W
WAFWOOF
web server testing case study
249“Walking the stack,” enterprise applications
296Web Application Firewall (WAF)
web application testing
234web server testing case study
249
,
250fWeb applications
cross-site scripting attacks
233database query injection attacks
232directory traversal attacks
231vs. enterprise applications
292information gathering attacks
231parameter passing attacks
233source code vulnerability example
254f
,
255fWebGoat
penetration testing targets
23Web servers
enterprise application hands-on challenge
318enterprise applications
297Httprint fingerprinting
121internal penetration test case study
131–132Web server testing
case study
login page screenshot
252fphpMyAdmin screenshot
251fCGI and default page exploitations
230name-based virtual hosting
239Web services
enterprise application integration
296soapUI enterprise application testing
308–309
,
313Web Services Definition Language (WSDL)
soapUI enterprise application testing
306Web Services Description Language (WSDL), enterprise application web services
296Web sites
individually targeted phishing
143Web User Interface (WUI), NST
17Whisker, CGI exploitation
230WHOIS
external penetration test
129intelligence gathering case study
86
,
86f
,
87
,
88WHOIS proxies, footprinting
53
,
60
,
62fWHOIS server, footprinting
53Wide area network (WAN), UDP scanning time
107Wi-Fi Protected Access (WPA)
Wi-Fi Protected Access 2 (WPA2)
Wi-Fi Protected Access 2-Enterprise (WPA2), wireless penetration case study
368Wi-Fi Protected Access-Pre-Shared Key (WPA-PSK)
wireless penetration testing
320Wi-Fi Protected Access 2-Pre-Shared Key (WPA2-PSK), wireless penetration case study
368Wi-Fi Protected Access-Remote Authentication Dial-in User Service (WPA-RADIUS)
Windows 2003 Server system
enterprise application case study
314internal penetration test case study
131–132Windows NT4 server, vulnerabilities overview
221–222Windows operating systems
dictionary/word list file format issues
359Microsoft SQL Server, users
194Netstat enterprise application testing
301Nmap OS fingerprinting
115pen-test lab case study
397web server testing case study
248Windows Vista, bootable USB drives
6–7Windows XP, Nmap OS fingerprinting
116fWindows XPE plugin, BartPE Builder
10Wired Equivalent Privacy (WEP)
cracking and data flow
348exploitation tools, basic steps
344WEP cloaking definition
323wireless penetration hands-on challenge
369–370wireless penetration testing
320vs. WPA-PSK exploitation
358Wireless card, choosing
326Wireless Geographic Logging Engine (WiGLE.net)
wireless penetration testing
333Wireless Local Area Networks (WLANs)
vs. Bluetooth vulnerabilities
362EAPOL four-way handshake
331finformation-gathering tools
vulnerability assessment tool
342–343Wireless networking utilities, Live Hacking CD
15Wireless penetration testing
EAPOL four-way handshake
331fexploitation tools
Aireplay-ng chopchop attack
351fAirodump-ng interactive packet replay results
355fAirodump-ng packet capture
349finformation-gathering tools
pen-test lab network isolation
375vulnerability assessment tool
342–343Worms
Microsoft SQL Spida Worm
194Slapper worm, web server history
220–221