W
- Wait function (IDC), Adding graphical interfaces
- wait mode (flowreplay), flowreplay
- WAP protocol, Protos, Protos
- wardialing technique, Get the Right Wardriving Gear
- wardriving technique, Get the Right Wardriving Gear, Get the Right Wardriving Gear, 802.11 Network Basics, How Wireless Discovery Tools Work, Kismet at a Glance, Other Wardriving Tools
- defined, Get the Right Wardriving Gear
- Kismet analyzer, Kismet at a Glance
- Netstumbler tool, How Wireless Discovery Tools Work
- overview, Get the Right Wardriving Gear, 802.11 Network Basics
- tools supported, Other Wardriving Tools
- watchpoints, Initial configuration, Setting breakpoints and watchpoints
- setting in IDA, Initial configuration
- setting in OllyDbg, Setting breakpoints and watchpoints
- watermark attack, Comparing dm-crypt to cryptoloop and loop-AES
- WDF (Wireshark Display Filters), Basics, Basic Wireshark Display Filters, TShark Techniques
- web applications, Windows Command Line, WebInspect, FileFuzz, Automatic Fuzzing with WebInspect, Next-Generation Fuzzing
- fuzzing, FileFuzz, Automatic Fuzzing with WebInspect, Next-Generation Fuzzing
- Nikto support, Windows Command Line
- WebInspect support, WebInspect
- Web of Trust model, How to Obtain Public Keys, Create Your GPG Keys, Modify Your Web of Trust Model, S/MIME Versus GPG/PGP
- CAcert CA and, S/MIME Versus GPG/PGP
- GPG rules for, Create Your GPG Keys
- modifying, Modify Your Web of Trust Model
- overview, How to Obtain Public Keys
- WebInspect, WebInspect, WebInspect, WebInspect, WebInspect Scan, Policy Tuning, Settings Tuning, Report Analysis, False Positives Analysis, WebInspect Tools, Assessment Management Platform (AMP)
- Assessment Management Platform, Assessment Management Platform (AMP)
- false positives analysis, False Positives Analysis
- licensing, WebInspect
- overview, WebInspect
- policy management, Policy Tuning
- report analysis, Report Analysis
- scan wizard, WebInspect, WebInspect Scan
- tools supported, WebInspect Tools
- tuning settings, Settings Tuning
- WebInspect tool, Automatic Fuzzing with WebInspect, Next-Generation Fuzzing
- WebProxy tool, Fuzzing Web Applications, Configuring WebProxy
- WebSpider, Automatic Fuzzing with WebInspect
- webspy utility (dsniff), Shadow Browsing
- WEP (Wireless Equivalent Privacy), Using Kismet, Capturing Packets and Decrypting Traffic with Kismet, WEP and WPA Encryption, Aircrack, Aircrack, Installing Aircrack-ng, Command-Line Options, Using Airpwn on WEP-Encrypted Networks, Scripting with Airpwn
- Aircrack tool and, Aircrack, Installing Aircrack-ng
- Airpwn tool and, Command-Line Options, Using Airpwn on WEP-Encrypted Networks, Scripting with Airpwn
- encryption, Using Kismet, Capturing Packets and Decrypting Traffic with Kismet
- overview, WEP and WPA Encryption, Aircrack
- wep_keygen utility (Airpwn), Scripting with Airpwn
- white hat researchers, Vulnerability Reporting, Vulnerability Reporting
- whitelists, User Access Restriction, Whitelist and Blacklist, Toolbar for Web Browsers
- SpamAssassin and, Whitelist and Blacklist
- SSH and, User Access Restriction
- TrustWatch Toolbar as, Toolbar for Web Browsers
- Whittaker, James A., Flipper
- Whois queries, TCPView: A Graphical Netstat
- Wi-Fi Protected Access (WPA), Using Kismet, Aircrack, Using Airpwn on WEP-Encrypted Networks
- Wildpackets driver, Windows Installation
- WinDbg debugger, The server/target
- Window scan, Special TCP Scan Types in Nmap
- Windows Explorer, Trimming down the list
- Windows Firewall, Endpoint/Host, Allowing limited inbound connections, Initial Setup, Updates
- blocking sessions, Allowing limited inbound connections
- Internet Worm Protection and, Updates
- OS support, Endpoint/Host
- overview, Initial Setup
- Windows Media File, Failed tests
- Windows operating system, UDP Scanning, Dealing with Blocked Pings, Choosing the Right Ports, Nessus, License, Windows Configuration, Plug-in Code Example, Windows Command Line, Windows Command Line, WebInspect, Using ettercap and arpspoof on a Switched Network, How Wireless Discovery Tools Work, Kismet at a Glance, Wireshark at a Glance, Linux, Other Wardriving Tools, Custom Packet Example: Ping of Death, Tracerouting: A Step-by-Step Example, Metasploit Payloads, Running an Exploit, The Meterpreter, The Meterpreter, Installing Aircrack-ng, Windows Installation, Exploitation Framework Applications, Task Overview, Porting Exploits Within Canvas, alpha2, alpha2, Execution Flow Hijacking, Metasploit Framework's msfelfscan and msfpescan, EEREAP, Choosing a Backdoor, VNC, Consolidating the Backdoor, Removing the Backdoor, Back Orifice 2000, Windows Rootkit: Hacker Defender, Windows Rootkit Detectors, Endpoint/Host, Allowing limited inbound connections, Tightening inbound connections by host, NAT with Inbound Service Mapping, Initial Setup, Verifying Your Coverage, Controlling Services, Limiting Access, sudowin, Rainbow Cracking, Rainbow Cracking, Cooperative Linux, UserMode Linux: Paravirtualization, Using SSH Under Windows, GPG, Stunnel, Client Encryption, Windows Filesystem Encryption with PGP Disk, The ClamAV Project, The ClamAV Project, Conclusion, MAC address, Setup, Protos, Basics, TShark Techniques, Comparing File Integrity Checkers, Finding a Windows Backdoor with Netstat, The Forensic ToolKit, Working with Alternate Data Streams, RootkitRevealer: Rooting Out Rootkits, FileFuzz, Other Tools
- access control and, sudowin
- Afick support, Comparing File Integrity Checkers
- Aircrack-ng support, Installing Aircrack-ng, Windows Installation
- Airopeek support, Other Wardriving Tools
- backdoor considerations, Choosing a Backdoor
- blocked pings, Dealing with Blocked Pings
- BO2k support, Back Orifice 2000
- ClamAV support, The ClamAV Project
- ClamWin support, The ClamAV Project
- coLinux project, Cooperative Linux
- command shell support, The Meterpreter
- common ports, Choosing the Right Ports
- controlling services, Controlling Services, Limiting Access
- dynamic libraries and, Metasploit Framework's msfelfscan and msfpescan
- EEREAP utility and, EEREAP
- email security and, Conclusion
- encryption with PGP disk, Windows Filesystem Encryption with PGP Disk
- exploit frameworks and, Exploitation Framework Applications
- FileFuzz tool, FileFuzz
- firewalls and, Endpoint/Host, Allowing limited inbound connections, Tightening inbound connections by host, Verifying Your Coverage
- FTK support, The Forensic ToolKit
- GPG/PGP support, GPG
- Hacker Defender rootkit, Windows Rootkit: Hacker Defender
- Kismet support, Kismet at a Glance
- LAN reconnaissance and, Using ettercap and arpspoof on a Switched Network
- LAND attacks, MAC address
- Metasploit support, Metasploit Payloads
- Meterpreter support, The Meterpreter
- Nessus plug-ins, Plug-in Code Example
- Nessus support, Nessus, License, Windows Configuration, Windows Command Line
- netstat support, Finding a Windows Backdoor with Netstat
- Netstumbler support, How Wireless Discovery Tools Work
- Nikto support, Windows Command Line
- Nmap support, UDP Scanning
- Opcodes database, Task Overview, Porting Exploits Within Canvas
- password cracking, Rainbow Cracking, Rainbow Cracking
- Ping of Death and, Custom Packet Example: Ping of Death
- Protos and, Protos
- QEMU support, UserMode Linux: Paravirtualization
- rootkit detectors, Windows Rootkit Detectors, RootkitRevealer: Rooting Out Rootkits
- RPC support, Initial Setup
- running exploits, Running an Exploit
- SEH support, alpha2, Execution Flow Hijacking
- SoftICE tool, Other Tools
- SSH support, Using SSH Under Windows
- Stunnel support, Stunnel, Client Encryption
- Sysinternals support, Working with Alternate Data Streams
- tracert support, Tracerouting: A Step-by-Step Example
- Traffic IQ Pro and, Setup
- TShark support, TShark Techniques
- Unicode UTG-15 encoding, alpha2
- VNC support, VNC, Consolidating the Backdoor, Removing the Backdoor
- WebInspect support, WebInspect
- wipfw support, NAT with Inbound Service Mapping
- Wireshark support, Wireshark at a Glance, Linux, Basics
- Windows Task Manager, Turning Off What You Do Not Need, Process Explorer: Powerful Process Management, Replacing the Task Manager with Process Explorer
- WinPcap, Ethereal/Wireshark, TShark Techniques
- WinSCP program, WinSCP
- Winters, Scott, Tightening inbound connections by host
- wipfw firewall application, NAT with Inbound Service Mapping
- wireless penetration, WEP and WPA Encryption, WEP and WPA Encryption, WEP and WPA Encryption, WEP and WPA Encryption, Aircrack, Aircrack, Airpwn, Karma
- Aircrack tool and, WEP and WPA Encryption, Aircrack
- Airpwn tool and, WEP and WPA Encryption, Airpwn
- Karma tool and, WEP and WPA Encryption, Karma
- WEP/WPA encryption and, WEP and WPA Encryption, Aircrack
- wireless reconnaissance, Get the Right Wardriving Gear, Get the Right Wardriving Gear, 802.11 Network Basics, 802.11 Network Basics, 802.11 Frames, 802.11 Frames, How Wireless Discovery Tools Work, How Wireless Discovery Tools Work, Kismet at a Glance, Wireshark at a Glance, AirDefense Mobile , AirMagnet Analyzers, Other Wardriving Tools, Other Wardriving Tools
- 802.11 frames, 802.11 Frames
- 802.11 network basics, 802.11 Network Basics, 802.11 Frames
- AirDefense Mobile tool, AirDefense Mobile
- AirMagnet analyzers, AirMagnet Analyzers
- Airopeek tool, Other Wardriving Tools
- discovery tools overview, How Wireless Discovery Tools Work
- Kismet analyzer, Kismet at a Glance
- Netstumbler tool, How Wireless Discovery Tools Work
- purpose, Get the Right Wardriving Gear
- wardriving and, Get the Right Wardriving Gear, 802.11 Network Basics, Other Wardriving Tools
- Wireshark analyzer, Wireshark at a Glance
- Wireshark Display Filters (WDF), Ethereal/Wireshark, Basic Wireshark Display Filters, TShark Techniques
- WMF images, Email Security and Anti-Spam
- worms, Conclusion, Installation Test, Failed tests, ILDS, Using Honeyd to Emulate a Network, Writing New Scripts with Honeyd, Conclusion
- defined, Conclusion
- false positives with, Failed tests
- honeypot monitoring and, ILDS, Writing New Scripts with Honeyd
- Norton Antivirus and, Installation Test
- possible scenarios, Conclusion
- tar pits and, Using Honeyd to Emulate a Network
- WPA (Wi-Fi Protected Access), Using Kismet, Aircrack, Using Airpwn on WEP-Encrypted Networks
- WPA-PSK shared key mode, Aircrack, Installing Aircrack-ng