M
Macchanger
wireless penetration testing
320
,
345Mail bounce, footprinting, SMTP mail bounce
58
,
58f
,
59fMail servers
domain record extraction
57Malloc, web server heap-based overflows
229Malware
social network attacks
160Management Information Base (MIB)
network device case study
286network device enumeration
276Man-in-the-middle (MITM) attack
Master boot record, UNetbootin risks
12MD5 hash
pen-test lab install disks
377Media Access Control (MAC) address
internal penetration test case study
134pen-test lab network isolation
376wireless penetration testing
320WLAN without encryption
327Message IDs, SMTP footprinting
55MetaGoofil, human recon
73Metasploit Framework
enterprise application case study
315
,
316fenterprise application testing
313msfencode payload to encoded executable
179fmsfpayload Meterpreter executable generation
177fmsfpayload Meterpreter options
176fand sapyto architecture
303SQL Server 2008 case study
213Meterpreter shell
database hacking case study
214
,
216fenterprise application case study
315–317human weakness case study
184
,
186msfpayload executable generation
177fspear-phishing attack
152
,
153Michael, WLAN vulnerabilities
322Microsoft Challenge Handshake Protocol version 2 (MS-CHAPv2), LEAP attacks
330Microsoft-ds ports, scanning
127Microsoft SQL Server
database communication
193database hacking overview
189Microsoft SQL Server 2000, password creation
194Microsoft SQL Server 2005, password creation
195Microsoft SQL Server 2008
Microsoft SQL Spida Worm, SQL Server passwords
194Mirroring, switch function
262Mode 1 security, Bluetooth
362Mode 2 security, Bluetooth
362Mode 3 security, Bluetooth
362MS Blaster, port scanning
127MSNBot (Bing), for intelligence gathering
34mssql_login
SQL Server 2008 case study
213
,
214fmssql_payload
database hacking case study
215fMulti-function devices, as targets
266Multipurpose Internet Mail Extensions (MIME), SMTP footprinting
55Multi-tier architecture, enterprise applications
293–294
,
294fMutillidae, penetration testing targets
22MX records
footprinting approach
55–56verification, case study
90MySpace, real-world intelligence example
36MySQL
web server testing case study
248