O
Obfuscation, custom malware
174Object exchange (OBEX), Bluetooth vulnerabilities
362
,
366OldApps.com, penetration testing targets
23Omnidirectional antenna, WLAN discovery
325–326On-disk installation, toolkit building
3OpenBSD Secure Shell (OpenSSH)
enumeration service identification
111–112external penetration test
130Open Shortest Path First (OSPF)
Open Source Security Testing Methodology Manual (OSSTMM), penetration testing frameworks
389Open source tools (general)
intelligence gathering
40–48social network attacks
164web application testing
233wireless penetration testing
Open Systems Interconnect (OSI) model
Nmap network device footprinting
268packet filtering firewall
265Open source tools (list)
Cisco Global Exploiter
280netxml2kml/Google Earth
341OpenVAS, vulnerability scanning
109Openwall, Nmap banner grabbing
115–116Open Web Application Security Project (OWASP)
Operating systems (general)
deauthentication attack
346enterprise applications
297external penetration test
130fingerprinting
110
,
112noisy (IDS) testing case study
136pen-test lab install disks
377pen-test lab virtualization software
392web server heap-based overflows
229Opwg.sh, sample output
209fOracle Auditing Tools (OAT), Oracle Password Guesser
206–207Oracle database management system
enterprise application hands-on challenge
318Nmap enterprise application testing
301oracle_default_passwords.csv
207foracle_default_passwords.csv, file sample contents
207fOracle JDBC drivers, Oracle Password Guesser
206–207Oracle Password Guesser, overview
206–209Organizational chart, human recon
69
,
70fOrganizational Systems Wireless Auditor Assistant (OSWA-Assistant)
Organizational Unique Identifier (OUI), macchanger
344Organization-base intelligence gathering
real-world intelligence
36