W

Wait function (IDC), Adding graphical interfaces
wait mode (flowreplay), flowreplay
WAP protocol, Protos, Protos
wardialing technique, Get the Right Wardriving Gear
wardriving technique, Get the Right Wardriving Gear, Get the Right Wardriving Gear, 802.11 Network Basics, How Wireless Discovery Tools Work, Kismet at a Glance, Other Wardriving Tools
defined, Get the Right Wardriving Gear
Kismet analyzer, Kismet at a Glance
Netstumbler tool, How Wireless Discovery Tools Work
overview, Get the Right Wardriving Gear, 802.11 Network Basics
tools supported, Other Wardriving Tools
watchpoints, Initial configuration, Setting breakpoints and watchpoints
setting in IDA, Initial configuration
setting in OllyDbg, Setting breakpoints and watchpoints
watermark attack, Comparing dm-crypt to cryptoloop and loop-AES
WDF (Wireshark Display Filters), Basics, Basic Wireshark Display Filters, TShark Techniques
web applications, Windows Command Line, WebInspect, FileFuzz, Automatic Fuzzing with WebInspect, Next-Generation Fuzzing
fuzzing, FileFuzz, Automatic Fuzzing with WebInspect, Next-Generation Fuzzing
Nikto support, Windows Command Line
WebInspect support, WebInspect
Web of Trust model, How to Obtain Public Keys, Create Your GPG Keys, Modify Your Web of Trust Model, S/MIME Versus GPG/PGP
CAcert CA and, S/MIME Versus GPG/PGP
GPG rules for, Create Your GPG Keys
modifying, Modify Your Web of Trust Model
overview, How to Obtain Public Keys
WebInspect, WebInspect, WebInspect, WebInspect, WebInspect Scan, Policy Tuning, Settings Tuning, Report Analysis, False Positives Analysis, WebInspect Tools, Assessment Management Platform (AMP)
Assessment Management Platform, Assessment Management Platform (AMP)
false positives analysis, False Positives Analysis
licensing, WebInspect
overview, WebInspect
policy management, Policy Tuning
report analysis, Report Analysis
scan wizard, WebInspect, WebInspect Scan
tools supported, WebInspect Tools
tuning settings, Settings Tuning
WebInspect tool, Automatic Fuzzing with WebInspect, Next-Generation Fuzzing
WebProxy tool, Fuzzing Web Applications, Configuring WebProxy
WebSpider, Automatic Fuzzing with WebInspect
webspy utility (dsniff), Shadow Browsing
WEP (Wireless Equivalent Privacy), Using Kismet, Capturing Packets and Decrypting Traffic with Kismet, WEP and WPA Encryption, Aircrack, Aircrack, Installing Aircrack-ng, Command-Line Options, Using Airpwn on WEP-Encrypted Networks, Scripting with Airpwn
Aircrack tool and, Aircrack, Installing Aircrack-ng
Airpwn tool and, Command-Line Options, Using Airpwn on WEP-Encrypted Networks, Scripting with Airpwn
encryption, Using Kismet, Capturing Packets and Decrypting Traffic with Kismet
overview, WEP and WPA Encryption, Aircrack
wep_keygen utility (Airpwn), Scripting with Airpwn
white hat researchers, Vulnerability Reporting, Vulnerability Reporting
whitelists, User Access Restriction, Whitelist and Blacklist, Toolbar for Web Browsers
SpamAssassin and, Whitelist and Blacklist
SSH and, User Access Restriction
TrustWatch Toolbar as, Toolbar for Web Browsers
Whittaker, James A., Flipper
Whois queries, TCPView: A Graphical Netstat
Wi-Fi Protected Access (WPA), Using Kismet, Aircrack, Using Airpwn on WEP-Encrypted Networks
Wildpackets driver, Windows Installation
WinDbg debugger, The server/target
Window scan, Special TCP Scan Types in Nmap
Windows Explorer, Trimming down the list
Windows Firewall, Endpoint/Host, Allowing limited inbound connections, Initial Setup, Updates
blocking sessions, Allowing limited inbound connections
Internet Worm Protection and, Updates
OS support, Endpoint/Host
overview, Initial Setup
Windows Media File, Failed tests
Windows operating system, UDP Scanning, Dealing with Blocked Pings, Choosing the Right Ports, Nessus, License, Windows Configuration, Plug-in Code Example, Windows Command Line, Windows Command Line, WebInspect, Using ettercap and arpspoof on a Switched Network, How Wireless Discovery Tools Work, Kismet at a Glance, Wireshark at a Glance, Linux, Other Wardriving Tools, Custom Packet Example: Ping of Death, Tracerouting: A Step-by-Step Example, Metasploit Payloads, Running an Exploit, The Meterpreter, The Meterpreter, Installing Aircrack-ng, Windows Installation, Exploitation Framework Applications, Task Overview, Porting Exploits Within Canvas, alpha2, alpha2, Execution Flow Hijacking, Metasploit Framework's msfelfscan and msfpescan, EEREAP, Choosing a Backdoor, VNC, Consolidating the Backdoor, Removing the Backdoor, Back Orifice 2000, Windows Rootkit: Hacker Defender, Windows Rootkit Detectors, Endpoint/Host, Allowing limited inbound connections, Tightening inbound connections by host, NAT with Inbound Service Mapping, Initial Setup, Verifying Your Coverage, Controlling Services, Limiting Access, sudowin, Rainbow Cracking, Rainbow Cracking, Cooperative Linux, UserMode Linux: Paravirtualization, Using SSH Under Windows, GPG, Stunnel, Client Encryption, Windows Filesystem Encryption with PGP Disk, The ClamAV Project, The ClamAV Project, Conclusion, MAC address, Setup, Protos, Basics, TShark Techniques, Comparing File Integrity Checkers, Finding a Windows Backdoor with Netstat, The Forensic ToolKit, Working with Alternate Data Streams, RootkitRevealer: Rooting Out Rootkits, FileFuzz, Other Tools
access control and, sudowin
Afick support, Comparing File Integrity Checkers
Aircrack-ng support, Installing Aircrack-ng, Windows Installation
Airopeek support, Other Wardriving Tools
backdoor considerations, Choosing a Backdoor
blocked pings, Dealing with Blocked Pings
BO2k support, Back Orifice 2000
ClamAV support, The ClamAV Project
ClamWin support, The ClamAV Project
coLinux project, Cooperative Linux
command shell support, The Meterpreter
common ports, Choosing the Right Ports
controlling services, Controlling Services, Limiting Access
dynamic libraries and, Metasploit Framework's msfelfscan and msfpescan
EEREAP utility and, EEREAP
email security and, Conclusion
encryption with PGP disk, Windows Filesystem Encryption with PGP Disk
exploit frameworks and, Exploitation Framework Applications
FileFuzz tool, FileFuzz
firewalls and, Endpoint/Host, Allowing limited inbound connections, Tightening inbound connections by host, Verifying Your Coverage
FTK support, The Forensic ToolKit
GPG/PGP support, GPG
Hacker Defender rootkit, Windows Rootkit: Hacker Defender
Kismet support, Kismet at a Glance
LAN reconnaissance and, Using ettercap and arpspoof on a Switched Network
LAND attacks, MAC address
Metasploit support, Metasploit Payloads
Meterpreter support, The Meterpreter
Nessus plug-ins, Plug-in Code Example
Nessus support, Nessus, License, Windows Configuration, Windows Command Line
netstat support, Finding a Windows Backdoor with Netstat
Netstumbler support, How Wireless Discovery Tools Work
Nikto support, Windows Command Line
Nmap support, UDP Scanning
Opcodes database, Task Overview, Porting Exploits Within Canvas
password cracking, Rainbow Cracking, Rainbow Cracking
Ping of Death and, Custom Packet Example: Ping of Death
Protos and, Protos
QEMU support, UserMode Linux: Paravirtualization
rootkit detectors, Windows Rootkit Detectors, RootkitRevealer: Rooting Out Rootkits
RPC support, Initial Setup
running exploits, Running an Exploit
SEH support, alpha2, Execution Flow Hijacking
SoftICE tool, Other Tools
SSH support, Using SSH Under Windows
Stunnel support, Stunnel, Client Encryption
Sysinternals support, Working with Alternate Data Streams
tracert support, Tracerouting: A Step-by-Step Example
Traffic IQ Pro and, Setup
TShark support, TShark Techniques
Unicode UTG-15 encoding, alpha2
VNC support, VNC, Consolidating the Backdoor, Removing the Backdoor
WebInspect support, WebInspect
wipfw support, NAT with Inbound Service Mapping
Wireshark support, Wireshark at a Glance, Linux, Basics
Windows Task Manager, Turning Off What You Do Not Need, Process Explorer: Powerful Process Management, Replacing the Task Manager with Process Explorer
WinPcap, Ethereal/Wireshark, TShark Techniques
WinSCP program, WinSCP
Winters, Scott, Tightening inbound connections by host
wipfw firewall application, NAT with Inbound Service Mapping
wireless penetration, WEP and WPA Encryption, WEP and WPA Encryption, WEP and WPA Encryption, WEP and WPA Encryption, Aircrack, Aircrack, Airpwn, Karma
Aircrack tool and, WEP and WPA Encryption, Aircrack
Airpwn tool and, WEP and WPA Encryption, Airpwn
Karma tool and, WEP and WPA Encryption, Karma
WEP/WPA encryption and, WEP and WPA Encryption, Aircrack
wireless reconnaissance, Get the Right Wardriving Gear, Get the Right Wardriving Gear, 802.11 Network Basics, 802.11 Network Basics, 802.11 Frames, 802.11 Frames, How Wireless Discovery Tools Work, How Wireless Discovery Tools Work, Kismet at a Glance, Wireshark at a Glance, AirDefense Mobile , AirMagnet Analyzers, Other Wardriving Tools, Other Wardriving Tools
802.11 frames, 802.11 Frames
802.11 network basics, 802.11 Network Basics, 802.11 Frames
AirDefense Mobile tool, AirDefense Mobile
AirMagnet analyzers, AirMagnet Analyzers
Airopeek tool, Other Wardriving Tools
discovery tools overview, How Wireless Discovery Tools Work
Kismet analyzer, Kismet at a Glance
Netstumbler tool, How Wireless Discovery Tools Work
purpose, Get the Right Wardriving Gear
wardriving and, Get the Right Wardriving Gear, 802.11 Network Basics, Other Wardriving Tools
Wireshark analyzer, Wireshark at a Glance
Wireshark Display Filters (WDF), Ethereal/Wireshark, Basic Wireshark Display Filters, TShark Techniques
WMF images, Email Security and Anti-Spam
worms, Conclusion, Installation Test, Failed tests, ILDS, Using Honeyd to Emulate a Network, Writing New Scripts with Honeyd, Conclusion
defined, Conclusion
false positives with, Failed tests
honeypot monitoring and, ILDS, Writing New Scripts with Honeyd
Norton Antivirus and, Installation Test
possible scenarios, Conclusion
tar pits and, Using Honeyd to Emulate a Network
WPA (Wi-Fi Protected Access), Using Kismet, Aircrack, Using Airpwn on WEP-Encrypted Networks
WPA-PSK shared key mode, Aircrack, Installing Aircrack-ng