P
Packet filtering firewall, definition
265Packetforge-ng, basic function
347
,
351Pair-wise Master Key (PMK), WPA2
322Parameter passing attacks, web application assessment
233Passive scanners, WLAN discovery
325Password cracking
database hacking hands-on challenge
215–216network device case study
285network device hands-on challenge
290wireless penetration testing
320Payloads
custom malware deployment
175
,
175fmsfencode, to encoded executable
179fPayment card industry (PCI), WLAN vulnerabilities
323PDF files
human weakness case study
183malicious, generation
185fPeer-to-peer applications, Arudius
17–18Penetration testing frameworks
implementation consistency
390VulnerabilityAssessment.co.uk
390Penetration testing targets
basic considerations
20–21Damn Vulnerable Web Application
22De-ICE.net PenTest disks
22Penetration testing toolkit creation
BackTrack toolkit creation case study
24
,
23–27LiveCD creation
4–5BartPE Builder Plugins
11fLiveCD tools
9UNetbootin Ophcrack Install
12fpersistent LiveCD creation
8–9private
vs. public considerations
2toolkit execution considerations
3Penetration testing toolkit examples
Katana Portable Applications
21fSamurai Web Testing Framework
15
,
16fPenetration test labs
client hardware matching
386install procedure documentation
388–389safety considerations
destruction and sanitization
379–380software tool considerations
396–397VulnerabilityAssessment.co.uk
390Perl script usage examples
Persistent LiveCD, creation
8–9Persistent Live USB, toolkit booting
3Personal area networks (PANs), 802.15.1 standard
321Phishing
individually targeted phishing
Photographs, social network attacks
162phpMyAdmin, web server testing case study
249
,
251fPhysical Address Extension (PAE), Xen
395Ping methods
Httprint fingerprinting
121noisy (IDS) testing case study
136–137p0f passive OS fingerprinting
118verification, network boundary exploration
78web server testing case study
248fPlaintext
network device case study
286PL/SQL, Oracle stored procedures
204Points of contact (POC), verification
76POP command, web server stack-based overflows
225
,
226f
,
227fPort 31337, Nmap port-scanning options
105–106Port scanning
stealthy penetration test case study
134Pre-coded stored procedures, SQL Server
195–196Prepended payload, custom malware
174
,
175fPre-production applications, enterprise application case study
313–314Pre-Shared Keys (PSK)
VPN device footprinting
271Primary domain name system (DNS) server, network device footprinting
268Primary key, database definition
190Production enterprise applications
Project-specific penetration test lab, basic considerations
384Protected Extensible Authentication Protocol (PEAP)
Proxy methods
fimap web application testing
241–242Proxy servers
Nmap network device scanning
272Pseudo Random Generation Algorithm (PRGA)
Pseudo Random Number Generator (PRNG), WEP attacks
329Psychological considerations
commiseration in email
144social network status udpates
164“Pull” real-time integration, enterprise applications
295PUSH C command, web server stack-based overflows
225
,
226fPUSH D command, web server stack-based overflows
225
,
226fPUSH flag, port scanning
99“Push” real-time integration, enterprise applications
295Pychkine-Tews-Weinmann (PTW) attacks
Python script usage examples