Ce hv8 references

1,128 views
1,027 views

Published on

Published in: Technology, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,128
On SlideShare
0
From Embeds
0
Number of Embeds
6
Actions
Shares
0
Downloads
78
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Ce hv8 references

  1. 1. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker M o d u le 01: Introduction to Ethical Hacking 1. Zero-day attacks are meaner, more ram pant than w e ever thought, from http://arstechnica.com/security/ 2 0 1 2 / 10 /zero-day-attacks-are-meaner-and-more-plentiful-thanthought/. 2. SECURITY POLICY: TARGET, CONTENT, & LINKS, from http://csrc.nist.gov/nissc/1998/proceedings/paperG4.pdf. 3. Anatom y of the Hack - Hands-on Security, from http://www.slideshare.net/NewBU/anatomy-of-thehack-handson-security-information-assurance-dub. 4. Hacker methodology, from http://w w w.hackersecuritym easures.com /. 5. Ethical Hacking, from w w w .secured eath.co m . 6. C. C. Palmer, Ethical hacking from http://researchweb.watson.ibm .com /journal/sj/403/palm er.htm l. 7. An O verview of Com puter Security, from www.cc.gatech.edu/classes/AY2005/cs4803cns_fall/security_overview.ppt. 8. Dr. Death, (2006), Ethical Hacking, from http://w w w .securedeath.com . 9. Ethical Hacking, from http://neworder.box.sk/news/921. 10. How are Penetrating Testing conducted?, from w w w .corsaire.co m . 11. Ethical Hacking: The Security Justification Redux, from http://www.sosresearch.org/publications/ISTAS02ethicalhack.PDF. 12. Ethical Hacking, from w ww.sosresearch.org/publications. 13. Ethical Hacking, from w w w .research.ibm .com . 14. Covering Tracks, from http://rootprom pt.org. 15. Attack, from http://www.linuxsecurity.com /content/view/17/70/. 16. Security Issues in W ireless M A G N ET at Networj Layer, from http://csce.unl.edu/~jaljaroo/publications/TR02-10-07.pdf. 17. Glossary of Security and Internet terms, from http://wssg.berkeley.edu/Securitylnfrastructure/glossary.htm l. 18. Glossary of Vulnerability Testing Terminology, from http://www.ee.oulu.fi/research/ouspg/sage/glossary/. 19. Information about hackers, from http://w w w .antionline.com /. 20. Information about hackers, from http://w2.eff.org/Net_culture/Hackers/. 21. LEX LUTHOR, information about hackers, from http://bak.spc.org/dms/archive/britphrk.txt. 22. Information about hackers, from http://directory.google.com/Top/Computers/Hacking/. 23. Information about hackers, from http://directory.google.com/Top/Computers/Security/Hackers/. 24. Information about hackers, from http://bak.spc.org/dms/archive/profile.html. References Page 2976 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  2. 2. Ethical Hacking and Countermeasures References 25. Exam 312-50 Certified Ethical Hacker Information about hackers, from http://dir.yahoo.com /Com puters_and_lnternet/Security_and_Encryption/Hacking/. M o d u le 02: Footprinting and Reconnaissance 26. Search Operators, from http://w w w.googleguide.com /advanced_operators.htm l. 27. The Complete W indow s Trojans Paper, from http://w w w .w indow security.com /w hitepapers/trojans/The_C om plete_W indow s_Trojans_Paper.htm l. 28. Naples, (2008), Information Gathering Tools, Available from http://it.toolbox.com /wiki/index.php/lnform ation_Gathering_Tools. 29. 30. Extract W ebsite Information from archive.org, Available from w w w .archive.org . Footprinting, from http://www.ethicalhacker.net/com ponent/option,com _sm f/ltem id,49/topic,228.m sg672. 31. Simson Garfinkel and David Cox, (2009), Finding and Archiving the Internet Footprint, http://simson.net/clips/academic/2009.BL.lnternetFootprint.pdf. 32. 33. CHAPTER 2 [FOOTPRINTING], from http://www.ecqurity.com /wp/footprinting-encored.pdf. Donna F. Cavallini and Sabrina 1 PACIFICI, Got COM PETITIVE INTELLIGENCE, . http://www.llrx.com /features/gotci.ppt. 34. Spam m ers & hackers: using the APNIC W hois Database to find in their network, from http://www.apnic.net/info/faq/abuse/using_whois.htm l. 35. P. Mockapetris, (1987), DOM AIN N A M ES - CONCEPTS AND FACILITIES, from htt p ://w w w .ie tf.0 rg/ rf c/ rf c 1034. txt. 36. M anic Velocity, Footprinting And The Basics Of Hacking, from http://web.textfiles.com/hacking/footprinting.txt. 37. Dean, (2001), W indow s 2000 Command Prom pt Troubleshooting Tools, from http://www.pcm ech.com /show/troubleshoot/192/. 38. nslookup Command, from http://publib. boulder. ibm.com/infocenter/pseries/v5r3/index.jsp?topic=/com.ibm.aix.doc/cmds/aixcmd s4/nslookup.htm. 39. 40. The nslookup M anual Page, from http://www.stopspam .org/usenet/m m f/m an/nslookup.htm l. Bob Hillery, (2001), Neohapsis Archives - Incidents list - Re: Finding out w ho owns ..., from http://archives.neohapsis.com/archives/incidents/2001-01/0032.html. 41. Ryan Spangler, (2003), Analysis of Rem ote Active Operating System Fingerprinting Tools, from http://w w w.packetw atch.net/docum ents/papers/osdetection.pdf. 42. Ryan Spangler, (2003), Analysis of Rem ote Active Operating System Fingerprinting Tools, from http://w w w.securiteam .com /securityreviews/5ZP010UAAI.htm l. 43. Fingerprint methodology: IPID sampling, from http://www.insecure.org/nmap/nmap-fingerprintingold.html. 44. Fyodor, (1998), Rem ote OS detection via TCP/IP Stack Fingerprinting, from http://www.donkboy.com /htm l/fingerprt.htm . 45. Rem ote OS Detection, from http://nmap.org/book/osdetect.html. 46. Regional Internet Registry, from http://en.wikipedia.org/wiki/Regional_lnternet_Registry. 47. Boy Scouts, Fingerprinting from http://onin.eom/fp/fpmeritbdg.html#top. 48. The Hacker's Choice, from http://freeworld.thc.org/welcom e/. 49. THC Fuzzy Fingerprint, from http://freeworld.thc.org/thc-ffp/. References Page 2977 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  3. 3. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 50. Katherine Knickerbocker, CJ625 Student Paper, from http://all.net/CID/Attack/papers/Spoofing.html. 51. Arik R. Johnson, W h a t is com petitive intelligence? How does com petitive ..., from http://aurorawdc.com /whatisci.htm . 52. Guangliang (Benny), (2006), Spamming and hacking, from http://www.apnic.net/info/faq/abuse/using_whois.htm l. 53. Dhillon, (2006), Footprinting: The Basics of Hacking: Hack In The Box, from http://www.hackinthebox.org/modules.php?op=modload&name=News&file=article&sid=5359&mode=t hread&order= 0 &thold= 0 . 54. Roshen, (2006), Paladion - Customers - Success Stories - Penetration Testing, from http://paladion.net/pentration_testing.php. 55. Paul Thompson, (2006), Cognitive Hacking and Digital Governm ent: Digital Identity, from http://www.ists.dartm outh.edu/library/chd0803.pdf. 56. Greg Sandoval, (2006), M PA A accused of hiring a hacker, from http://news.com.com/MPAA+accused+of+hiring+a+hacker/2100-1030_3-6076665.html. 57. Kurt Seifried, (2005), Closet20001213 Backdoors, Back Channels and HTTP(S), from http://www.seif ried.org/security/index.php/Closet20001213_Backdoors,_Back_Channels_and_HTTP(S). 58. Happy Browser, (2005), from http://www.hotscripts.com /Detailed/39030.htm l. 59. Client-server architecture, from http://w w w.netw orkintrusion.co.uk/N_scan.htm . 60. Elegant architecture: NASI, from http://www.nessus.org/features/. 61. The Signatures, from http://www.honeynet.org/papers/finger/. 62. Ryan Spangler, (2003), Analysis of Rem ote Active Operating System Fingerprinting Tools, Nmap t o o l: technique, from http://w w w.securiteam .com /securityreviews/5ZP010UAAI.htm l. 63. Bew are!: W a r dialing, Sandstorm Sandtrap 1.5 W ard ia le r Detector Plus 16 and Basic Detectors, from http://w w w .data-connect.com /Santstorm _PhoneSw eep.htm . 64. Appendix A - Glossary of Terms: IPSEC, from http://www.im sglobal.org/gws/gwsvlpO/im sgws_securityProfvlpO .htm l. 65. Def. and info. Vulnerability scanning, from http://www.webencanto.com /com puter_glossary/Com m unications/Ethics/vulnerability_scanning.htm l. 66. Footprinting, from http://books.mcgrawhill. com/downloads/products//0072193816/0072193816_ch01. pdf]. 67. P. Mockapetris, Zvon - RFC 1034 [DO M AIN N A M ES - CONCEPTS AND FACILITIES] - DOMAIN..., from http://www.zvon.org/tmRFC/RFC1034/Output/chapter3.html. 68. Gaurav, (2006), The Domain Name System (DNS), from http://people.csa.iisc.ernet.in/gaurav/np/rfcs/dns.html. 69. Using the Internet for Com petitive Intelligence, from http://www.cio.com /CIO/arch_0695_cicolum n.htm l. 70. Reporting network abuse: Spamming and hacking, from http://www.apnic.net/info/faq/abuse/using_whois.htm l. 71. Bastian Ballmann, (2011), Information gathering tools, from http://www2.packetstormsecurity.org/cgibin/search/search.cgi?searchvalue=information+gathering&type=archives&[search].x= 0 &[search].y= 0 . 72. Google Earth, from http://www.google.com /earth/index.htm l. 73. pipl,from https://pipl.com/. 74. spokeo, from http://w w w.spokeo.com . 75. Zaba Search, from http://w w w.zabasearch.com . References Page 2978 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  4. 4. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 76. 123 People Search, from http://w w w.123people.com . 77. Zoomlnfo, from http://w w w.zoom info.com . 78. PeekYou, from http://w w w .peekyou.com . 79. W in k People Search, from http://wink.com . 80. Intelius, from http://w w w.intelius.com . 81. A n yW ho , from http://w w w .anyw ho.com . 82. PeopleSm art, from http://w w w .peoplesm art.com . 83. People Lookup, from https://w ww .peoplelookup.com . 84. W hitePages, from http://w w w .w hitepages.com . 85. Facebook, from https://w ww .facebook.com /. 86. Linkedln, from http://w w w.linkedin.com . 87. Google+, from https://plus.google.com. 88. Twitter, from http://twitter.com . 89. Google Finance, from http://finance.google.com /finance. 90. Yahoo Finance, from http://finance.yahoo.com . 91. Zaproxy, from https://code.google.eom/p/zaproxy/downloads/list. 92. Burp Suite, from http://portswigger.net/burp/download.htm l. 93. Firebug, from https://getfirebug.com/downloads/. 94. HTTrack W eb site Copier, from http://w w w.httrack.c 0 m/page/ 2 /. 95. BlackW idow , from http://softbytelabs.com /us/downloads.htm l. 96. W ebripper, from http://w w w.calluna-software.com /W ebripper. 97. SurfOffline, from http://w w w.surfoffline.com /. 98. W ebsite Ripper Copier, from http://w w w.tensons.com /products/w ebsiterippercopier/. 99. PageNest, from http://w w w .pagenest.com . 100. Teleport Pro, from http://w w w.tenm ax.com /teleport/pro/download.htm . 101. Backstreet Browser, from http://www.spadixbd.com /backstreet/. 102. Portable Offline Browser, from http://w w w .m etaproducts.com /Portable_O ffline_Brow ser.htm . 103. Offline Explorer Enterprise, from http://w w w .m etaproducts.com /offline_explorer_enterprise.htm . 104. Proxy Offline Browser, from http://www.proxy-offline-browser.com/. 105. GNU W get, from ftp://ftp.gnu.org/gnu/wget/. 106. iMiser, from http://internetresearchtool.com . 107. Hooeey W ebprint, from http://www.hooeeywebprint.com.s3-website-us-eastl.am azonaws.com /dow nload.htm l. 108. W ayback M achine, from http://archive.org/web/web.php. 109. W ebSite-W atcher, from http://aignes.com /download.htm . 110. eM ailTrackerPro, from http://w w w .em ailtrackerpro.com . 111. PoliteM ail, from http://w w w .politem ail.com . 112. Email Lookup - Free Email Tracker, from http://w w w.ipaddresslocation.org. 113. Read Notify, from http://w w w .readnotify.com . 114. Pointofmail, from http://w w w .pointofm ail.com . References Page 2979 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  5. 5. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 115. DidTheyReadlt, from http://w w w .didtheyreadit.com . 116. Super Email M arketing Softw are, from http://www.bulk-email-marketing-software.net. 117. Trace Email, from http://whatismyipaddress.com/trace-email. 118. W h o R e a d M e , from http://w horeadm e.com . 119. MSGTAG, from http://www.m sgtag.com /download/free/. 120. GetNotify, from http://w w w .getnotify.com . 121. Zendio, from http://w w w.zendio.com /download. 122. G-Lock Analytics, from http://glockanalytics.com. 123. EDGAR Database, from http://w w w .sec.gov/edgar.shtm l. 124. Hoovers, from http://w w w .hoovers.com . 125. LexisNexis, from http://www.lexisnexis.com . 126. Business W ire , from http://w w w.businesswire.com . 127. M arket W atch, from http://w w w .m arketw atch.com . 128. The W all Street T ra n scrip t, from http://w w w .tw st.com . 129. Upper M arketplace, from http://w w w .lipperm arketplace.com . 130. Eurom onitor, from http://w w w .eurom onitor.com . 131. Fagan Finder, from http://w w w.faganfinder.com . 132. SEC Info, from http://w w w .secinfo.com . 133. The Search Monitor, from http://w w w .thesearchm onitor.com . 134. Compete PRO™, from http://w w w .com pete.com . 135. Copernic Tracker, from http://w w w.copernic.com . 136. ABI/IN FO RM Global, from http://w w w .proquest.com . 137. SEM Rush, from http://w w w.sem rush.com . 138. AttentionM eter, from http://w w w .attentionm eter.com . 139. Jobitorial, from http://w w w .jobitorial.com . 140. Google Hacking Database, from http://w w w.hackersforcharity.org. 141. M etaGoofil, from http://www.edge-security.com . 142. Google Hack Honeypot, from http://ghh.sourceforge.net. 143. Goolink Scanner, from http://w w w.ghacks.net. 144. GM apCatcher, from http://code.google.com. 145. SiteDigger, from http://w w w .m cafee.com . 146. SearchDiggity, from http://w w w.stachliu.com . 147. Google Hacks, from http://code.google.com. 148. Google HACK DB, from http://w w w .secpoint.com . 149. BiLE Suite, from http://w w w.sensepost.com . 150. Gooscan, from http://w w w.darknet.org.uk. 151. W H O IS Lookup at DomainTools.com, from http://whois.dom aintools.com /. 152. Domain Dossier, from http://centralops.net/co. 153. Sm artW hois, from http://www.tam os.com /download/m ain/index.php. 154. CountryW hois, from http://www.tam os.com /products/countrywhois/. References Page 2980 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  6. 6. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 155. W h o is Analyzer Pro, from http://w w w.whoisanalyzer.com /dow nload.opp. 156. LanWhols, from http://lantricks.com/download/. 157. HotW hois, from http://w w w.tialsoft.com /download/?url=http://ww w .tialsoft.com /hwhois.exe. 158. Batch IP Converter, from http://w w w .netw orkm ost.com /dow nload.htm . 159. W hois 2010 Pro, from http://lapshins.com/. 160. CallerIP, from http://w w w.callerippro.com /dow nload.htm l. 161. ActiveW hois, from http://w w w.johnru.com /. 162. W h o is Lookup M ultiple Addresses, from http://www.sobolsoft.com /. 163. WhoisThisDom ain, from http://w w w.nirsoft.net/utils/w hois_this_dom ain.htm l. 164. Sm artW hois, from http://sm artwhois.com . 165. W hois, from http://tools.whois.net. 166. Better W hois, from http://w w w .betterw hois.com . 167. DNSstuff, from http://w w w.dnsstuff.com . 168. W hois Source, from http://www.whois.se. 169. N etw ork Solutions Whois, from http://w w w.netw orksolutions.com . 170. W e b Wiz, from http://www.webwiz.co.uk/domain-tools/whois-lookup.htm. 171. W ebToolHub, from http://www.webtoolhub.com/tn561381-whois-lookup.aspx. 172. Network-Tools.com, from http://network-tools.com. 173. Ultra Tools, from https://w ww .ultratools.com /w hois/hom e. 174. dnsstuff, from http://w w w.dnsstuff.com /. 175. network-tools, from http://network-tools.com/. 176. DNS Queries, from http://www.dnsqueries.com /en/. 177. DIG, from http://www.kloth.net/services/dig.php. 178. myDNSTools, from http://www.m ydnstools.info/nslookup. 179. DN SW atch, from http://w w w .dnsw atch.info. 180. DomainTools, from http://w w w.dom aintools.com . 181. Professional Toolset, from http://www.dnsstuff.com /tools. 182. DNS, from http://e-dns.org. 183. DNS Records, from http://network-tools.com. 184. DNS Lookup Tool, from http://www.webwiz.co.uk/domain-tools/dns-records.htm. 185. DNSData View, from http://w w w .nirsoft.net. 186. DNS Query Utility, from http://w w w.webm aster-toolkit.com . 187. W H O IS-RW S, from http://whois.arin.net/ui. 188. Netcraft, from http://searchdns.netcraft.com /Phost. 189. Shodan, from http://w w w.shodanhq.com /. 190. Path Analyzer Pro, from http://w w w.pathanalyzer.com /dow nload.opp. 191. VisualRoute 2010, from http://w w w .visualroute.com /dow nload.htm l. 192. N etw ork Pinger, from http://w w w.netw orkpinger.eom /en/dow nloads/#dow nload. 193. Magic NetTrace, from http://w w w.tialsoft.com /download/?url=http://ww w .tialsoft.com /m NTr.exe. 194. GEO Spider, from http://oreware.com /viewprogram .php?prog=22. References Page 2981 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  7. 7. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 195. 3D Traceroute, from http://w w w .d3tr.de/dow nload.htm l. 196. vTrace, from http://vtrace.pl/download.htm l. 197. AnalogX HyperTrace, from http://w w w.analogx.com /contents/dow nload/N etwork/htrace/Freeware.htm . 198. Trout, from http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/freetools/trout.aspx. 199. N etw ork Systems Traceroute, from http://w w w .net.princeton.edu/traceroute.htm l. 200. Roadkil's Trace Route, from http://www.roadkil.net/program .php/P27/Trace%20Route 201. Ping Plotter, from http://w w w .pingplotter.com . 202. myiptest, from http://www.myiptest.com/staticpages/index.php/how-about-you. 203. Maltego, from http://w w w.paterva.com /web6/products/download4.php. 204. Domain Name Analyzer Pro, from http://www.domainpunch.com/domain-name-analyzerpro/download.php. 205. W e b Data Extractor, from http://w w w .w ebextractor.com . 206. Prefix W hois, from http://pwhois.org. 207. Netmask (IRPAS), from http://w w w.phenoelit.org/irpas/dow nload.htm l. 208. Binging, from http://w w w.blueinfy.com /tools.htm l. 209. Tctrace (IRPAS), from http://w w w.phenoelit.org/irpas/dow nload.htm l. 210. Spiderzilla, from http://spiderzilla.mozdev.org/installation.html. 211. Autonom ous System Scanner (ASS) (IRPAS), from http://w w w.phenoelit.org/irpas/dow nload.htm l. 212. Sam Spade, from http://w w w.m ajorgeeks.com /Sam _Spade_d594.htm l. 213. DNS DIGGER, from http://www.dnsdigger.com . 214. Robtex, from http://w w w.robtex.com . 215. Dig W e b Interface, from http://w w w.digw ebinterface.com 216. SpiderFoot, from http://sourceforge.net/projects/spiderfoot/?so.urce=dlp. 217. Domain Research Tool, from http://w w w .dom ainresearchtool.com . 218. CallerIP, from http://w w w.callerippro.com /dow nload.htm l. 219. ActiveW hois, from http://w w w .johnru.com . 220. Zaba Search, from http://www.zabasearch.com /. 221. yoNam e, from http://yonam e.com . 222. GeoTrace, from http://www.nabber.org/projects/geotrace/. 223. Ping-Probe, from http://www.ping-probe.com/Ping-Probe/index.html. 224. DomainHostingView, from http://w w w .nirsoft.net. M o d u le 03: Scanning N etw orks 225. Explanation of the Three-W ay Handshake via TCP/IP, from http://support.microsoft.com/kb/172983. 226. Appendix G. Lists of reserved ports, ICM P types and codes, and Internet protocols, from http://www.ingate.com /files/422/fwm anual-en/xal0285.htm l. 227. 228. The Art of Port Scanning - by Fyodor, from http://nm ap.org/nm ap_doc.htm l. M ethods of IP N etw ork Scanning - Stealth TCP Scanning Methods, from http://w w w .c 0 dewalkers.c 0 m/c/a/Server-Administrati0 n /M eth 0 ds-0 f-IP-Netw 0 rk-Scanning/ 3 /. References Page 2982 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  8. 8. Ethical Hacking and Countermeasures References 229. Exam 312-50 Certified Ethical Hacker W h a t is Port Scanning and Types of Port Scanning, from http://www.hackillusion.com/what-is-portscanning-and-types-of-port-scanning/. 230. UDP Scan, from http://www.networkuptim e.com /nm ap/page3-10.shtm l. 231. Hacking Exposed, from http://www.scribd.com/doc/62708034/Hacking-Exposed-Book. 232. N etw ork Security Assessment, from https://w w w .trustm atta.com /dow nloads/pdf/M atta_IP_N etw ork_Scanning.pdf. 233. Quick-Tip: SSH Tunneling M ade Easy, from http://www.revsys.com/writings/quicktips/ssh-tunnel.html. 234. Detecting Spoofed Packets, from http://seclab.cs.ucdavis.edu/papers/DetectingSpoofed-DISCEX.pdf. 235. Scanning modes: FIN, Xmas, Null, from http://www.openxtra.co.uk/support/howto/nmap-scanmodes.php. 236. Port scanning techniq:sW (W in d o w scan), from http://www.paulisageek.com /nm ap/index.htm l. 237. Prabhaker M ateti, UDP Scanning, from http://www.cs.wright.edu/~pmateti/Courses/499/Probing/. 238. FTP server bounce attack, TCP Fragmenting, Intrusion detection systems use signature-based mechanisms, from http://www.in-f-or.it/informatica/docs/portscan.pdf. 239. Laura Chappell, (2003), OS Fingerprinting W ith ICM P: ICM P echo, from http://www.securitypronews.com /it/security/spn-23-200309290SFingerprintingwithlCMP.htm l. 240. 241. Scan Type-sF -sX -sN, from http://content.ix2.net/arc/t-4370.html. Unixo3/introduction to Nmap, from http://www.sam hart.com /cgi‫־‬ bin/classnotes/wiki.pl?UNIX03/lntroduction_To_Nm ap. 242. Fyodor, (2006), Art of port scanning: Features, Ideal scanning and related IPID games, Nmap: discription, Fingerprint methadology: IPID samplingBounce attacks worked, Techniqe: TCP reverse ident scanning, from http://w w w.insecure.org/nm ap/nm ap_doc.htm l. 243. Antirez, hping2(8) - Linux man page: Discription, Hping2 Commands, from http://www.hping.org/m anpage.htm l. 244. Chris McNab, (2008), Third Party IP N etw ork Scanning Methods, Available from http://w w w .c 0 dewalkers.c 0 m/c/a/Server-Administrati0 n/Third-Party-IP-Netw 0 rk-Scanning-Meth 0 ds/. 245. Thierry Lagarde , AutoScan Network, Available from http://autoscannetwork.com/index. php?option=com_content&task=view&id=48&ltemid=32. 246. Onion Routing, Available from http://dictionary.zdnet.com/definition/onion+routing.html. 247. Van Geelkerken F.W .J, (2006), Digital Mixing (M IX nets), Available from http://www.iusm entis.com /society/privacy/rem ailers/onionrouting/. 248. Keith J. Jones, M ike Shema, & Bradley C. Johnson, Vulnerability Scanners, from w ww.foundstone.com /pdf/books/AntiHackerSam ple.pdf. 249. Examining Port Scan Methods- Analysing Audible Techniques, from http://www.in-for.it/informatica/docs/portscan.pdf. 250. IM S General W e b Services Security Profile, http://w w w.im sglobal.org/gws/gw svlpO/im sgw s_securityProfvlpO .htm l. 251. Bew are!: W a r dialing, from http://w w w.castlecops.com /al361-W ar_dialing.htm l. 252. Simson L. Garfinkel, Autom atic Parity Detection, from http://archive.cert.unistuttgart.de/archive/bugtraq/1998/12/msg00215.html. 253. Lance M ueller, CREATE A REVERSE SSH TUNNEL, http ://w w w .lancem ueller.com /blog/C reate%20Reverse%20SSH %20to%20reach%20servlet%20inside%2 Ofirewall.pdf. References Page 2983 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  9. 9. Ethical Hacking and Countermeasures References 254. Exam 312-50 Certified Ethical Hacker Avi Kak, (2010), Port Scanning, Vulnerability Scanning, Packet Sniffing, and Intrusion Detection, http://cobweb.ecn.purdue.edu/~kak/com psec/NewLectures/Lecture23.pdf. 255. Renaud Deraison, Ron Gula, and Todd Hayton, (2009), Passive Vulnerability Scanning Introduction, http://nessus.org/whitepapers/passive_scanning_tenable.pdf. 256. Cheng Guang, TCP Analysis Based on Flags, http://www.nordu.net/development/2nd-cnnw/tcp-analysisbased-on-flags.pdf. 257. Cheng Tang & Jonathan Gossels, (1999), Wardialing: Practical Advice to Understand Your Exposure, http://www.system experts.com /assets/tutors/wardial0299.pdf. 258. N etw ork Security Library, from http://w w w.window security.com /w hitepapers/m isc/Exam ining_port_scan_m ethods__ Analyzing_Audibl e_Te. 259. Lance Cottrell, Anonym izer Limitations: Logs, from http://www.livinginternet.eom /i/is_anon.htm . 260. Michel Leconte, (2006), N etw ork security consulting, from http://www.activsupport.com/SmallBusiness-Network-Security-Soluti. 261. 262. Angry IP Scanner, from http://angryip. 0 rg/w/D 0 w n l 0 a d . SolarW inds Engineer's Toolset, from http://downloads.solarwinds.com/solarwinds/Release/Toolset/ZPToolset/ZP-Toolset-Ol.html. 263. 264. Colasoft Ping Tool, from http://w w w.colasoft.com /dow nload/products/dow nload_ping_tool.php. PacketTrap M SP, from http://www.packettrap.com/download?hsCtaTracking=e95ec5b5-069f-4cd5962c-9c0e6e32a6da%7C072dfe23-353f-46c2-9ab0-la27d39c01fl. 265. 266. Visual Ping Tester - Standard, from http://w w w .pingtester.net. Ping Sw eep (Integrated into W hatsupG old), from http://www.whatsupgold.com /products/download/network_m anagem ent.aspx?k_id=ping-sweep-tool. 267. Ping Scanner Pro, from http://www.digilextechnologies.com . 268. N etw ork Ping, from http://www.greenline-soft.com /product_network_ping/index.aspx. 269. Ultra Ping Pro, from http://ultraping.webs.com /downloads.htm . 270. Ping Monitor, from http://w w w.niliand.com . 271. PinglnfoView, from http://w w w.nirsoft.net/utils/m ultiple_ping_tool.htm l. 272. Pinkie, from http://w w w.ipuptim e.net/category/download/. 273. Colasoft Packet Builder, from http://w w w.colasoft.com /dow nload/products/dow nload_packet_builder.php. 274. NetScanTools Pro, from http://w w w.netscantools.com /nstprodem orequestform .htm l. 275. PRTG N etw ork M onitor, from http://w w w.paessler.com /dow nload/prtg. 276. Global Network Inventory Scanner, from http://w w w .m agnetosoft.com /products/global_network_inventory/gni_features.htm . 277. Net Tools, from http://m absoft.com /nettools.htm . 278. SoftPerfect Netw ork Scanner, from http://w w w.softperfect.com /products/netw orkscanner/. 279. IP Tools, from http://www.ks-soft.net/ip-tools.eng/downpage.htm. 280. Advanced Port Scanner, from http://www.radm in.com /dow nload/previousversions/portscanner.php. 281. MegaPing, from http://www.m agnetosoft.com /products/m egaping/m egaping_features.htm . 282. Netifera, from http://netifera.com . 283. N etw ork Inventory Explorer, from http://www.10strike.com /networkinventoryexplorer/download.shtm l. References Page 2984 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  10. 10. Ethical Hacking and Countermeasures References 284. Exam 312-50 Certified Ethical Hacker Free Port Scanner, from http://w w w .nsauditor.eom /netw ork_tools/free_port_scanner.htm l#.U W JRvqLzvrw . 285. ID Serve, from http://w w w.grc.com . 286. Netcraft, from http://toolbar.netcraft.com . 287. Netcat, from http://sourceforge.net/projects/netcat/files/latest/download?source=files. 288. GFI LanGuard, from http://www.gfi.com/downloads/mirrors.aspx?pid=lanss. 289. SAINT, from http://w w w.saintcorporation.com /products/software/saintScanner.htm l. 290. Retina CS, from http://www.beyondtrust.com/Landers/TY-Page-RetinaCSCommunity/index.html. 291. OpenVAS, from http://w w w .openvas.org. 292. Core Impact Professional, from http://w w w .coresecurity.com . 293. Security M anager Plus, from http://www.manageengine.com/products/securitymanager/download, html. 294. Nexpose, from http://www.rapid7.com /products/nexpose/com pare-downloads.jsp. 295. Shadow Security Scanner, from http://www.safety-lab.com /en/download.htm . 296. QualysGuard, from http://w w w.qualys.com . 297. Nsauditor Netw ork Security Auditor, from http://w w w.nsaudit 0 r.c 0 m /netw 0 rk_security/netw 0 rk_security_audit 0 r.htm l#.UW KEx 6 Lzvrw. 298. 299. Security Auditor's Research Assistant (SARA), from http://www-arc.com /sara/. LANsurveyor, from http://www.solarwinds.com/register/MoreSoftware.aspx?External=false&Program=17592&c=70150000 OOOPjNE. 300. OpM anager, from http://www.m anageengine.com /network-m onitoring/download.htm l. 301. N etw orkView , from http://w w w .netw orkview .com /htm l/dow nload.htm l. 302. The Dude, from http://w w w.m ikrotik.com /thedude. 303. LANState, from http://www.10-strike.com /lanstate/download.shtm l. 304. HP Network Node M anager i software, from http://w w w 8 .hp.com/us/en/softwaresolutions/software. html?compURI=1170657#. 305. FriendlyPinger, from http://www.kilievich.com /fpinger/download.htm . 306. N etM apper, from http://w w w .opnet.com . 307. Ipsonar, from http://w w w.lum eta.com /product/product.htm l. 308. NetBrain Enterprise Suite, from http://www.netbraintech.com /instant-trial/. 309. CartoReso, from http://cartoreso.cam pus.ecp.fr. 310. Spiceworks-Network M apper, from http://w w w.spicew orks.com /dow nload/. 311. Switch Center Enterprise, from http://www.lan-secure.c 0 m/d 0 w n l 0 ads.htrn#netw 0 rk. 312. NetCrunch, from http://www.adrem soft.com /dem o/downloadproduct. php?product=nc7&file=NCServer7Premium. exe. 313. Proxy W orkbench, from http://proxyworkbench.com/. 314. Proxifier, from http://w w w.proxifier.com /dow nload.htm . 315. Proxy Switcher, from http://w w w.proxysw itcher.com /. 316. SocksChain, from http://ufasoft.com/socks/. 317. TOR (The Onion Routing), from https://w ww .torproject.org/download/dow nload. References Page 2985 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  11. 11. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 318. Proxy, from http://www.analogx.com /conter 1 ts/download/N etw ork/proxy/Freeware.htm . 319. Proxy Commander, from http://www.dlao.com /proxycm d/. 320. Protoport Proxy Chain, from http://w w w .protoport.com . 321. Proxy Tool W indow s App, from http://webproxylist.com/proxy-tool-windows-app/. 322. Proxy+, from http://www.proxyplus.cz/. 323. Gproxy, from http://gpassl.com /gproxy.php. 324. FastProxySwitch, from http://www.affinity-tools.com/fps/. 325. Fiddler, from http://www.fiddler2.com /fiddler2/version.asp. 326. ProxyFinder Enterprise, from http://www.proxy-tool.com . 327. Socks Proxy Scanner, from http://w w w .m ylanview er.com . 328. ezProxy, from https://w ww . 0 clc.0 rg/ezpr0 xy/d 0 w n l 0 ad.en.h.tm l. 329. Charles, from http://www.charlesproxy.com /. 330. JA P Anonym ity and Privacy, from http://anon.inf.tu-dresden.de/win/download_en.htm l. 331. UltraSurf, from http://w w w.ultrasurf.us. 332. CC Proxy Server, from http://www.youngzsoft.net/ccproxy/proxy-server-download.htm. 333. W ideCap, from http://w idecap.ru. 334. FoxyProxy Standard, from https://addons.mozilla.org. 335. ProxyCap, from http://w w w.proxycap.com . 336. Super N etw ork Tunnel, from http://w w w .netw orktunnel.net. 337. HTTP-Tunnel, from http://www.http-tunnel.com . 338. Bitvise, from http://w w w .bitvise.com . 339. Psiphon, from http://psiphon.ca. 340. Your-Freedom, from http://w w w.your-freedom .net. 341. Just Ping, from http://www.just-ping.com. 342. W ebSitePulse, from http://w w w .w ebsitepulse.com . 343. G-Zapper, from http://w w w.dum m ysoftw are.com /gzapper.htm l. 344. M ow ser, from http://w w w .m ow ser.com . 345. Spotflux, from http://w w w.spotflux.com . 346. Anonym ous W e b Surfing Tool, from http://www.anonym ous-surfing.com . 347. U-Surf, from http://ultim ate-anonym ity.com . 348. Hide Your IP Address, from http://w w w .hideyouripaddress.net. 349. W arpProxy, from http://silent-surf.com. 350. Anonymizer Universal, from http://w w w.anonym izer.com . 351. Hope Proxy, from http://w w w.hopeproxy.com . 352. Guardster, from http://w w w.guardster.com . 353. Hide M y IP, from http://www.privacy-pro.com /features.htm l. M o d u le 04: Enum eration 354. rpcinfo, from http://www.usoft.spb.ru/com m ands/rpcinfo/. 355. RPCCLIENT, from http://w w w .sarata.com /m anpages/m anl/rpcclient.htm l. References Page 2986 Ethical Hacking and Countermeasures Copyright © by EC-C0l1nCil All Rights Reserved. Reproduction is Strictly Prohibited.
  12. 12. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 356. Enum eration, from http://w w w.edenofire.com /tutes/hack.php. 357. smtp-user-enum User Docum entation, from http://pentestmonkey.net/tools/user-enumeration/smtpuser-enum. 358. Chris Gates, (2006), W indow s Enum eration: USER2SID & SID2USER, from http://w w w.window security.com /w hitepaper/W indow s-Enum eration-USER2SID-SID2USER.htm l. 359. W h a t is S N M P ?, from http://www.wtcs.org/snm p4tpc/snm p.htm . 360. SN M P, from http://w w w.cisc 0 .c0 m/univercd/cc/td/d 0 c/cisintwk/it 0 _ d 0 c/snmp.htm#xt 0 cid 5 . 361. SN M PForDum m ies, from http://w iki.outboundindex.net/SNM PForDum m ies. 362. Jan van Oorschot, Jeroen W orte lb o e r and Dirk W isse, (2001), S N M P - The Mission Statem ent, http://www.securityfocus.com/infocus/1301. 363. rp c in fo (lM ), from http://docs.hp.com /en/B2355-90692/rpcinfo.lM.htm l. 364. GRAPE- INFO- DOT- COM, from http://www.grape-info.com . 365. Joris Evers, (2006), AT&T hack exposes 19,000 identities, from http://news.cnet.com/2100-1029_36110765.html. 366. S N M P from http://w w w .iss.net/security_center/advice/Reference/N etw orking/SN M P/default.htm . 367. Simple Netw ork M anagem ent Protocol (SN M P), from http://www.cisco.com /en/US/docs/internetworking/technology/handbook/SNM P.htm l. 368. Linux / Unix finger command, from http://www.com puterhope.com /unix/ufinger.htm . 369. Chris Gates, (2006), W in d o w s Enum eration: USER2SID & SID2USER http://w w w.window security.com /w hitepapers/W indows-Enum eration-USER2SID-SID2USER.htm l. 370. SuperScan, from http://www.m cafee.com /us/downloads/free-tools/superscan.aspx. 371. Hyena, from http://w w w.system tools.com /hyena/trial_dow nload.htm . 372. Winfingerprint, from http://w w w.winfingerprint.com . 373. N etBIO S Enum erator, from http://nbtenum .sourceforge.net/. 374. PsTools, from http://technet.microsoft.com/en-us/sysinternals/bb897553.aspx. 375. OpUtils, from http://www.m anageengine.com /products/oputils/download.htm l. 376. SolarW ind 's IP Netw ork Browser, from http://www.solarwinds.com/engineers-toolset/ip-networkbrowser, aspx. 377. Getif, from http://www.wtcs.org/snm p4tpc/getif.htm . 378. O iD ViEW S N M P M IB Browser, from http://w w w .oidview .com /m ibbrow ser.htm l. 379. iReasoning M IB Browser, from http://ireasoning.com /m ibbrowser.shtm l. 380. SNScan, from http://www.mcafee.com/us/downloads/free-tools/snscan.aspx. 381. S N M P Scanner, from http://www.secure-bytes.com /SNM P+Scanner.php. 382. S N M P Informant, from http://www.snm p-inform ant.com /. 383. Net-SNMP, from http://net-snm p.sourceforge.net/download.htm l. 384. Nsauditor Netw ork Security Auditor, from http://w w w.nsaudit 0 r.c 0 m /netw 0 rk_security/netw 0 rk_security_audit 0 r.htm l#.UV 7 LH 5 NHLZ 4 . 385. Spiceworks, from http://www.spiceworks.com/free-snmp-network-management-software/. 386. Enum4linux, from http://labs.portcullis.co.uk/application/enum4linux/. 387. Softerra LDAP Administrator, from http://w w w.ldapadm inistrator.com /. 388. JXplorer, from http://www.jxplorer.org/. 389. LDAP Admin Tool, from http://w w w.ldapsoft.com /ldapbrowser/ldapadm intool.htm l. References Page 2987 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  13. 13. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 390. LDAP Account M anager, from https://www.ldap-account-manager.org/lamcms/. 391. LEX - The LDAP Explorer, from http://w w w.ldapexplorer.com /. 392. LDAP Admin, from http://www.ldapadm in.org/. 393. Active Directory Explorer, from http://technet.microsoft.com/en-us/sysinternals/bb963907.aspx. 394. LDAP Administration Tool, from http://sourceforge.net/projects/ldap-at/. 395. LDAP Search, from http://securityxploded.com/ldapsearch.php. 396. Active Directory Domain Services M anagem ent Pack, from http://www.microsoft.com/enus/download/details.aspx?id=21357. 397. LDAP Browser/Editor, from http://www.novell.com /coolsolutions/tools/13765.htm l. 398. NSLookup, from http://www.kloth.net/services/nslookup.php. M o d u le 05: System Hacking 399. W h y Keyloggers are extrem ely dangerous?, from http://gamecreator.hubpages.com/hub/WhyKeyloggers-are-extremely-dangerous. 400. Steganography in Depth, from http://www.crcnetbase.com/doi/abs/10.1201/9780203504765.ch4. 401. Detecting spoofed packets, from http://ieeexplore.ieee.0rg/xpl/articleDetails.jsp?arnumber=1194882. 402. NTLM Authentication in Java, from http://www.luigidragone.com/software/ntlm-authentication-in-java/. 403. A Tutorial Review on Steganography, from http://www.jiit.ac.in/jiit/ic3/IC3_2008/IC32008/APP2_21.pdf. 404. 405. network scanning, from http://searchm idm arketsecurity.techtarget.com /definition/network-scanning. Ricky M. Magalhaes, (2004), Using passwords as a defense mechanism to improve W indow s security, from w w w .w ind ow security.com /artid es/Passw ord s_lm p rove_W ind ow s_Security_Part2 .htm l. 406. Piazza & Peter, (2002), Hybrid threats have rosy future: attacks that combine virus ..., http://findartides.com /p/articles/m i_hb6380/is_200207/ai_n25618875?tag=content;coll. 407. 408. Andreas W estfeld and Andreas Pfitzmann, Attacks on Steganographic Systems, citeseerx.ist.psu.edu/. DaijiSanai and HidenobuSeki, (2004), Optimized Attack for NTLM2 Session Response http://www.blackhat.com/presentations/bh-asia-04/bh-jp-04-pdfs/bh-jp-04-seki.pdf. 409. Zhi W ang, Xuxian Jiang, W eidong Cui, and Xinyuan W ang, Countering Persistent Kernel Rootkits Through System atic Hook Discovery, http://research.microsoft.com/en-us/um/people/wdcui/papers/hookmapraid08.pdf. 410. Elia Florio, W hen M alw are M eets Rootkits, http://w w w .sym antec.com /avcenter/reference/w hen.m alw are.m eets.rootkits.pdf. 411. 412. Peter Piazza, (2002), SM O : Tech Talk, from http://www.securitym anagem ent.com /library/001272.htm l. Brute force attack - Wikipedia, the free encyclopedia, from http://en.wikipedia.org/w iki/Brute_force_attack. 413. 414. Talk:Brute force attack - Bvio, from http://bvio.ngic.re.kr/Bvio/index.php/Talk:Brute_force_attack. Passwords, from http://searchsecurity.techtarget.com /searchSecurity/downloads/HackingforDum m iesCh07.pdf. 415. Authernative, Inc. | Products | FAQs, from http://w w w.authernative.com /faqs.shtm l. 416. CIAC Notes, from http://www.ciac.org/ciac/notes/Notes03a.shtm l. 417. Path: new shost.uw o.caluw ovax.uw o.calm neville From: m neville@ uw ovax ..., from http://w w w.uwo.ca/its/doc/newsletters/lnTouch/voll-9495/w inl8.txt. 418. The Hack FAQ: Password Basics, from http://www.nmrc.org/pub/faq/hackfaq/hackfaq-04.html. References Page 2988 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  14. 14. Ethical Hacking and Countermeasures References 419. 420. Exam 312-50 Certified Ethical Hacker Luigi Dragone, NTLM Authentication in Java, from http://www.luigidragone.com /networking/ntlm .htm l. Hardening the Base W indow s 2000 Server, from http://www.m icrosoft.com /technet/security/prodtech/windows2000/secwin2k/swin2k06.m spx. 421. Bill W all, Sunbelt TECH BRIEFIN G, from http://w w w.stratvantage.com /security/ntpass.htm . 422. Security Options, from http://www.microsoft.com/technet/security/topics/serversecurity/tcg/tcgch05n.mspx. 423. Technical Explanation of N etw ork S M B Capture, from http://ebook.coolersky.com /hack/lc5.04_doc/sm b_capture.htm l. 424. Detecting Alternate Data Streams, from http://www.windowsitpro.com /Article/ArtidelD/16189/16189.htm l. 425. Bojan Smojver, Linux Today - ZDNet Australia: Threats M ove Beyond Linux to W indow s, http://www.linuxtoday.com/security/2002121100426SCSVNT. 426. Neohapsis Archives - NTBugtraq - Proposal for protection from ..., from http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0245.html. 427. Russell Kay, (2006), Sidebar: A Simple Rootkit Example, http://www.computerworld.eom/securitytopics/security/hacking/story/0,10801,108116,00.html?from=s tory_package. 428. Russell Kay, (2006), Rootkits offer the lure of total control, from http://www.tech world. com/security/features/index.cfm?featureid=2219. 429. 430. Paladion Networks, from http://www.paladion.net/m edia/insights/ihfaq.htm . NTFS Stream s - Everything you need to know (demos and tests included), from http://www.diam ondcs.com .au/stream s/stream s.htm . 431. H. Carvey, (2002), The Dark Side of NTFS (M icrosoft's Scarlet Letter), from http://www.infosecwriters.com /texts.php?op=display&id=53. 432. Stegonography (a secretly hidden coding that dates back to a n c ie n t...), from http://www.wordinfo.info/words/index/info/view_unit/3403/?letter=S&spage=9. 433. Ravindranath AV, Steganography: Hiding Data in Images, from http://www.asptoday.com /Content.aspx?id=2347. 434. Paul Robertson, (2005), CS 450 Hom ework 4, from http://www.cs.umb.edu/~paulr/CS450/assignments/ass4.html. 435. NBTdeputy (v 1.0.1), from http://w w w.securityfriday.com /Topics/w inxpl.htm l. 436. Sir Dystic, (2002), N BN am e, from http://www.securityfocus.com/comments/tools/1670/12751/threaded. 437. Fred B. Schneider, Authentication, from http://www.cs.cornell.edu/Courses/cs513/2000sp/NL10.html. 438. CS513: System Security - Topic Outline, from http://www.cs.cornell.edu/courses/cs513/2005fa/02.outline.html. 439. Security Options from http://www.microsoft.com/technet/security/guidance/serversecurity/tcg/tcgch05n.mspx. 440. Hardening the Base W in d o w s 2000 Server, http://technet.microsoft.com/hi-in/library/cc751216(enus).aspx. 441. Brute force attack, from http://w w w .reference.com /brow se/w iki/Brute_force_attack. 442. W h a t is pwdump2, from http://w w w.bindview.com /Services/razor/Utilities/W indow s/pwdum p2_readm e.cfm . 443. Derogee, Steganography and Steganalysis, from http://www.liacs.nl/hom e/tm oerlan/privtech.pdf. References Page 2989 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  15. 15. Ethical Hacking and Countermeasures References 444. Exam 312-50 Certified Ethical Hacker Techworld.com - Rootkits offer the lure of total control, from http://www.tech world. com /websecurity/features/index.cfm ?featureid=2219&pagtype=sam ecatsam ech an. 445. 446. Dasmith, Softw are Analysis, from http://www.unc.edu/~sm ithdr/inlsl87/sr.htm l. Hacking Windows-Specific Services, from http://awkwardalliteration.com/ebooks/Computers/Hacking%20Exposed%20W indow s% 202003%20Chapter%205.pdf. 447. Ricky M. Magalhaes, (2003), Using passwords as a defense mechanism to improve W indow s security, from http ://w w w .w indow security.com /articles/Passw ords_lm prove_W indow s_Security_Part2.htm l. 448. W inrtgen, from http://www.oxid.it/projects.htm l. 449. RainbowCrack, from http://pr 0 ject-rainb 0 w crack.c 0 m/index.htm#d 0 w n l 0 a d . 450. Elcomsoft Distributed Password Recovery, from http://w w w.elcom soft.com /edpr.htm l. 451. Securityoverride, from http://securityoverride.org/default-password-list. 452. Cirt, from http://cirt.net. 453. Default-password, from http://default-password.info. 454. Defaultpassword, from http://w w w.defaultpassw ord.us. 455. Passwordsdatabase, from http://w w w.passwordsdatabase.com . 456. W 3dt, from https://w3dt.net/tools/defaultpasswords/. 457. Virus, from http://w w w.virus.org/default_passw ds. 458. Open-sez.me, from http://open-sez.me/passwd.htm. 459. Routerpasswords, from http://w w w.routerpasswords.com /. 460. Fortypoundhead, from http://w w w .fortypoundhead.com /tools_dpw .asp. 461. pwdump7, from http://www.tarasco.org/security/pwdum p_7/. 462. fgdump, from http://www.foofus.net/~fizzgig/fgdump/. 463. LOphtCrack, from http://www.IOphtcrack.com /download.htm l. 464. Ophcrack, from http://ophcrack.sourceforge.net/download.php. 465. RainbowCrack, from http://pr 0 ject-rainb 0 w crack.c 0 m/index.htm#d 0 w n l 0 a d . 466. Password Unlocker Bundle, from http://www.passwordunlocker.com /password-recovery-bundle.htm l. 467. Proactive System Password Recovery, from http://w w w.elcom soft.com /pspr.htm l. 468. John the Ripper, from http://w w w.openwall.com /john/. 469. W indow s Password Cracker, from http://www.windows-password-cracker.com /download.htm l. 470. W inPassw ord, from http://lastbit.com /ntpsw/default.asp. 471. Passware Kit Enterprise, from http://www.lostpassword.com /kit-enterprise.htm . 472. PasswordsPro, from http://www.insidepro.com /eng/passwordspro.shtm l. 473. LSASecretsView, from http://w w w.nirsoft.net/utils/lsa_secrets_view.htm l. 474. LCP, from http://www.lcpsoft.com /english/download.htm . 475. Password Cracker, from http://www.am lpages.com /pwdcrack.shtm l. 476. Kon-Boot, from http://w w w.thelead82.com /kon-boot/konbootW IN.htm l. 477. W indow s Password Recovery Tool, from http://w w w .w indow spassw ordsrecovery.com /. 478. Hash Suite, from http://hashsuite.openw all.net/download. 479. SAM Inside, from http://www.insidepro.com /eng/sam inside.shtm l. References Page 2990 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  16. 16. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 480. W indow s Password Recovery, from http://w w w .passcape.com /w indow s_passw ord_recovery. 481. Password Recovery Bundle, from http://www.top-password.com/password-recovery-bundle.html. 482. krbpwguess, from http://www.cqure.net/wp/tools/password-recovery/krbpwguess/. 483. W indow s Password Breaker Enterprise, from http://www.recoverw indowspassw ord.com /window spassword-breaker.html. 484. Rekeysoft W indow s Password Recovery Enterprise, from http://www.rekeysoft.com/reset-windowspassword.html. 485. Active(® Password Changer, from http://www.password-changer.com /. 486. Offline NT Password & Registry Editor, from http://pogostick.net/~pnh/ntpasswd/. 487. W indow s Password Reset Kit, from http://www.reset-windows-password.net/. 488. W indow s Password Recovery Tool, from http://w w w .w indow spassw ordsrecovery.com /. 489. ElcomSoft System Recovery, from http://www.elcom soft.eom /esr.htm l#forgot adm inistrator password. 490. Trinity Rescue Kit, from http://trinityhom e.org/Hom e/index.php?content=TRINITY_RESCUE_KIT_DOW NLOAD&front_id=12&lang =en&locale=en. 491. W indow s Password Recovery Bootdisk, from http://www.rixler.com/windows-password-recoverybootdisk.htm. 492. PasswordLastic, from http://www.passwordlastic.com/windows-password-recovery-lastic. 493. Stellar Phoenix Password Recovery, from http://www.stellarinfo.com /password-recovery.htm . 494. W indow s Password Recovery Personal, from http://w w w.window s-passw ordrecovery.com /. 495. W indow s Adm inistrator Password Reset, from http://www.systoolsgroup.com/windows-adminstratorpassword-reset.html. 496. RemoteExec, from http://www.isdecisions.com /products/rem oteexec. 497. PDQ Deploy, from http://www.adm inarsenal.com /download-pdq. 498. D am eW are NT Utilities, from http://w w w .dam ew are.ru/nt_utilities.htm l. 499. Spytech SpyAgent, from http://www.spytech-web.com /spyagent.shtm l. 500. All In One Keylogger, from http://w w w .relytec.com /. 501. Ultim ate Keylogger, from http://w w w.ultim atekeylogger.com /dow nload/. 502. Advanced Keylogger, from http://www.m ykeylogger.com /perfect-keylogger. 503. The Best Keylogger, from http://w w w.thebestkeylogger.com /. 504. SoftActivity Keylogger, from http://www.softactivity.com /download-al.asp. 505. Elite Keylogger, from http://www.widestep.com/elite-keystroke-recorder-info. 506. Pow ered Keylogger, from http://www.m ykeylogger.com /undetectable-keylogger/. 507. StaffCop Standard, from http://w w w.staffcop.com /dow nload/. 508. iM onitorPC, from http://w w w.im onitorpc.com /. 509. PC Activity M onitor Standard, from http://w w w .pcacm e.com /dow nload.htm l. 510. KeyProw ler, from http://keyprowler.com /download.aspx. 511. Keylogger Spy Monitor, from http://ematrixsoft.com/download.php?p=keylogger-spy-monitor-software. 512. REFOG Personal M onitor, from http://www.refog.com /personal-m onitor.htm l. 513. Actual Keylogger, from http://www.actualkeylogger.com/download-free-key-logger.html. 514. Spytector, from http://w w w.spytector.com /download.htm l. References Page 2991 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  17. 17. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 515. KidLogger, from http://kidlogger.net/download.htm l. 516. PC Spy Keylogger, from http://www.pc-spy-keylogger.com. 517. Revealer Keylogger, from http://www.logixoft.com/free-keylogger-download. 518. Spy Keylogger, from http://www.spy-key-logger.com/download.html. 519. Actual Spy, from http://w w w.actualspy.com /download.htm l. 520. SpyBuddy® 2013, from http://www.exploreanywhere.com /products/spybuddy/. 521. Amac Keylogger, from http://w w w.am ackeylogger.com /. 522. Aobo M ac OS X KeyLogger, from http://www.keylogger-mac.com/. 523. Perfect Keylogger for Mac, from http://www.blazingtools.com . 524. Award Keylogger for Mac, from http://www.award-soft.com /content/view/275/136. 525. M ac Keylogger, from http://w w w.award-soft.com /M ac_Keylogger/. 526. REFOG Keylogger for MAC, from http://www.refog.com /m ac-keylogger.htm l. 527. KidLogger for MAC, from http://kidlogger.net/download.htm l. 528. MAC Log Manager, from http://www.keylogger.in/keylogger/m adogm anager.htm l. 529. logkext, from https://c 0 de.g 0 0 gle.c 0 m/p/l0 gkext/. 530. Keyboard Spy, from http://alphaom ega.softw are.free.fr/keyboardspy/Keyboard%20Spy.htm l. 531. FreeMacKeylogger, from http://www.hwsuite.com/free-mac-keylogger/. 532. KeyGrabber, from http://w w w .keydem on.com . 533. KeyGhost, from http://w w w.keyghost.com . 534. Activity Monitor, from http://w w w.softactivity.com /download.asp. 535. Rem ote Desktop Spy, from http://www.global-spy-software.com /download.php. 536. SSPro, from http://www.gpsoftdev.com /download-m onitoring-software/. 537. RecoveryFix Em ployee Activity M onitor, from http://www.recoveryfix.com /download-em ployeemonitoring.html. 538. Em ployee Desktop Live View er, from http://www.nucleustechnologies.com /download-em ployeedesktop-live-viewer.php. 539. NetVizor, from http://w w w .netvizor.net/dow nload.htm . 540. Net Spy Pro, from http://www.net-m onitoring-software.com /windows/trial.htm l. 541. REFOG Em ployee M onitor, from http://www.refog.com /em ployee-com puter-m onitoring-software.htm l. 542. OsMonitor, from http://www.os-m onitor.com /download.htm . 543. LANVisor, from http://w w w.lanvisor.com /download.htm . 544. W o rk Examiner Standard, from http://w w w.workexam iner.com /dow nload.htm l. 545. Pow er Spy, from http://ematrixsoft.com/index.php. 546. eBLASTER, from http://www.spectorsoft.com /products/eBlaster_Windows/index.asp?source=nav-hseBwin. 547. !m onitor Em ployee Activity M onitor, from http://www.em ployee-m onitoring-software.ee/. 548. Em ployee Monitoring, from http://w w w .em ployeem onitoring.net/dow nload.asp. 549. OsMonitor, from http://www.os-m onitor.com /download.htm . 550. Ascendant N FM , from http://www.ascendant-security.com /download.shtm l. 551. Spylab W ebSpy, from http://w w w.spylab.org/dow nload.htm . References Page 2992 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  18. 18. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 552. Personal Inspector, from http://www.spyarsenal.com /personal-inspector/. 553. CyberSpy, from http://w w w .cyberspysoftw are.com /dow nload.htm l. 554. AceSpy, from http://w w w.acespy.com /features.htm l. 555. EmailObserver, from http://w w w .softsecurity.com /prod_D 7_m ore.htm l. 556. Net Nanny Home Suite, from http://w w w.netnanny.com /products/netnanny_hom e_suite/detail/technical. 557. Aobo Filter for PC, from http://www.aobo-porn-filter.com /downloads. 558. CyberSieve, from http://www.softforyou.com /cs-download.php. 559. Child Control, from http://salfeld.com/download/child-control/index.html. 560. SentryPC, from http://w w w.sentrypc.com /trial.htm . 561. iProtectYou Pro, from http://www.softforyou.com /ip-index.htm l. 562. K9 W e b Protection, from http://w w w l.k9w ebprotection.com /getk9/dow nload-softw are. 563. Verity Parental Control Softw are, from http://www.nchsoftware.com /childm onitoring/index.htm l. 564. Profil Parental Filter, from http://www.profiltechnology.com /en/hom e/profil-parental-filter. 565. PC Pandora, from http://w w w.pcpandora.com /download/. 566. KidsWatch, from http://w w w.kidswatch.com /. 567. SoftActivity TS Monitor, from http://w w w.softactivity.com /downloadtsm .aspx. 568. Desktop Spy, from http://w w w.spyarsenal.com /dow nload.htm l. 569. IcyScreen, from http://www.16software.com /icyscreen/screenshots.php. 570. Spector Pro, from http://www.spectorsoft.com /products/SpectorPro_Windows/index.asp?source=navhs-ProWin. 571. PC Tattletale, from http://w w w .pctattletale.com /. 572. Computer Screen Spy Monitor, from http://w w w.m ysuperspy.com /dow nload.htm . 573. PC Screen Spy M onitor, from http://ematrixsoft.com/download.php?p=pc-screen-spy-monitor-software. 574. Kahlown Screen Spy Monitor, from http://w w w.lesoftrejion.com /. 575. Guardbay Rem ote Com puter Monitoring Softw are, from http://w w w.guardbay.com . 576. HT Em ployee Monitor, from http://w w w.hidetools.com /em ployee-m onitor.htm l. 577. Spy Em ployee Monitor, from http://www.spysw.com /em ployee-m onitor-software.htm . 578. USBSpy, from http://www.everstrike.com /usb-m onitor/. 579. USB Monitor, from http://www.hhdsoftware.com /usb-m onitor. 580. USB Grabber, from http://usbgrabber.sourceforge.net/. 581. USBTrace, from http://w w w .sysnudeus.com /usbtrace_dow nload.htm l. 582. USBD eview , from http://w w w.nirsoft.net/utils/usb_devices_view.htm l. 583. Advanced USB Port Monitor, from http://www.aggsoft.com/usb-port-monitor.htm. 584. USB M onitor Pro, from http://www.usb-monitor.com/. 585. USB Activity Monitoring Softw are, from http://www.datadoctor.org/partition-recovery/downloads.htm l. 586. Stealth iBot Com puter Spy, from http://www.brickhousesecurity.com/product/stealth+ibot+computer+spy.do. 587. KeyCarbon USB Hardware Keylogger, from http://www.spywaredirect.net/keycarbon-usb.htm l. 588. USB 2GB Keylogger, from http://diij.com/KL2-Keylogger-2GB-USB-Hardware-keelog/prod_24.html. References Page 2993 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  19. 19. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 589. Spy Voice Recorder, from http://w w w.m ysuperspy.com /recorder.htm . 590. Sound Snooper, from http://www.sound-snooper.com /en/download.php. 591. W ebC am Recorder, from http://w ebcam recorder.com /. 592. W ebcam M agic, from http://w w w.robom agic.com /w ebcam m agic.htm . 593. M yW eb cam Broadcaster, from http://w w w.eyespyfx.com /broadcast.php. 594. I-Can-See-You, from http://w w w .internetsafetysoftw are.com . 595. Digi-Watcher, from http://www.digi-watcher.com /. 596. NET Video Spy, from http://w w w.sarbash.com /download.shtm l. 597. Eyeline Video Surveillance Softw are, from http://w w w.nchsoftware.com /surveillance/index.htm l. 598. Capturix VideoSpy, from http://www.capturix.com /default.asp?target=consum er&product=cvs. 599. W ebC am Looker, from http://felenasoft.com /webcam looker/en/. 600. SecuritySpy, from http://w w w.bensoftware.com /securityspy/download.htm l. 601. iSpy, from http://www.ispyconnect.com /download.aspx. 602. Printer Activity Monitor, from http://www.redline-software.com /eng/products/pam /. 603. Print M onitor Pro, from http://www.spyarsenal.com/printer-monitoring-software/print-monitor-pro/. 604. Accurate Printer Monitor, from http://www.aggsoft.com /printer-m onitor.htm . 605. Print Censor Professional, from http://usefuls 0 ft.c 0 m/print-cens 0 r/ # .U W P W 8 JNH LZ 4 . 606. All-Spy Print, from http://www.all-spy.com/all-spy-print.html. 607. O &K Print W atch, from http://w w w .prnw atch.com /okpw .htm l. 608. Print Job Monitor, from http://www.imonitorsoft.com/product-print-job-monitor.htm. 609. PrintTrak, from http://www.lygil.com /printtrak/printtrak.htm . 610. Printer Admin - Copier Tracking System, from http://w w w.printeradm in.com /copy-m anagem ent.htm . 611. Print Inspector, from http://www.softperfect.com /products/pinspector/. 612. Print365, from http://krawasoft.com /index.htm l. 613. M obile Spy, from http://w w w .phonespysoftw are.com /. 614. VRS Recording System, from http://www.nch.com .au/vrs/index.htm l. 615. M odem Spy, from http://w w w.m odem spy.com /en/dow nload.php. 616. M obiStealth Cell Phone Spy, from http://www.mobistealth.com/mobile-phone-spy-software. 617. SPYPhone GOLD, from http://spyera.com/products/spyphone-gold-internet. 618. SpyPhoneTap, from http://w w w.spyphonetap.com /. 619. FlexiSPY O M N I, from http://www.flexispy.com/en/flexispy-omni-spy-app-cell-phone.htm. 620. SpyBubble, from http://www.spybubble.com/cell-phone-spy.php. 621. M O BILE SPY, from http://www.m obile-spy.com /. 622. StealthGenie, from http://w w w.stealthgenie.com /. 623. CellSPYExpert, from http://www.cellspyexpert.com /. 624. SPYPhone, from http://spyera.com/products/spy-phone-basic-internet. 625. EasyGPS, from http://www.easygps.com /. 626. FlexiSPY PRO-X, from http://www.flexispy.com/spyphone-call-interceptor-gps-tracker-symbian.htm. 627. GPS TrackM aker Professional, from http://w w w.trackm aker.com /dwlpage.php. 628. M O BILE SPY, from http://www.m obile-spy.com /. References Page 2994 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  20. 20. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 629. World-Tracker, from http://www.world-tracker.com /v4/. 630. ALL-in-ONE Spy, from http://w w w.thespyphone.com /allinone.htm l. 631. Trackstick, from http://w w w.trackstick.com /download.htm l. 632. M obiStealth Pro, from http://w w w .m obistealth.com . 633. mSpy, from http://w w w.buym spy.com /. 634. GPS Retriever, from http://w w w.m obilebugstore.com /Blackberry_gps_retriver.aspx. 635. Zemana AntiLogger, from http://www.zem ana.com /Download.aspx. 636. Anti-Keylogger, from http://www.anti-keyloggers.com/. 637. PrivacyKeyboard, from http://www.antikeylogger.eom /products/privacykeyboard/overview.htm l#download. 638. DefenseW all HIPS, from http://www.softsphere.com /program s/. 639. KeyScrambler, from http://w w w.qfxsoftw are.com /dow nload.htm . 640. 1 Hate Keyloggers, from http://dewasoft.com/privacy/i-hate-keyloggers.htm. 641. SpyShelter STOP-LOGGER, from http://www.spyshelter.com /download-spyshelter. 642. DataGuard AntiKeylogger Ultim ate, from http://www.maxsecuritylab.com/dataguard-antikeylogger/download-anti-keyloger.php. 643. PrivacyKeyboard, from http://www.privacykeyboard.com /privacy-keyboard.htm l. 644. Elite Anti Keylogger, from http://www.elite-antikeylogger.com /free-download.htm l. 645. CoDefender, from https://www.encassa.com /downloads/default.aspx. 646. PC Tools Spyw are Doctor, from http://www.pctools.com /spyware-doctor/. 647. SU PERAntiSpyw are, from http://superantispyware.com /index.htm l. 648. Spyw are Term inator 2012, from http://w w w.pcrx.com /spywareterm inator/. 649. Ad-Aware Free Antivirus+, from http://w w w .lavasoft.com /products/ad_aw are_free.php. 650. Norton Internet Security, from http://in.norton.com/downloads-trial-norton-internet-security. 651. SpyHunter, from http://w w w.enigm asoftw are.com /products/. 652. Kaspersky Internet Security 2013, from http://www.kaspersky.com/internet-security-free-trial. 653. SecureA nyw here Complete 2012, from http://www.webroot.com /En_US/consum er-productssecureanywhere-com plete.htm l. 654. MacScan, from http://m acscan.securem ac.com /. 655. Spybot - Search & Destroy, from http://www.safer-networking.org/dl/. 656. M alw arebytes Anti-M alw are PRO, from http://w w w.m alwarebytes.org/products/m alw arebytes_pro/. 657. Fu, from http://www.f-secure.com/v-descs/fu.shtml. 658. KBeast, from http://core.ipsecs.com/rootkit/kernel-rootkit/kbeast-vl/. 659. Hacker Defender HxDef Rootkit, from http://vishnuvalentino.com/hacking-tutorial/hacker-defenderhxdef-rootkit-tutorial-in-1 0 -steps-nostalgia/. 660. Stinger, from http://www.mcafee.com/us/downloads/free-tools/how-to-use-stinger.aspx. 661. UnHackM e, from http://w w w.greatis.com /unhackm e/dow nload.htm . 662. Virus Removal Tool, from http://www.sophos.com/en-us/products/free-tools/virus-removal-tool.aspx. 663. Hypersight Rootkit Detector, from http://northsecuritylabs.com /. 664. Avira Free Antivirus, from http://www.avira.com /en/avira-free-antivirus. 665. SanityCheck, from http://w w w.resplendence.com /downloads. References Page 2995 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  21. 21. Ethical Hacking and Countermeasures References 666. 667. Exam 312-50 Certified Ethical Hacker G M ER , from http://w w w.gm er.net/. Rootkit Buster, from http://dow nloadcenter.trendm icro.com/index. php?regs=NABU&dk=result_page&dkval=drop_list&catid =6&prodid=155. 668. Rootkit Razor, from http://www.tizersecure.com /. 669. Rem oveAny, from http://www.free-anti-spy.com/en/index.php. 670. TDSSKiller, from http://support.kaspersky.com/5350?el=88446. 671. Prevx, from http://w w w.prevx.com /freescan.asp. 672. Stream Arm or, from http://securityxploded.com /stream arm or.php. 673. ADS Spy, from http://www.m erijn.nu/program s.php#adsspy. 674. ADS M anager, from http://dm itrybrant.com /adsm anager. 675. Streams, from http://technet.microsoft.com/en-us/sysinternals/bb897440.aspx. 676. AlternateStream View , from http://w w w .nirsoft.net/utils/alternate_data_stream s.htm l. 677. NTFS-Streams: ADS manipulation tool, from http://sourceforge.net/projects/ntfs-ads/. 678. Stream Explorer, from http://w w w.rekenw onder.eom /stream explorer.htm #Stream s. 679. ADS Scanner, from http://www.pointstone.com /products/ADS-Scanner/. 680. RKDetector, from http://w w w.rkdetector.com /. 681. G M ER , from http://w w w.gm er.net/. 682. HijackThis, from http://www.trendm icro.com /us/security/products/index.htm l. 683. SN O W , from http://www.darkside.com .au/snow/index.htm l. 684. QuickStego, from http://quickcrypto.com/free-steganography-software.html. 685. Hide In Picture, from http://sourceforge.net/projects/hide-in-picture/. 686. gifshuffle, from http://www.darkside.com .au/gifshuffle/index.htm l. 687. CryptaPix, from http://www.briggsoft.com /cpix.htm . 688. BM PSecrets, from http://bmpsecrets.com/. 689. OpenPuff, from http://em beddedsw .net/O penPuff_Steganography_H om e.htm l. 690. OpenStego, from http://openstego.sourceforge.net/. 691. PHP-Class Stream Steganography, from http://www.phpclasses.org/package/6027-PHP-Store-andhidden-information-in-PNG-images.html. 692. Red JPEG , from http://www.totalcm d.net/plugring/redjpeg.htm l. 693. Steganography Studio 694. Virtual Steganographic Laboratory (VSL), from http://vsl.sourceforge.net/. 695. wbStego, from http://wbstego.wbailer.com /. 696. Merge Streams, from http://w w w.ntkernel.com /w&p.php?id=23. 697. Office XML, from http://www.irongeek.com/i.php?page=security/ms-office-stego-code. 698. Data Stash, from http://w w w.skyjuicesoftware.com /software/ds_info.htm l. 699. FoxHole, from http://foxhole.sourceforge.net. 700. Xidie Security Suite, from http://w w w .stegano.ro. 701. StegParty, from http://w w w.fasterlight.com . 702. Hydan, from http://www.crazyboy.com /hydan/. References Page 2996 , from http://stegstudio.sourceforge.net/. Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  22. 22. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 703. StegJ, from http://sourceforge.net/projects/stegj/files/. 704. StegoStick, from http://stegostick.sourceforge.net/. 705. SN O W , from http://www.darkside.com .au/snow/index.htm l. 706. OmniHide PRO, from http://om nihide.com /. 707. Our Secret, from http://w w w.securekit.net/oursecret.htm . 708. RT Steganography, from http://rtstegvideo.sourceforge.net/. 709. Masker, from http://www.softpuls.com /m asker/. 710. Max File Encryption, from http://www.softeza.com /fileencryption/. 711. M SU StegoVideo, from http://w w w.com pression.ru/video/stego_video/index_en.htm l. 712. BDV DataHider, from http://www.bdvnotepad.com /products/bdv-datahider/. 713. StegoStick, from http://stegostick.sourceforge.net/. 714. OpenPuff, from http://em beddedsw .net/O penPuff_Steganography_H om e.htm l. 715. Stegsecret, from http://stegsecret.sourceforge.net/. 716. PSM Encryptor, from http://dem o.powersoftm akers.com /psm e.zip. 717. DeepSound, from http://jpinsoft.net/DeepSound/Download.aspx. 718. Mp3stegz, from http://mp3stegz.sourceforge.net/. 719. M AXA Security Tools, from http://www.maxa-tools.com/mst.php?lang=en. 720. BitCrypt, from http://bitcrypt.moshe-szweizer.com/. 721. MP3Stego, from http://www.petitcolas.net/fabien/steganography/m p3stego/. 722. Hide4PGP, from http://www.heinz-repp.onlinehom e.de/. 723. CHAOS Universal, from http://safechaos.com/cu.htm. 724. SilentEye, from http://w w w.silenteye.org/. 725. QuickCrypto, from http://w w w.quickcrypto.com /dow nload.htm l. 726. CryptArkan, from http://www.kuskov.com /com ponent/option,com _rem ository/ltem id,30/func,fileinfo/id,l/. 727. StegoStick, from http://stegostick.sourceforge.net/. 728. Invisible Secrets 4, from http://www.invisiblesecrets.com /. 729. Folder Lock, from http://w w w .new softw ares.net/folderlock/. 730. A+ Folder Locker, from http://www.giantmatrix.com/products/aplus-folder-locker/. 731. Toolwiz BSafe, from http://www.toolwiz.com/products/toolwiz-bsafe/. 732. Hide Folders 2012, from http://fspro.net/hide-folders/. 733. GiliSoft File Lock Pro, from http://www.gilisoft.com/product-file-lock-pro.htm. 734. Universal Shield, from http://w w w.everstrike.com /shield.htm . 735. W in M e n d Folder Hidden, from http://www.winm end.com /folder-hidden/. 736. Encrypted Magic Folders , from http://www.pc-magic.c 0 m /des.htm #em f. 737. QuickCrypto, from http://w w w.quickcrypto.com /dow nload.htm l. 738. Max Folder Secure, from http://w w w.m axfoldersecure.com /. 739. Spam Mimic, from http://www.spam m im ic.com /. 740. Sams Big G Play M aker, from http://www.scram disk.clara.net/. 741. Gargoyle Investigator™ Forensic Pro, from http://w etst 0 netech.c 0 m/pr 0 duct/ 2 /d 0 w n l 0 ads. References Page 2997 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  23. 23. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 742. XStegsecret, from http://stegsecret.sourceforge.net/. 743. Stego Suite, from http ://w w w .w etst 0 netech.c 0 m/pr 0 d u ct/l/d 0 w n l 0 ads. 744. StegAlyzerAS, from http://www.sarc-wv.com/products/stegalyzeras/. 745. StegAlyzerRTS, from http://www.sarc-wv.com/products/stegalyzerrts/. 746. StegSpy, from http://www.spy-hunter.com /stegspy. 747. Steg A lyzerSS, from http://www.sarc-wv.com/products/stegalyzerss/. 748. Steg M arkSD K , from http://www.datam ark.com .sg/downloads-sdk.htm . 749. Steganography Studio, from http://stegstudio.sourceforge.net/. 750. Virtual Steganographic Laboratory (VSL), from http://vsl.sourceforge.net/. 751. Stegdetect, from http://w w w.outguess.org/detection.php. 752. Auditpol, from http://technet.microsoft.com/en-us/library/cc755264(v=ws.l0).aspx. 753. CCIeaner, from http://w w w .piriform .com /dow nload. 754. MRU-Blaster, from http://w w w.brightfort.com /m rublaster.htm l. 755. W ipe, from http://privacyroot.com /softw are/w ww /en/wipe.php. 756. Tracks Eraser Pro, from http://w w w .acesoft.net/features.htm . 757. BleachBit, from http://bleachbit.sourceforge.net/news/bleachbit-093. 758. AbsoluteShield Internet Eraser Pro, from http://www.internet-track-eraser.com /ineteraser.php. 759. Clear M y History, from http://www.hide-my-ip.com/clearmyhistory.shtml. 760. EvidenceEraser, from http://w w w .evidenceeraser.com /. 761. W inTools.net Professional, from http://w w w .w intools.net/. 762. RealTime Cookie & Cache Cleaner (R tC 3 ), from http://www.kleinsoft.co.za/buy.htm l. 763. AdvaHist Eraser, from http://w w w.advacrypt.cjb.net/. 764. Free Internet W in d o w W asher, from h ttp ://w w w .eusing .com /W indow _W ash er/W indow _W asher.htm . M od ule 06: Trojans and Backdoors 765. Placing Backdoors through Firewalls, from http://www.cyberwarzone.com /cyberwarfare/placingbackdoors-through-firewalls. 766. A Deep Look into Netcat - The TCP/IP Swiss Arm y Knife, from http://www.linux-support.com/cms/adeep-look-into-netcat-the-tcpip-swiss-army-knife/. 767. Trojans Revealed: Hackers Center: Internet Security Archive ..., http://www.hackerscenter.com /archive/view.asp?id=24717. 768. Dancho Danchev, The Com plete W indow s Trojans Paper, from http://www.fram e4.com /content/pubs/com p_trojans.txt. 769. The corporate threat posed by email Trojans, from http://www.gfisoftware.de/whitepapers/networkprotection-against-trojans.pdf. 770. Trojan Horses, from http://www-i4.informatik.rwth-aachen.de/lufg/teaching/ss2004/dependabilitysem inar/paper/final 8 .pdf. 771. Trojans - and how to protect your network against them, from http://w w w .w indow security.com /w hitepapers/trojans_protect_your_netw ork.htm l. 772. Fausi Qattan & Fredrik Thernelius, (2004), M aster's Thesis, from http://www.dsv.su.se/research/seclab/pages/pdf-files/04-34.pdf. 773. Malicious Intrusion Techniques, http://www.telecom worx.com /Adobe/Files39087.pdf. References Page 2998 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  24. 24. Ethical Hacking and Countermeasures References 774. Exam 312-50 Certified Ethical Hacker Increased use of Trojan Horse Programs, from http://www.niscc.gov.uk/niscc/docs/tn-2004021600080.html?lang=en. 775. Anti Trojan source - How to protect your network against trojans ..., from http://news.myinstall.com/news/45/. 776. Dancho Danchev, Trojan W h ite Paper, from http://www.anti-trojan-software-reviews.com/trojan-whitepaper-p 2 .htm. 777. 778. Trojans, from http://w w w.em ailprivacy.info/trojans. Rem ote Access Trojan FAQ and Port List Com puter Security - N etw ork ..., from http://www.infosyssec.com /infosyssec/trojanportlist.htm l. 779. W IN SN O RT.com : Intrusion Detection, from http://www.winsnort.com /m odules.php?op=m odload&nam e=FAQ&file=index&m yfaq=yes&id_cat=13. 780. Trojan Horse Com puter Infection Symptoms, from http://hacker-elim inator.com /trojansym ptom s.htm l. 781. LockDown M illennium Advanced Online Help, from http://lockdowncorp.com /m anual/TrojanlnfectionSym ptom s.htm . 782. Commodon Communications - Threats to your Security on the Internet, from http://w w w.com m odon.com /threat/threat-detect.htm . 783. Van Hauser/THC, Placing Backdoors Through Firewalls, from http://www.cgisecurity.com /lib/placing_backdoors_through_firewalls.txt. 784. Mikejc, (2004), Tech-Recipes.com - Use System File Checker to Solve Problems, from http://www.techrecipes.com /windows_tips602.htm l. 785. Exploring the Explodable, from http://www.guninski.com /browsers.htm l. 786. David W ells, (1996), W rappers, from http://w w w.objs.com /survey/wrap.htm . 787. Milly, Steve A., Stan, Ojatex, Gordon, Darius and Buzz, (2000), W ord Pad , from www.pchelp.org/security/scrap.htm. 788. Trojans F A Q http://www.windowsecurity.com /faqs/Trojans/. 789. Information on Com puter Viruses, from http://www-rohan.sdsu.edu/viruses.htm l. 790. Advanced Netw ork Configuration and Troubleshooting, from http://snow.nl/dist/xhtmlc/ch05s02.html. 791. Tom Armstrong, (2001), N etcat - The TCP/IP Swiss Arm y Knife, from http://rn.nu/program/util/netcat/netcat.html. 792. Microsoft - W indow s File, from Protection, from http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/enus/system _file_protection.m spx?m fr=true. 793. Scott W . Hotaling's, Placing Backdoors Through Firewalls, from http://masc2279.no-ip.org/gadgetstoys/internet/placing-backdoors-through-firewalls. 794. How to block ICM P tunneling?, from https://listserv.icsalabs.com/pipermail/firewall-wizards/1999July/006060.html. 795. 796. Newbie: Security, from http://www.unixgeeks.org/security/newbie/security/firewall.htm l. Phrack Magazine 0 0 . Volum e Seven, Issue Forty-Nine File 06 o f ..., from http://www.phrack.org/phrack/49/P49-06. 797. Dancho Danchev dancho, The Complete W indow s Trojans Paper, from http://www.astalavista.com /index.php?section=directory&linkid=640. 798. Declan McCullagh, (2006), Case 2:00-cr-00170-WHA-VPM, from http://www.politechbot.com /docs/feds.trojan.hacking.brief.082406.pdf. 799. TCPView, from http://technet.microsoft.com/en-us/sysinternals/bb897437.aspx. References Page 2999 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  25. 25. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 800. CurrPorts, from http://www.nirsoft.net/utils/cports.htm l. 801. Process Monitor, from http://technet.microsoft.com/en-in/sysinternals/bb896645.aspx. 802. W h a t's Running, from http://w w w.whatsrunning.net/. 803. PrcView, from http://w w w .team cti.com . 804. W insonar, from http://w w w .few byte.com /w insonar.htm l. 805. HiddenFinder, from http://w w w .w enpoint.com /dow nload/. 806. Autoruns for W indow s, from http://technet.microsoft.com/en-us/sysinternals/bb963902.aspx. 807. KillProcess, from http://orangelam psoftware.com /products_killprocess.php. 808. Security Task Manager, from http://w w w.neuber.com /taskm anager/. 809. Yet Another (rem ote) Process Monitor, from http://yaprocm on.sourceforge.net/. 810. MONIT, from http://m m onit.com /m onit/. 811. OpM anager, from http://www.m anageengine.com /network-m onitoring/process-m onitoring.htm l. 812. j v l 6 Pow er Tools 2012, from http://www.m acecraft.com /jvl6-powertools-2012/. 813. PC Tools Registry Mechanic, from http://www.pctools.com /registry-m echanic/. 814. Reg Organizer, from http://w w w.chem table.com /organizer.htm . 815. Registry Shower, from http://w w w.registryshower.com /download.htm . 816. Comodo Cloud Scanner, from http://www.com odo.com /hom e/internet-security/cloud-scanner.php. 817. Buster Sandbox Analyzer, from http://bsa.isoftware.nl/. 818. All-Seeing Eyes, from http://w w w.fortego.com /en/ase.htm l. 819. M J Registry W atcher, from http://w w w.jac 0 bsm.c 0 m/mjs 0 ft.htm #rgw tchr. 820. Active Registry Monitor, from http://w w w.devicelock.com /arm /. 821. SpyM e Tools, from http://www.lcibrossolutions.com /spym e_tools.htm . 822. Regshot, from http://regshot.sourceforge.net/. 823. Registry Live W atch , from http://leelusoft.blogspot.in/2009/ll/registry-live-watch-10.html. 824. DriverView, from http://w w w.nirsoft.net/utils/driverview.htm l. 825. Driver Detective, from http://w w w.drivershq.com /. 826. Unknown Device Identifier, from http://www.zhangduo.com /udi.htm l. 827. DriverGuide Toolkit, from http://w w w.driverguidetoolkit.com /. 828. DriverMax, from http://www.innovative-sol.com /driverm ax/index.htm . 829. Driver Magician, from http://www.driverm agician.com /. 830. Driver Reviver, from http://www.reviversoft.com /driver-reviver/. 831. DriverScanner, from http://w w w.uniblue.com /software/driverscanner/. 832. Double Driver, from http://www.boozet.org/dd.htm . 833. M y Drivers, from http://www.zhangduo.com /driverbackup.htm l. 834. DriverEasy, from http://w w w.drivereasy.com /. 835. W indow s Service M anager (SrvM an), from http://tools.sysprogs.org/srvman/. 836. SM A R T Utility, from http://www.thewindowsclub.com/smart-a-utility-for-tweaking-windows-7-vista-xpservices. 837. Netwrix Service Monitor, from http://w w w .netw rix.com /w indow s_services_m onitoring_freew are.htm l. 838. Vista Services Optimizer, from http://www.sm artpcutilities.com /servicesoptim izer.htm l. References Page 3000 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  26. 26. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 839. ServiW in, from http://w w w.nirsoft.net/utils/serviwin.htm l. 840. W indow s Service M anager Tray, from http://winservicem anager.codeplex.com /. 841. AnVirTask M anager, from http://w w w .anvir.com /dow nload.htm . 842. Process Hacker, from http://processhacker.sourceforge.net/downloads.php. 843. Free W indow s Service M onitor Tool, from http://www.manageengine.com/free-windows-servicemonitor/free-windows-service-monitor-index.html. 844. O verseer Netw ork M onitor, from http://www.overseer-network-m onitor.com /Download.aspx. 845. Total N etw ork M onitor, from http://www.softinventive.com /products/total-network-m onitor/. 846. Starter, from http://codestuff.tripod.com /products_starter.htm l. 847. Security AutoRun, from http://tcpmonitor.altervista.org/startup-manager/. 848. Absolute Startup manager, from http://w w w.absolutestartup.com /. 849. ActiveStartup, from http://w w w.hexilesoft.com /activestartup.htm l. 850. StartEd Lite, from http://w w w.outertech.com /en/w indows-startup. 851. Startup Inspector, from http://w w w .window sstartup.com /startupinspector.php. 852. Program Starter, from http://www.ab-tools.com /de/software/program m starter/. 853. Disable Startup, from http://w w w.disablestartup.com /. 854. StartupM onitor, from http://w w w .m lin.net/StartupM onitor.shtm l. 855. Chameleon Startup Manager, from http://www.cham eleon-m anagers.com /downloads.php. 856. Startup Booster, from http://w w w.sm artpctools.com /startup_booster/. 857. FCIV, from http://www.microsoft.com/en-us/download/details.aspx?id=11533. 858. Tripwire, from http://www.tripwire.com/it-security-software/security-configuration‫־‬management/fileintegrity-monitoring/. 859. FastSum, from http://w w w.fastsum .com /download.php. 860. W in M D 5 , from http://w w w .blisstonia.eom /softw are/W inM D5/#dow nload. 861. Advanced Checksum Verifier (ACSV), from http://w w w.irnis.net/. 862. Fsum Fronted, from http://fsum fe.sourceforge.net/. 863. Verisys, from http://www.ionx.co.uk/products/verisys. 864. AFICK (Another File Integrity Checker), from http://afick.sourceforge.net/. 865. File Integrity Monitoring, from http://www.ncircle.com/index.php?s=products_ccm _file-integritymonitoring. 866. Attribute M anager, from http://www.m iklsoft.com /attrm an/index.htm l. 867. PA File Sight, from http://www.poweradmin.com/file-sight/index3.aspx. 868. CSP File Integrity Checker, from http://w w w.tandem security.com /solution_14.php. 869. ExactFile, from http://www.exactfile.com /downloads/. 870. OSSEC, from http://www.ossec.net/?page_id= 19. 871. W indow s Defender, from http://www.microsoft.com/en-in/download/details.aspx?id=17. 872. M cAfee AntiVirus Plus, from http://home.mcafee.com/store/free-antivirus-trials. 873. Norton AntiVirus, from http://us.norton.com/downloads-trial-nortonantivirus?inid= us_hho_topnav_dow nload_detail_nav. 874. Trojan Horse Construction Kit, from http://www.pestpatrol.eom /zks/pestinfo/t/trojan_horse_construction_kit.asp. References Page 3001 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  27. 27. Ethical Hacking and Countermeasures References 875. Exam 312-50 Certified Ethical Hacker Progenic Mail Trojan Construction Kit - PMT, from http://www.sim ovits.com /trojans/tr_data/y2630.htm l. 876. Pandora's Box, from http://greece.mrdonn.org/greekgods/pandora.html. 877. TrojanHunter, from http://w w w.trojanhunter.com /trojanhunter/. 878. Emsisoft Anti-Malware, from http://w w w.em sisoft.in/en/software/antim alw are/. 879. Anti-Trojan Shield (ATS), from http://w w w.atshield.com /?r=dow nload. 880. Spyw are Doctor, from http://www.pctools.com /spyware-doctor/download/?src=lp_sd. 881. Anti M alw are BOCIean, from http://www.com odo.com /hom e/internet-security/anti-m alware.php. 882. Anti Hacker, from http://www.hide-my-ip.com/antihacker.shtml. 883. XoftSpySE, from http://www.paretologic.com/xoftspy/se/newlp/xray/. 884. SPYW AREfighter, from http://w w w.spam fighter.com /SPYW AREfighter/. 885. Anti Trojan Elite, from http://w w w.rem ove-trojan.com /index_ate.php. 886. SU PERAntiSpyw are, from http://w w w.superantispyw are.com /index.htm l. 887. Trojan Rem over, from http://w w w.sim plysup.com /trem over/download.htm l. 888. Twister Antivirus, from http://www.filseclab.com/en-us/. M od ule 07: Viruses and W o rm s 889. Types of Virus, from http://w w w .m indpride.net/root/Extras/Viruses/virus_protection_and_rem oval_ii.htm . 890. Vulnerabilities in N etw ork Infrastructures and Prevention/Containm ent Measures, from http://proceedings.informingscience.org/lnSITE2012/lnSITE12p053-067Awodele0012.pdf. 891. Terminology, from http://www.f-secure.com/en/web/labs_global/terminology-f. 892. Virus Protection, from http://w w w .m indpride.net/root/Extras/Viruses/virus_protection_and_rem oval_iii.htm . 893. Paul Boutin, (2003), An inside view of the w orm that crashed the Internet in 15 minutes, founder from http://w w w .w ired.com /w ired/archive/ll.07/slam m er.htm l. 894. Case Study: Microsoft N etw ork Hacked by QAZ Trojan, from http://www.msnbc.com/msn/482011.asp Oct. 29, 2000. 895. M ark Russinovich, (2008), TCPView for W in d o w s v2.53, from http://www.sysinternals.com /Utilities/TcpView.htm l. 896. M ark Russinowich and Bryce Cogswell, (2008), Autoruns for w indows (v 9.32), from http://www.sysinternals.com /Utilities/Autoruns.htm l. 897. Merijn, (2005), Hijack This (System Checker) (v 1.99.1), from http://www.m ajorgeeks.com /download.php?det=3155. 898. Norman Book on Com puter Viruses, from http://download.norm an.no/m anuals/eng/BOOKON.PDF. 899. Carey Nachenberg, Understanding and Managing Polym orphic Viruses from http://w w w.sym antec.com /avcenter/reference/striker.pdf. 900. The Spread of the Sapphire/Slam m er W orm , from http://www.caida.org/publications/papers/2003/sapphire/sapphire.html. 901. Mike Gunderloy, (2003), Microsoft Certified Professional Magazine Online | N ewsletters, vol 2 # 8 , from http://mcpmag.com /newsletter/article. asp?EditorialslD=153. 902. R. A. Hettinga, (2003), Random Scanning W orm s and Sapphire/Slam m er's PRNG, from http://www.mailarchive.com /cryptography@ wasabisystems.com/msg03503.html. References Page 3002 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  28. 28. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 903. Information on a virus on campus, http://security.uwo.ca/antivirus/infoHistory.htm l. 904. Virus History ‫ ־‬The Senior M ost Virus!!, from www.optusnet.com .au/learning/em ail/virus. 905. Computer Knowledge Virus Tutorial, from www .m pl.org.eg/doc/eBOO Ks/vtutor.pdf. 906. Dr. Alan Solomon and Robert M. Slade, 1990 - VX BBS & Little Black Book (AT&T Attack), 1991 - Tequila, 2001 - Gnuman, W inux Windows/Linux Virus, 2004 - Trojan.Xombe, Randex, Bizex, W itty, from w w w .cknow.com /vtutor/HistoryofViruses.htm l. 907. Michelangelo, DAME, & VCL, from http://library.thinkquest.org/04oct/00460/malwareHistory.html. 908. Honeypots, Honeynets, and Intrusion Detection, from http://w w w.honeypots.net/. 909. Featured Files, from http://packetstormsecurity.org/. 910. BinText, from http://www.mcafee.com/apps/free-tools/termsofuse.aspxPurh/us/downloads/freetools/bintext.aspx. 911. UPX, from http://upx.sourceforge.net/#downloadupx. 912. Process Explorer, from http://technet.microsoft.com/en-in/sysinternals/bb896653.aspx. 913. RegShot, from http://regshot.sourceforge.net/. 914. OllyDbg, from http://www.ollydbg.de/. 915. ProcDump, from http://technet.microsoft.com/en-us/sysinternals/dd996900.aspx. 916. IDA Pro, from https://www.hex-rays.com /products/ida/support/download_dem o.shtm l. 917. VirusTotal, from https://w ww .virustotal.com /en/. 918. Anubis: Analyzing Unknown Binaries, from http://anubis.iseclab.org. 919. Avast! Online Scanner, from http://onlinescan.avast.com . 920. M alw are Protection Center, from http://www.m icrosoft.com /security/portal/. 921. ThreatExpert, from http://w w w .threatexpert.com . 922. Dr. W e b Online Scanners, from http://vm s.drweb.com . 923. Metascan Online, from http://www.m etascan-online.com /. 924. Bitdefender QuickScan, from http://w w w.bitdefender.com /scanner/online/free.htm l. 925. GFI SandBox, from http://www.gfi.com/malware-analysis-tool. 926. UploadM alw are.com , from U ploadM alw are.com . 927. Fortinet, from http://www.fortiguard.com /antivirus/virus_scanner.htm l. 928. Immunet, from http://w w w.im m unet.com /free/index.htm l. 929. AVG Antivirus, from http://free.avg.com/in-en/homepage. 930. BitDefender, from http://w w w.bitdefender.com /Dow nloads/. 931. Kaspersky Anti-Virus, from http://www.kaspersky.com /trials. 932. Trend M icro Internet Security Pro, from http://apac.trendm icro.com . 933. Norton AntiVirus, from http://us.norton.com/downloads-trial-nortonantivirus?inid= us_hho_topnav_dow nload_detail_nav. 934. F-Secure Anti-Virus, from http://www.f-secure.com/en/web/home_global/anti-virus. 935. Avast Pro Antivirus, from http://www.avast.com /pro-antivirus. 936. M cAfee AntiVirus Plus 2013, from http://home.mcafee.com/store/free-antivirus-trials. 937. ESET Sm art Security 6 , from http://www.eset.eom /download/hom e/detail/fam ily/5/. 938. Total Defense Internet Security Suite, from http://www.totaldefense.com /shop/total-defense-internetsecurity-suite.aspx. References Page 3003 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  29. 29. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 939. W h a t's Running, from http://w w w.whatsrunning.net/. 940. W insonar, from http://w w w .few byte.com /w insonar.htm l. 941. Reg Organizer, from http://w w w.chem table.com /organizer.htm . 942. W indow s Service M anager (SrvM an), from http://tools.sysprogs.org/srvman/. 943. ServiW in, from http://w w w.nirsoft.net/utils/serviwin.htm l. 944. Starter, from http://codestuff.tripod.com /products_starter.htm l. 945. Security AutoRun, from http://tcpmonitor.altervista.org/startup-manager/. 946. FCIV, from http://www.microsoft.com/en-us/download/details.aspx?id=11533. M od ule 08: Sniffing 947. W h a t is Sniffer and how to detect sniffing in com puter network, from http://www.aboutonlinetips.com/sniffer-types-and-protecting-against-sniffing/. 948. Anatom y of an ARP Poisoning Attack, from http://www.unitedsystemsok.com/anatomy-of-an-arppoisoning-attack. 949. 950. W h a t is AR P?, from http://w w w.antiarp.com /english_94.htm l. Modeling and Analysis of W ireless LAN Traffic, from http://www.dm clab.hanyang.ac.kr/files/publication/journals/international/200911_08.pdf. 951. Dynamic ARP Inspection (DAI), from http://daxm.net/ccienotes/20100131/dynamic-arp-inspection-dai. 952. O verview of Layer 2 Switched Networks and Communication, from http://www.sakunsharma.in/2011/07/overview-layer-2-switched-networks-communication/. 953. Application Protocol IPv 6 , from http://www.ciscoexpo.ru/dub/sites/default/files/sem inar_attachm ents/ipv 6 .pdf. 954. 955. Dynamic Host Configuration Protocol, from http://www.ietf.org/rfc/rfc2131.txt. Understanding,Preventing,Defending Against Layer 2 Attacks, from http://www.sanog.org/resources/sanogl5/sanogl5-yusuf-l2-security.pdf. 956. A N ew Schem e to Check ARP Spoofing: Prevention of MAN-IN-THE-MIDDLE Attack, from http://www.ijcsit.com/docs/Volume%202/vol2issue4/ijcsit2011020420.pdf. 957. LAYER 2 ATTACKS & MITIGATION TECHNIQUES, from http://www.sanog.org/resources/sanog7/yusuf-L2attack-mitigation.pdf. 958. Chris M artin, W h a t is Sniffer and how to detect Sniffing in com puter network, Available from http://74.125.153.132/search?q=cache:Tu6yfsiaY3AJ:www.aboutonlinetips.com/sniffer-types-andprotecting-against-sniffing/+wire+sniffing+techniques&cd=25&hl=en&ct=clnk&gl=in&client=fi refox-a. 959. Adam Barth, Secure content sniffing for W e b browsers or How to stop papers from reviewing them selves, Available from http://www.adambarth.com/papers/2009/barth-caballero-song.pdf. 960. Undetectable sniffing on Ethernet, Available from http://www.askapache.com/security/sniffing-onethernet-undetected.htm l. 961. Suhas A Desai, (2007), Techniques for Preventing Sniffing, Packet Sniffing: Sniffing Tools Detection Prevention Methods, Available from http://e-articles.info/e/a/title/Packet-Sniffing:-Sniffing-ToolsDetection-Prevention-Methods/. 962. Suhas A Desai, (2007), Tool to Detect Sniffers, Packet Sniffing: Sniffing Tools Detection Prevention Methods, Available from http://e-articles.info/e/a/title/Packet-Sniffing:-Sniffing-Tools-DetectionPrevention-Methods/. 963. Identifying Nonessential Services and Attacks > Attacks, from http://www.informit.com/articles/article.asp?p=98121&seqNum=2. References Page 3004 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  30. 30. Ethical Hacking and Countermeasures References 964. 965. Exam 312-50 Certified Ethical Hacker ARP cache poisoning /ARP spoofing, from http://su2.info/doc/arpspoof.php. N etw ork m anagement, network discovery, SN M P, M IB and W M I browsers, from w w w .netw orkview .com /htm l/features.htm l. 966. Address Resolution Protocol (ARP), from www.erg.abdn.ac.uk/users/gorry/course/inet-pages/arp.html. 967. Angela D. Orebaugh, (2004), Top Ten Ethereal Tips and Tricks, from http://www.onlamp.eom/pub/a/security/2004/05/13/etherealtips.html. 968. Packages, from http://packages.debian.org/. 969. N etw ork Protocol Analysis, from http://w w w .m aatec.com /. 970. The Hacker's Ethic, from http://web.textfiles.com/ezines/HWA/hwa-hn34.txt. 971. Jarom il, Dyne:ll GNU/Linux User's Guide, from http://dynebolic.org/dynebolic-man.pdf. 972. Address Resolution Protocol (arp), from www.erg.abdn.ac.uk/users/gorry/course/inet-pages/arp.html. 973. Adam Barth, Juan Caballero and Dawn Song, Secure Content Sniffing for W e b Browsers, or How to Stop Papers from Reviewing Themselves, http://www.adambarth.com/papers/2009/barth-caballerosong.pdf. 974. Alberto Ornaghi and M arco Valleri, M an in the middle attacks, http://www.blackhat.com/presentations/bh-europe-03/bh-europe-03-valleri.pdf. 975. Tom Olzak, (2006), DNS Cache Poisoning: Definition and Prevention, http://adventuresinsecurity.com /Papers/DNS_Cache_Poisoning.pdf. 976. Sean W halen, (2001), An Introduction to Arp Spoofing, http://w w w.rootsecure.net/content/dow nloads/pdf/arp_spoofing_intro.pdf. 977. Daiji Sanai, (2001), Detection of Promiscuous Nodes using ARP packets, http://w w w.securityfriday.com /prom iscuous_detection_ 0 1 .pdf. 978. N etw ork m anagement, network discovery, SN M P, M IB and W M I browsers, from w w w .netw orkview .com /htm l/w hat_s_new .htm l. 979. Source Address Spoofing, from http://www.networkcom puting.com /shared/article/showArticle.jhtm l?articleld=8702815&dassroom . 980. Keith Brown, (1999), Security Briefs, from http://www.microsoft.com/msj/0299/security/security0299.aspx. 981. Corey Nachreiner, (2005), Anatom y of an ARP Poisoning Attack, from http://www.watchguard.com /infocenter/editorial/135324.asp. 982. macof, from http://w w w .m onkey.org. 983. Yersinia, from http://w w w .yersinia.net/dow nload.htm . 984. Dhcpstarv, from http://dhcpstarv.sourceforge.net/. 985. Gobbler, from http://gobbler.sourceforge.net/. 986. Cain & Abel, from http://www.oxid.it/cain.htm l. 987. W inArpAttacker, from http://www.xfocus.org/index.html. 988. Ufasoft Snif, from http://ufasoft.com/sniffer/. 989. XArp, from http://www.chrism c.de/developm ent/xarp/index.htm l. 990. SMAC, from http://www.klcconsulting.net/sm ac/index.htm l#download. 991. Cascade Pilot, from http://www.riverbed.com/products-solutions/products/performancemanagement/network-infrastructure/High-Speed-Packet-Analysis.html. 992. Tcpdump, from http://w w w.tcpdum p.org/. 993. W inDum p, from http://w w w.winpcap.org/w indum p/default.htm . References Page 3005 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  31. 31. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 994. Capsa N etw ork Analyzer, from http://w w w.colasoft.com /dow nload/products/capsa_free.php. 995. O m niPeek Netw ork Analyzer, from http://w w w.wildpackets.com /products/om nipeek_network_analyzer. 996. Observer, from http://www.networkinstrum ents.com /products/observer/index.php?tab=download. 997. Sniff-O-Matic, from http://w w w.kw akkelflap.com /sniffer.htm l. 998. JitB it Netw ork Sniffer, from http://w w w.jitbit.com /networksniffer/. 999. M SN Sniffer 2, from http://www.m snsniffer.com /download/index.htm . 1000. Ace Password Sniffer, from http://w w w.effetech.com /aps/. 1001. RSA N etW itness Investigator, from http://w w w .em c.c 0 m /security/rsa-netwitness.htm #lfreew are. 1002. Big-Mother, from http://w w w .tupsoft.com /dow nload.htm . 1003. EtherD etect Packet Sniffer, from http ://w w w .etherdetect.com /dow nload.htm . 1004. dsniff, from http://monkey.org/~dugsong/dsniff/. 1005. EffeTech HTTP Sniffer, from http://w w w .effetech.com /dow nload/. 1006. Ntop, from http://www.ntop.org/products/ntop/. 1007. Ettercap, from http://ettercap.sourceforge.net/dow nloads.htm l. 1008. SmartSniff, from http://www.nirsoft.net/utils/sm sniff.htm l. 1009. EtherApe, from http://etherape.sourceforge.net/. 1010. N etw ork Probe, from http://w w w.objectplanet.com /probe/. 1011. Snort, from http://w w w.snort.org/. 1012. Sn iffem , from http://www.sniff-em .com /download.shtm l. 1013. MaaTec N etw ork Analyzer, from http://w w w .m aatec.com /m tna/dow nload.htm l. 1014. Alchem y N etw ork Monitor, from http://w w w.m ishelpers.com /netw ork_m onitor/index.htm l. 1015. Com m View, from http://www.tam os.com /download/m ain/index.php. 1016. NetResident, from http://ww w.tam os.com /products/netresident/. 1017. AIM Sniffer, from http://www.effetech.com /aim -sniffer/index.htm . 1018. Netstumbler, from http://w w w.netstum bler.com /downloads/. 1019. IE HTTP Analyzer, from http://w w w.ieinspector.com /httpanalyzer/. 1020. MiniStum bler, from http://w w w .netstum bler.com /dow nloads. 1021. PacketM on, from http://w w w.analogx.com /contents/dow nload/Network/pm on/Freew are.htm . 1022. NADetector, from http://w w w .nsauditor.com /netw ork_m onitoring/nadetector_traffic_analyzer.htm l. 1023. Microsoft Network Monitor, from http://www.microsoft.com/en-us/download/details.aspx?id=4865. 1024. N etw orkM iner, from http://w w w .netresec.com /?page= N etw orkM iner. 1025. N etw ork Security Toolkit, from http://www.networksecuritytoolkit.org/nst/index.htm l. 1026. Ethereal, from http://w w w .ethereal.com /. 1027. KSniffer, from http://ksniffer.sourceforge.net/index.php?section=download. 1028. IPgrab, from http://ipgrab.sourceforge.net/. 1029. W ebSiteSniffer, from http://w w w.nirsoft.net/utils/w eb_site_sniffer.htm l. 1030. ICQ Sniffer, from http://w w w.etherboss.com /icq/download.htm . 1031. URL Helper, from http://w w w.urlhelper.com /index.htm . 1032. W ebCookiesSniffer, from http://w w w.nirsoft.net/utils/w eb_cookies_sniffer.htm l. References Page 3006 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

×