S
“sa” account
database creation challenge
215Safety considerations, pen-test lab
destruction and sanitization
379–380Samurai Web Testing Framework
SAP system, enterprise applications
102
,
128sapyto
enterprise application case study
118f
,
128enterprise application testing
104Scalability
vertical-horizontal combination
293Scanning (vulnerability assessment)
external penetration test case study
internal penetration test case study
network devices, open source tools
noisy (IDS) testing case study
Nmap SYN scan with background noise
137f“Rules of Engagement” document
96stealthy penetration test case study
targeted Nmap scan results
136fvulnerability scanners
109wireless penetration testing
320Scripting
Cisco HTTP Configuration Arbitrary Administrative Access Vulnerability
281SD card, toolkit booting
3Search engines
human-based search engines
35–36for intelligence gathering
Secondary domain name system (DNS) server, network device footprinting
268Secure Shell (SSH)
enumeration service identification
111–112stealthy penetration test case study
135–136Secure Shell (SSH) host keys, Nmap banner grabbing
117Secure Socket Layer (SSL), external penetration test
130SELECT statement
Microsoft SQL Server, roles and permissions
195Service identification, enumeration
111Service set identifier (SSID)
wireless penetration case study
368WLAN without encryption
327WLAN information gathering
333Service set identifier (SSID) Broadcast Beacon, WLAN discovery
325SID, Oracle databases
205
,
209sid_brute, Oracle databases
205Simple Mail Transport Protocol (SMTP)
enumeration service identification
111–112header in RFC 2822 format
54finternal penetration test case study
131–132stealthy penetration test case study
135–136Simple Network Management Protocol (SNMP)
Simple Object Access Protocol (SOAP)
enterprise application web services
296soapUI enterprise application testing
306
,
308–309Slapper worm, web server history
220–221Slax, De-ICE.net PenTest disks
22Slurp (Yahoo!), for intelligence gathering
34SMB, basic considerations
127Snmpenum.pl
network device enumeration
276Snmpwalk
network device case study
286network device enumeration
276Social engineering attacks
custom malware, basic approach
170in penetration testing
142Social-Engineer Toolkit (SET)
Infectious Media Generator
180fSocial network attacks
Facebook/Google Buzz API browsers
164–165Facebook sample details
166fGoogle Maps GPS coordinate examples
169fsocial network diagram
161fSocial Networking Map (2010)
159fSP 800-115, penetration testing frameworks
390Spamming, personal phishing
144Spear-phishing attack, SET
Spiders
for intelligence gathering
34Split embedded payload, custom malware
175
,
175fSpoofing tools, Live Hacking CD
15SQLix
web application testing
243Sqlmap
web application testing
245web server testing case study
254–255Stack-based overflows, web server exploits
Standard configuration guide, database installation
193Stateful inspection firewall, basic function
265Static routing, definition
264Stealthy penetration test case study, scanning and enumeration
targeted Nmap scan results
136fStorage area networks (SAN), as targets
266strcpy function, web server stack-based overflows
228
,
229fStress testing, web server testing
223Structured Query Language (SQL)
Subnets
Nmap network device scanning
272scanning and enumeration purpose
96–97web server testing case study
247–248Sun Java, browser exploitation
150SunOS/Solaris machines
Nmap OS fingerprinting
115Supply chain management, enterprise applications
296–297Switched port analyzer (SPAN), switch function
262Switches
identification techniques
261SYN flood, noisy (IDS) testing case study
136
,
137fSYN scan
external penetration test
130noisy (IDS) testing case study
136
,
137fstealthy penetration test case study
135Sysinfo, human weakness case study
186fSystem administrator (sysadmin)
Microsoft SQL Server, users
194System Identifier (SID), database communication
193Systems Management Server (SMS), Bluetooth vulnerability exploitation
366System-to-system integration, enterprise applications
295–296