from http://www.nirsoft.net/utils/cports.htm l.
801.
Process Monitor, from http://technet.microsoft.com/en-in/sysinternals/bb896645.aspx.
802.
W h a t's Running, from http://w w w.whatsrunning.net/.
803.
PrcView, from http://w w w .team cti.com .
804.
W insonar, from http://w w w .few byte.com /w insonar.htm l.
805.
HiddenFinder, from http://w w w .w enpoint.com /dow nload/.
806.
Autoruns for W indow s, from http://technet.microsoft.com/en-us/sysinternals/bb963902.aspx.
807.
KillProcess, from http://orangelam psoftware.com /products_killprocess.php.
808.
Security Task Manager, from http://w w w.neuber.com /taskm anager/.
809.
Yet Another (rem ote) Process Monitor, from http://yaprocm on.sourceforge.net/.
810.
MONIT, from http://m m onit.com /m onit/.
811.
OpM anager, from http://www.m anageengine.com /network-m onitoring/process-m onitoring.htm l.
812.
j v l 6 Pow er Tools 2012, from http://www.m acecraft.com /jvl6-powertools-2012/.
813.
PC Tools Registry Mechanic, from http://www.pctools.com /registry-m echanic/.
814.
Reg Organizer, from http://w w w.chem table.com /organizer.htm .
815.
Registry Shower, from http://w w w.registryshower.com /download.htm .
816.
Comodo Cloud Scanner, from http://www.com odo.com /hom e/internet-security/cloud-scanner.php.
817.
Buster Sandbox Analyzer, from http://bsa.isoftware.nl/.
818.
All-Seeing Eyes, from http://w w w.fortego.com /en/ase.htm l.
819.
M J Registry W atcher, from http://w w w.jac 0 bsm.c 0 m/mjs 0 ft.htm #rgw tchr.
820.
Active Registry Monitor, from http://w w w.devicelock.com /arm /.
821.
SpyM e Tools, from http://www.lcibrossolutions.com /spym e_tools.htm .
822.
Regshot, from http://regshot.sourceforge.net/.
823.
Registry Live W atch , from http://leelusoft.blogspot.in/2009/ll/registry-live-watch-10.html.
824.
DriverView, from http://w w w.nirsoft.net/utils/driverview.htm l.
825.
Driver Detective, from http://w w w.drivershq.com /.
826.
Unknown Device Identifier, from http://www.zhangduo.com /udi.htm l.
827.
DriverGuide Toolkit, from http://w w w.driverguidetoolkit.com /.
828.
DriverMax, from http://www.innovative-sol.com /driverm ax/index.htm .
829.
Driver Magician, from http://www.driverm agician.com /.
830.
Driver Reviver, from http://www.reviversoft.com /driver-reviver/.
831.
DriverScanner, from http://w w w.uniblue.com /software/driverscanner/.
832.
Double Driver, from http://www.boozet.org/dd.htm .
833.
M y Drivers, from http://www.zhangduo.com /driverbackup.htm l.
834.
DriverEasy, from http://w w w.drivereasy.com /.
835.
W indow s Service M anager (SrvM an), from http://tools.sysprogs.org/srvman/.
836.
SM A R T Utility, from http://www.thewindowsclub.com/smart-a-utility-for-tweaking-windows-7-vista-xpservices.
837.
Netwrix Service Monitor, from http://w w w .netw rix.com /w indow s_services_m onitoring_freew are.htm l.
838.
Vista Services Optimizer, from http://www.sm artpcutilities.com /servicesoptim izer.htm l.
References Page 3000
Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 26. Ethical Hacking and Countermeasures
References
Exam 312-50 Certified Ethical Hacker
839.
ServiW in, from http://w w w.nirsoft.net/utils/serviwin.htm l.
840.
W indow s Service M anager Tray, from http://winservicem anager.codeplex.com /.
841.
AnVirTask M anager, from http://w w w .anvir.com /dow nload.htm .
842.
Process Hacker, from http://processhacker.sourceforge.net/downloads.php.
843.
Free W indow s Service M onitor Tool, from http://www.manageengine.com/free-windows-servicemonitor/free-windows-service-monitor-index.html.
844.
O verseer Netw ork M onitor, from http://www.overseer-network-m onitor.com /Download.aspx.
845.
Total N etw ork M onitor, from http://www.softinventive.com /products/total-network-m onitor/.
846.
Starter, from http://codestuff.tripod.com /products_starter.htm l.
847.
Security AutoRun, from http://tcpmonitor.altervista.org/startup-manager/.
848.
Absolute Startup manager, from http://w w w.absolutestartup.com /.
849.
ActiveStartup, from http://w w w.hexilesoft.com /activestartup.htm l.
850.
StartEd Lite, from http://w w w.outertech.com /en/w indows-startup.
851.
Startup Inspector, from http://w w w .window sstartup.com /startupinspector.php.
852.
Program Starter, from http://www.ab-tools.com /de/software/program m starter/.
853.
Disable Startup, from http://w w w.disablestartup.com /.
854.
StartupM onitor, from http://w w w .m lin.net/StartupM onitor.shtm l.
855.
Chameleon Startup Manager, from http://www.cham eleon-m anagers.com /downloads.php.
856.
Startup Booster, from http://w w w.sm artpctools.com /startup_booster/.
857.
FCIV, from http://www.microsoft.com/en-us/download/details.aspx?id=11533.
858.
Tripwire, from http://www.tripwire.com/it-security-software/security-configuration־management/fileintegrity-monitoring/.
859.
FastSum, from http://w w w.fastsum .com /download.php.
860.
W in M D 5 , from http://w w w .blisstonia.eom /softw are/W inM D5/#dow nload.
861.
Advanced Checksum Verifier (ACSV), from http://w w w.irnis.net/.
862.
Fsum Fronted, from http://fsum fe.sourceforge.net/.
863.
Verisys, from http://www.ionx.co.uk/products/verisys.
864.
AFICK (Another File Integrity Checker), from http://afick.sourceforge.net/.
865.
File Integrity Monitoring, from http://www.ncircle.com/index.php?s=products_ccm _file-integritymonitoring.
866.
Attribute M anager, from http://www.m iklsoft.com /attrm an/index.htm l.
867.
PA File Sight, from http://www.poweradmin.com/file-sight/index3.aspx.
868.
CSP File Integrity Checker, from http://w w w.tandem security.com /solution_14.php.
869.
ExactFile, from http://www.exactfile.com /downloads/.
870.
OSSEC, from http://www.ossec.net/?page_id= 19.
871.
W indow s Defender, from http://www.microsoft.com/en-in/download/details.aspx?id=17.
872.
M cAfee AntiVirus Plus, from http://home.mcafee.com/store/free-antivirus-trials.
873.
Norton AntiVirus, from http://us.norton.com/downloads-trial-nortonantivirus?inid= us_hho_topnav_dow nload_detail_nav.
874.
Trojan Horse Construction Kit, from
http://www.pestpatrol.eom /zks/pestinfo/t/trojan_horse_construction_kit.asp.
References Page 3001
Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 27. Ethical Hacking and Countermeasures
References
875.
Exam 312-50 Certified Ethical Hacker
Progenic Mail Trojan Construction Kit - PMT, from
http://www.sim ovits.com /trojans/tr_data/y2630.htm l.
876.
Pandora's Box, from http://greece.mrdonn.org/greekgods/pandora.html.
877.
TrojanHunter, from http://w w w.trojanhunter.com /trojanhunter/.
878.
Emsisoft Anti-Malware, from http://w w w.em sisoft.in/en/software/antim alw are/.
879.
Anti-Trojan Shield (ATS), from http://w w w.atshield.com /?r=dow nload.
880.
Spyw are Doctor, from http://www.pctools.com /spyware-doctor/download/?src=lp_sd.
881.
Anti M alw are BOCIean, from http://www.com odo.com /hom e/internet-security/anti-m alware.php.
882.
Anti Hacker, from http://www.hide-my-ip.com/antihacker.shtml.
883.
XoftSpySE, from http://www.paretologic.com/xoftspy/se/newlp/xray/.
884.
SPYW AREfighter, from http://w w w.spam fighter.com /SPYW AREfighter/.
885.
Anti Trojan Elite, from http://w w w.rem ove-trojan.com /index_ate.php.
886.
SU PERAntiSpyw are, from http://w w w.superantispyw are.com /index.htm l.
887.
Trojan Rem over, from http://w w w.sim plysup.com /trem over/download.htm l.
888.
Twister Antivirus, from http://www.filseclab.com/en-us/.
M od ule 07: Viruses and W o rm s
889.
Types of Virus, from
http://w w w .m indpride.net/root/Extras/Viruses/virus_protection_and_rem oval_ii.htm .
890.
Vulnerabilities in N etw ork Infrastructures and Prevention/Containm ent Measures, from
http://proceedings.informingscience.org/lnSITE2012/lnSITE12p053-067Awodele0012.pdf.
891.
Terminology, from http://www.f-secure.com/en/web/labs_global/terminology-f.
892.
Virus Protection, from
http://w w w .m indpride.net/root/Extras/Viruses/virus_protection_and_rem oval_iii.htm .
893.
Paul Boutin, (2003), An inside view of the w orm that crashed the Internet in 15 minutes, founder from
http://w w w .w ired.com /w ired/archive/ll.07/slam m er.htm l.
894.
Case Study: Microsoft N etw ork Hacked by QAZ Trojan, from http://www.msnbc.com/msn/482011.asp
Oct. 29, 2000.
895.
M ark Russinovich, (2008), TCPView for W in d o w s v2.53, from
http://www.sysinternals.com /Utilities/TcpView.htm l.
896.
M ark Russinowich and Bryce Cogswell, (2008), Autoruns for w indows (v 9.32), from
http://www.sysinternals.com /Utilities/Autoruns.htm l.
897.
Merijn, (2005), Hijack This (System Checker) (v 1.99.1), from
http://www.m ajorgeeks.com /download.php?det=3155.
898.
Norman Book on Com puter Viruses, from http://download.norm an.no/m anuals/eng/BOOKON.PDF.
899.
Carey Nachenberg, Understanding and Managing Polym orphic Viruses from
http://w w w.sym antec.com /avcenter/reference/striker.pdf.
900.
The Spread of the Sapphire/Slam m er W orm , from
http://www.caida.org/publications/papers/2003/sapphire/sapphire.html.
901.
Mike Gunderloy, (2003), Microsoft Certified Professional Magazine Online | N ewsletters, vol 2 # 8 , from
http://mcpmag.com /newsletter/article. asp?EditorialslD=153.
902.
R. A. Hettinga, (2003), Random Scanning W orm s and Sapphire/Slam m er's PRNG, from http://www.mailarchive.com /cryptography@ wasabisystems.com/msg03503.html.
References Page 3002
Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 28. Ethical Hacking and Countermeasures
References
Exam 312-50 Certified Ethical Hacker
903.
Information on a virus on campus, http://security.uwo.ca/antivirus/infoHistory.htm l.
904.
Virus History ־The Senior M ost Virus!!, from www.optusnet.com .au/learning/em ail/virus.
905.
Computer Knowledge Virus Tutorial, from www .m pl.org.eg/doc/eBOO Ks/vtutor.pdf.
906.
Dr. Alan Solomon and Robert M. Slade, 1990 - VX BBS & Little Black Book (AT&T Attack), 1991 - Tequila,
2001 - Gnuman, W inux Windows/Linux Virus, 2004 - Trojan.Xombe, Randex, Bizex, W itty, from
w w w .cknow.com /vtutor/HistoryofViruses.htm l.
907.
Michelangelo, DAME, & VCL, from http://library.thinkquest.org/04oct/00460/malwareHistory.html.
908.
Honeypots, Honeynets, and Intrusion Detection, from http://w w w.honeypots.net/.
909.
Featured Files, from http://packetstormsecurity.org/.
910.
BinText, from http://www.mcafee.com/apps/free-tools/termsofuse.aspxPurh/us/downloads/freetools/bintext.aspx.
911.
UPX, from http://upx.sourceforge.net/#downloadupx.
912.
Process Explorer, from http://technet.microsoft.com/en-in/sysinternals/bb896653.aspx.
913.
RegShot, from http://regshot.sourceforge.net/.
914.
OllyDbg, from http://www.ollydbg.de/.
915.
ProcDump, from http://technet.microsoft.com/en-us/sysinternals/dd996900.aspx.
916.
IDA Pro, from https://www.hex-rays.com /products/ida/support/download_dem o.shtm l.
917.
VirusTotal, from https://w ww .virustotal.com /en/.
918.
Anubis: Analyzing Unknown Binaries, from http://anubis.iseclab.org.
919.
Avast! Online Scanner, from http://onlinescan.avast.com .
920.
M alw are Protection Center, from http://www.m icrosoft.com /security/portal/.
921.
ThreatExpert, from http://w w w .threatexpert.com .
922.
Dr. W e b Online Scanners, from http://vm s.drweb.com .
923.
Metascan Online, from http://www.m etascan-online.com /.
924.
Bitdefender QuickScan, from http://w w w.bitdefender.com /scanner/online/free.htm l.
925.
GFI SandBox, from http://www.gfi.com/malware-analysis-tool.
926.
UploadM alw are.com , from U ploadM alw are.com .
927.
Fortinet, from http://www.fortiguard.com /antivirus/virus_scanner.htm l.
928.
Immunet, from http://w w w.im m unet.com /free/index.htm l.
929.
AVG Antivirus, from http://free.avg.com/in-en/homepage.
930.
BitDefender, from http://w w w.bitdefender.com /Dow nloads/.
931.
Kaspersky Anti-Virus, from http://www.kaspersky.com /trials.
932.
Trend M icro Internet Security Pro, from http://apac.trendm icro.com .
933.
Norton AntiVirus, from http://us.norton.com/downloads-trial-nortonantivirus?inid= us_hho_topnav_dow nload_detail_nav.
934.
F-Secure Anti-Virus, from http://www.f-secure.com/en/web/home_global/anti-virus.
935.
Avast Pro Antivirus, from http://www.avast.com /pro-antivirus.
936.
M cAfee AntiVirus Plus 2013, from http://home.mcafee.com/store/free-antivirus-trials.
937.
ESET Sm art Security 6 , from http://www.eset.eom /download/hom e/detail/fam ily/5/.
938.
Total Defense Internet Security Suite, from http://www.totaldefense.com /shop/total-defense-internetsecurity-suite.aspx.
References Page 3003
Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 29. Ethical Hacking and Countermeasures
References
Exam 312-50 Certified Ethical Hacker
939.
W h a t's Running, from http://w w w.whatsrunning.net/.
940.
W insonar, from http://w w w .few byte.com /w insonar.htm l.
941.
Reg Organizer, from http://w w w.chem table.com /organizer.htm .
942.
W indow s Service M anager (SrvM an), from http://tools.sysprogs.org/srvman/.
943.
ServiW in, from http://w w w.nirsoft.net/utils/serviwin.htm l.
944.
Starter, from http://codestuff.tripod.com /products_starter.htm l.
945.
Security AutoRun, from http://tcpmonitor.altervista.org/startup-manager/.
946.
FCIV, from http://www.microsoft.com/en-us/download/details.aspx?id=11533.
M od ule 08: Sniffing
947.
W h a t is Sniffer and how to detect sniffing in com puter network, from
http://www.aboutonlinetips.com/sniffer-types-and-protecting-against-sniffing/.
948.
Anatom y of an ARP Poisoning Attack, from http://www.unitedsystemsok.com/anatomy-of-an-arppoisoning-attack.
949.
950.
W h a t is AR P?, from http://w w w.antiarp.com /english_94.htm l.
Modeling and Analysis of W ireless LAN Traffic, from
http://www.dm clab.hanyang.ac.kr/files/publication/journals/international/200911_08.pdf.
951.
Dynamic ARP Inspection (DAI), from http://daxm.net/ccienotes/20100131/dynamic-arp-inspection-dai.
952.
O verview of Layer 2 Switched Networks and Communication, from
http://www.sakunsharma.in/2011/07/overview-layer-2-switched-networks-communication/.
953.
Application Protocol IPv 6 , from
http://www.ciscoexpo.ru/dub/sites/default/files/sem inar_attachm ents/ipv 6 .pdf.
954.
955.
Dynamic Host Configuration Protocol, from http://www.ietf.org/rfc/rfc2131.txt.
Understanding,Preventing,Defending Against Layer 2 Attacks, from
http://www.sanog.org/resources/sanogl5/sanogl5-yusuf-l2-security.pdf.
956.
A N ew Schem e to Check ARP Spoofing: Prevention of MAN-IN-THE-MIDDLE Attack, from
http://www.ijcsit.com/docs/Volume%202/vol2issue4/ijcsit2011020420.pdf.
957.
LAYER 2 ATTACKS & MITIGATION TECHNIQUES, from http://www.sanog.org/resources/sanog7/yusuf-L2attack-mitigation.pdf.
958.
Chris M artin, W h a t is Sniffer and how to detect Sniffing in com puter network, Available from
http://74.125.153.132/search?q=cache:Tu6yfsiaY3AJ:www.aboutonlinetips.com/sniffer-types-andprotecting-against-sniffing/+wire+sniffing+techniques&cd=25&hl=en&ct=clnk&gl=in&client=fi refox-a.
959.
Adam Barth, Secure content sniffing for W e b browsers or How to stop papers from reviewing
them selves, Available from http://www.adambarth.com/papers/2009/barth-caballero-song.pdf.
960.
Undetectable sniffing on Ethernet, Available from http://www.askapache.com/security/sniffing-onethernet-undetected.htm l.
961.
Suhas A Desai, (2007), Techniques for Preventing Sniffing, Packet Sniffing: Sniffing Tools Detection
Prevention Methods, Available from http://e-articles.info/e/a/title/Packet-Sniffing:-Sniffing-ToolsDetection-Prevention-Methods/.
962.
Suhas A Desai, (2007), Tool to Detect Sniffers, Packet Sniffing: Sniffing Tools Detection Prevention
Methods, Available from http://e-articles.info/e/a/title/Packet-Sniffing:-Sniffing-Tools-DetectionPrevention-Methods/.
963.
Identifying Nonessential Services and Attacks > Attacks, from
http://www.informit.com/articles/article.asp?p=98121&seqNum=2.
References Page 3004
Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 30. Ethical Hacking and Countermeasures
References
964.
965.
Exam 312-50 Certified Ethical Hacker
ARP cache poisoning /ARP spoofing, from http://su2.info/doc/arpspoof.php.
N etw ork m anagement, network discovery, SN M P, M IB and W M I browsers, from
w w w .netw orkview .com /htm l/features.htm l.
966.
Address Resolution Protocol (ARP), from www.erg.abdn.ac.uk/users/gorry/course/inet-pages/arp.html.
967.
Angela D. Orebaugh, (2004), Top Ten Ethereal Tips and Tricks, from
http://www.onlamp.eom/pub/a/security/2004/05/13/etherealtips.html.
968.
Packages, from http://packages.debian.org/.
969.
N etw ork Protocol Analysis, from http://w w w .m aatec.com /.
970.
The Hacker's Ethic, from http://web.textfiles.com/ezines/HWA/hwa-hn34.txt.
971.
Jarom il, Dyne:ll GNU/Linux User's Guide, from http://dynebolic.org/dynebolic-man.pdf.
972.
Address Resolution Protocol (arp), from www.erg.abdn.ac.uk/users/gorry/course/inet-pages/arp.html.
973.
Adam Barth, Juan Caballero and Dawn Song, Secure Content Sniffing for W e b Browsers, or How to Stop
Papers from Reviewing Themselves, http://www.adambarth.com/papers/2009/barth-caballerosong.pdf.
974.
Alberto Ornaghi and M arco Valleri, M an in the middle attacks,
http://www.blackhat.com/presentations/bh-europe-03/bh-europe-03-valleri.pdf.
975.
Tom Olzak, (2006), DNS Cache Poisoning: Definition and Prevention,
http://adventuresinsecurity.com /Papers/DNS_Cache_Poisoning.pdf.
976.
Sean W halen, (2001), An Introduction to Arp Spoofing,
http://w w w.rootsecure.net/content/dow nloads/pdf/arp_spoofing_intro.pdf.
977.
Daiji Sanai, (2001), Detection of Promiscuous Nodes using ARP packets,
http://w w w.securityfriday.com /prom iscuous_detection_ 0 1 .pdf.
978.
N etw ork m anagement, network discovery, SN M P, M IB and W M I browsers, from
w w w .netw orkview .com /htm l/w hat_s_new .htm l.
979.
Source Address Spoofing, from
http://www.networkcom puting.com /shared/article/showArticle.jhtm l?articleld=8702815&dassroom .
980.
Keith Brown, (1999), Security Briefs, from
http://www.microsoft.com/msj/0299/security/security0299.aspx.
981.
Corey Nachreiner, (2005), Anatom y of an ARP Poisoning Attack, from
http://www.watchguard.com /infocenter/editorial/135324.asp.
982.
macof, from http://w w w .m onkey.org.
983.
Yersinia, from http://w w w .yersinia.net/dow nload.htm .
984.
Dhcpstarv, from http://dhcpstarv.sourceforge.net/.
985.
Gobbler, from http://gobbler.sourceforge.net/.
986.
Cain & Abel, from http://www.oxid.it/cain.htm l.
987.
W inArpAttacker, from http://www.xfocus.org/index.html.
988.
Ufasoft Snif, from http://ufasoft.com/sniffer/.
989.
XArp, from http://www.chrism c.de/developm ent/xarp/index.htm l.
990.
SMAC, from http://www.klcconsulting.net/sm ac/index.htm l#download.
991.
Cascade Pilot, from http://www.riverbed.com/products-solutions/products/performancemanagement/network-infrastructure/High-Speed-Packet-Analysis.html.
992.
Tcpdump, from http://w w w.tcpdum p.org/.
993.
W inDum p, from http://w w w.winpcap.org/w indum p/default.htm .
References Page 3005
Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 31. Ethical Hacking and Countermeasures
References
Exam 312-50 Certified Ethical Hacker
994.
Capsa N etw ork Analyzer, from http://w w w.colasoft.com /dow nload/products/capsa_free.php.
995.
O m niPeek Netw ork Analyzer, from
http://w w w.wildpackets.com /products/om nipeek_network_analyzer.
996.
Observer, from http://www.networkinstrum ents.com /products/observer/index.php?tab=download.
997.
Sniff-O-Matic, from http://w w w.kw akkelflap.com /sniffer.htm l.
998.
JitB it Netw ork Sniffer, from http://w w w.jitbit.com /networksniffer/.
999.
M SN Sniffer 2, from http://www.m snsniffer.com /download/index.htm .
1000.
Ace Password Sniffer, from http://w w w.effetech.com /aps/.
1001.
RSA N etW itness Investigator, from http://w w w .em c.c 0 m /security/rsa-netwitness.htm #lfreew are.
1002.
Big-Mother, from http://w w w .tupsoft.com /dow nload.htm .
1003.
EtherD etect Packet Sniffer, from http ://w w w .etherdetect.com /dow nload.htm .
1004.
dsniff, from http://monkey.org/~dugsong/dsniff/.
1005.
EffeTech HTTP Sniffer, from http://w w w .effetech.com /dow nload/.
1006.
Ntop, from http://www.ntop.org/products/ntop/.
1007.
Ettercap, from http://ettercap.sourceforge.net/dow nloads.htm l.
1008.
SmartSniff, from http://www.nirsoft.net/utils/sm sniff.htm l.
1009.
EtherApe, from http://etherape.sourceforge.net/.
1010.
N etw ork Probe, from http://w w w.objectplanet.com /probe/.
1011.
Snort, from http://w w w.snort.org/.
1012.
Sn iffem , from http://www.sniff-em .com /download.shtm l.
1013.
MaaTec N etw ork Analyzer, from http://w w w .m aatec.com /m tna/dow nload.htm l.
1014.
Alchem y N etw ork Monitor, from http://w w w.m ishelpers.com /netw ork_m onitor/index.htm l.
1015.
Com m View, from http://www.tam os.com /download/m ain/index.php.
1016.
NetResident, from http://ww w.tam os.com /products/netresident/.
1017.
AIM Sniffer, from http://www.effetech.com /aim -sniffer/index.htm .
1018.
Netstumbler, from http://w w w.netstum bler.com /downloads/.
1019.
IE HTTP Analyzer, from http://w w w.ieinspector.com /httpanalyzer/.
1020.
MiniStum bler, from http://w w w .netstum bler.com /dow nloads.
1021.
PacketM on, from http://w w w.analogx.com /contents/dow nload/Network/pm on/Freew are.htm .
1022.
NADetector, from http://w w w .nsauditor.com /netw ork_m onitoring/nadetector_traffic_analyzer.htm l.
1023.
Microsoft Network Monitor, from http://www.microsoft.com/en-us/download/details.aspx?id=4865.
1024.
N etw orkM iner, from http://w w w .netresec.com /?page= N etw orkM iner.
1025.
N etw ork Security Toolkit, from http://www.networksecuritytoolkit.org/nst/index.htm l.
1026.
Ethereal, from http://w w w .ethereal.com /.
1027.
KSniffer, from http://ksniffer.sourceforge.net/index.php?section=download.
1028.
IPgrab, from http://ipgrab.sourceforge.net/.
1029.
W ebSiteSniffer, from http://w w w.nirsoft.net/utils/w eb_site_sniffer.htm l.
1030.
ICQ Sniffer, from http://w w w.etherboss.com /icq/download.htm .
1031.
URL Helper, from http://w w w.urlhelper.com /index.htm .
1032.
W ebCookiesSniffer, from http://w w w.nirsoft.net/utils/w eb_cookies_sniffer.htm l.
References Page 3006
Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.