D
Damn Vulnerable Web Application (DVWA)
penetration testing targets
22Database administrator (DBA)
Microsoft SQL Server, password creation
194Database hacking
CGI vulnerability testing
223enterprise applications
294
,
298Nmap enterprise application testing
300Database management systems (DBMSs)
Database owner (DBO), Microsoft SQL Server
Database query injection attacks
enterprise applications
298soapUI enterprise application testing
313web application assessment
232web server testing case study
252
,
253fDatabase server
database query injection attacks
232Data Encryption Standard (DES), LEAP attacks
227Data transfer, pen-test lab security
378Deauthentication attack
wireless penetration case study
368–369Decibels (dB), antenna gain
326“Deep packet inspection” firewall, definition
265“Default deny rule bases,” definition
219–220Default pages, vulnerability testing
De-ICE.net PenTest disks, penetration testing targets
22Demilitarized Zone (DMZ), external pen-test lab
383Denial of service (DoS)
Cisco Global Exploiter
280noisy (IDS) testing case study
136scanning and enumeration
97Department of Defense, pen-test lab hard drive sanitization
380“Desk scans,” before brute forcing
207Dictionary attacks
enterprise application integrations
299enterprise applications
299wireless penetration testing tools
324–325DigDug
footprinting case study
90fDig tool
domain record extraction
57DirBuster
web directory scanning
245Direct data integrations, enterprise applications
298–299Directional antenna, WLAN discovery
325–326Directory traversal attacks, web application assessment
231Disassembler, web server testing
223Dnsenum.pl, footprinting
62–65Dnsmap, verification
84
,
92fDNS Name Server (NS)
footprinting
domain record extraction
57intelligence gathering, TLD
39Dnsreverse.py, DNS server brute forcing
65DOC files, Trojan horses
150Documentation, pen-test lab
Documentation management, enterprise applications
292Domain name expansion
intelligence gathering
38–40Netcraft wildcard DNS query example
40fDomain name registries, footprinting
54Domain name space, DNS footprinting
50Domain name system (DNS)
BiLE suite tld-expand.pl
48cyberworld target definition
30enumeration, definition
110external penetration test
129footprinting
basic considerations
49–53domain record extraction
57forward DNS brute force
57–58zone transfer attempt
56–57intelligence gathering
real-world intelligence
36internal penetration test case study
131
,
134network device case study
284network device footprinting
268verification
74–75
,
78vs. assigned Internet numbers
78reverse DNS verification
79–80DVD
BackTrack toolkit creation case study
24pen-test lab
destruction and sanitization
379Dynamic domain name system (DynDNS)
external penetration test
129internal penetration test case study
134Dynamic Host Configuration Protocol (DHCP)