SlideShare a Scribd company logo
1 of 82
Download to read offline
Ethical Hacking and Countermeasures
References

Exam 312-50 Certified Ethical Hacker

M o d u le 01: Introduction to Ethical Hacking
1.

Zero-day attacks are meaner, more ram pant than w e ever thought, from
http://arstechnica.com/security/ 2 0 1 2 / 10 /zero-day-attacks-are-meaner-and-more-plentiful-thanthought/.

2.

SECURITY POLICY: TARGET, CONTENT, & LINKS, from
http://csrc.nist.gov/nissc/1998/proceedings/paperG4.pdf.

3.

Anatom y of the Hack - Hands-on Security, from http://www.slideshare.net/NewBU/anatomy-of-thehack-handson-security-information-assurance-dub.

4.

Hacker methodology, from http://w w w.hackersecuritym easures.com /.

5.

Ethical Hacking, from w w w .secured eath.co m .

6.

C. C. Palmer, Ethical hacking from http://researchweb.watson.ibm .com /journal/sj/403/palm er.htm l.

7.

An O verview of Com puter Security, from
www.cc.gatech.edu/classes/AY2005/cs4803cns_fall/security_overview.ppt.

8.

Dr. Death, (2006), Ethical Hacking, from http://w w w .securedeath.com .

9.

Ethical Hacking, from http://neworder.box.sk/news/921.

10.

How are Penetrating Testing conducted?, from w w w .corsaire.co m .

11.

Ethical Hacking: The Security Justification Redux, from
http://www.sosresearch.org/publications/ISTAS02ethicalhack.PDF.

12.

Ethical Hacking, from w ww.sosresearch.org/publications.

13.

Ethical Hacking, from w w w .research.ibm .com .

14.

Covering Tracks, from http://rootprom pt.org.

15.

Attack, from http://www.linuxsecurity.com /content/view/17/70/.

16.

Security Issues in W ireless M A G N ET at Networj Layer, from
http://csce.unl.edu/~jaljaroo/publications/TR02-10-07.pdf.

17.

Glossary of Security and Internet terms, from
http://wssg.berkeley.edu/Securitylnfrastructure/glossary.htm l.

18.

Glossary of Vulnerability Testing Terminology, from
http://www.ee.oulu.fi/research/ouspg/sage/glossary/.

19.

Information about

hackers, from http://w w w .antionline.com /.

20.

Information about

hackers, from http://w2.eff.org/Net_culture/Hackers/.

21.

LEX LUTHOR, information about hackers, from http://bak.spc.org/dms/archive/britphrk.txt.

22.

Information about

hackers, from http://directory.google.com/Top/Computers/Hacking/.

23.

Information about

hackers, from http://directory.google.com/Top/Computers/Security/Hackers/.

24.

Information about

hackers, from http://bak.spc.org/dms/archive/profile.html.

References Page 2976

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
References

25.

Exam 312-50 Certified Ethical Hacker

Information about hackers, from
http://dir.yahoo.com /Com puters_and_lnternet/Security_and_Encryption/Hacking/.

M o d u le 02: Footprinting and Reconnaissance
26.

Search Operators, from http://w w w.googleguide.com /advanced_operators.htm l.

27.

The Complete W indow s Trojans Paper, from
http://w w w .w indow security.com /w hitepapers/trojans/The_C om plete_W indow s_Trojans_Paper.htm l.

28.

Naples, (2008), Information Gathering Tools, Available from
http://it.toolbox.com /wiki/index.php/lnform ation_Gathering_Tools.

29.
30.

Extract W ebsite Information from archive.org, Available from w w w .archive.org .
Footprinting, from
http://www.ethicalhacker.net/com ponent/option,com _sm f/ltem id,49/topic,228.m sg672.

31.

Simson Garfinkel and David Cox, (2009), Finding and Archiving the Internet Footprint,
http://simson.net/clips/academic/2009.BL.lnternetFootprint.pdf.

32.
33.

CHAPTER 2 [FOOTPRINTING], from http://www.ecqurity.com /wp/footprinting-encored.pdf.
Donna F. Cavallini and Sabrina 1 PACIFICI, Got COM PETITIVE INTELLIGENCE,
.
http://www.llrx.com /features/gotci.ppt.

34.

Spam m ers & hackers: using the APNIC W hois Database to find in their network, from
http://www.apnic.net/info/faq/abuse/using_whois.htm l.

35.

P. Mockapetris, (1987), DOM AIN N A M ES - CONCEPTS AND FACILITIES, from
htt p ://w w w .ie tf.0 rg/ rf c/ rf c 1034. txt.

36.

M anic Velocity, Footprinting And The Basics Of Hacking, from
http://web.textfiles.com/hacking/footprinting.txt.

37.

Dean, (2001), W indow s 2000 Command Prom pt Troubleshooting Tools, from
http://www.pcm ech.com /show/troubleshoot/192/.

38.

nslookup Command, from
http://publib. boulder. ibm.com/infocenter/pseries/v5r3/index.jsp?topic=/com.ibm.aix.doc/cmds/aixcmd
s4/nslookup.htm.

39.
40.

The nslookup M anual Page, from http://www.stopspam .org/usenet/m m f/m an/nslookup.htm l.
Bob Hillery, (2001), Neohapsis Archives - Incidents list - Re: Finding out w ho owns ..., from
http://archives.neohapsis.com/archives/incidents/2001-01/0032.html.

41.

Ryan Spangler, (2003), Analysis of Rem ote Active Operating System Fingerprinting Tools, from
http://w w w.packetw atch.net/docum ents/papers/osdetection.pdf.

42.

Ryan Spangler, (2003), Analysis of Rem ote Active Operating System Fingerprinting Tools, from
http://w w w.securiteam .com /securityreviews/5ZP010UAAI.htm l.

43.

Fingerprint methodology: IPID sampling, from http://www.insecure.org/nmap/nmap-fingerprintingold.html.

44.

Fyodor, (1998), Rem ote OS detection via TCP/IP Stack Fingerprinting, from
http://www.donkboy.com /htm l/fingerprt.htm .

45.

Rem ote OS Detection, from http://nmap.org/book/osdetect.html.

46.

Regional Internet Registry, from http://en.wikipedia.org/wiki/Regional_lnternet_Registry.

47.

Boy Scouts, Fingerprinting from http://onin.eom/fp/fpmeritbdg.html#top.

48.

The Hacker's Choice, from http://freeworld.thc.org/welcom e/.

49.

THC Fuzzy Fingerprint, from http://freeworld.thc.org/thc-ffp/.

References Page 2977

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
References

Exam 312-50 Certified Ethical Hacker

50.

Katherine Knickerbocker, CJ625 Student Paper, from http://all.net/CID/Attack/papers/Spoofing.html.

51.

Arik R. Johnson, W h a t is com petitive intelligence? How does com petitive ..., from
http://aurorawdc.com /whatisci.htm .

52.

Guangliang (Benny), (2006), Spamming and hacking, from
http://www.apnic.net/info/faq/abuse/using_whois.htm l.

53.

Dhillon, (2006), Footprinting: The Basics of Hacking: Hack In The Box, from
http://www.hackinthebox.org/modules.php?op=modload&name=News&file=article&sid=5359&mode=t
hread&order= 0 &thold= 0 .

54.

Roshen, (2006), Paladion - Customers - Success Stories - Penetration Testing, from
http://paladion.net/pentration_testing.php.

55.

Paul Thompson, (2006), Cognitive Hacking and Digital Governm ent: Digital Identity, from
http://www.ists.dartm outh.edu/library/chd0803.pdf.

56.

Greg Sandoval, (2006), M PA A accused of hiring a hacker, from
http://news.com.com/MPAA+accused+of+hiring+a+hacker/2100-1030_3-6076665.html.

57.

Kurt Seifried, (2005), Closet20001213 Backdoors, Back Channels and HTTP(S), from
http://www.seif ried.org/security/index.php/Closet20001213_Backdoors,_Back_Channels_and_HTTP(S).

58.

Happy Browser, (2005), from http://www.hotscripts.com /Detailed/39030.htm l.

59.

Client-server architecture, from http://w w w.netw orkintrusion.co.uk/N_scan.htm .

60.

Elegant architecture: NASI, from http://www.nessus.org/features/.

61.

The Signatures, from http://www.honeynet.org/papers/finger/.

62.

Ryan Spangler, (2003), Analysis of Rem ote Active Operating System Fingerprinting Tools, Nmap t o o l:
technique, from http://w w w.securiteam .com /securityreviews/5ZP010UAAI.htm l.

63.

Bew are!: W a r dialing, Sandstorm Sandtrap 1.5 W ard ia le r Detector Plus 16 and Basic Detectors, from
http://w w w .data-connect.com /Santstorm _PhoneSw eep.htm .

64.

Appendix A - Glossary of Terms: IPSEC, from
http://www.im sglobal.org/gws/gwsvlpO/im sgws_securityProfvlpO .htm l.

65.

Def. and info. Vulnerability scanning, from
http://www.webencanto.com /com puter_glossary/Com m unications/Ethics/vulnerability_scanning.htm l.

66.

Footprinting, from http://books.mcgrawhill. com/downloads/products//0072193816/0072193816_ch01. pdf].

67.

P. Mockapetris, Zvon - RFC 1034 [DO M AIN N A M ES - CONCEPTS AND FACILITIES] - DOMAIN..., from
http://www.zvon.org/tmRFC/RFC1034/Output/chapter3.html.

68.

Gaurav, (2006), The Domain Name System (DNS), from
http://people.csa.iisc.ernet.in/gaurav/np/rfcs/dns.html.

69.

Using the Internet for Com petitive Intelligence, from
http://www.cio.com /CIO/arch_0695_cicolum n.htm l.

70.

Reporting network abuse: Spamming and hacking, from
http://www.apnic.net/info/faq/abuse/using_whois.htm l.

71.

Bastian Ballmann, (2011), Information gathering tools, from http://www2.packetstormsecurity.org/cgibin/search/search.cgi?searchvalue=information+gathering&type=archives&[search].x= 0 &[search].y= 0 .

72.

Google Earth, from http://www.google.com /earth/index.htm l.

73.

pipl,from https://pipl.com/.

74.

spokeo, from http://w w w.spokeo.com .

75.

Zaba Search, from http://w w w.zabasearch.com .

References Page 2978

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
References

Exam 312-50 Certified Ethical Hacker

76.

123 People Search, from http://w w w.123people.com .

77.

Zoomlnfo, from http://w w w.zoom info.com .

78.

PeekYou, from http://w w w .peekyou.com .

79.

W in k People Search, from http://wink.com .

80.

Intelius, from http://w w w.intelius.com .

81.

A n yW ho , from http://w w w .anyw ho.com .

82.

PeopleSm art, from http://w w w .peoplesm art.com .

83.

People Lookup, from https://w ww .peoplelookup.com .

84.

W hitePages, from http://w w w .w hitepages.com .

85.

Facebook, from https://w ww .facebook.com /.

86.

Linkedln, from http://w w w.linkedin.com .

87.

Google+, from https://plus.google.com.

88.

Twitter, from http://twitter.com .

89.

Google Finance, from http://finance.google.com /finance.

90.

Yahoo Finance, from http://finance.yahoo.com .

91.

Zaproxy, from https://code.google.eom/p/zaproxy/downloads/list.

92.

Burp Suite, from http://portswigger.net/burp/download.htm l.

93.

Firebug, from https://getfirebug.com/downloads/.

94.

HTTrack W eb site Copier, from http://w w w.httrack.c 0 m/page/ 2 /.

95.

BlackW idow , from http://softbytelabs.com /us/downloads.htm l.

96.

W ebripper, from http://w w w.calluna-software.com /W ebripper.

97.

SurfOffline, from http://w w w.surfoffline.com /.

98.

W ebsite Ripper Copier, from http://w w w.tensons.com /products/w ebsiterippercopier/.

99.

PageNest, from http://w w w .pagenest.com .

100.

Teleport Pro, from http://w w w.tenm ax.com /teleport/pro/download.htm .

101.

Backstreet Browser, from http://www.spadixbd.com /backstreet/.

102.

Portable Offline Browser, from http://w w w .m etaproducts.com /Portable_O ffline_Brow ser.htm .

103.

Offline Explorer Enterprise, from http://w w w .m etaproducts.com /offline_explorer_enterprise.htm .

104.

Proxy Offline Browser, from http://www.proxy-offline-browser.com/.

105.

GNU W get, from ftp://ftp.gnu.org/gnu/wget/.

106.

iMiser, from http://internetresearchtool.com .

107.

Hooeey W ebprint, from http://www.hooeeywebprint.com.s3-website-us-eastl.am azonaws.com /dow nload.htm l.

108.

W ayback M achine, from http://archive.org/web/web.php.

109.

W ebSite-W atcher, from http://aignes.com /download.htm .

110.

eM ailTrackerPro, from http://w w w .em ailtrackerpro.com .

111.

PoliteM ail, from http://w w w .politem ail.com .

112.

Email Lookup - Free Email Tracker, from http://w w w.ipaddresslocation.org.

113.

Read Notify, from http://w w w .readnotify.com .

114.

Pointofmail, from http://w w w .pointofm ail.com .

References Page 2979

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
References

Exam 312-50 Certified Ethical Hacker

115.

DidTheyReadlt, from http://w w w .didtheyreadit.com .

116.

Super Email M arketing Softw are, from http://www.bulk-email-marketing-software.net.

117.

Trace Email, from http://whatismyipaddress.com/trace-email.

118.

W h o R e a d M e , from http://w horeadm e.com .

119.

MSGTAG, from http://www.m sgtag.com /download/free/.

120.

GetNotify, from http://w w w .getnotify.com .

121.

Zendio, from http://w w w.zendio.com /download.

122.

G-Lock Analytics, from http://glockanalytics.com.

123.

EDGAR Database, from http://w w w .sec.gov/edgar.shtm l.

124.

Hoovers, from http://w w w .hoovers.com .

125.

LexisNexis, from http://www.lexisnexis.com .

126.

Business W ire , from http://w w w.businesswire.com .

127.

M arket W atch, from http://w w w .m arketw atch.com .

128.

The W all Street T ra n scrip t, from http://w w w .tw st.com .

129.

Upper M arketplace, from http://w w w .lipperm arketplace.com .

130.

Eurom onitor, from http://w w w .eurom onitor.com .

131.

Fagan Finder, from http://w w w.faganfinder.com .

132.

SEC Info, from http://w w w .secinfo.com .

133.

The Search Monitor, from http://w w w .thesearchm onitor.com .

134.

Compete PRO™, from http://w w w .com pete.com .

135.

Copernic Tracker, from http://w w w.copernic.com .

136.

ABI/IN FO RM Global, from http://w w w .proquest.com .

137.

SEM Rush, from http://w w w.sem rush.com .

138.

AttentionM eter, from http://w w w .attentionm eter.com .

139.

Jobitorial, from http://w w w .jobitorial.com .

140.

Google Hacking Database, from http://w w w.hackersforcharity.org.

141.

M etaGoofil, from http://www.edge-security.com .

142.

Google Hack Honeypot, from http://ghh.sourceforge.net.

143.

Goolink Scanner, from http://w w w.ghacks.net.

144.

GM apCatcher, from http://code.google.com.

145.

SiteDigger, from http://w w w .m cafee.com .

146.

SearchDiggity, from http://w w w.stachliu.com .

147.

Google Hacks, from http://code.google.com.

148.

Google HACK DB, from http://w w w .secpoint.com .

149.

BiLE Suite, from http://w w w.sensepost.com .

150.

Gooscan, from http://w w w.darknet.org.uk.

151.

W H O IS Lookup at DomainTools.com, from http://whois.dom aintools.com /.

152.

Domain Dossier, from http://centralops.net/co.

153.

Sm artW hois, from http://www.tam os.com /download/m ain/index.php.

154.

CountryW hois, from http://www.tam os.com /products/countrywhois/.

References Page 2980

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
References

Exam 312-50 Certified Ethical Hacker

155.

W h o is Analyzer Pro, from http://w w w.whoisanalyzer.com /dow nload.opp.

156.

LanWhols, from http://lantricks.com/download/.

157.

HotW hois, from http://w w w.tialsoft.com /download/?url=http://ww w .tialsoft.com /hwhois.exe.

158.

Batch IP Converter, from http://w w w .netw orkm ost.com /dow nload.htm .

159.

W hois 2010 Pro, from http://lapshins.com/.

160.

CallerIP, from http://w w w.callerippro.com /dow nload.htm l.

161.

ActiveW hois, from http://w w w.johnru.com /.

162.

W h o is Lookup M ultiple Addresses, from http://www.sobolsoft.com /.

163.

WhoisThisDom ain, from http://w w w.nirsoft.net/utils/w hois_this_dom ain.htm l.

164.

Sm artW hois, from http://sm artwhois.com .

165.

W hois, from http://tools.whois.net.

166.

Better W hois, from http://w w w .betterw hois.com .

167.

DNSstuff, from http://w w w.dnsstuff.com .

168.

W hois Source, from http://www.whois.se.

169.

N etw ork Solutions Whois, from http://w w w.netw orksolutions.com .

170.

W e b Wiz, from http://www.webwiz.co.uk/domain-tools/whois-lookup.htm.

171.

W ebToolHub, from http://www.webtoolhub.com/tn561381-whois-lookup.aspx.

172.

Network-Tools.com, from http://network-tools.com.

173.

Ultra Tools, from https://w ww .ultratools.com /w hois/hom e.

174.

dnsstuff, from http://w w w.dnsstuff.com /.

175.

network-tools, from http://network-tools.com/.

176.

DNS Queries, from http://www.dnsqueries.com /en/.

177.

DIG, from http://www.kloth.net/services/dig.php.

178.

myDNSTools, from http://www.m ydnstools.info/nslookup.

179.

DN SW atch, from http://w w w .dnsw atch.info.

180.

DomainTools, from http://w w w.dom aintools.com .

181.

Professional Toolset, from http://www.dnsstuff.com /tools.

182.

DNS, from http://e-dns.org.

183.

DNS Records, from http://network-tools.com.

184.

DNS Lookup Tool, from http://www.webwiz.co.uk/domain-tools/dns-records.htm.

185.

DNSData View, from http://w w w .nirsoft.net.

186.

DNS Query Utility, from http://w w w.webm aster-toolkit.com .

187.

W H O IS-RW S, from http://whois.arin.net/ui.

188.

Netcraft, from http://searchdns.netcraft.com /Phost.

189.

Shodan, from http://w w w.shodanhq.com /.

190.

Path Analyzer Pro, from http://w w w.pathanalyzer.com /dow nload.opp.

191.

VisualRoute 2010, from http://w w w .visualroute.com /dow nload.htm l.

192.

N etw ork Pinger, from http://w w w.netw orkpinger.eom /en/dow nloads/#dow nload.

193.

Magic NetTrace, from http://w w w.tialsoft.com /download/?url=http://ww w .tialsoft.com /m NTr.exe.

194.

GEO Spider, from http://oreware.com /viewprogram .php?prog=22.

References Page 2981

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
References

Exam 312-50 Certified Ethical Hacker

195.

3D Traceroute, from http://w w w .d3tr.de/dow nload.htm l.

196.

vTrace, from http://vtrace.pl/download.htm l.

197.

AnalogX HyperTrace, from
http://w w w.analogx.com /contents/dow nload/N etwork/htrace/Freeware.htm .

198.

Trout, from http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/freetools/trout.aspx.

199.

N etw ork Systems Traceroute, from http://w w w .net.princeton.edu/traceroute.htm l.

200.

Roadkil's Trace Route, from http://www.roadkil.net/program .php/P27/Trace%20Route

201.

Ping Plotter, from http://w w w .pingplotter.com .

202.

myiptest, from http://www.myiptest.com/staticpages/index.php/how-about-you.

203.

Maltego, from http://w w w.paterva.com /web6/products/download4.php.

204.

Domain Name Analyzer Pro, from http://www.domainpunch.com/domain-name-analyzerpro/download.php.

205.

W e b Data Extractor, from http://w w w .w ebextractor.com .

206.

Prefix W hois, from http://pwhois.org.

207.

Netmask (IRPAS), from http://w w w.phenoelit.org/irpas/dow nload.htm l.

208.

Binging, from http://w w w.blueinfy.com /tools.htm l.

209.

Tctrace (IRPAS), from http://w w w.phenoelit.org/irpas/dow nload.htm l.

210.

Spiderzilla, from http://spiderzilla.mozdev.org/installation.html.

211.

Autonom ous System Scanner (ASS) (IRPAS), from http://w w w.phenoelit.org/irpas/dow nload.htm l.

212.

Sam Spade, from http://w w w.m ajorgeeks.com /Sam _Spade_d594.htm l.

213.

DNS DIGGER, from http://www.dnsdigger.com .

214.

Robtex, from http://w w w.robtex.com .

215.

Dig W e b Interface, from http://w w w.digw ebinterface.com

216.

SpiderFoot, from http://sourceforge.net/projects/spiderfoot/?so.urce=dlp.

217.

Domain Research Tool, from http://w w w .dom ainresearchtool.com .

218.

CallerIP, from http://w w w.callerippro.com /dow nload.htm l.

219.

ActiveW hois, from http://w w w .johnru.com .

220.

Zaba Search, from http://www.zabasearch.com /.

221.

yoNam e, from http://yonam e.com .

222.

GeoTrace, from http://www.nabber.org/projects/geotrace/.

223.

Ping-Probe, from http://www.ping-probe.com/Ping-Probe/index.html.

224.

DomainHostingView, from http://w w w .nirsoft.net.

M o d u le 03: Scanning N etw orks
225.

Explanation of the Three-W ay Handshake via TCP/IP, from http://support.microsoft.com/kb/172983.

226.

Appendix G. Lists of reserved ports, ICM P types and codes, and Internet protocols, from
http://www.ingate.com /files/422/fwm anual-en/xal0285.htm l.

227.
228.

The Art of Port Scanning - by Fyodor, from http://nm ap.org/nm ap_doc.htm l.
M ethods of IP N etw ork Scanning - Stealth TCP Scanning Methods, from
http://w w w .c 0 dewalkers.c 0 m/c/a/Server-Administrati0 n /M eth 0 ds-0 f-IP-Netw 0 rk-Scanning/ 3 /.

References Page 2982

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
References

229.

Exam 312-50 Certified Ethical Hacker

W h a t is Port Scanning and Types of Port Scanning, from http://www.hackillusion.com/what-is-portscanning-and-types-of-port-scanning/.

230.

UDP Scan, from http://www.networkuptim e.com /nm ap/page3-10.shtm l.

231.

Hacking Exposed, from http://www.scribd.com/doc/62708034/Hacking-Exposed-Book.

232.

N etw ork Security Assessment, from
https://w w w .trustm atta.com /dow nloads/pdf/M atta_IP_N etw ork_Scanning.pdf.

233.

Quick-Tip: SSH Tunneling M ade Easy, from http://www.revsys.com/writings/quicktips/ssh-tunnel.html.

234.

Detecting Spoofed Packets, from http://seclab.cs.ucdavis.edu/papers/DetectingSpoofed-DISCEX.pdf.

235.

Scanning modes: FIN, Xmas, Null, from http://www.openxtra.co.uk/support/howto/nmap-scanmodes.php.

236.

Port scanning techniq:sW (W in d o w scan), from http://www.paulisageek.com /nm ap/index.htm l.

237.

Prabhaker M ateti, UDP Scanning, from http://www.cs.wright.edu/~pmateti/Courses/499/Probing/.

238.

FTP server bounce attack, TCP Fragmenting, Intrusion detection systems use signature-based
mechanisms, from http://www.in-f-or.it/informatica/docs/portscan.pdf.

239.

Laura Chappell, (2003), OS Fingerprinting W ith ICM P: ICM P echo, from
http://www.securitypronews.com /it/security/spn-23-200309290SFingerprintingwithlCMP.htm l.

240.
241.

Scan Type-sF -sX -sN, from http://content.ix2.net/arc/t-4370.html.
Unixo3/introduction to Nmap, from http://www.sam hart.com /cgi‫־‬
bin/classnotes/wiki.pl?UNIX03/lntroduction_To_Nm ap.

242.

Fyodor, (2006), Art of port scanning: Features, Ideal scanning and related IPID games, Nmap: discription,
Fingerprint methadology: IPID samplingBounce attacks worked, Techniqe: TCP reverse ident scanning,
from http://w w w.insecure.org/nm ap/nm ap_doc.htm l.

243.

Antirez, hping2(8) - Linux man page: Discription, Hping2 Commands, from
http://www.hping.org/m anpage.htm l.

244.

Chris McNab, (2008), Third Party IP N etw ork Scanning Methods, Available from
http://w w w .c 0 dewalkers.c 0 m/c/a/Server-Administrati0 n/Third-Party-IP-Netw 0 rk-Scanning-Meth 0 ds/.

245.

Thierry Lagarde , AutoScan Network, Available from http://autoscannetwork.com/index. php?option=com_content&task=view&id=48&ltemid=32.

246.

Onion Routing, Available from http://dictionary.zdnet.com/definition/onion+routing.html.

247.

Van Geelkerken F.W .J, (2006), Digital Mixing (M IX nets), Available from
http://www.iusm entis.com /society/privacy/rem ailers/onionrouting/.

248.

Keith J. Jones, M ike Shema, & Bradley C. Johnson, Vulnerability Scanners, from
w ww.foundstone.com /pdf/books/AntiHackerSam ple.pdf.

249.

Examining Port Scan Methods- Analysing Audible Techniques, from http://www.in-for.it/informatica/docs/portscan.pdf.

250.

IM S General W e b Services Security Profile,
http://w w w.im sglobal.org/gws/gw svlpO/im sgw s_securityProfvlpO .htm l.

251.

Bew are!: W a r dialing, from http://w w w.castlecops.com /al361-W ar_dialing.htm l.

252.

Simson L. Garfinkel, Autom atic Parity Detection, from http://archive.cert.unistuttgart.de/archive/bugtraq/1998/12/msg00215.html.

253.

Lance M ueller, CREATE A REVERSE SSH TUNNEL,
http ://w w w .lancem ueller.com /blog/C reate%20Reverse%20SSH %20to%20reach%20servlet%20inside%2
Ofirewall.pdf.

References Page 2983

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
References

254.

Exam 312-50 Certified Ethical Hacker

Avi Kak, (2010), Port Scanning, Vulnerability Scanning, Packet Sniffing, and Intrusion Detection,
http://cobweb.ecn.purdue.edu/~kak/com psec/NewLectures/Lecture23.pdf.

255.

Renaud Deraison, Ron Gula, and Todd Hayton, (2009), Passive Vulnerability Scanning Introduction,
http://nessus.org/whitepapers/passive_scanning_tenable.pdf.

256.

Cheng Guang, TCP Analysis Based on Flags, http://www.nordu.net/development/2nd-cnnw/tcp-analysisbased-on-flags.pdf.

257.

Cheng Tang & Jonathan Gossels, (1999), Wardialing: Practical Advice to Understand Your Exposure,
http://www.system experts.com /assets/tutors/wardial0299.pdf.

258.

N etw ork Security Library, from
http://w w w.window security.com /w hitepapers/m isc/Exam ining_port_scan_m ethods__ Analyzing_Audibl
e_Te.

259.

Lance Cottrell, Anonym izer Limitations: Logs, from http://www.livinginternet.eom /i/is_anon.htm .

260.

Michel Leconte, (2006), N etw ork security consulting, from http://www.activsupport.com/SmallBusiness-Network-Security-Soluti.

261.
262.

Angry IP Scanner, from http://angryip. 0 rg/w/D 0 w n l 0 a d .
SolarW inds Engineer's Toolset, from http://downloads.solarwinds.com/solarwinds/Release/Toolset/ZPToolset/ZP-Toolset-Ol.html.

263.
264.

Colasoft Ping Tool, from http://w w w.colasoft.com /dow nload/products/dow nload_ping_tool.php.
PacketTrap M SP, from http://www.packettrap.com/download?hsCtaTracking=e95ec5b5-069f-4cd5962c-9c0e6e32a6da%7C072dfe23-353f-46c2-9ab0-la27d39c01fl.

265.
266.

Visual Ping Tester - Standard, from http://w w w .pingtester.net.
Ping Sw eep (Integrated into W hatsupG old), from
http://www.whatsupgold.com /products/download/network_m anagem ent.aspx?k_id=ping-sweep-tool.

267.

Ping Scanner Pro, from http://www.digilextechnologies.com .

268.

N etw ork Ping, from http://www.greenline-soft.com /product_network_ping/index.aspx.

269.

Ultra Ping Pro, from http://ultraping.webs.com /downloads.htm .

270.

Ping Monitor, from http://w w w.niliand.com .

271.

PinglnfoView, from http://w w w.nirsoft.net/utils/m ultiple_ping_tool.htm l.

272.

Pinkie, from http://w w w.ipuptim e.net/category/download/.

273.

Colasoft Packet Builder, from
http://w w w.colasoft.com /dow nload/products/dow nload_packet_builder.php.

274.

NetScanTools Pro, from http://w w w.netscantools.com /nstprodem orequestform .htm l.

275.

PRTG N etw ork M onitor, from http://w w w.paessler.com /dow nload/prtg.

276.

Global Network Inventory Scanner, from
http://w w w .m agnetosoft.com /products/global_network_inventory/gni_features.htm .

277.

Net Tools, from http://m absoft.com /nettools.htm .

278.

SoftPerfect Netw ork Scanner, from http://w w w.softperfect.com /products/netw orkscanner/.

279.

IP Tools, from http://www.ks-soft.net/ip-tools.eng/downpage.htm.

280.

Advanced Port Scanner, from http://www.radm in.com /dow nload/previousversions/portscanner.php.

281.

MegaPing, from http://www.m agnetosoft.com /products/m egaping/m egaping_features.htm .

282.

Netifera, from http://netifera.com .

283.

N etw ork Inventory Explorer, from http://www.10strike.com /networkinventoryexplorer/download.shtm l.

References Page 2984

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
References

284.

Exam 312-50 Certified Ethical Hacker

Free Port Scanner, from
http://w w w .nsauditor.eom /netw ork_tools/free_port_scanner.htm l#.U W JRvqLzvrw .

285.

ID Serve, from http://w w w.grc.com .

286.

Netcraft, from http://toolbar.netcraft.com .

287.

Netcat, from http://sourceforge.net/projects/netcat/files/latest/download?source=files.

288.

GFI LanGuard, from http://www.gfi.com/downloads/mirrors.aspx?pid=lanss.

289.

SAINT, from http://w w w.saintcorporation.com /products/software/saintScanner.htm l.

290.

Retina CS, from http://www.beyondtrust.com/Landers/TY-Page-RetinaCSCommunity/index.html.

291.

OpenVAS, from http://w w w .openvas.org.

292.

Core Impact Professional, from http://w w w .coresecurity.com .

293.

Security M anager Plus, from http://www.manageengine.com/products/securitymanager/download, html.

294.

Nexpose, from http://www.rapid7.com /products/nexpose/com pare-downloads.jsp.

295.

Shadow Security Scanner, from http://www.safety-lab.com /en/download.htm .

296.

QualysGuard, from http://w w w.qualys.com .

297.

Nsauditor Netw ork Security Auditor, from
http://w w w.nsaudit 0 r.c 0 m /netw 0 rk_security/netw 0 rk_security_audit 0 r.htm l#.UW KEx 6 Lzvrw.

298.
299.

Security Auditor's Research Assistant (SARA), from http://www-arc.com /sara/.
LANsurveyor, from
http://www.solarwinds.com/register/MoreSoftware.aspx?External=false&Program=17592&c=70150000
OOOPjNE.

300.

OpM anager, from http://www.m anageengine.com /network-m onitoring/download.htm l.

301.

N etw orkView , from http://w w w .netw orkview .com /htm l/dow nload.htm l.

302.

The Dude, from http://w w w.m ikrotik.com /thedude.

303.

LANState, from http://www.10-strike.com /lanstate/download.shtm l.

304.

HP Network Node M anager i software, from http://w w w 8 .hp.com/us/en/softwaresolutions/software. html?compURI=1170657#.

305.

FriendlyPinger, from http://www.kilievich.com /fpinger/download.htm .

306.

N etM apper, from http://w w w .opnet.com .

307.

Ipsonar, from http://w w w.lum eta.com /product/product.htm l.

308.

NetBrain Enterprise Suite, from http://www.netbraintech.com /instant-trial/.

309.

CartoReso, from http://cartoreso.cam pus.ecp.fr.

310.

Spiceworks-Network M apper, from http://w w w.spicew orks.com /dow nload/.

311.

Switch Center Enterprise, from http://www.lan-secure.c 0 m/d 0 w n l 0 ads.htrn#netw 0 rk.

312.

NetCrunch, from http://www.adrem soft.com /dem o/downloadproduct. php?product=nc7&file=NCServer7Premium. exe.

313.

Proxy W orkbench, from http://proxyworkbench.com/.

314.

Proxifier, from http://w w w.proxifier.com /dow nload.htm .

315.

Proxy Switcher, from http://w w w.proxysw itcher.com /.

316.

SocksChain, from http://ufasoft.com/socks/.

317.

TOR (The Onion Routing), from https://w ww .torproject.org/download/dow nload.

References Page 2985

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
References

Exam 312-50 Certified Ethical Hacker

318.

Proxy, from http://www.analogx.com /conter 1
ts/download/N etw ork/proxy/Freeware.htm .

319.

Proxy Commander, from http://www.dlao.com /proxycm d/.

320.

Protoport Proxy Chain, from http://w w w .protoport.com .

321.

Proxy Tool W indow s App, from http://webproxylist.com/proxy-tool-windows-app/.

322.

Proxy+, from http://www.proxyplus.cz/.

323.

Gproxy, from http://gpassl.com /gproxy.php.

324.

FastProxySwitch, from http://www.affinity-tools.com/fps/.

325.

Fiddler, from http://www.fiddler2.com /fiddler2/version.asp.

326.

ProxyFinder Enterprise, from http://www.proxy-tool.com .

327.

Socks Proxy Scanner, from http://w w w .m ylanview er.com .

328.

ezProxy, from https://w ww . 0 clc.0 rg/ezpr0 xy/d 0 w n l 0 ad.en.h.tm l.

329.

Charles, from http://www.charlesproxy.com /.

330.

JA P Anonym ity and Privacy, from http://anon.inf.tu-dresden.de/win/download_en.htm l.

331.

UltraSurf, from http://w w w.ultrasurf.us.

332.

CC Proxy Server, from http://www.youngzsoft.net/ccproxy/proxy-server-download.htm.

333.

W ideCap, from http://w idecap.ru.

334.

FoxyProxy Standard, from https://addons.mozilla.org.

335.

ProxyCap, from http://w w w.proxycap.com .

336.

Super N etw ork Tunnel, from http://w w w .netw orktunnel.net.

337.

HTTP-Tunnel, from http://www.http-tunnel.com .

338.

Bitvise, from http://w w w .bitvise.com .

339.

Psiphon, from http://psiphon.ca.

340.

Your-Freedom, from http://w w w.your-freedom .net.

341.

Just Ping, from http://www.just-ping.com.

342.

W ebSitePulse, from http://w w w .w ebsitepulse.com .

343.

G-Zapper, from http://w w w.dum m ysoftw are.com /gzapper.htm l.

344.

M ow ser, from http://w w w .m ow ser.com .

345.

Spotflux, from http://w w w.spotflux.com .

346.

Anonym ous W e b Surfing Tool, from http://www.anonym ous-surfing.com .

347.

U-Surf, from http://ultim ate-anonym ity.com .

348.

Hide Your IP Address, from http://w w w .hideyouripaddress.net.

349.

W arpProxy, from http://silent-surf.com.

350.

Anonymizer Universal, from http://w w w.anonym izer.com .

351.

Hope Proxy, from http://w w w.hopeproxy.com .

352.

Guardster, from http://w w w.guardster.com .

353.

Hide M y IP, from http://www.privacy-pro.com /features.htm l.

M o d u le 04: Enum eration
354.

rpcinfo, from http://www.usoft.spb.ru/com m ands/rpcinfo/.

355.

RPCCLIENT, from http://w w w .sarata.com /m anpages/m anl/rpcclient.htm l.

References Page 2986

Ethical Hacking and Countermeasures Copyright © by EC-C0l1nCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
References

Exam 312-50 Certified Ethical Hacker

356.

Enum eration, from http://w w w.edenofire.com /tutes/hack.php.

357.

smtp-user-enum User Docum entation, from http://pentestmonkey.net/tools/user-enumeration/smtpuser-enum.

358.

Chris Gates, (2006), W indow s Enum eration: USER2SID & SID2USER, from
http://w w w.window security.com /w hitepaper/W indow s-Enum eration-USER2SID-SID2USER.htm l.

359.

W h a t is S N M P ?, from http://www.wtcs.org/snm p4tpc/snm p.htm .

360.

SN M P, from http://w w w.cisc 0 .c0 m/univercd/cc/td/d 0 c/cisintwk/it 0 _ d 0 c/snmp.htm#xt 0 cid 5 .

361.

SN M PForDum m ies, from http://w iki.outboundindex.net/SNM PForDum m ies.

362.

Jan van Oorschot, Jeroen W orte lb o e r and Dirk W isse, (2001), S N M P - The Mission Statem ent,
http://www.securityfocus.com/infocus/1301.

363.

rp c in fo (lM ), from http://docs.hp.com /en/B2355-90692/rpcinfo.lM.htm l.

364.

GRAPE- INFO- DOT- COM, from http://www.grape-info.com .

365.

Joris Evers, (2006), AT&T hack exposes 19,000 identities, from http://news.cnet.com/2100-1029_36110765.html.

366.

S N M P from http://w w w .iss.net/security_center/advice/Reference/N etw orking/SN M P/default.htm .

367.

Simple Netw ork M anagem ent Protocol (SN M P), from
http://www.cisco.com /en/US/docs/internetworking/technology/handbook/SNM P.htm l.

368.

Linux / Unix finger command, from http://www.com puterhope.com /unix/ufinger.htm .

369.

Chris Gates, (2006), W in d o w s Enum eration: USER2SID & SID2USER
http://w w w.window security.com /w hitepapers/W indows-Enum eration-USER2SID-SID2USER.htm l.

370.

SuperScan, from http://www.m cafee.com /us/downloads/free-tools/superscan.aspx.

371.

Hyena, from http://w w w.system tools.com /hyena/trial_dow nload.htm .

372.

Winfingerprint, from http://w w w.winfingerprint.com .

373.

N etBIO S Enum erator, from http://nbtenum .sourceforge.net/.

374.

PsTools, from http://technet.microsoft.com/en-us/sysinternals/bb897553.aspx.

375.

OpUtils, from http://www.m anageengine.com /products/oputils/download.htm l.

376.

SolarW ind 's IP Netw ork Browser, from http://www.solarwinds.com/engineers-toolset/ip-networkbrowser, aspx.

377.

Getif, from http://www.wtcs.org/snm p4tpc/getif.htm .

378.

O iD ViEW S N M P M IB Browser, from http://w w w .oidview .com /m ibbrow ser.htm l.

379.

iReasoning M IB Browser, from http://ireasoning.com /m ibbrowser.shtm l.

380.

SNScan, from http://www.mcafee.com/us/downloads/free-tools/snscan.aspx.

381.

S N M P Scanner, from http://www.secure-bytes.com /SNM P+Scanner.php.

382.

S N M P Informant, from http://www.snm p-inform ant.com /.

383.

Net-SNMP, from http://net-snm p.sourceforge.net/download.htm l.

384.

Nsauditor Netw ork Security Auditor, from
http://w w w.nsaudit 0 r.c 0 m /netw 0 rk_security/netw 0 rk_security_audit 0 r.htm l#.UV 7 LH 5 NHLZ 4 .

385.

Spiceworks, from http://www.spiceworks.com/free-snmp-network-management-software/.

386.

Enum4linux, from http://labs.portcullis.co.uk/application/enum4linux/.

387.

Softerra LDAP Administrator, from http://w w w.ldapadm inistrator.com /.

388.

JXplorer, from http://www.jxplorer.org/.

389.

LDAP Admin Tool, from http://w w w.ldapsoft.com /ldapbrowser/ldapadm intool.htm l.

References Page 2987

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
References

Exam 312-50 Certified Ethical Hacker

390.

LDAP Account M anager, from https://www.ldap-account-manager.org/lamcms/.

391.

LEX - The LDAP Explorer, from http://w w w.ldapexplorer.com /.

392.

LDAP Admin, from http://www.ldapadm in.org/.

393.

Active Directory Explorer, from http://technet.microsoft.com/en-us/sysinternals/bb963907.aspx.

394.

LDAP Administration Tool, from http://sourceforge.net/projects/ldap-at/.

395.

LDAP Search, from http://securityxploded.com/ldapsearch.php.

396.

Active Directory Domain Services M anagem ent Pack, from http://www.microsoft.com/enus/download/details.aspx?id=21357.

397.

LDAP Browser/Editor, from http://www.novell.com /coolsolutions/tools/13765.htm l.

398.

NSLookup, from http://www.kloth.net/services/nslookup.php.

M o d u le 05: System Hacking
399.

W h y Keyloggers are extrem ely dangerous?, from http://gamecreator.hubpages.com/hub/WhyKeyloggers-are-extremely-dangerous.

400.

Steganography in Depth, from http://www.crcnetbase.com/doi/abs/10.1201/9780203504765.ch4.

401.

Detecting spoofed packets, from http://ieeexplore.ieee.0rg/xpl/articleDetails.jsp?arnumber=1194882.

402.

NTLM Authentication in Java, from http://www.luigidragone.com/software/ntlm-authentication-in-java/.

403.

A Tutorial Review on Steganography, from http://www.jiit.ac.in/jiit/ic3/IC3_2008/IC32008/APP2_21.pdf.

404.
405.

network scanning, from http://searchm idm arketsecurity.techtarget.com /definition/network-scanning.
Ricky M. Magalhaes, (2004), Using passwords as a defense mechanism to improve W indow s security,
from w w w .w ind ow security.com /artid es/Passw ord s_lm p rove_W ind ow s_Security_Part2 .htm l.

406.

Piazza & Peter, (2002), Hybrid threats have rosy future: attacks that combine virus ...,
http://findartides.com /p/articles/m i_hb6380/is_200207/ai_n25618875?tag=content;coll.

407.
408.

Andreas W estfeld and Andreas Pfitzmann, Attacks on Steganographic Systems, citeseerx.ist.psu.edu/.
DaijiSanai and HidenobuSeki, (2004), Optimized Attack for NTLM2 Session Response
http://www.blackhat.com/presentations/bh-asia-04/bh-jp-04-pdfs/bh-jp-04-seki.pdf.

409.

Zhi W ang, Xuxian Jiang, W eidong Cui, and Xinyuan W ang, Countering Persistent Kernel Rootkits Through
System atic Hook Discovery, http://research.microsoft.com/en-us/um/people/wdcui/papers/hookmapraid08.pdf.

410.

Elia Florio, W hen M alw are M eets Rootkits,
http://w w w .sym antec.com /avcenter/reference/w hen.m alw are.m eets.rootkits.pdf.

411.
412.

Peter Piazza, (2002), SM O : Tech Talk, from http://www.securitym anagem ent.com /library/001272.htm l.
Brute force attack - Wikipedia, the free encyclopedia, from
http://en.wikipedia.org/w iki/Brute_force_attack.

413.
414.

Talk:Brute force attack - Bvio, from http://bvio.ngic.re.kr/Bvio/index.php/Talk:Brute_force_attack.
Passwords, from
http://searchsecurity.techtarget.com /searchSecurity/downloads/HackingforDum m iesCh07.pdf.

415.

Authernative, Inc. | Products | FAQs, from http://w w w.authernative.com /faqs.shtm l.

416.

CIAC Notes, from http://www.ciac.org/ciac/notes/Notes03a.shtm l.

417.

Path: new shost.uw o.caluw ovax.uw o.calm neville From: m neville@ uw ovax ..., from
http://w w w.uwo.ca/its/doc/newsletters/lnTouch/voll-9495/w inl8.txt.

418.

The Hack FAQ: Password Basics, from http://www.nmrc.org/pub/faq/hackfaq/hackfaq-04.html.

References Page 2988

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
References

419.
420.

Exam 312-50 Certified Ethical Hacker

Luigi Dragone, NTLM Authentication in Java, from http://www.luigidragone.com /networking/ntlm .htm l.
Hardening the Base W indow s 2000 Server, from
http://www.m icrosoft.com /technet/security/prodtech/windows2000/secwin2k/swin2k06.m spx.

421.

Bill W all, Sunbelt TECH BRIEFIN G, from http://w w w.stratvantage.com /security/ntpass.htm .

422.

Security Options, from
http://www.microsoft.com/technet/security/topics/serversecurity/tcg/tcgch05n.mspx.

423.

Technical Explanation of N etw ork S M B Capture, from
http://ebook.coolersky.com /hack/lc5.04_doc/sm b_capture.htm l.

424.

Detecting Alternate Data Streams, from
http://www.windowsitpro.com /Article/ArtidelD/16189/16189.htm l.

425.

Bojan Smojver, Linux Today - ZDNet Australia: Threats M ove Beyond Linux to W indow s,
http://www.linuxtoday.com/security/2002121100426SCSVNT.

426.

Neohapsis Archives - NTBugtraq - Proposal for protection from ..., from
http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0245.html.

427.

Russell Kay, (2006), Sidebar: A Simple Rootkit Example,
http://www.computerworld.eom/securitytopics/security/hacking/story/0,10801,108116,00.html?from=s
tory_package.

428.

Russell Kay, (2006), Rootkits offer the lure of total control, from
http://www.tech world. com/security/features/index.cfm?featureid=2219.

429.
430.

Paladion Networks, from http://www.paladion.net/m edia/insights/ihfaq.htm .
NTFS Stream s - Everything you need to know (demos and tests included), from
http://www.diam ondcs.com .au/stream s/stream s.htm .

431.

H. Carvey, (2002), The Dark Side of NTFS (M icrosoft's Scarlet Letter), from
http://www.infosecwriters.com /texts.php?op=display&id=53.

432.

Stegonography (a secretly hidden coding that dates back to a n c ie n t...), from
http://www.wordinfo.info/words/index/info/view_unit/3403/?letter=S&spage=9.

433.

Ravindranath AV, Steganography: Hiding Data in Images, from
http://www.asptoday.com /Content.aspx?id=2347.

434.

Paul Robertson, (2005), CS 450 Hom ework 4, from
http://www.cs.umb.edu/~paulr/CS450/assignments/ass4.html.

435.

NBTdeputy (v 1.0.1), from http://w w w.securityfriday.com /Topics/w inxpl.htm l.

436.

Sir Dystic, (2002), N BN am e, from
http://www.securityfocus.com/comments/tools/1670/12751/threaded.

437.

Fred B. Schneider, Authentication, from http://www.cs.cornell.edu/Courses/cs513/2000sp/NL10.html.

438.

CS513: System Security - Topic Outline, from
http://www.cs.cornell.edu/courses/cs513/2005fa/02.outline.html.

439.

Security Options from
http://www.microsoft.com/technet/security/guidance/serversecurity/tcg/tcgch05n.mspx.

440.

Hardening the Base W in d o w s 2000 Server, http://technet.microsoft.com/hi-in/library/cc751216(enus).aspx.

441.

Brute force attack, from http://w w w .reference.com /brow se/w iki/Brute_force_attack.

442.

W h a t is pwdump2, from
http://w w w.bindview.com /Services/razor/Utilities/W indow s/pwdum p2_readm e.cfm .

443.

Derogee, Steganography and Steganalysis, from http://www.liacs.nl/hom e/tm oerlan/privtech.pdf.

References Page 2989

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
References

444.

Exam 312-50 Certified Ethical Hacker

Techworld.com - Rootkits offer the lure of total control, from
http://www.tech world. com /websecurity/features/index.cfm ?featureid=2219&pagtype=sam ecatsam ech
an.

445.
446.

Dasmith, Softw are Analysis, from http://www.unc.edu/~sm ithdr/inlsl87/sr.htm l.
Hacking Windows-Specific Services, from
http://awkwardalliteration.com/ebooks/Computers/Hacking%20Exposed%20W indow s% 202003%20Chapter%205.pdf.

447.

Ricky M. Magalhaes, (2003), Using passwords as a defense mechanism to improve W indow s security,
from http ://w w w .w indow security.com /articles/Passw ords_lm prove_W indow s_Security_Part2.htm l.

448.

W inrtgen, from http://www.oxid.it/projects.htm l.

449.

RainbowCrack, from http://pr 0 ject-rainb 0 w crack.c 0 m/index.htm#d 0 w n l 0 a d .

450.

Elcomsoft Distributed Password Recovery, from http://w w w.elcom soft.com /edpr.htm l.

451.

Securityoverride, from http://securityoverride.org/default-password-list.

452.

Cirt, from http://cirt.net.

453.

Default-password, from http://default-password.info.

454.

Defaultpassword, from http://w w w.defaultpassw ord.us.

455.

Passwordsdatabase, from http://w w w.passwordsdatabase.com .

456.

W 3dt, from https://w3dt.net/tools/defaultpasswords/.

457.

Virus, from http://w w w.virus.org/default_passw ds.

458.

Open-sez.me, from http://open-sez.me/passwd.htm.

459.

Routerpasswords, from http://w w w.routerpasswords.com /.

460.

Fortypoundhead, from http://w w w .fortypoundhead.com /tools_dpw .asp.

461.

pwdump7, from http://www.tarasco.org/security/pwdum p_7/.

462.

fgdump, from http://www.foofus.net/~fizzgig/fgdump/.

463.

LOphtCrack, from http://www.IOphtcrack.com /download.htm l.

464.

Ophcrack, from http://ophcrack.sourceforge.net/download.php.

465.

RainbowCrack, from http://pr 0 ject-rainb 0 w crack.c 0 m/index.htm#d 0 w n l 0 a d .

466.

Password Unlocker Bundle, from http://www.passwordunlocker.com /password-recovery-bundle.htm l.

467.

Proactive System Password Recovery, from http://w w w.elcom soft.com /pspr.htm l.

468.

John the Ripper, from http://w w w.openwall.com /john/.

469.

W indow s Password Cracker, from http://www.windows-password-cracker.com /download.htm l.

470.

W inPassw ord, from http://lastbit.com /ntpsw/default.asp.

471.

Passware Kit Enterprise, from http://www.lostpassword.com /kit-enterprise.htm .

472.

PasswordsPro, from http://www.insidepro.com /eng/passwordspro.shtm l.

473.

LSASecretsView, from http://w w w.nirsoft.net/utils/lsa_secrets_view.htm l.

474.

LCP, from http://www.lcpsoft.com /english/download.htm .

475.

Password Cracker, from http://www.am lpages.com /pwdcrack.shtm l.

476.

Kon-Boot, from http://w w w.thelead82.com /kon-boot/konbootW IN.htm l.

477.

W indow s Password Recovery Tool, from http://w w w .w indow spassw ordsrecovery.com /.

478.

Hash Suite, from http://hashsuite.openw all.net/download.

479.

SAM Inside, from http://www.insidepro.com /eng/sam inside.shtm l.

References Page 2990

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
References

Exam 312-50 Certified Ethical Hacker

480.

W indow s Password Recovery, from http://w w w .passcape.com /w indow s_passw ord_recovery.

481.

Password Recovery Bundle, from http://www.top-password.com/password-recovery-bundle.html.

482.

krbpwguess, from http://www.cqure.net/wp/tools/password-recovery/krbpwguess/.

483.

W indow s Password Breaker Enterprise, from http://www.recoverw indowspassw ord.com /window spassword-breaker.html.

484.

Rekeysoft W indow s Password Recovery Enterprise, from http://www.rekeysoft.com/reset-windowspassword.html.

485.

Active(® Password Changer, from http://www.password-changer.com /.

486.

Offline NT Password & Registry Editor, from http://pogostick.net/~pnh/ntpasswd/.

487.

W indow s Password Reset Kit, from http://www.reset-windows-password.net/.

488.

W indow s Password Recovery Tool, from http://w w w .w indow spassw ordsrecovery.com /.

489.

ElcomSoft System Recovery, from http://www.elcom soft.eom /esr.htm l#forgot adm inistrator password.

490.

Trinity Rescue Kit, from
http://trinityhom e.org/Hom e/index.php?content=TRINITY_RESCUE_KIT_DOW NLOAD&front_id=12&lang
=en&locale=en.

491.

W indow s Password Recovery Bootdisk, from http://www.rixler.com/windows-password-recoverybootdisk.htm.

492.

PasswordLastic, from http://www.passwordlastic.com/windows-password-recovery-lastic.

493.

Stellar Phoenix Password Recovery, from http://www.stellarinfo.com /password-recovery.htm .

494.

W indow s Password Recovery Personal, from http://w w w.window s-passw ordrecovery.com /.

495.

W indow s Adm inistrator Password Reset, from http://www.systoolsgroup.com/windows-adminstratorpassword-reset.html.

496.

RemoteExec, from http://www.isdecisions.com /products/rem oteexec.

497.

PDQ Deploy, from http://www.adm inarsenal.com /download-pdq.

498.

D am eW are NT Utilities, from http://w w w .dam ew are.ru/nt_utilities.htm l.

499.

Spytech SpyAgent, from http://www.spytech-web.com /spyagent.shtm l.

500.

All In One Keylogger, from http://w w w .relytec.com /.

501.

Ultim ate Keylogger, from http://w w w.ultim atekeylogger.com /dow nload/.

502.

Advanced Keylogger, from http://www.m ykeylogger.com /perfect-keylogger.

503.

The Best Keylogger, from http://w w w.thebestkeylogger.com /.

504.

SoftActivity Keylogger, from http://www.softactivity.com /download-al.asp.

505.

Elite Keylogger, from http://www.widestep.com/elite-keystroke-recorder-info.

506.

Pow ered Keylogger, from http://www.m ykeylogger.com /undetectable-keylogger/.

507.

StaffCop Standard, from http://w w w.staffcop.com /dow nload/.

508.

iM onitorPC, from http://w w w.im onitorpc.com /.

509.

PC Activity M onitor Standard, from http://w w w .pcacm e.com /dow nload.htm l.

510.

KeyProw ler, from http://keyprowler.com /download.aspx.

511.

Keylogger Spy Monitor, from http://ematrixsoft.com/download.php?p=keylogger-spy-monitor-software.

512.

REFOG Personal M onitor, from http://www.refog.com /personal-m onitor.htm l.

513.

Actual Keylogger, from http://www.actualkeylogger.com/download-free-key-logger.html.

514.

Spytector, from http://w w w.spytector.com /download.htm l.

References Page 2991

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
References

Exam 312-50 Certified Ethical Hacker

515.

KidLogger, from http://kidlogger.net/download.htm l.

516.

PC Spy Keylogger, from http://www.pc-spy-keylogger.com.

517.

Revealer Keylogger, from http://www.logixoft.com/free-keylogger-download.

518.

Spy Keylogger, from http://www.spy-key-logger.com/download.html.

519.

Actual Spy, from http://w w w.actualspy.com /download.htm l.

520.

SpyBuddy® 2013, from http://www.exploreanywhere.com /products/spybuddy/.

521.

Amac Keylogger, from http://w w w.am ackeylogger.com /.

522.

Aobo M ac OS X KeyLogger, from http://www.keylogger-mac.com/.

523.

Perfect Keylogger for Mac, from http://www.blazingtools.com .

524.

Award Keylogger for Mac, from http://www.award-soft.com /content/view/275/136.

525.

M ac Keylogger, from http://w w w.award-soft.com /M ac_Keylogger/.

526.

REFOG Keylogger for MAC, from http://www.refog.com /m ac-keylogger.htm l.

527.

KidLogger for MAC, from http://kidlogger.net/download.htm l.

528.

MAC Log Manager, from http://www.keylogger.in/keylogger/m adogm anager.htm l.

529.

logkext, from https://c 0 de.g 0 0 gle.c 0 m/p/l0 gkext/.

530.

Keyboard Spy, from http://alphaom ega.softw are.free.fr/keyboardspy/Keyboard%20Spy.htm l.

531.

FreeMacKeylogger, from http://www.hwsuite.com/free-mac-keylogger/.

532.

KeyGrabber, from http://w w w .keydem on.com .

533.

KeyGhost, from http://w w w.keyghost.com .

534.

Activity Monitor, from http://w w w.softactivity.com /download.asp.

535.

Rem ote Desktop Spy, from http://www.global-spy-software.com /download.php.

536.

SSPro, from http://www.gpsoftdev.com /download-m onitoring-software/.

537.

RecoveryFix Em ployee Activity M onitor, from http://www.recoveryfix.com /download-em ployeemonitoring.html.

538.

Em ployee Desktop Live View er, from http://www.nucleustechnologies.com /download-em ployeedesktop-live-viewer.php.

539.

NetVizor, from http://w w w .netvizor.net/dow nload.htm .

540.

Net Spy Pro, from http://www.net-m onitoring-software.com /windows/trial.htm l.

541.

REFOG Em ployee M onitor, from http://www.refog.com /em ployee-com puter-m onitoring-software.htm l.

542.

OsMonitor, from http://www.os-m onitor.com /download.htm .

543.

LANVisor, from http://w w w.lanvisor.com /download.htm .

544.

W o rk Examiner Standard, from http://w w w.workexam iner.com /dow nload.htm l.

545.

Pow er Spy, from http://ematrixsoft.com/index.php.

546.

eBLASTER, from http://www.spectorsoft.com /products/eBlaster_Windows/index.asp?source=nav-hseBwin.

547.

!m onitor Em ployee Activity M onitor, from http://www.em ployee-m onitoring-software.ee/.

548.

Em ployee Monitoring, from http://w w w .em ployeem onitoring.net/dow nload.asp.

549.

OsMonitor, from http://www.os-m onitor.com /download.htm .

550.

Ascendant N FM , from http://www.ascendant-security.com /download.shtm l.

551.

Spylab W ebSpy, from http://w w w.spylab.org/dow nload.htm .

References Page 2992

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
References

Exam 312-50 Certified Ethical Hacker

552.

Personal Inspector, from http://www.spyarsenal.com /personal-inspector/.

553.

CyberSpy, from http://w w w .cyberspysoftw are.com /dow nload.htm l.

554.

AceSpy, from http://w w w.acespy.com /features.htm l.

555.

EmailObserver, from http://w w w .softsecurity.com /prod_D 7_m ore.htm l.

556.

Net Nanny Home Suite, from
http://w w w.netnanny.com /products/netnanny_hom e_suite/detail/technical.

557.

Aobo Filter for PC, from http://www.aobo-porn-filter.com /downloads.

558.

CyberSieve, from http://www.softforyou.com /cs-download.php.

559.

Child Control, from http://salfeld.com/download/child-control/index.html.

560.

SentryPC, from http://w w w.sentrypc.com /trial.htm .

561.

iProtectYou Pro, from http://www.softforyou.com /ip-index.htm l.

562.

K9 W e b Protection, from http://w w w l.k9w ebprotection.com /getk9/dow nload-softw are.

563.

Verity Parental Control Softw are, from http://www.nchsoftware.com /childm onitoring/index.htm l.

564.

Profil Parental Filter, from http://www.profiltechnology.com /en/hom e/profil-parental-filter.

565.

PC Pandora, from http://w w w.pcpandora.com /download/.

566.

KidsWatch, from http://w w w.kidswatch.com /.

567.

SoftActivity TS Monitor, from http://w w w.softactivity.com /downloadtsm .aspx.

568.

Desktop Spy, from http://w w w.spyarsenal.com /dow nload.htm l.

569.

IcyScreen, from http://www.16software.com /icyscreen/screenshots.php.

570.

Spector Pro, from http://www.spectorsoft.com /products/SpectorPro_Windows/index.asp?source=navhs-ProWin.

571.

PC Tattletale, from http://w w w .pctattletale.com /.

572.

Computer Screen Spy Monitor, from http://w w w.m ysuperspy.com /dow nload.htm .

573.

PC Screen Spy M onitor, from http://ematrixsoft.com/download.php?p=pc-screen-spy-monitor-software.

574.

Kahlown Screen Spy Monitor, from http://w w w.lesoftrejion.com /.

575.

Guardbay Rem ote Com puter Monitoring Softw are, from http://w w w.guardbay.com .

576.

HT Em ployee Monitor, from http://w w w.hidetools.com /em ployee-m onitor.htm l.

577.

Spy Em ployee Monitor, from http://www.spysw.com /em ployee-m onitor-software.htm .

578.

USBSpy, from http://www.everstrike.com /usb-m onitor/.

579.

USB Monitor, from http://www.hhdsoftware.com /usb-m onitor.

580.

USB Grabber, from http://usbgrabber.sourceforge.net/.

581.

USBTrace, from http://w w w .sysnudeus.com /usbtrace_dow nload.htm l.

582.

USBD eview , from http://w w w.nirsoft.net/utils/usb_devices_view.htm l.

583.

Advanced USB Port Monitor, from http://www.aggsoft.com/usb-port-monitor.htm.

584.

USB M onitor Pro, from http://www.usb-monitor.com/.

585.

USB Activity Monitoring Softw are, from http://www.datadoctor.org/partition-recovery/downloads.htm l.

586.

Stealth iBot Com puter Spy, from
http://www.brickhousesecurity.com/product/stealth+ibot+computer+spy.do.

587.

KeyCarbon USB Hardware Keylogger, from http://www.spywaredirect.net/keycarbon-usb.htm l.

588.

USB 2GB Keylogger, from http://diij.com/KL2-Keylogger-2GB-USB-Hardware-keelog/prod_24.html.

References Page 2993

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
References

Exam 312-50 Certified Ethical Hacker

589.

Spy Voice Recorder, from http://w w w.m ysuperspy.com /recorder.htm .

590.

Sound Snooper, from http://www.sound-snooper.com /en/download.php.

591.

W ebC am Recorder, from http://w ebcam recorder.com /.

592.

W ebcam M agic, from http://w w w.robom agic.com /w ebcam m agic.htm .

593.

M yW eb cam Broadcaster, from http://w w w.eyespyfx.com /broadcast.php.

594.

I-Can-See-You, from http://w w w .internetsafetysoftw are.com .

595.

Digi-Watcher, from http://www.digi-watcher.com /.

596.

NET Video Spy, from http://w w w.sarbash.com /download.shtm l.

597.

Eyeline Video Surveillance Softw are, from http://w w w.nchsoftware.com /surveillance/index.htm l.

598.

Capturix VideoSpy, from http://www.capturix.com /default.asp?target=consum er&product=cvs.

599.

W ebC am Looker, from http://felenasoft.com /webcam looker/en/.

600.

SecuritySpy, from http://w w w.bensoftware.com /securityspy/download.htm l.

601.

iSpy, from http://www.ispyconnect.com /download.aspx.

602.

Printer Activity Monitor, from http://www.redline-software.com /eng/products/pam /.

603.

Print M onitor Pro, from http://www.spyarsenal.com/printer-monitoring-software/print-monitor-pro/.

604.

Accurate Printer Monitor, from http://www.aggsoft.com /printer-m onitor.htm .

605.

Print Censor Professional, from http://usefuls 0 ft.c 0 m/print-cens 0 r/ # .U W P W 8 JNH LZ 4 .

606.

All-Spy Print, from http://www.all-spy.com/all-spy-print.html.

607.

O &K Print W atch, from http://w w w .prnw atch.com /okpw .htm l.

608.

Print Job Monitor, from http://www.imonitorsoft.com/product-print-job-monitor.htm.

609.

PrintTrak, from http://www.lygil.com /printtrak/printtrak.htm .

610.

Printer Admin - Copier Tracking System, from http://w w w.printeradm in.com /copy-m anagem ent.htm .

611.

Print Inspector, from http://www.softperfect.com /products/pinspector/.

612.

Print365, from http://krawasoft.com /index.htm l.

613.

M obile Spy, from http://w w w .phonespysoftw are.com /.

614.

VRS Recording System, from http://www.nch.com .au/vrs/index.htm l.

615.

M odem Spy, from http://w w w.m odem spy.com /en/dow nload.php.

616.

M obiStealth Cell Phone Spy, from http://www.mobistealth.com/mobile-phone-spy-software.

617.

SPYPhone GOLD, from http://spyera.com/products/spyphone-gold-internet.

618.

SpyPhoneTap, from http://w w w.spyphonetap.com /.

619.

FlexiSPY O M N I, from http://www.flexispy.com/en/flexispy-omni-spy-app-cell-phone.htm.

620.

SpyBubble, from http://www.spybubble.com/cell-phone-spy.php.

621.

M O BILE SPY, from http://www.m obile-spy.com /.

622.

StealthGenie, from http://w w w.stealthgenie.com /.

623.

CellSPYExpert, from http://www.cellspyexpert.com /.

624.

SPYPhone, from http://spyera.com/products/spy-phone-basic-internet.

625.

EasyGPS, from http://www.easygps.com /.

626.

FlexiSPY PRO-X, from http://www.flexispy.com/spyphone-call-interceptor-gps-tracker-symbian.htm.

627.

GPS TrackM aker Professional, from http://w w w.trackm aker.com /dwlpage.php.

628.

M O BILE SPY, from http://www.m obile-spy.com /.

References Page 2994

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
References

Exam 312-50 Certified Ethical Hacker

629.

World-Tracker, from http://www.world-tracker.com /v4/.

630.

ALL-in-ONE Spy, from http://w w w.thespyphone.com /allinone.htm l.

631.

Trackstick, from http://w w w.trackstick.com /download.htm l.

632.

M obiStealth Pro, from http://w w w .m obistealth.com .

633.

mSpy, from http://w w w.buym spy.com /.

634.

GPS Retriever, from http://w w w.m obilebugstore.com /Blackberry_gps_retriver.aspx.

635.

Zemana AntiLogger, from http://www.zem ana.com /Download.aspx.

636.

Anti-Keylogger, from http://www.anti-keyloggers.com/.

637.

PrivacyKeyboard, from http://www.antikeylogger.eom /products/privacykeyboard/overview.htm l#download.

638.

DefenseW all HIPS, from http://www.softsphere.com /program s/.

639.

KeyScrambler, from http://w w w.qfxsoftw are.com /dow nload.htm .

640.

1 Hate Keyloggers, from http://dewasoft.com/privacy/i-hate-keyloggers.htm.

641.

SpyShelter STOP-LOGGER, from http://www.spyshelter.com /download-spyshelter.

642.

DataGuard AntiKeylogger Ultim ate, from http://www.maxsecuritylab.com/dataguard-antikeylogger/download-anti-keyloger.php.

643.

PrivacyKeyboard, from http://www.privacykeyboard.com /privacy-keyboard.htm l.

644.

Elite Anti Keylogger, from http://www.elite-antikeylogger.com /free-download.htm l.

645.

CoDefender, from https://www.encassa.com /downloads/default.aspx.

646.

PC Tools Spyw are Doctor, from http://www.pctools.com /spyware-doctor/.

647.

SU PERAntiSpyw are, from http://superantispyware.com /index.htm l.

648.

Spyw are Term inator 2012, from http://w w w.pcrx.com /spywareterm inator/.

649.

Ad-Aware Free Antivirus+, from http://w w w .lavasoft.com /products/ad_aw are_free.php.

650.

Norton Internet Security, from http://in.norton.com/downloads-trial-norton-internet-security.

651.

SpyHunter, from http://w w w.enigm asoftw are.com /products/.

652.

Kaspersky Internet Security 2013, from http://www.kaspersky.com/internet-security-free-trial.

653.

SecureA nyw here Complete 2012, from http://www.webroot.com /En_US/consum er-productssecureanywhere-com plete.htm l.

654.

MacScan, from http://m acscan.securem ac.com /.

655.

Spybot - Search & Destroy, from http://www.safer-networking.org/dl/.

656.

M alw arebytes Anti-M alw are PRO, from http://w w w.m alwarebytes.org/products/m alw arebytes_pro/.

657.

Fu, from http://www.f-secure.com/v-descs/fu.shtml.

658.

KBeast, from http://core.ipsecs.com/rootkit/kernel-rootkit/kbeast-vl/.

659.

Hacker Defender HxDef Rootkit, from http://vishnuvalentino.com/hacking-tutorial/hacker-defenderhxdef-rootkit-tutorial-in-1 0 -steps-nostalgia/.

660.

Stinger, from http://www.mcafee.com/us/downloads/free-tools/how-to-use-stinger.aspx.

661.

UnHackM e, from http://w w w.greatis.com /unhackm e/dow nload.htm .

662.

Virus Removal Tool, from http://www.sophos.com/en-us/products/free-tools/virus-removal-tool.aspx.

663.

Hypersight Rootkit Detector, from http://northsecuritylabs.com /.

664.

Avira Free Antivirus, from http://www.avira.com /en/avira-free-antivirus.

665.

SanityCheck, from http://w w w.resplendence.com /downloads.

References Page 2995

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
References

666.

667.

Exam 312-50 Certified Ethical Hacker

G M ER , from http://w w w.gm er.net/.
Rootkit Buster, from
http://dow nloadcenter.trendm icro.com/index. php?regs=NABU&dk=result_page&dkval=drop_list&catid
=6&prodid=155.

668.

Rootkit Razor, from http://www.tizersecure.com /.

669.

Rem oveAny, from http://www.free-anti-spy.com/en/index.php.

670.

TDSSKiller, from http://support.kaspersky.com/5350?el=88446.

671.

Prevx, from http://w w w.prevx.com /freescan.asp.

672.

Stream Arm or, from http://securityxploded.com /stream arm or.php.

673.

ADS Spy, from http://www.m erijn.nu/program s.php#adsspy.

674.

ADS M anager, from http://dm itrybrant.com /adsm anager.

675.

Streams, from http://technet.microsoft.com/en-us/sysinternals/bb897440.aspx.

676.

AlternateStream View , from http://w w w .nirsoft.net/utils/alternate_data_stream s.htm l.

677.

NTFS-Streams: ADS manipulation tool, from http://sourceforge.net/projects/ntfs-ads/.

678.

Stream Explorer, from http://w w w.rekenw onder.eom /stream explorer.htm #Stream s.

679.

ADS Scanner, from http://www.pointstone.com /products/ADS-Scanner/.

680.

RKDetector, from http://w w w.rkdetector.com /.

681.

G M ER , from http://w w w.gm er.net/.

682.

HijackThis, from http://www.trendm icro.com /us/security/products/index.htm l.

683.

SN O W , from http://www.darkside.com .au/snow/index.htm l.

684.

QuickStego, from http://quickcrypto.com/free-steganography-software.html.

685.

Hide In Picture, from http://sourceforge.net/projects/hide-in-picture/.

686.

gifshuffle, from http://www.darkside.com .au/gifshuffle/index.htm l.

687.

CryptaPix, from http://www.briggsoft.com /cpix.htm .

688.

BM PSecrets, from http://bmpsecrets.com/.

689.

OpenPuff, from http://em beddedsw .net/O penPuff_Steganography_H om e.htm l.

690.

OpenStego, from http://openstego.sourceforge.net/.

691.

PHP-Class Stream Steganography, from http://www.phpclasses.org/package/6027-PHP-Store-andhidden-information-in-PNG-images.html.

692.

Red JPEG , from http://www.totalcm d.net/plugring/redjpeg.htm l.

693.

Steganography Studio

694.

Virtual Steganographic Laboratory (VSL), from http://vsl.sourceforge.net/.

695.

wbStego, from http://wbstego.wbailer.com /.

696.

Merge Streams, from http://w w w.ntkernel.com /w&p.php?id=23.

697.

Office XML, from http://www.irongeek.com/i.php?page=security/ms-office-stego-code.

698.

Data Stash, from http://w w w.skyjuicesoftware.com /software/ds_info.htm l.

699.

FoxHole, from http://foxhole.sourceforge.net.

700.

Xidie Security Suite, from http://w w w .stegano.ro.

701.

StegParty, from http://w w w.fasterlight.com .

702.

Hydan, from http://www.crazyboy.com /hydan/.

References Page 2996

, from http://stegstudio.sourceforge.net/.

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
References

Exam 312-50 Certified Ethical Hacker

703.

StegJ, from http://sourceforge.net/projects/stegj/files/.

704.

StegoStick, from http://stegostick.sourceforge.net/.

705.

SN O W , from http://www.darkside.com .au/snow/index.htm l.

706.

OmniHide PRO, from http://om nihide.com /.

707.

Our Secret, from http://w w w.securekit.net/oursecret.htm .

708.

RT Steganography, from http://rtstegvideo.sourceforge.net/.

709.

Masker, from http://www.softpuls.com /m asker/.

710.

Max File Encryption, from http://www.softeza.com /fileencryption/.

711.

M SU StegoVideo, from http://w w w.com pression.ru/video/stego_video/index_en.htm l.

712.

BDV DataHider, from http://www.bdvnotepad.com /products/bdv-datahider/.

713.

StegoStick, from http://stegostick.sourceforge.net/.

714.

OpenPuff, from http://em beddedsw .net/O penPuff_Steganography_H om e.htm l.

715.

Stegsecret, from http://stegsecret.sourceforge.net/.

716.

PSM Encryptor, from http://dem o.powersoftm akers.com /psm e.zip.

717.

DeepSound, from http://jpinsoft.net/DeepSound/Download.aspx.

718.

Mp3stegz, from http://mp3stegz.sourceforge.net/.

719.

M AXA Security Tools, from http://www.maxa-tools.com/mst.php?lang=en.

720.

BitCrypt, from http://bitcrypt.moshe-szweizer.com/.

721.

MP3Stego, from http://www.petitcolas.net/fabien/steganography/m p3stego/.

722.

Hide4PGP, from http://www.heinz-repp.onlinehom e.de/.

723.

CHAOS Universal, from http://safechaos.com/cu.htm.

724.

SilentEye, from http://w w w.silenteye.org/.

725.

QuickCrypto, from http://w w w.quickcrypto.com /dow nload.htm l.

726.

CryptArkan, from
http://www.kuskov.com /com ponent/option,com _rem ository/ltem id,30/func,fileinfo/id,l/.

727.

StegoStick, from http://stegostick.sourceforge.net/.

728.

Invisible Secrets 4, from http://www.invisiblesecrets.com /.

729.

Folder Lock, from http://w w w .new softw ares.net/folderlock/.

730.

A+ Folder Locker, from http://www.giantmatrix.com/products/aplus-folder-locker/.

731.

Toolwiz BSafe, from http://www.toolwiz.com/products/toolwiz-bsafe/.

732.

Hide Folders 2012, from http://fspro.net/hide-folders/.

733.

GiliSoft File Lock Pro, from http://www.gilisoft.com/product-file-lock-pro.htm.

734.

Universal Shield, from http://w w w.everstrike.com /shield.htm .

735.

W in M e n d Folder Hidden, from http://www.winm end.com /folder-hidden/.

736.

Encrypted Magic Folders , from http://www.pc-magic.c 0 m /des.htm #em f.

737.

QuickCrypto, from http://w w w.quickcrypto.com /dow nload.htm l.

738.

Max Folder Secure, from http://w w w.m axfoldersecure.com /.

739.

Spam Mimic, from http://www.spam m im ic.com /.

740.

Sams Big G Play M aker, from http://www.scram disk.clara.net/.

741.

Gargoyle Investigator™ Forensic Pro, from http://w etst 0 netech.c 0 m/pr 0 duct/ 2 /d 0 w n l 0 ads.

References Page 2997

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
References

Exam 312-50 Certified Ethical Hacker

742.

XStegsecret, from http://stegsecret.sourceforge.net/.

743.

Stego Suite, from http ://w w w .w etst 0 netech.c 0 m/pr 0 d u ct/l/d 0 w n l 0 ads.

744.

StegAlyzerAS, from http://www.sarc-wv.com/products/stegalyzeras/.

745.

StegAlyzerRTS, from http://www.sarc-wv.com/products/stegalyzerrts/.

746.

StegSpy, from http://www.spy-hunter.com /stegspy.

747.

Steg A lyzerSS, from http://www.sarc-wv.com/products/stegalyzerss/.

748.

Steg M arkSD K , from http://www.datam ark.com .sg/downloads-sdk.htm .

749.

Steganography Studio, from http://stegstudio.sourceforge.net/.

750.

Virtual Steganographic Laboratory (VSL), from http://vsl.sourceforge.net/.

751.

Stegdetect, from http://w w w.outguess.org/detection.php.

752.

Auditpol, from http://technet.microsoft.com/en-us/library/cc755264(v=ws.l0).aspx.

753.

CCIeaner, from http://w w w .piriform .com /dow nload.

754.

MRU-Blaster, from http://w w w.brightfort.com /m rublaster.htm l.

755.

W ipe, from http://privacyroot.com /softw are/w ww /en/wipe.php.

756.

Tracks Eraser Pro, from http://w w w .acesoft.net/features.htm .

757.

BleachBit, from http://bleachbit.sourceforge.net/news/bleachbit-093.

758.

AbsoluteShield Internet Eraser Pro, from http://www.internet-track-eraser.com /ineteraser.php.

759.

Clear M y History, from http://www.hide-my-ip.com/clearmyhistory.shtml.

760.

EvidenceEraser, from http://w w w .evidenceeraser.com /.

761.

W inTools.net Professional, from http://w w w .w intools.net/.

762.

RealTime Cookie & Cache Cleaner (R tC 3 ), from http://www.kleinsoft.co.za/buy.htm l.

763.

AdvaHist Eraser, from http://w w w.advacrypt.cjb.net/.

764.

Free Internet W in d o w W asher, from h ttp ://w w w .eusing .com /W indow _W ash er/W indow _W asher.htm .

M od ule 06: Trojans and Backdoors
765.

Placing Backdoors through Firewalls, from http://www.cyberwarzone.com /cyberwarfare/placingbackdoors-through-firewalls.

766.

A Deep Look into Netcat - The TCP/IP Swiss Arm y Knife, from http://www.linux-support.com/cms/adeep-look-into-netcat-the-tcpip-swiss-army-knife/.

767.

Trojans Revealed: Hackers Center: Internet Security Archive ...,
http://www.hackerscenter.com /archive/view.asp?id=24717.

768.

Dancho Danchev, The Com plete W indow s Trojans Paper, from
http://www.fram e4.com /content/pubs/com p_trojans.txt.

769.

The corporate threat posed by email Trojans, from http://www.gfisoftware.de/whitepapers/networkprotection-against-trojans.pdf.

770.

Trojan Horses, from http://www-i4.informatik.rwth-aachen.de/lufg/teaching/ss2004/dependabilitysem inar/paper/final 8 .pdf.

771.

Trojans - and how to protect your network against them, from
http://w w w .w indow security.com /w hitepapers/trojans_protect_your_netw ork.htm l.

772.

Fausi Qattan & Fredrik Thernelius, (2004), M aster's Thesis, from
http://www.dsv.su.se/research/seclab/pages/pdf-files/04-34.pdf.

773.

Malicious Intrusion Techniques, http://www.telecom worx.com /Adobe/Files39087.pdf.

References Page 2998

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
References

774.

Exam 312-50 Certified Ethical Hacker

Increased use of Trojan Horse Programs, from http://www.niscc.gov.uk/niscc/docs/tn-2004021600080.html?lang=en.

775.

Anti Trojan source - How to protect your network against trojans ..., from http://news.myinstall.com/news/45/.

776.

Dancho Danchev, Trojan W h ite Paper, from http://www.anti-trojan-software-reviews.com/trojan-whitepaper-p 2 .htm.

777.
778.

Trojans, from http://w w w.em ailprivacy.info/trojans.
Rem ote Access Trojan FAQ and Port List Com puter Security - N etw ork ..., from
http://www.infosyssec.com /infosyssec/trojanportlist.htm l.

779.

W IN SN O RT.com : Intrusion Detection, from
http://www.winsnort.com /m odules.php?op=m odload&nam e=FAQ&file=index&m yfaq=yes&id_cat=13.

780.

Trojan Horse Com puter Infection Symptoms, from http://hacker-elim inator.com /trojansym ptom s.htm l.

781.

LockDown M illennium Advanced Online Help, from
http://lockdowncorp.com /m anual/TrojanlnfectionSym ptom s.htm .

782.

Commodon Communications - Threats to your Security on the Internet, from
http://w w w.com m odon.com /threat/threat-detect.htm .

783.

Van Hauser/THC, Placing Backdoors Through Firewalls, from
http://www.cgisecurity.com /lib/placing_backdoors_through_firewalls.txt.

784.

Mikejc, (2004), Tech-Recipes.com - Use System File Checker to Solve Problems, from http://www.techrecipes.com /windows_tips602.htm l.

785.

Exploring the Explodable, from http://www.guninski.com /browsers.htm l.

786.

David W ells, (1996), W rappers, from http://w w w.objs.com /survey/wrap.htm .

787.

Milly, Steve A., Stan, Ojatex, Gordon, Darius and Buzz, (2000), W ord Pad , from www.pchelp.org/security/scrap.htm.

788.

Trojans F A Q http://www.windowsecurity.com /faqs/Trojans/.

789.

Information on Com puter Viruses, from http://www-rohan.sdsu.edu/viruses.htm l.

790.

Advanced Netw ork Configuration and Troubleshooting, from http://snow.nl/dist/xhtmlc/ch05s02.html.

791.

Tom Armstrong, (2001), N etcat - The TCP/IP Swiss Arm y Knife, from
http://rn.nu/program/util/netcat/netcat.html.

792.

Microsoft - W indow s File, from Protection, from
http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/enus/system _file_protection.m spx?m fr=true.

793.

Scott W . Hotaling's, Placing Backdoors Through Firewalls, from http://masc2279.no-ip.org/gadgetstoys/internet/placing-backdoors-through-firewalls.

794.

How to block ICM P tunneling?, from https://listserv.icsalabs.com/pipermail/firewall-wizards/1999July/006060.html.

795.
796.

Newbie: Security, from http://www.unixgeeks.org/security/newbie/security/firewall.htm l.
Phrack Magazine 0 0 . Volum e Seven, Issue Forty-Nine File 06 o f ..., from
http://www.phrack.org/phrack/49/P49-06.

797.

Dancho Danchev dancho, The Complete W indow s Trojans Paper, from
http://www.astalavista.com /index.php?section=directory&linkid=640.

798.

Declan McCullagh, (2006), Case 2:00-cr-00170-WHA-VPM, from
http://www.politechbot.com /docs/feds.trojan.hacking.brief.082406.pdf.

799.

TCPView, from http://technet.microsoft.com/en-us/sysinternals/bb897437.aspx.

References Page 2999

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
References

Exam 312-50 Certified Ethical Hacker

800.

CurrPorts, from http://www.nirsoft.net/utils/cports.htm l.

801.

Process Monitor, from http://technet.microsoft.com/en-in/sysinternals/bb896645.aspx.

802.

W h a t's Running, from http://w w w.whatsrunning.net/.

803.

PrcView, from http://w w w .team cti.com .

804.

W insonar, from http://w w w .few byte.com /w insonar.htm l.

805.

HiddenFinder, from http://w w w .w enpoint.com /dow nload/.

806.

Autoruns for W indow s, from http://technet.microsoft.com/en-us/sysinternals/bb963902.aspx.

807.

KillProcess, from http://orangelam psoftware.com /products_killprocess.php.

808.

Security Task Manager, from http://w w w.neuber.com /taskm anager/.

809.

Yet Another (rem ote) Process Monitor, from http://yaprocm on.sourceforge.net/.

810.

MONIT, from http://m m onit.com /m onit/.

811.

OpM anager, from http://www.m anageengine.com /network-m onitoring/process-m onitoring.htm l.

812.

j v l 6 Pow er Tools 2012, from http://www.m acecraft.com /jvl6-powertools-2012/.

813.

PC Tools Registry Mechanic, from http://www.pctools.com /registry-m echanic/.

814.

Reg Organizer, from http://w w w.chem table.com /organizer.htm .

815.

Registry Shower, from http://w w w.registryshower.com /download.htm .

816.

Comodo Cloud Scanner, from http://www.com odo.com /hom e/internet-security/cloud-scanner.php.

817.

Buster Sandbox Analyzer, from http://bsa.isoftware.nl/.

818.

All-Seeing Eyes, from http://w w w.fortego.com /en/ase.htm l.

819.

M J Registry W atcher, from http://w w w.jac 0 bsm.c 0 m/mjs 0 ft.htm #rgw tchr.

820.

Active Registry Monitor, from http://w w w.devicelock.com /arm /.

821.

SpyM e Tools, from http://www.lcibrossolutions.com /spym e_tools.htm .

822.

Regshot, from http://regshot.sourceforge.net/.

823.

Registry Live W atch , from http://leelusoft.blogspot.in/2009/ll/registry-live-watch-10.html.

824.

DriverView, from http://w w w.nirsoft.net/utils/driverview.htm l.

825.

Driver Detective, from http://w w w.drivershq.com /.

826.

Unknown Device Identifier, from http://www.zhangduo.com /udi.htm l.

827.

DriverGuide Toolkit, from http://w w w.driverguidetoolkit.com /.

828.

DriverMax, from http://www.innovative-sol.com /driverm ax/index.htm .

829.

Driver Magician, from http://www.driverm agician.com /.

830.

Driver Reviver, from http://www.reviversoft.com /driver-reviver/.

831.

DriverScanner, from http://w w w.uniblue.com /software/driverscanner/.

832.

Double Driver, from http://www.boozet.org/dd.htm .

833.

M y Drivers, from http://www.zhangduo.com /driverbackup.htm l.

834.

DriverEasy, from http://w w w.drivereasy.com /.

835.

W indow s Service M anager (SrvM an), from http://tools.sysprogs.org/srvman/.

836.

SM A R T Utility, from http://www.thewindowsclub.com/smart-a-utility-for-tweaking-windows-7-vista-xpservices.

837.

Netwrix Service Monitor, from http://w w w .netw rix.com /w indow s_services_m onitoring_freew are.htm l.

838.

Vista Services Optimizer, from http://www.sm artpcutilities.com /servicesoptim izer.htm l.

References Page 3000

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
References

Exam 312-50 Certified Ethical Hacker

839.

ServiW in, from http://w w w.nirsoft.net/utils/serviwin.htm l.

840.

W indow s Service M anager Tray, from http://winservicem anager.codeplex.com /.

841.

AnVirTask M anager, from http://w w w .anvir.com /dow nload.htm .

842.

Process Hacker, from http://processhacker.sourceforge.net/downloads.php.

843.

Free W indow s Service M onitor Tool, from http://www.manageengine.com/free-windows-servicemonitor/free-windows-service-monitor-index.html.

844.

O verseer Netw ork M onitor, from http://www.overseer-network-m onitor.com /Download.aspx.

845.

Total N etw ork M onitor, from http://www.softinventive.com /products/total-network-m onitor/.

846.

Starter, from http://codestuff.tripod.com /products_starter.htm l.

847.

Security AutoRun, from http://tcpmonitor.altervista.org/startup-manager/.

848.

Absolute Startup manager, from http://w w w.absolutestartup.com /.

849.

ActiveStartup, from http://w w w.hexilesoft.com /activestartup.htm l.

850.

StartEd Lite, from http://w w w.outertech.com /en/w indows-startup.

851.

Startup Inspector, from http://w w w .window sstartup.com /startupinspector.php.

852.

Program Starter, from http://www.ab-tools.com /de/software/program m starter/.

853.

Disable Startup, from http://w w w.disablestartup.com /.

854.

StartupM onitor, from http://w w w .m lin.net/StartupM onitor.shtm l.

855.

Chameleon Startup Manager, from http://www.cham eleon-m anagers.com /downloads.php.

856.

Startup Booster, from http://w w w.sm artpctools.com /startup_booster/.

857.

FCIV, from http://www.microsoft.com/en-us/download/details.aspx?id=11533.

858.

Tripwire, from http://www.tripwire.com/it-security-software/security-configuration‫־‬management/fileintegrity-monitoring/.

859.

FastSum, from http://w w w.fastsum .com /download.php.

860.

W in M D 5 , from http://w w w .blisstonia.eom /softw are/W inM D5/#dow nload.

861.

Advanced Checksum Verifier (ACSV), from http://w w w.irnis.net/.

862.

Fsum Fronted, from http://fsum fe.sourceforge.net/.

863.

Verisys, from http://www.ionx.co.uk/products/verisys.

864.

AFICK (Another File Integrity Checker), from http://afick.sourceforge.net/.

865.

File Integrity Monitoring, from http://www.ncircle.com/index.php?s=products_ccm _file-integritymonitoring.

866.

Attribute M anager, from http://www.m iklsoft.com /attrm an/index.htm l.

867.

PA File Sight, from http://www.poweradmin.com/file-sight/index3.aspx.

868.

CSP File Integrity Checker, from http://w w w.tandem security.com /solution_14.php.

869.

ExactFile, from http://www.exactfile.com /downloads/.

870.

OSSEC, from http://www.ossec.net/?page_id= 19.

871.

W indow s Defender, from http://www.microsoft.com/en-in/download/details.aspx?id=17.

872.

M cAfee AntiVirus Plus, from http://home.mcafee.com/store/free-antivirus-trials.

873.

Norton AntiVirus, from http://us.norton.com/downloads-trial-nortonantivirus?inid= us_hho_topnav_dow nload_detail_nav.

874.

Trojan Horse Construction Kit, from
http://www.pestpatrol.eom /zks/pestinfo/t/trojan_horse_construction_kit.asp.

References Page 3001

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
References

875.

Exam 312-50 Certified Ethical Hacker

Progenic Mail Trojan Construction Kit - PMT, from
http://www.sim ovits.com /trojans/tr_data/y2630.htm l.

876.

Pandora's Box, from http://greece.mrdonn.org/greekgods/pandora.html.

877.

TrojanHunter, from http://w w w.trojanhunter.com /trojanhunter/.

878.

Emsisoft Anti-Malware, from http://w w w.em sisoft.in/en/software/antim alw are/.

879.

Anti-Trojan Shield (ATS), from http://w w w.atshield.com /?r=dow nload.

880.

Spyw are Doctor, from http://www.pctools.com /spyware-doctor/download/?src=lp_sd.

881.

Anti M alw are BOCIean, from http://www.com odo.com /hom e/internet-security/anti-m alware.php.

882.

Anti Hacker, from http://www.hide-my-ip.com/antihacker.shtml.

883.

XoftSpySE, from http://www.paretologic.com/xoftspy/se/newlp/xray/.

884.

SPYW AREfighter, from http://w w w.spam fighter.com /SPYW AREfighter/.

885.

Anti Trojan Elite, from http://w w w.rem ove-trojan.com /index_ate.php.

886.

SU PERAntiSpyw are, from http://w w w.superantispyw are.com /index.htm l.

887.

Trojan Rem over, from http://w w w.sim plysup.com /trem over/download.htm l.

888.

Twister Antivirus, from http://www.filseclab.com/en-us/.

M od ule 07: Viruses and W o rm s
889.

Types of Virus, from
http://w w w .m indpride.net/root/Extras/Viruses/virus_protection_and_rem oval_ii.htm .

890.

Vulnerabilities in N etw ork Infrastructures and Prevention/Containm ent Measures, from
http://proceedings.informingscience.org/lnSITE2012/lnSITE12p053-067Awodele0012.pdf.

891.

Terminology, from http://www.f-secure.com/en/web/labs_global/terminology-f.

892.

Virus Protection, from
http://w w w .m indpride.net/root/Extras/Viruses/virus_protection_and_rem oval_iii.htm .

893.

Paul Boutin, (2003), An inside view of the w orm that crashed the Internet in 15 minutes, founder from
http://w w w .w ired.com /w ired/archive/ll.07/slam m er.htm l.

894.

Case Study: Microsoft N etw ork Hacked by QAZ Trojan, from http://www.msnbc.com/msn/482011.asp
Oct. 29, 2000.

895.

M ark Russinovich, (2008), TCPView for W in d o w s v2.53, from
http://www.sysinternals.com /Utilities/TcpView.htm l.

896.

M ark Russinowich and Bryce Cogswell, (2008), Autoruns for w indows (v 9.32), from
http://www.sysinternals.com /Utilities/Autoruns.htm l.

897.

Merijn, (2005), Hijack This (System Checker) (v 1.99.1), from
http://www.m ajorgeeks.com /download.php?det=3155.

898.

Norman Book on Com puter Viruses, from http://download.norm an.no/m anuals/eng/BOOKON.PDF.

899.

Carey Nachenberg, Understanding and Managing Polym orphic Viruses from
http://w w w.sym antec.com /avcenter/reference/striker.pdf.

900.

The Spread of the Sapphire/Slam m er W orm , from
http://www.caida.org/publications/papers/2003/sapphire/sapphire.html.

901.

Mike Gunderloy, (2003), Microsoft Certified Professional Magazine Online | N ewsletters, vol 2 # 8 , from
http://mcpmag.com /newsletter/article. asp?EditorialslD=153.

902.

R. A. Hettinga, (2003), Random Scanning W orm s and Sapphire/Slam m er's PRNG, from http://www.mailarchive.com /cryptography@ wasabisystems.com/msg03503.html.

References Page 3002

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
References

Exam 312-50 Certified Ethical Hacker

903.

Information on a virus on campus, http://security.uwo.ca/antivirus/infoHistory.htm l.

904.

Virus History ‫ ־‬The Senior M ost Virus!!, from www.optusnet.com .au/learning/em ail/virus.

905.

Computer Knowledge Virus Tutorial, from www .m pl.org.eg/doc/eBOO Ks/vtutor.pdf.

906.

Dr. Alan Solomon and Robert M. Slade, 1990 - VX BBS & Little Black Book (AT&T Attack), 1991 - Tequila,
2001 - Gnuman, W inux Windows/Linux Virus, 2004 - Trojan.Xombe, Randex, Bizex, W itty, from
w w w .cknow.com /vtutor/HistoryofViruses.htm l.

907.

Michelangelo, DAME, & VCL, from http://library.thinkquest.org/04oct/00460/malwareHistory.html.

908.

Honeypots, Honeynets, and Intrusion Detection, from http://w w w.honeypots.net/.

909.

Featured Files, from http://packetstormsecurity.org/.

910.

BinText, from http://www.mcafee.com/apps/free-tools/termsofuse.aspxPurh/us/downloads/freetools/bintext.aspx.

911.

UPX, from http://upx.sourceforge.net/#downloadupx.

912.

Process Explorer, from http://technet.microsoft.com/en-in/sysinternals/bb896653.aspx.

913.

RegShot, from http://regshot.sourceforge.net/.

914.

OllyDbg, from http://www.ollydbg.de/.

915.

ProcDump, from http://technet.microsoft.com/en-us/sysinternals/dd996900.aspx.

916.

IDA Pro, from https://www.hex-rays.com /products/ida/support/download_dem o.shtm l.

917.

VirusTotal, from https://w ww .virustotal.com /en/.

918.

Anubis: Analyzing Unknown Binaries, from http://anubis.iseclab.org.

919.

Avast! Online Scanner, from http://onlinescan.avast.com .

920.

M alw are Protection Center, from http://www.m icrosoft.com /security/portal/.

921.

ThreatExpert, from http://w w w .threatexpert.com .

922.

Dr. W e b Online Scanners, from http://vm s.drweb.com .

923.

Metascan Online, from http://www.m etascan-online.com /.

924.

Bitdefender QuickScan, from http://w w w.bitdefender.com /scanner/online/free.htm l.

925.

GFI SandBox, from http://www.gfi.com/malware-analysis-tool.

926.

UploadM alw are.com , from U ploadM alw are.com .

927.

Fortinet, from http://www.fortiguard.com /antivirus/virus_scanner.htm l.

928.

Immunet, from http://w w w.im m unet.com /free/index.htm l.

929.

AVG Antivirus, from http://free.avg.com/in-en/homepage.

930.

BitDefender, from http://w w w.bitdefender.com /Dow nloads/.

931.

Kaspersky Anti-Virus, from http://www.kaspersky.com /trials.

932.

Trend M icro Internet Security Pro, from http://apac.trendm icro.com .

933.

Norton AntiVirus, from http://us.norton.com/downloads-trial-nortonantivirus?inid= us_hho_topnav_dow nload_detail_nav.

934.

F-Secure Anti-Virus, from http://www.f-secure.com/en/web/home_global/anti-virus.

935.

Avast Pro Antivirus, from http://www.avast.com /pro-antivirus.

936.

M cAfee AntiVirus Plus 2013, from http://home.mcafee.com/store/free-antivirus-trials.

937.

ESET Sm art Security 6 , from http://www.eset.eom /download/hom e/detail/fam ily/5/.

938.

Total Defense Internet Security Suite, from http://www.totaldefense.com /shop/total-defense-internetsecurity-suite.aspx.

References Page 3003

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
References

Exam 312-50 Certified Ethical Hacker

939.

W h a t's Running, from http://w w w.whatsrunning.net/.

940.

W insonar, from http://w w w .few byte.com /w insonar.htm l.

941.

Reg Organizer, from http://w w w.chem table.com /organizer.htm .

942.

W indow s Service M anager (SrvM an), from http://tools.sysprogs.org/srvman/.

943.

ServiW in, from http://w w w.nirsoft.net/utils/serviwin.htm l.

944.

Starter, from http://codestuff.tripod.com /products_starter.htm l.

945.

Security AutoRun, from http://tcpmonitor.altervista.org/startup-manager/.

946.

FCIV, from http://www.microsoft.com/en-us/download/details.aspx?id=11533.

M od ule 08: Sniffing
947.

W h a t is Sniffer and how to detect sniffing in com puter network, from
http://www.aboutonlinetips.com/sniffer-types-and-protecting-against-sniffing/.

948.

Anatom y of an ARP Poisoning Attack, from http://www.unitedsystemsok.com/anatomy-of-an-arppoisoning-attack.

949.
950.

W h a t is AR P?, from http://w w w.antiarp.com /english_94.htm l.
Modeling and Analysis of W ireless LAN Traffic, from
http://www.dm clab.hanyang.ac.kr/files/publication/journals/international/200911_08.pdf.

951.

Dynamic ARP Inspection (DAI), from http://daxm.net/ccienotes/20100131/dynamic-arp-inspection-dai.

952.

O verview of Layer 2 Switched Networks and Communication, from
http://www.sakunsharma.in/2011/07/overview-layer-2-switched-networks-communication/.

953.

Application Protocol IPv 6 , from
http://www.ciscoexpo.ru/dub/sites/default/files/sem inar_attachm ents/ipv 6 .pdf.

954.
955.

Dynamic Host Configuration Protocol, from http://www.ietf.org/rfc/rfc2131.txt.
Understanding,Preventing,Defending Against Layer 2 Attacks, from
http://www.sanog.org/resources/sanogl5/sanogl5-yusuf-l2-security.pdf.

956.

A N ew Schem e to Check ARP Spoofing: Prevention of MAN-IN-THE-MIDDLE Attack, from
http://www.ijcsit.com/docs/Volume%202/vol2issue4/ijcsit2011020420.pdf.

957.

LAYER 2 ATTACKS & MITIGATION TECHNIQUES, from http://www.sanog.org/resources/sanog7/yusuf-L2attack-mitigation.pdf.

958.

Chris M artin, W h a t is Sniffer and how to detect Sniffing in com puter network, Available from
http://74.125.153.132/search?q=cache:Tu6yfsiaY3AJ:www.aboutonlinetips.com/sniffer-types-andprotecting-against-sniffing/+wire+sniffing+techniques&cd=25&hl=en&ct=clnk&gl=in&client=fi refox-a.

959.

Adam Barth, Secure content sniffing for W e b browsers or How to stop papers from reviewing
them selves, Available from http://www.adambarth.com/papers/2009/barth-caballero-song.pdf.

960.

Undetectable sniffing on Ethernet, Available from http://www.askapache.com/security/sniffing-onethernet-undetected.htm l.

961.

Suhas A Desai, (2007), Techniques for Preventing Sniffing, Packet Sniffing: Sniffing Tools Detection
Prevention Methods, Available from http://e-articles.info/e/a/title/Packet-Sniffing:-Sniffing-ToolsDetection-Prevention-Methods/.

962.

Suhas A Desai, (2007), Tool to Detect Sniffers, Packet Sniffing: Sniffing Tools Detection Prevention
Methods, Available from http://e-articles.info/e/a/title/Packet-Sniffing:-Sniffing-Tools-DetectionPrevention-Methods/.

963.

Identifying Nonessential Services and Attacks > Attacks, from
http://www.informit.com/articles/article.asp?p=98121&seqNum=2.

References Page 3004

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
References

964.
965.

Exam 312-50 Certified Ethical Hacker

ARP cache poisoning /ARP spoofing, from http://su2.info/doc/arpspoof.php.
N etw ork m anagement, network discovery, SN M P, M IB and W M I browsers, from
w w w .netw orkview .com /htm l/features.htm l.

966.

Address Resolution Protocol (ARP), from www.erg.abdn.ac.uk/users/gorry/course/inet-pages/arp.html.

967.

Angela D. Orebaugh, (2004), Top Ten Ethereal Tips and Tricks, from
http://www.onlamp.eom/pub/a/security/2004/05/13/etherealtips.html.

968.

Packages, from http://packages.debian.org/.

969.

N etw ork Protocol Analysis, from http://w w w .m aatec.com /.

970.

The Hacker's Ethic, from http://web.textfiles.com/ezines/HWA/hwa-hn34.txt.

971.

Jarom il, Dyne:ll GNU/Linux User's Guide, from http://dynebolic.org/dynebolic-man.pdf.

972.

Address Resolution Protocol (arp), from www.erg.abdn.ac.uk/users/gorry/course/inet-pages/arp.html.

973.

Adam Barth, Juan Caballero and Dawn Song, Secure Content Sniffing for W e b Browsers, or How to Stop
Papers from Reviewing Themselves, http://www.adambarth.com/papers/2009/barth-caballerosong.pdf.

974.

Alberto Ornaghi and M arco Valleri, M an in the middle attacks,
http://www.blackhat.com/presentations/bh-europe-03/bh-europe-03-valleri.pdf.

975.

Tom Olzak, (2006), DNS Cache Poisoning: Definition and Prevention,
http://adventuresinsecurity.com /Papers/DNS_Cache_Poisoning.pdf.

976.

Sean W halen, (2001), An Introduction to Arp Spoofing,
http://w w w.rootsecure.net/content/dow nloads/pdf/arp_spoofing_intro.pdf.

977.

Daiji Sanai, (2001), Detection of Promiscuous Nodes using ARP packets,
http://w w w.securityfriday.com /prom iscuous_detection_ 0 1 .pdf.

978.

N etw ork m anagement, network discovery, SN M P, M IB and W M I browsers, from
w w w .netw orkview .com /htm l/w hat_s_new .htm l.

979.

Source Address Spoofing, from
http://www.networkcom puting.com /shared/article/showArticle.jhtm l?articleld=8702815&dassroom .

980.

Keith Brown, (1999), Security Briefs, from
http://www.microsoft.com/msj/0299/security/security0299.aspx.

981.

Corey Nachreiner, (2005), Anatom y of an ARP Poisoning Attack, from
http://www.watchguard.com /infocenter/editorial/135324.asp.

982.

macof, from http://w w w .m onkey.org.

983.

Yersinia, from http://w w w .yersinia.net/dow nload.htm .

984.

Dhcpstarv, from http://dhcpstarv.sourceforge.net/.

985.

Gobbler, from http://gobbler.sourceforge.net/.

986.

Cain & Abel, from http://www.oxid.it/cain.htm l.

987.

W inArpAttacker, from http://www.xfocus.org/index.html.

988.

Ufasoft Snif, from http://ufasoft.com/sniffer/.

989.

XArp, from http://www.chrism c.de/developm ent/xarp/index.htm l.

990.

SMAC, from http://www.klcconsulting.net/sm ac/index.htm l#download.

991.

Cascade Pilot, from http://www.riverbed.com/products-solutions/products/performancemanagement/network-infrastructure/High-Speed-Packet-Analysis.html.

992.

Tcpdump, from http://w w w.tcpdum p.org/.

993.

W inDum p, from http://w w w.winpcap.org/w indum p/default.htm .

References Page 3005

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
References

Exam 312-50 Certified Ethical Hacker

994.

Capsa N etw ork Analyzer, from http://w w w.colasoft.com /dow nload/products/capsa_free.php.

995.

O m niPeek Netw ork Analyzer, from
http://w w w.wildpackets.com /products/om nipeek_network_analyzer.

996.

Observer, from http://www.networkinstrum ents.com /products/observer/index.php?tab=download.

997.

Sniff-O-Matic, from http://w w w.kw akkelflap.com /sniffer.htm l.

998.

JitB it Netw ork Sniffer, from http://w w w.jitbit.com /networksniffer/.

999.

M SN Sniffer 2, from http://www.m snsniffer.com /download/index.htm .

1000.

Ace Password Sniffer, from http://w w w.effetech.com /aps/.

1001.

RSA N etW itness Investigator, from http://w w w .em c.c 0 m /security/rsa-netwitness.htm #lfreew are.

1002.

Big-Mother, from http://w w w .tupsoft.com /dow nload.htm .

1003.

EtherD etect Packet Sniffer, from http ://w w w .etherdetect.com /dow nload.htm .

1004.

dsniff, from http://monkey.org/~dugsong/dsniff/.

1005.

EffeTech HTTP Sniffer, from http://w w w .effetech.com /dow nload/.

1006.

Ntop, from http://www.ntop.org/products/ntop/.

1007.

Ettercap, from http://ettercap.sourceforge.net/dow nloads.htm l.

1008.

SmartSniff, from http://www.nirsoft.net/utils/sm sniff.htm l.

1009.

EtherApe, from http://etherape.sourceforge.net/.

1010.

N etw ork Probe, from http://w w w.objectplanet.com /probe/.

1011.

Snort, from http://w w w.snort.org/.

1012.

Sn iffem , from http://www.sniff-em .com /download.shtm l.

1013.

MaaTec N etw ork Analyzer, from http://w w w .m aatec.com /m tna/dow nload.htm l.

1014.

Alchem y N etw ork Monitor, from http://w w w.m ishelpers.com /netw ork_m onitor/index.htm l.

1015.

Com m View, from http://www.tam os.com /download/m ain/index.php.

1016.

NetResident, from http://ww w.tam os.com /products/netresident/.

1017.

AIM Sniffer, from http://www.effetech.com /aim -sniffer/index.htm .

1018.

Netstumbler, from http://w w w.netstum bler.com /downloads/.

1019.

IE HTTP Analyzer, from http://w w w.ieinspector.com /httpanalyzer/.

1020.

MiniStum bler, from http://w w w .netstum bler.com /dow nloads.

1021.

PacketM on, from http://w w w.analogx.com /contents/dow nload/Network/pm on/Freew are.htm .

1022.

NADetector, from http://w w w .nsauditor.com /netw ork_m onitoring/nadetector_traffic_analyzer.htm l.

1023.

Microsoft Network Monitor, from http://www.microsoft.com/en-us/download/details.aspx?id=4865.

1024.

N etw orkM iner, from http://w w w .netresec.com /?page= N etw orkM iner.

1025.

N etw ork Security Toolkit, from http://www.networksecuritytoolkit.org/nst/index.htm l.

1026.

Ethereal, from http://w w w .ethereal.com /.

1027.

KSniffer, from http://ksniffer.sourceforge.net/index.php?section=download.

1028.

IPgrab, from http://ipgrab.sourceforge.net/.

1029.

W ebSiteSniffer, from http://w w w.nirsoft.net/utils/w eb_site_sniffer.htm l.

1030.

ICQ Sniffer, from http://w w w.etherboss.com /icq/download.htm .

1031.

URL Helper, from http://w w w.urlhelper.com /index.htm .

1032.

W ebCookiesSniffer, from http://w w w.nirsoft.net/utils/w eb_cookies_sniffer.htm l.

References Page 3006

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references
Ce hv8 references

More Related Content

Similar to Ce hv8 references

Open Education and Blockchain
Open Education and BlockchainOpen Education and Blockchain
Open Education and BlockchainCarmen Holotescu
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its typesRishab Gupta
 
Science of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyScience of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyShawn Riley
 
CONFidence 2017: Hackers vs SOC - 12 hours to break in, 250 days to detect (G...
CONFidence 2017: Hackers vs SOC - 12 hours to break in, 250 days to detect (G...CONFidence 2017: Hackers vs SOC - 12 hours to break in, 250 days to detect (G...
CONFidence 2017: Hackers vs SOC - 12 hours to break in, 250 days to detect (G...PROIDEA
 
Ethical Hacking Conference 2015- Building Secure Products -a perspective
 Ethical Hacking Conference 2015- Building Secure Products -a perspective Ethical Hacking Conference 2015- Building Secure Products -a perspective
Ethical Hacking Conference 2015- Building Secure Products -a perspectiveDr. Anish Cheriyan (PhD)
 
Security protection On banking systems using ethical hacking.
Security protection  On banking systems using  ethical hacking.Security protection  On banking systems using  ethical hacking.
Security protection On banking systems using ethical hacking.Rishabh Gupta
 
Among Viruses, Trojans, and Backdoors:Fighting Malware in 2022
Among Viruses, Trojans, and Backdoors:Fighting Malware in 2022Among Viruses, Trojans, and Backdoors:Fighting Malware in 2022
Among Viruses, Trojans, and Backdoors:Fighting Malware in 2022Marcus Botacin
 
MITRE ATT&CKcon 2018: Decision Analysis Applications in Threat Analysis Frame...
MITRE ATT&CKcon 2018: Decision Analysis Applications in Threat Analysis Frame...MITRE ATT&CKcon 2018: Decision Analysis Applications in Threat Analysis Frame...
MITRE ATT&CKcon 2018: Decision Analysis Applications in Threat Analysis Frame...MITRE - ATT&CKcon
 
3.Seminar Report Ashar Shaikh Final.docx
3.Seminar Report Ashar Shaikh Final.docx3.Seminar Report Ashar Shaikh Final.docx
3.Seminar Report Ashar Shaikh Final.docxasharshaikh8
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsAaron ND Sawmadal
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsAaron ND Sawmadal
 
BSides IR in Heterogeneous Environment
BSides IR in Heterogeneous EnvironmentBSides IR in Heterogeneous Environment
BSides IR in Heterogeneous EnvironmentStefano Maccaglia
 
Reversing & malware analysis training part 8 malware memory forensics
Reversing & malware analysis training part 8   malware memory forensicsReversing & malware analysis training part 8   malware memory forensics
Reversing & malware analysis training part 8 malware memory forensicsAbdulrahman Bassam
 
Feldo: Function Event Listing and Dynamic Observing for Detecting and Prevent...
Feldo: Function Event Listing and Dynamic Observing for Detecting and Prevent...Feldo: Function Event Listing and Dynamic Observing for Detecting and Prevent...
Feldo: Function Event Listing and Dynamic Observing for Detecting and Prevent...Tzung-Bi Shih
 
Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016Sergey Gordeychik
 
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...Clare Nelson, CISSP, CIPP-E
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hackingsamprada123
 
Cyber Security: Trends and Globar War
Cyber Security: Trends and Globar WarCyber Security: Trends and Globar War
Cyber Security: Trends and Globar WarNasir Bhutta
 

Similar to Ce hv8 references (20)

Open Education and Blockchain
Open Education and BlockchainOpen Education and Blockchain
Open Education and Blockchain
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Pen test methodology
Pen test methodologyPen test methodology
Pen test methodology
 
Science of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyScience of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis Methodology
 
CONFidence 2017: Hackers vs SOC - 12 hours to break in, 250 days to detect (G...
CONFidence 2017: Hackers vs SOC - 12 hours to break in, 250 days to detect (G...CONFidence 2017: Hackers vs SOC - 12 hours to break in, 250 days to detect (G...
CONFidence 2017: Hackers vs SOC - 12 hours to break in, 250 days to detect (G...
 
Ethical Hacking Conference 2015- Building Secure Products -a perspective
 Ethical Hacking Conference 2015- Building Secure Products -a perspective Ethical Hacking Conference 2015- Building Secure Products -a perspective
Ethical Hacking Conference 2015- Building Secure Products -a perspective
 
Security protection On banking systems using ethical hacking.
Security protection  On banking systems using  ethical hacking.Security protection  On banking systems using  ethical hacking.
Security protection On banking systems using ethical hacking.
 
Among Viruses, Trojans, and Backdoors:Fighting Malware in 2022
Among Viruses, Trojans, and Backdoors:Fighting Malware in 2022Among Viruses, Trojans, and Backdoors:Fighting Malware in 2022
Among Viruses, Trojans, and Backdoors:Fighting Malware in 2022
 
MITRE ATT&CKcon 2018: Decision Analysis Applications in Threat Analysis Frame...
MITRE ATT&CKcon 2018: Decision Analysis Applications in Threat Analysis Frame...MITRE ATT&CKcon 2018: Decision Analysis Applications in Threat Analysis Frame...
MITRE ATT&CKcon 2018: Decision Analysis Applications in Threat Analysis Frame...
 
3.Seminar Report Ashar Shaikh Final.docx
3.Seminar Report Ashar Shaikh Final.docx3.Seminar Report Ashar Shaikh Final.docx
3.Seminar Report Ashar Shaikh Final.docx
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
 
BSides IR in Heterogeneous Environment
BSides IR in Heterogeneous EnvironmentBSides IR in Heterogeneous Environment
BSides IR in Heterogeneous Environment
 
Reversing & malware analysis training part 8 malware memory forensics
Reversing & malware analysis training part 8   malware memory forensicsReversing & malware analysis training part 8   malware memory forensics
Reversing & malware analysis training part 8 malware memory forensics
 
Feldo: Function Event Listing and Dynamic Observing for Detecting and Prevent...
Feldo: Function Event Listing and Dynamic Observing for Detecting and Prevent...Feldo: Function Event Listing and Dynamic Observing for Detecting and Prevent...
Feldo: Function Event Listing and Dynamic Observing for Detecting and Prevent...
 
Iu report
Iu reportIu report
Iu report
 
Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016
 
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
Cyber Security: Trends and Globar War
Cyber Security: Trends and Globar WarCyber Security: Trends and Globar War
Cyber Security: Trends and Globar War
 

Recently uploaded

React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

Ce hv8 references

  • 1. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker M o d u le 01: Introduction to Ethical Hacking 1. Zero-day attacks are meaner, more ram pant than w e ever thought, from http://arstechnica.com/security/ 2 0 1 2 / 10 /zero-day-attacks-are-meaner-and-more-plentiful-thanthought/. 2. SECURITY POLICY: TARGET, CONTENT, & LINKS, from http://csrc.nist.gov/nissc/1998/proceedings/paperG4.pdf. 3. Anatom y of the Hack - Hands-on Security, from http://www.slideshare.net/NewBU/anatomy-of-thehack-handson-security-information-assurance-dub. 4. Hacker methodology, from http://w w w.hackersecuritym easures.com /. 5. Ethical Hacking, from w w w .secured eath.co m . 6. C. C. Palmer, Ethical hacking from http://researchweb.watson.ibm .com /journal/sj/403/palm er.htm l. 7. An O verview of Com puter Security, from www.cc.gatech.edu/classes/AY2005/cs4803cns_fall/security_overview.ppt. 8. Dr. Death, (2006), Ethical Hacking, from http://w w w .securedeath.com . 9. Ethical Hacking, from http://neworder.box.sk/news/921. 10. How are Penetrating Testing conducted?, from w w w .corsaire.co m . 11. Ethical Hacking: The Security Justification Redux, from http://www.sosresearch.org/publications/ISTAS02ethicalhack.PDF. 12. Ethical Hacking, from w ww.sosresearch.org/publications. 13. Ethical Hacking, from w w w .research.ibm .com . 14. Covering Tracks, from http://rootprom pt.org. 15. Attack, from http://www.linuxsecurity.com /content/view/17/70/. 16. Security Issues in W ireless M A G N ET at Networj Layer, from http://csce.unl.edu/~jaljaroo/publications/TR02-10-07.pdf. 17. Glossary of Security and Internet terms, from http://wssg.berkeley.edu/Securitylnfrastructure/glossary.htm l. 18. Glossary of Vulnerability Testing Terminology, from http://www.ee.oulu.fi/research/ouspg/sage/glossary/. 19. Information about hackers, from http://w w w .antionline.com /. 20. Information about hackers, from http://w2.eff.org/Net_culture/Hackers/. 21. LEX LUTHOR, information about hackers, from http://bak.spc.org/dms/archive/britphrk.txt. 22. Information about hackers, from http://directory.google.com/Top/Computers/Hacking/. 23. Information about hackers, from http://directory.google.com/Top/Computers/Security/Hackers/. 24. Information about hackers, from http://bak.spc.org/dms/archive/profile.html. References Page 2976 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 2. Ethical Hacking and Countermeasures References 25. Exam 312-50 Certified Ethical Hacker Information about hackers, from http://dir.yahoo.com /Com puters_and_lnternet/Security_and_Encryption/Hacking/. M o d u le 02: Footprinting and Reconnaissance 26. Search Operators, from http://w w w.googleguide.com /advanced_operators.htm l. 27. The Complete W indow s Trojans Paper, from http://w w w .w indow security.com /w hitepapers/trojans/The_C om plete_W indow s_Trojans_Paper.htm l. 28. Naples, (2008), Information Gathering Tools, Available from http://it.toolbox.com /wiki/index.php/lnform ation_Gathering_Tools. 29. 30. Extract W ebsite Information from archive.org, Available from w w w .archive.org . Footprinting, from http://www.ethicalhacker.net/com ponent/option,com _sm f/ltem id,49/topic,228.m sg672. 31. Simson Garfinkel and David Cox, (2009), Finding and Archiving the Internet Footprint, http://simson.net/clips/academic/2009.BL.lnternetFootprint.pdf. 32. 33. CHAPTER 2 [FOOTPRINTING], from http://www.ecqurity.com /wp/footprinting-encored.pdf. Donna F. Cavallini and Sabrina 1 PACIFICI, Got COM PETITIVE INTELLIGENCE, . http://www.llrx.com /features/gotci.ppt. 34. Spam m ers & hackers: using the APNIC W hois Database to find in their network, from http://www.apnic.net/info/faq/abuse/using_whois.htm l. 35. P. Mockapetris, (1987), DOM AIN N A M ES - CONCEPTS AND FACILITIES, from htt p ://w w w .ie tf.0 rg/ rf c/ rf c 1034. txt. 36. M anic Velocity, Footprinting And The Basics Of Hacking, from http://web.textfiles.com/hacking/footprinting.txt. 37. Dean, (2001), W indow s 2000 Command Prom pt Troubleshooting Tools, from http://www.pcm ech.com /show/troubleshoot/192/. 38. nslookup Command, from http://publib. boulder. ibm.com/infocenter/pseries/v5r3/index.jsp?topic=/com.ibm.aix.doc/cmds/aixcmd s4/nslookup.htm. 39. 40. The nslookup M anual Page, from http://www.stopspam .org/usenet/m m f/m an/nslookup.htm l. Bob Hillery, (2001), Neohapsis Archives - Incidents list - Re: Finding out w ho owns ..., from http://archives.neohapsis.com/archives/incidents/2001-01/0032.html. 41. Ryan Spangler, (2003), Analysis of Rem ote Active Operating System Fingerprinting Tools, from http://w w w.packetw atch.net/docum ents/papers/osdetection.pdf. 42. Ryan Spangler, (2003), Analysis of Rem ote Active Operating System Fingerprinting Tools, from http://w w w.securiteam .com /securityreviews/5ZP010UAAI.htm l. 43. Fingerprint methodology: IPID sampling, from http://www.insecure.org/nmap/nmap-fingerprintingold.html. 44. Fyodor, (1998), Rem ote OS detection via TCP/IP Stack Fingerprinting, from http://www.donkboy.com /htm l/fingerprt.htm . 45. Rem ote OS Detection, from http://nmap.org/book/osdetect.html. 46. Regional Internet Registry, from http://en.wikipedia.org/wiki/Regional_lnternet_Registry. 47. Boy Scouts, Fingerprinting from http://onin.eom/fp/fpmeritbdg.html#top. 48. The Hacker's Choice, from http://freeworld.thc.org/welcom e/. 49. THC Fuzzy Fingerprint, from http://freeworld.thc.org/thc-ffp/. References Page 2977 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 3. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 50. Katherine Knickerbocker, CJ625 Student Paper, from http://all.net/CID/Attack/papers/Spoofing.html. 51. Arik R. Johnson, W h a t is com petitive intelligence? How does com petitive ..., from http://aurorawdc.com /whatisci.htm . 52. Guangliang (Benny), (2006), Spamming and hacking, from http://www.apnic.net/info/faq/abuse/using_whois.htm l. 53. Dhillon, (2006), Footprinting: The Basics of Hacking: Hack In The Box, from http://www.hackinthebox.org/modules.php?op=modload&name=News&file=article&sid=5359&mode=t hread&order= 0 &thold= 0 . 54. Roshen, (2006), Paladion - Customers - Success Stories - Penetration Testing, from http://paladion.net/pentration_testing.php. 55. Paul Thompson, (2006), Cognitive Hacking and Digital Governm ent: Digital Identity, from http://www.ists.dartm outh.edu/library/chd0803.pdf. 56. Greg Sandoval, (2006), M PA A accused of hiring a hacker, from http://news.com.com/MPAA+accused+of+hiring+a+hacker/2100-1030_3-6076665.html. 57. Kurt Seifried, (2005), Closet20001213 Backdoors, Back Channels and HTTP(S), from http://www.seif ried.org/security/index.php/Closet20001213_Backdoors,_Back_Channels_and_HTTP(S). 58. Happy Browser, (2005), from http://www.hotscripts.com /Detailed/39030.htm l. 59. Client-server architecture, from http://w w w.netw orkintrusion.co.uk/N_scan.htm . 60. Elegant architecture: NASI, from http://www.nessus.org/features/. 61. The Signatures, from http://www.honeynet.org/papers/finger/. 62. Ryan Spangler, (2003), Analysis of Rem ote Active Operating System Fingerprinting Tools, Nmap t o o l: technique, from http://w w w.securiteam .com /securityreviews/5ZP010UAAI.htm l. 63. Bew are!: W a r dialing, Sandstorm Sandtrap 1.5 W ard ia le r Detector Plus 16 and Basic Detectors, from http://w w w .data-connect.com /Santstorm _PhoneSw eep.htm . 64. Appendix A - Glossary of Terms: IPSEC, from http://www.im sglobal.org/gws/gwsvlpO/im sgws_securityProfvlpO .htm l. 65. Def. and info. Vulnerability scanning, from http://www.webencanto.com /com puter_glossary/Com m unications/Ethics/vulnerability_scanning.htm l. 66. Footprinting, from http://books.mcgrawhill. com/downloads/products//0072193816/0072193816_ch01. pdf]. 67. P. Mockapetris, Zvon - RFC 1034 [DO M AIN N A M ES - CONCEPTS AND FACILITIES] - DOMAIN..., from http://www.zvon.org/tmRFC/RFC1034/Output/chapter3.html. 68. Gaurav, (2006), The Domain Name System (DNS), from http://people.csa.iisc.ernet.in/gaurav/np/rfcs/dns.html. 69. Using the Internet for Com petitive Intelligence, from http://www.cio.com /CIO/arch_0695_cicolum n.htm l. 70. Reporting network abuse: Spamming and hacking, from http://www.apnic.net/info/faq/abuse/using_whois.htm l. 71. Bastian Ballmann, (2011), Information gathering tools, from http://www2.packetstormsecurity.org/cgibin/search/search.cgi?searchvalue=information+gathering&type=archives&[search].x= 0 &[search].y= 0 . 72. Google Earth, from http://www.google.com /earth/index.htm l. 73. pipl,from https://pipl.com/. 74. spokeo, from http://w w w.spokeo.com . 75. Zaba Search, from http://w w w.zabasearch.com . References Page 2978 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 4. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 76. 123 People Search, from http://w w w.123people.com . 77. Zoomlnfo, from http://w w w.zoom info.com . 78. PeekYou, from http://w w w .peekyou.com . 79. W in k People Search, from http://wink.com . 80. Intelius, from http://w w w.intelius.com . 81. A n yW ho , from http://w w w .anyw ho.com . 82. PeopleSm art, from http://w w w .peoplesm art.com . 83. People Lookup, from https://w ww .peoplelookup.com . 84. W hitePages, from http://w w w .w hitepages.com . 85. Facebook, from https://w ww .facebook.com /. 86. Linkedln, from http://w w w.linkedin.com . 87. Google+, from https://plus.google.com. 88. Twitter, from http://twitter.com . 89. Google Finance, from http://finance.google.com /finance. 90. Yahoo Finance, from http://finance.yahoo.com . 91. Zaproxy, from https://code.google.eom/p/zaproxy/downloads/list. 92. Burp Suite, from http://portswigger.net/burp/download.htm l. 93. Firebug, from https://getfirebug.com/downloads/. 94. HTTrack W eb site Copier, from http://w w w.httrack.c 0 m/page/ 2 /. 95. BlackW idow , from http://softbytelabs.com /us/downloads.htm l. 96. W ebripper, from http://w w w.calluna-software.com /W ebripper. 97. SurfOffline, from http://w w w.surfoffline.com /. 98. W ebsite Ripper Copier, from http://w w w.tensons.com /products/w ebsiterippercopier/. 99. PageNest, from http://w w w .pagenest.com . 100. Teleport Pro, from http://w w w.tenm ax.com /teleport/pro/download.htm . 101. Backstreet Browser, from http://www.spadixbd.com /backstreet/. 102. Portable Offline Browser, from http://w w w .m etaproducts.com /Portable_O ffline_Brow ser.htm . 103. Offline Explorer Enterprise, from http://w w w .m etaproducts.com /offline_explorer_enterprise.htm . 104. Proxy Offline Browser, from http://www.proxy-offline-browser.com/. 105. GNU W get, from ftp://ftp.gnu.org/gnu/wget/. 106. iMiser, from http://internetresearchtool.com . 107. Hooeey W ebprint, from http://www.hooeeywebprint.com.s3-website-us-eastl.am azonaws.com /dow nload.htm l. 108. W ayback M achine, from http://archive.org/web/web.php. 109. W ebSite-W atcher, from http://aignes.com /download.htm . 110. eM ailTrackerPro, from http://w w w .em ailtrackerpro.com . 111. PoliteM ail, from http://w w w .politem ail.com . 112. Email Lookup - Free Email Tracker, from http://w w w.ipaddresslocation.org. 113. Read Notify, from http://w w w .readnotify.com . 114. Pointofmail, from http://w w w .pointofm ail.com . References Page 2979 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 5. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 115. DidTheyReadlt, from http://w w w .didtheyreadit.com . 116. Super Email M arketing Softw are, from http://www.bulk-email-marketing-software.net. 117. Trace Email, from http://whatismyipaddress.com/trace-email. 118. W h o R e a d M e , from http://w horeadm e.com . 119. MSGTAG, from http://www.m sgtag.com /download/free/. 120. GetNotify, from http://w w w .getnotify.com . 121. Zendio, from http://w w w.zendio.com /download. 122. G-Lock Analytics, from http://glockanalytics.com. 123. EDGAR Database, from http://w w w .sec.gov/edgar.shtm l. 124. Hoovers, from http://w w w .hoovers.com . 125. LexisNexis, from http://www.lexisnexis.com . 126. Business W ire , from http://w w w.businesswire.com . 127. M arket W atch, from http://w w w .m arketw atch.com . 128. The W all Street T ra n scrip t, from http://w w w .tw st.com . 129. Upper M arketplace, from http://w w w .lipperm arketplace.com . 130. Eurom onitor, from http://w w w .eurom onitor.com . 131. Fagan Finder, from http://w w w.faganfinder.com . 132. SEC Info, from http://w w w .secinfo.com . 133. The Search Monitor, from http://w w w .thesearchm onitor.com . 134. Compete PRO™, from http://w w w .com pete.com . 135. Copernic Tracker, from http://w w w.copernic.com . 136. ABI/IN FO RM Global, from http://w w w .proquest.com . 137. SEM Rush, from http://w w w.sem rush.com . 138. AttentionM eter, from http://w w w .attentionm eter.com . 139. Jobitorial, from http://w w w .jobitorial.com . 140. Google Hacking Database, from http://w w w.hackersforcharity.org. 141. M etaGoofil, from http://www.edge-security.com . 142. Google Hack Honeypot, from http://ghh.sourceforge.net. 143. Goolink Scanner, from http://w w w.ghacks.net. 144. GM apCatcher, from http://code.google.com. 145. SiteDigger, from http://w w w .m cafee.com . 146. SearchDiggity, from http://w w w.stachliu.com . 147. Google Hacks, from http://code.google.com. 148. Google HACK DB, from http://w w w .secpoint.com . 149. BiLE Suite, from http://w w w.sensepost.com . 150. Gooscan, from http://w w w.darknet.org.uk. 151. W H O IS Lookup at DomainTools.com, from http://whois.dom aintools.com /. 152. Domain Dossier, from http://centralops.net/co. 153. Sm artW hois, from http://www.tam os.com /download/m ain/index.php. 154. CountryW hois, from http://www.tam os.com /products/countrywhois/. References Page 2980 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 6. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 155. W h o is Analyzer Pro, from http://w w w.whoisanalyzer.com /dow nload.opp. 156. LanWhols, from http://lantricks.com/download/. 157. HotW hois, from http://w w w.tialsoft.com /download/?url=http://ww w .tialsoft.com /hwhois.exe. 158. Batch IP Converter, from http://w w w .netw orkm ost.com /dow nload.htm . 159. W hois 2010 Pro, from http://lapshins.com/. 160. CallerIP, from http://w w w.callerippro.com /dow nload.htm l. 161. ActiveW hois, from http://w w w.johnru.com /. 162. W h o is Lookup M ultiple Addresses, from http://www.sobolsoft.com /. 163. WhoisThisDom ain, from http://w w w.nirsoft.net/utils/w hois_this_dom ain.htm l. 164. Sm artW hois, from http://sm artwhois.com . 165. W hois, from http://tools.whois.net. 166. Better W hois, from http://w w w .betterw hois.com . 167. DNSstuff, from http://w w w.dnsstuff.com . 168. W hois Source, from http://www.whois.se. 169. N etw ork Solutions Whois, from http://w w w.netw orksolutions.com . 170. W e b Wiz, from http://www.webwiz.co.uk/domain-tools/whois-lookup.htm. 171. W ebToolHub, from http://www.webtoolhub.com/tn561381-whois-lookup.aspx. 172. Network-Tools.com, from http://network-tools.com. 173. Ultra Tools, from https://w ww .ultratools.com /w hois/hom e. 174. dnsstuff, from http://w w w.dnsstuff.com /. 175. network-tools, from http://network-tools.com/. 176. DNS Queries, from http://www.dnsqueries.com /en/. 177. DIG, from http://www.kloth.net/services/dig.php. 178. myDNSTools, from http://www.m ydnstools.info/nslookup. 179. DN SW atch, from http://w w w .dnsw atch.info. 180. DomainTools, from http://w w w.dom aintools.com . 181. Professional Toolset, from http://www.dnsstuff.com /tools. 182. DNS, from http://e-dns.org. 183. DNS Records, from http://network-tools.com. 184. DNS Lookup Tool, from http://www.webwiz.co.uk/domain-tools/dns-records.htm. 185. DNSData View, from http://w w w .nirsoft.net. 186. DNS Query Utility, from http://w w w.webm aster-toolkit.com . 187. W H O IS-RW S, from http://whois.arin.net/ui. 188. Netcraft, from http://searchdns.netcraft.com /Phost. 189. Shodan, from http://w w w.shodanhq.com /. 190. Path Analyzer Pro, from http://w w w.pathanalyzer.com /dow nload.opp. 191. VisualRoute 2010, from http://w w w .visualroute.com /dow nload.htm l. 192. N etw ork Pinger, from http://w w w.netw orkpinger.eom /en/dow nloads/#dow nload. 193. Magic NetTrace, from http://w w w.tialsoft.com /download/?url=http://ww w .tialsoft.com /m NTr.exe. 194. GEO Spider, from http://oreware.com /viewprogram .php?prog=22. References Page 2981 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 7. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 195. 3D Traceroute, from http://w w w .d3tr.de/dow nload.htm l. 196. vTrace, from http://vtrace.pl/download.htm l. 197. AnalogX HyperTrace, from http://w w w.analogx.com /contents/dow nload/N etwork/htrace/Freeware.htm . 198. Trout, from http://www.mcafee.com/apps/free-tools/termsofuse.aspx?url=/us/downloads/freetools/trout.aspx. 199. N etw ork Systems Traceroute, from http://w w w .net.princeton.edu/traceroute.htm l. 200. Roadkil's Trace Route, from http://www.roadkil.net/program .php/P27/Trace%20Route 201. Ping Plotter, from http://w w w .pingplotter.com . 202. myiptest, from http://www.myiptest.com/staticpages/index.php/how-about-you. 203. Maltego, from http://w w w.paterva.com /web6/products/download4.php. 204. Domain Name Analyzer Pro, from http://www.domainpunch.com/domain-name-analyzerpro/download.php. 205. W e b Data Extractor, from http://w w w .w ebextractor.com . 206. Prefix W hois, from http://pwhois.org. 207. Netmask (IRPAS), from http://w w w.phenoelit.org/irpas/dow nload.htm l. 208. Binging, from http://w w w.blueinfy.com /tools.htm l. 209. Tctrace (IRPAS), from http://w w w.phenoelit.org/irpas/dow nload.htm l. 210. Spiderzilla, from http://spiderzilla.mozdev.org/installation.html. 211. Autonom ous System Scanner (ASS) (IRPAS), from http://w w w.phenoelit.org/irpas/dow nload.htm l. 212. Sam Spade, from http://w w w.m ajorgeeks.com /Sam _Spade_d594.htm l. 213. DNS DIGGER, from http://www.dnsdigger.com . 214. Robtex, from http://w w w.robtex.com . 215. Dig W e b Interface, from http://w w w.digw ebinterface.com 216. SpiderFoot, from http://sourceforge.net/projects/spiderfoot/?so.urce=dlp. 217. Domain Research Tool, from http://w w w .dom ainresearchtool.com . 218. CallerIP, from http://w w w.callerippro.com /dow nload.htm l. 219. ActiveW hois, from http://w w w .johnru.com . 220. Zaba Search, from http://www.zabasearch.com /. 221. yoNam e, from http://yonam e.com . 222. GeoTrace, from http://www.nabber.org/projects/geotrace/. 223. Ping-Probe, from http://www.ping-probe.com/Ping-Probe/index.html. 224. DomainHostingView, from http://w w w .nirsoft.net. M o d u le 03: Scanning N etw orks 225. Explanation of the Three-W ay Handshake via TCP/IP, from http://support.microsoft.com/kb/172983. 226. Appendix G. Lists of reserved ports, ICM P types and codes, and Internet protocols, from http://www.ingate.com /files/422/fwm anual-en/xal0285.htm l. 227. 228. The Art of Port Scanning - by Fyodor, from http://nm ap.org/nm ap_doc.htm l. M ethods of IP N etw ork Scanning - Stealth TCP Scanning Methods, from http://w w w .c 0 dewalkers.c 0 m/c/a/Server-Administrati0 n /M eth 0 ds-0 f-IP-Netw 0 rk-Scanning/ 3 /. References Page 2982 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 8. Ethical Hacking and Countermeasures References 229. Exam 312-50 Certified Ethical Hacker W h a t is Port Scanning and Types of Port Scanning, from http://www.hackillusion.com/what-is-portscanning-and-types-of-port-scanning/. 230. UDP Scan, from http://www.networkuptim e.com /nm ap/page3-10.shtm l. 231. Hacking Exposed, from http://www.scribd.com/doc/62708034/Hacking-Exposed-Book. 232. N etw ork Security Assessment, from https://w w w .trustm atta.com /dow nloads/pdf/M atta_IP_N etw ork_Scanning.pdf. 233. Quick-Tip: SSH Tunneling M ade Easy, from http://www.revsys.com/writings/quicktips/ssh-tunnel.html. 234. Detecting Spoofed Packets, from http://seclab.cs.ucdavis.edu/papers/DetectingSpoofed-DISCEX.pdf. 235. Scanning modes: FIN, Xmas, Null, from http://www.openxtra.co.uk/support/howto/nmap-scanmodes.php. 236. Port scanning techniq:sW (W in d o w scan), from http://www.paulisageek.com /nm ap/index.htm l. 237. Prabhaker M ateti, UDP Scanning, from http://www.cs.wright.edu/~pmateti/Courses/499/Probing/. 238. FTP server bounce attack, TCP Fragmenting, Intrusion detection systems use signature-based mechanisms, from http://www.in-f-or.it/informatica/docs/portscan.pdf. 239. Laura Chappell, (2003), OS Fingerprinting W ith ICM P: ICM P echo, from http://www.securitypronews.com /it/security/spn-23-200309290SFingerprintingwithlCMP.htm l. 240. 241. Scan Type-sF -sX -sN, from http://content.ix2.net/arc/t-4370.html. Unixo3/introduction to Nmap, from http://www.sam hart.com /cgi‫־‬ bin/classnotes/wiki.pl?UNIX03/lntroduction_To_Nm ap. 242. Fyodor, (2006), Art of port scanning: Features, Ideal scanning and related IPID games, Nmap: discription, Fingerprint methadology: IPID samplingBounce attacks worked, Techniqe: TCP reverse ident scanning, from http://w w w.insecure.org/nm ap/nm ap_doc.htm l. 243. Antirez, hping2(8) - Linux man page: Discription, Hping2 Commands, from http://www.hping.org/m anpage.htm l. 244. Chris McNab, (2008), Third Party IP N etw ork Scanning Methods, Available from http://w w w .c 0 dewalkers.c 0 m/c/a/Server-Administrati0 n/Third-Party-IP-Netw 0 rk-Scanning-Meth 0 ds/. 245. Thierry Lagarde , AutoScan Network, Available from http://autoscannetwork.com/index. php?option=com_content&task=view&id=48&ltemid=32. 246. Onion Routing, Available from http://dictionary.zdnet.com/definition/onion+routing.html. 247. Van Geelkerken F.W .J, (2006), Digital Mixing (M IX nets), Available from http://www.iusm entis.com /society/privacy/rem ailers/onionrouting/. 248. Keith J. Jones, M ike Shema, & Bradley C. Johnson, Vulnerability Scanners, from w ww.foundstone.com /pdf/books/AntiHackerSam ple.pdf. 249. Examining Port Scan Methods- Analysing Audible Techniques, from http://www.in-for.it/informatica/docs/portscan.pdf. 250. IM S General W e b Services Security Profile, http://w w w.im sglobal.org/gws/gw svlpO/im sgw s_securityProfvlpO .htm l. 251. Bew are!: W a r dialing, from http://w w w.castlecops.com /al361-W ar_dialing.htm l. 252. Simson L. Garfinkel, Autom atic Parity Detection, from http://archive.cert.unistuttgart.de/archive/bugtraq/1998/12/msg00215.html. 253. Lance M ueller, CREATE A REVERSE SSH TUNNEL, http ://w w w .lancem ueller.com /blog/C reate%20Reverse%20SSH %20to%20reach%20servlet%20inside%2 Ofirewall.pdf. References Page 2983 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 9. Ethical Hacking and Countermeasures References 254. Exam 312-50 Certified Ethical Hacker Avi Kak, (2010), Port Scanning, Vulnerability Scanning, Packet Sniffing, and Intrusion Detection, http://cobweb.ecn.purdue.edu/~kak/com psec/NewLectures/Lecture23.pdf. 255. Renaud Deraison, Ron Gula, and Todd Hayton, (2009), Passive Vulnerability Scanning Introduction, http://nessus.org/whitepapers/passive_scanning_tenable.pdf. 256. Cheng Guang, TCP Analysis Based on Flags, http://www.nordu.net/development/2nd-cnnw/tcp-analysisbased-on-flags.pdf. 257. Cheng Tang & Jonathan Gossels, (1999), Wardialing: Practical Advice to Understand Your Exposure, http://www.system experts.com /assets/tutors/wardial0299.pdf. 258. N etw ork Security Library, from http://w w w.window security.com /w hitepapers/m isc/Exam ining_port_scan_m ethods__ Analyzing_Audibl e_Te. 259. Lance Cottrell, Anonym izer Limitations: Logs, from http://www.livinginternet.eom /i/is_anon.htm . 260. Michel Leconte, (2006), N etw ork security consulting, from http://www.activsupport.com/SmallBusiness-Network-Security-Soluti. 261. 262. Angry IP Scanner, from http://angryip. 0 rg/w/D 0 w n l 0 a d . SolarW inds Engineer's Toolset, from http://downloads.solarwinds.com/solarwinds/Release/Toolset/ZPToolset/ZP-Toolset-Ol.html. 263. 264. Colasoft Ping Tool, from http://w w w.colasoft.com /dow nload/products/dow nload_ping_tool.php. PacketTrap M SP, from http://www.packettrap.com/download?hsCtaTracking=e95ec5b5-069f-4cd5962c-9c0e6e32a6da%7C072dfe23-353f-46c2-9ab0-la27d39c01fl. 265. 266. Visual Ping Tester - Standard, from http://w w w .pingtester.net. Ping Sw eep (Integrated into W hatsupG old), from http://www.whatsupgold.com /products/download/network_m anagem ent.aspx?k_id=ping-sweep-tool. 267. Ping Scanner Pro, from http://www.digilextechnologies.com . 268. N etw ork Ping, from http://www.greenline-soft.com /product_network_ping/index.aspx. 269. Ultra Ping Pro, from http://ultraping.webs.com /downloads.htm . 270. Ping Monitor, from http://w w w.niliand.com . 271. PinglnfoView, from http://w w w.nirsoft.net/utils/m ultiple_ping_tool.htm l. 272. Pinkie, from http://w w w.ipuptim e.net/category/download/. 273. Colasoft Packet Builder, from http://w w w.colasoft.com /dow nload/products/dow nload_packet_builder.php. 274. NetScanTools Pro, from http://w w w.netscantools.com /nstprodem orequestform .htm l. 275. PRTG N etw ork M onitor, from http://w w w.paessler.com /dow nload/prtg. 276. Global Network Inventory Scanner, from http://w w w .m agnetosoft.com /products/global_network_inventory/gni_features.htm . 277. Net Tools, from http://m absoft.com /nettools.htm . 278. SoftPerfect Netw ork Scanner, from http://w w w.softperfect.com /products/netw orkscanner/. 279. IP Tools, from http://www.ks-soft.net/ip-tools.eng/downpage.htm. 280. Advanced Port Scanner, from http://www.radm in.com /dow nload/previousversions/portscanner.php. 281. MegaPing, from http://www.m agnetosoft.com /products/m egaping/m egaping_features.htm . 282. Netifera, from http://netifera.com . 283. N etw ork Inventory Explorer, from http://www.10strike.com /networkinventoryexplorer/download.shtm l. References Page 2984 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 10. Ethical Hacking and Countermeasures References 284. Exam 312-50 Certified Ethical Hacker Free Port Scanner, from http://w w w .nsauditor.eom /netw ork_tools/free_port_scanner.htm l#.U W JRvqLzvrw . 285. ID Serve, from http://w w w.grc.com . 286. Netcraft, from http://toolbar.netcraft.com . 287. Netcat, from http://sourceforge.net/projects/netcat/files/latest/download?source=files. 288. GFI LanGuard, from http://www.gfi.com/downloads/mirrors.aspx?pid=lanss. 289. SAINT, from http://w w w.saintcorporation.com /products/software/saintScanner.htm l. 290. Retina CS, from http://www.beyondtrust.com/Landers/TY-Page-RetinaCSCommunity/index.html. 291. OpenVAS, from http://w w w .openvas.org. 292. Core Impact Professional, from http://w w w .coresecurity.com . 293. Security M anager Plus, from http://www.manageengine.com/products/securitymanager/download, html. 294. Nexpose, from http://www.rapid7.com /products/nexpose/com pare-downloads.jsp. 295. Shadow Security Scanner, from http://www.safety-lab.com /en/download.htm . 296. QualysGuard, from http://w w w.qualys.com . 297. Nsauditor Netw ork Security Auditor, from http://w w w.nsaudit 0 r.c 0 m /netw 0 rk_security/netw 0 rk_security_audit 0 r.htm l#.UW KEx 6 Lzvrw. 298. 299. Security Auditor's Research Assistant (SARA), from http://www-arc.com /sara/. LANsurveyor, from http://www.solarwinds.com/register/MoreSoftware.aspx?External=false&Program=17592&c=70150000 OOOPjNE. 300. OpM anager, from http://www.m anageengine.com /network-m onitoring/download.htm l. 301. N etw orkView , from http://w w w .netw orkview .com /htm l/dow nload.htm l. 302. The Dude, from http://w w w.m ikrotik.com /thedude. 303. LANState, from http://www.10-strike.com /lanstate/download.shtm l. 304. HP Network Node M anager i software, from http://w w w 8 .hp.com/us/en/softwaresolutions/software. html?compURI=1170657#. 305. FriendlyPinger, from http://www.kilievich.com /fpinger/download.htm . 306. N etM apper, from http://w w w .opnet.com . 307. Ipsonar, from http://w w w.lum eta.com /product/product.htm l. 308. NetBrain Enterprise Suite, from http://www.netbraintech.com /instant-trial/. 309. CartoReso, from http://cartoreso.cam pus.ecp.fr. 310. Spiceworks-Network M apper, from http://w w w.spicew orks.com /dow nload/. 311. Switch Center Enterprise, from http://www.lan-secure.c 0 m/d 0 w n l 0 ads.htrn#netw 0 rk. 312. NetCrunch, from http://www.adrem soft.com /dem o/downloadproduct. php?product=nc7&file=NCServer7Premium. exe. 313. Proxy W orkbench, from http://proxyworkbench.com/. 314. Proxifier, from http://w w w.proxifier.com /dow nload.htm . 315. Proxy Switcher, from http://w w w.proxysw itcher.com /. 316. SocksChain, from http://ufasoft.com/socks/. 317. TOR (The Onion Routing), from https://w ww .torproject.org/download/dow nload. References Page 2985 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 11. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 318. Proxy, from http://www.analogx.com /conter 1 ts/download/N etw ork/proxy/Freeware.htm . 319. Proxy Commander, from http://www.dlao.com /proxycm d/. 320. Protoport Proxy Chain, from http://w w w .protoport.com . 321. Proxy Tool W indow s App, from http://webproxylist.com/proxy-tool-windows-app/. 322. Proxy+, from http://www.proxyplus.cz/. 323. Gproxy, from http://gpassl.com /gproxy.php. 324. FastProxySwitch, from http://www.affinity-tools.com/fps/. 325. Fiddler, from http://www.fiddler2.com /fiddler2/version.asp. 326. ProxyFinder Enterprise, from http://www.proxy-tool.com . 327. Socks Proxy Scanner, from http://w w w .m ylanview er.com . 328. ezProxy, from https://w ww . 0 clc.0 rg/ezpr0 xy/d 0 w n l 0 ad.en.h.tm l. 329. Charles, from http://www.charlesproxy.com /. 330. JA P Anonym ity and Privacy, from http://anon.inf.tu-dresden.de/win/download_en.htm l. 331. UltraSurf, from http://w w w.ultrasurf.us. 332. CC Proxy Server, from http://www.youngzsoft.net/ccproxy/proxy-server-download.htm. 333. W ideCap, from http://w idecap.ru. 334. FoxyProxy Standard, from https://addons.mozilla.org. 335. ProxyCap, from http://w w w.proxycap.com . 336. Super N etw ork Tunnel, from http://w w w .netw orktunnel.net. 337. HTTP-Tunnel, from http://www.http-tunnel.com . 338. Bitvise, from http://w w w .bitvise.com . 339. Psiphon, from http://psiphon.ca. 340. Your-Freedom, from http://w w w.your-freedom .net. 341. Just Ping, from http://www.just-ping.com. 342. W ebSitePulse, from http://w w w .w ebsitepulse.com . 343. G-Zapper, from http://w w w.dum m ysoftw are.com /gzapper.htm l. 344. M ow ser, from http://w w w .m ow ser.com . 345. Spotflux, from http://w w w.spotflux.com . 346. Anonym ous W e b Surfing Tool, from http://www.anonym ous-surfing.com . 347. U-Surf, from http://ultim ate-anonym ity.com . 348. Hide Your IP Address, from http://w w w .hideyouripaddress.net. 349. W arpProxy, from http://silent-surf.com. 350. Anonymizer Universal, from http://w w w.anonym izer.com . 351. Hope Proxy, from http://w w w.hopeproxy.com . 352. Guardster, from http://w w w.guardster.com . 353. Hide M y IP, from http://www.privacy-pro.com /features.htm l. M o d u le 04: Enum eration 354. rpcinfo, from http://www.usoft.spb.ru/com m ands/rpcinfo/. 355. RPCCLIENT, from http://w w w .sarata.com /m anpages/m anl/rpcclient.htm l. References Page 2986 Ethical Hacking and Countermeasures Copyright © by EC-C0l1nCil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 12. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 356. Enum eration, from http://w w w.edenofire.com /tutes/hack.php. 357. smtp-user-enum User Docum entation, from http://pentestmonkey.net/tools/user-enumeration/smtpuser-enum. 358. Chris Gates, (2006), W indow s Enum eration: USER2SID & SID2USER, from http://w w w.window security.com /w hitepaper/W indow s-Enum eration-USER2SID-SID2USER.htm l. 359. W h a t is S N M P ?, from http://www.wtcs.org/snm p4tpc/snm p.htm . 360. SN M P, from http://w w w.cisc 0 .c0 m/univercd/cc/td/d 0 c/cisintwk/it 0 _ d 0 c/snmp.htm#xt 0 cid 5 . 361. SN M PForDum m ies, from http://w iki.outboundindex.net/SNM PForDum m ies. 362. Jan van Oorschot, Jeroen W orte lb o e r and Dirk W isse, (2001), S N M P - The Mission Statem ent, http://www.securityfocus.com/infocus/1301. 363. rp c in fo (lM ), from http://docs.hp.com /en/B2355-90692/rpcinfo.lM.htm l. 364. GRAPE- INFO- DOT- COM, from http://www.grape-info.com . 365. Joris Evers, (2006), AT&T hack exposes 19,000 identities, from http://news.cnet.com/2100-1029_36110765.html. 366. S N M P from http://w w w .iss.net/security_center/advice/Reference/N etw orking/SN M P/default.htm . 367. Simple Netw ork M anagem ent Protocol (SN M P), from http://www.cisco.com /en/US/docs/internetworking/technology/handbook/SNM P.htm l. 368. Linux / Unix finger command, from http://www.com puterhope.com /unix/ufinger.htm . 369. Chris Gates, (2006), W in d o w s Enum eration: USER2SID & SID2USER http://w w w.window security.com /w hitepapers/W indows-Enum eration-USER2SID-SID2USER.htm l. 370. SuperScan, from http://www.m cafee.com /us/downloads/free-tools/superscan.aspx. 371. Hyena, from http://w w w.system tools.com /hyena/trial_dow nload.htm . 372. Winfingerprint, from http://w w w.winfingerprint.com . 373. N etBIO S Enum erator, from http://nbtenum .sourceforge.net/. 374. PsTools, from http://technet.microsoft.com/en-us/sysinternals/bb897553.aspx. 375. OpUtils, from http://www.m anageengine.com /products/oputils/download.htm l. 376. SolarW ind 's IP Netw ork Browser, from http://www.solarwinds.com/engineers-toolset/ip-networkbrowser, aspx. 377. Getif, from http://www.wtcs.org/snm p4tpc/getif.htm . 378. O iD ViEW S N M P M IB Browser, from http://w w w .oidview .com /m ibbrow ser.htm l. 379. iReasoning M IB Browser, from http://ireasoning.com /m ibbrowser.shtm l. 380. SNScan, from http://www.mcafee.com/us/downloads/free-tools/snscan.aspx. 381. S N M P Scanner, from http://www.secure-bytes.com /SNM P+Scanner.php. 382. S N M P Informant, from http://www.snm p-inform ant.com /. 383. Net-SNMP, from http://net-snm p.sourceforge.net/download.htm l. 384. Nsauditor Netw ork Security Auditor, from http://w w w.nsaudit 0 r.c 0 m /netw 0 rk_security/netw 0 rk_security_audit 0 r.htm l#.UV 7 LH 5 NHLZ 4 . 385. Spiceworks, from http://www.spiceworks.com/free-snmp-network-management-software/. 386. Enum4linux, from http://labs.portcullis.co.uk/application/enum4linux/. 387. Softerra LDAP Administrator, from http://w w w.ldapadm inistrator.com /. 388. JXplorer, from http://www.jxplorer.org/. 389. LDAP Admin Tool, from http://w w w.ldapsoft.com /ldapbrowser/ldapadm intool.htm l. References Page 2987 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 13. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 390. LDAP Account M anager, from https://www.ldap-account-manager.org/lamcms/. 391. LEX - The LDAP Explorer, from http://w w w.ldapexplorer.com /. 392. LDAP Admin, from http://www.ldapadm in.org/. 393. Active Directory Explorer, from http://technet.microsoft.com/en-us/sysinternals/bb963907.aspx. 394. LDAP Administration Tool, from http://sourceforge.net/projects/ldap-at/. 395. LDAP Search, from http://securityxploded.com/ldapsearch.php. 396. Active Directory Domain Services M anagem ent Pack, from http://www.microsoft.com/enus/download/details.aspx?id=21357. 397. LDAP Browser/Editor, from http://www.novell.com /coolsolutions/tools/13765.htm l. 398. NSLookup, from http://www.kloth.net/services/nslookup.php. M o d u le 05: System Hacking 399. W h y Keyloggers are extrem ely dangerous?, from http://gamecreator.hubpages.com/hub/WhyKeyloggers-are-extremely-dangerous. 400. Steganography in Depth, from http://www.crcnetbase.com/doi/abs/10.1201/9780203504765.ch4. 401. Detecting spoofed packets, from http://ieeexplore.ieee.0rg/xpl/articleDetails.jsp?arnumber=1194882. 402. NTLM Authentication in Java, from http://www.luigidragone.com/software/ntlm-authentication-in-java/. 403. A Tutorial Review on Steganography, from http://www.jiit.ac.in/jiit/ic3/IC3_2008/IC32008/APP2_21.pdf. 404. 405. network scanning, from http://searchm idm arketsecurity.techtarget.com /definition/network-scanning. Ricky M. Magalhaes, (2004), Using passwords as a defense mechanism to improve W indow s security, from w w w .w ind ow security.com /artid es/Passw ord s_lm p rove_W ind ow s_Security_Part2 .htm l. 406. Piazza & Peter, (2002), Hybrid threats have rosy future: attacks that combine virus ..., http://findartides.com /p/articles/m i_hb6380/is_200207/ai_n25618875?tag=content;coll. 407. 408. Andreas W estfeld and Andreas Pfitzmann, Attacks on Steganographic Systems, citeseerx.ist.psu.edu/. DaijiSanai and HidenobuSeki, (2004), Optimized Attack for NTLM2 Session Response http://www.blackhat.com/presentations/bh-asia-04/bh-jp-04-pdfs/bh-jp-04-seki.pdf. 409. Zhi W ang, Xuxian Jiang, W eidong Cui, and Xinyuan W ang, Countering Persistent Kernel Rootkits Through System atic Hook Discovery, http://research.microsoft.com/en-us/um/people/wdcui/papers/hookmapraid08.pdf. 410. Elia Florio, W hen M alw are M eets Rootkits, http://w w w .sym antec.com /avcenter/reference/w hen.m alw are.m eets.rootkits.pdf. 411. 412. Peter Piazza, (2002), SM O : Tech Talk, from http://www.securitym anagem ent.com /library/001272.htm l. Brute force attack - Wikipedia, the free encyclopedia, from http://en.wikipedia.org/w iki/Brute_force_attack. 413. 414. Talk:Brute force attack - Bvio, from http://bvio.ngic.re.kr/Bvio/index.php/Talk:Brute_force_attack. Passwords, from http://searchsecurity.techtarget.com /searchSecurity/downloads/HackingforDum m iesCh07.pdf. 415. Authernative, Inc. | Products | FAQs, from http://w w w.authernative.com /faqs.shtm l. 416. CIAC Notes, from http://www.ciac.org/ciac/notes/Notes03a.shtm l. 417. Path: new shost.uw o.caluw ovax.uw o.calm neville From: m neville@ uw ovax ..., from http://w w w.uwo.ca/its/doc/newsletters/lnTouch/voll-9495/w inl8.txt. 418. The Hack FAQ: Password Basics, from http://www.nmrc.org/pub/faq/hackfaq/hackfaq-04.html. References Page 2988 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 14. Ethical Hacking and Countermeasures References 419. 420. Exam 312-50 Certified Ethical Hacker Luigi Dragone, NTLM Authentication in Java, from http://www.luigidragone.com /networking/ntlm .htm l. Hardening the Base W indow s 2000 Server, from http://www.m icrosoft.com /technet/security/prodtech/windows2000/secwin2k/swin2k06.m spx. 421. Bill W all, Sunbelt TECH BRIEFIN G, from http://w w w.stratvantage.com /security/ntpass.htm . 422. Security Options, from http://www.microsoft.com/technet/security/topics/serversecurity/tcg/tcgch05n.mspx. 423. Technical Explanation of N etw ork S M B Capture, from http://ebook.coolersky.com /hack/lc5.04_doc/sm b_capture.htm l. 424. Detecting Alternate Data Streams, from http://www.windowsitpro.com /Article/ArtidelD/16189/16189.htm l. 425. Bojan Smojver, Linux Today - ZDNet Australia: Threats M ove Beyond Linux to W indow s, http://www.linuxtoday.com/security/2002121100426SCSVNT. 426. Neohapsis Archives - NTBugtraq - Proposal for protection from ..., from http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0245.html. 427. Russell Kay, (2006), Sidebar: A Simple Rootkit Example, http://www.computerworld.eom/securitytopics/security/hacking/story/0,10801,108116,00.html?from=s tory_package. 428. Russell Kay, (2006), Rootkits offer the lure of total control, from http://www.tech world. com/security/features/index.cfm?featureid=2219. 429. 430. Paladion Networks, from http://www.paladion.net/m edia/insights/ihfaq.htm . NTFS Stream s - Everything you need to know (demos and tests included), from http://www.diam ondcs.com .au/stream s/stream s.htm . 431. H. Carvey, (2002), The Dark Side of NTFS (M icrosoft's Scarlet Letter), from http://www.infosecwriters.com /texts.php?op=display&id=53. 432. Stegonography (a secretly hidden coding that dates back to a n c ie n t...), from http://www.wordinfo.info/words/index/info/view_unit/3403/?letter=S&spage=9. 433. Ravindranath AV, Steganography: Hiding Data in Images, from http://www.asptoday.com /Content.aspx?id=2347. 434. Paul Robertson, (2005), CS 450 Hom ework 4, from http://www.cs.umb.edu/~paulr/CS450/assignments/ass4.html. 435. NBTdeputy (v 1.0.1), from http://w w w.securityfriday.com /Topics/w inxpl.htm l. 436. Sir Dystic, (2002), N BN am e, from http://www.securityfocus.com/comments/tools/1670/12751/threaded. 437. Fred B. Schneider, Authentication, from http://www.cs.cornell.edu/Courses/cs513/2000sp/NL10.html. 438. CS513: System Security - Topic Outline, from http://www.cs.cornell.edu/courses/cs513/2005fa/02.outline.html. 439. Security Options from http://www.microsoft.com/technet/security/guidance/serversecurity/tcg/tcgch05n.mspx. 440. Hardening the Base W in d o w s 2000 Server, http://technet.microsoft.com/hi-in/library/cc751216(enus).aspx. 441. Brute force attack, from http://w w w .reference.com /brow se/w iki/Brute_force_attack. 442. W h a t is pwdump2, from http://w w w.bindview.com /Services/razor/Utilities/W indow s/pwdum p2_readm e.cfm . 443. Derogee, Steganography and Steganalysis, from http://www.liacs.nl/hom e/tm oerlan/privtech.pdf. References Page 2989 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 15. Ethical Hacking and Countermeasures References 444. Exam 312-50 Certified Ethical Hacker Techworld.com - Rootkits offer the lure of total control, from http://www.tech world. com /websecurity/features/index.cfm ?featureid=2219&pagtype=sam ecatsam ech an. 445. 446. Dasmith, Softw are Analysis, from http://www.unc.edu/~sm ithdr/inlsl87/sr.htm l. Hacking Windows-Specific Services, from http://awkwardalliteration.com/ebooks/Computers/Hacking%20Exposed%20W indow s% 202003%20Chapter%205.pdf. 447. Ricky M. Magalhaes, (2003), Using passwords as a defense mechanism to improve W indow s security, from http ://w w w .w indow security.com /articles/Passw ords_lm prove_W indow s_Security_Part2.htm l. 448. W inrtgen, from http://www.oxid.it/projects.htm l. 449. RainbowCrack, from http://pr 0 ject-rainb 0 w crack.c 0 m/index.htm#d 0 w n l 0 a d . 450. Elcomsoft Distributed Password Recovery, from http://w w w.elcom soft.com /edpr.htm l. 451. Securityoverride, from http://securityoverride.org/default-password-list. 452. Cirt, from http://cirt.net. 453. Default-password, from http://default-password.info. 454. Defaultpassword, from http://w w w.defaultpassw ord.us. 455. Passwordsdatabase, from http://w w w.passwordsdatabase.com . 456. W 3dt, from https://w3dt.net/tools/defaultpasswords/. 457. Virus, from http://w w w.virus.org/default_passw ds. 458. Open-sez.me, from http://open-sez.me/passwd.htm. 459. Routerpasswords, from http://w w w.routerpasswords.com /. 460. Fortypoundhead, from http://w w w .fortypoundhead.com /tools_dpw .asp. 461. pwdump7, from http://www.tarasco.org/security/pwdum p_7/. 462. fgdump, from http://www.foofus.net/~fizzgig/fgdump/. 463. LOphtCrack, from http://www.IOphtcrack.com /download.htm l. 464. Ophcrack, from http://ophcrack.sourceforge.net/download.php. 465. RainbowCrack, from http://pr 0 ject-rainb 0 w crack.c 0 m/index.htm#d 0 w n l 0 a d . 466. Password Unlocker Bundle, from http://www.passwordunlocker.com /password-recovery-bundle.htm l. 467. Proactive System Password Recovery, from http://w w w.elcom soft.com /pspr.htm l. 468. John the Ripper, from http://w w w.openwall.com /john/. 469. W indow s Password Cracker, from http://www.windows-password-cracker.com /download.htm l. 470. W inPassw ord, from http://lastbit.com /ntpsw/default.asp. 471. Passware Kit Enterprise, from http://www.lostpassword.com /kit-enterprise.htm . 472. PasswordsPro, from http://www.insidepro.com /eng/passwordspro.shtm l. 473. LSASecretsView, from http://w w w.nirsoft.net/utils/lsa_secrets_view.htm l. 474. LCP, from http://www.lcpsoft.com /english/download.htm . 475. Password Cracker, from http://www.am lpages.com /pwdcrack.shtm l. 476. Kon-Boot, from http://w w w.thelead82.com /kon-boot/konbootW IN.htm l. 477. W indow s Password Recovery Tool, from http://w w w .w indow spassw ordsrecovery.com /. 478. Hash Suite, from http://hashsuite.openw all.net/download. 479. SAM Inside, from http://www.insidepro.com /eng/sam inside.shtm l. References Page 2990 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 16. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 480. W indow s Password Recovery, from http://w w w .passcape.com /w indow s_passw ord_recovery. 481. Password Recovery Bundle, from http://www.top-password.com/password-recovery-bundle.html. 482. krbpwguess, from http://www.cqure.net/wp/tools/password-recovery/krbpwguess/. 483. W indow s Password Breaker Enterprise, from http://www.recoverw indowspassw ord.com /window spassword-breaker.html. 484. Rekeysoft W indow s Password Recovery Enterprise, from http://www.rekeysoft.com/reset-windowspassword.html. 485. Active(® Password Changer, from http://www.password-changer.com /. 486. Offline NT Password & Registry Editor, from http://pogostick.net/~pnh/ntpasswd/. 487. W indow s Password Reset Kit, from http://www.reset-windows-password.net/. 488. W indow s Password Recovery Tool, from http://w w w .w indow spassw ordsrecovery.com /. 489. ElcomSoft System Recovery, from http://www.elcom soft.eom /esr.htm l#forgot adm inistrator password. 490. Trinity Rescue Kit, from http://trinityhom e.org/Hom e/index.php?content=TRINITY_RESCUE_KIT_DOW NLOAD&front_id=12&lang =en&locale=en. 491. W indow s Password Recovery Bootdisk, from http://www.rixler.com/windows-password-recoverybootdisk.htm. 492. PasswordLastic, from http://www.passwordlastic.com/windows-password-recovery-lastic. 493. Stellar Phoenix Password Recovery, from http://www.stellarinfo.com /password-recovery.htm . 494. W indow s Password Recovery Personal, from http://w w w.window s-passw ordrecovery.com /. 495. W indow s Adm inistrator Password Reset, from http://www.systoolsgroup.com/windows-adminstratorpassword-reset.html. 496. RemoteExec, from http://www.isdecisions.com /products/rem oteexec. 497. PDQ Deploy, from http://www.adm inarsenal.com /download-pdq. 498. D am eW are NT Utilities, from http://w w w .dam ew are.ru/nt_utilities.htm l. 499. Spytech SpyAgent, from http://www.spytech-web.com /spyagent.shtm l. 500. All In One Keylogger, from http://w w w .relytec.com /. 501. Ultim ate Keylogger, from http://w w w.ultim atekeylogger.com /dow nload/. 502. Advanced Keylogger, from http://www.m ykeylogger.com /perfect-keylogger. 503. The Best Keylogger, from http://w w w.thebestkeylogger.com /. 504. SoftActivity Keylogger, from http://www.softactivity.com /download-al.asp. 505. Elite Keylogger, from http://www.widestep.com/elite-keystroke-recorder-info. 506. Pow ered Keylogger, from http://www.m ykeylogger.com /undetectable-keylogger/. 507. StaffCop Standard, from http://w w w.staffcop.com /dow nload/. 508. iM onitorPC, from http://w w w.im onitorpc.com /. 509. PC Activity M onitor Standard, from http://w w w .pcacm e.com /dow nload.htm l. 510. KeyProw ler, from http://keyprowler.com /download.aspx. 511. Keylogger Spy Monitor, from http://ematrixsoft.com/download.php?p=keylogger-spy-monitor-software. 512. REFOG Personal M onitor, from http://www.refog.com /personal-m onitor.htm l. 513. Actual Keylogger, from http://www.actualkeylogger.com/download-free-key-logger.html. 514. Spytector, from http://w w w.spytector.com /download.htm l. References Page 2991 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 17. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 515. KidLogger, from http://kidlogger.net/download.htm l. 516. PC Spy Keylogger, from http://www.pc-spy-keylogger.com. 517. Revealer Keylogger, from http://www.logixoft.com/free-keylogger-download. 518. Spy Keylogger, from http://www.spy-key-logger.com/download.html. 519. Actual Spy, from http://w w w.actualspy.com /download.htm l. 520. SpyBuddy® 2013, from http://www.exploreanywhere.com /products/spybuddy/. 521. Amac Keylogger, from http://w w w.am ackeylogger.com /. 522. Aobo M ac OS X KeyLogger, from http://www.keylogger-mac.com/. 523. Perfect Keylogger for Mac, from http://www.blazingtools.com . 524. Award Keylogger for Mac, from http://www.award-soft.com /content/view/275/136. 525. M ac Keylogger, from http://w w w.award-soft.com /M ac_Keylogger/. 526. REFOG Keylogger for MAC, from http://www.refog.com /m ac-keylogger.htm l. 527. KidLogger for MAC, from http://kidlogger.net/download.htm l. 528. MAC Log Manager, from http://www.keylogger.in/keylogger/m adogm anager.htm l. 529. logkext, from https://c 0 de.g 0 0 gle.c 0 m/p/l0 gkext/. 530. Keyboard Spy, from http://alphaom ega.softw are.free.fr/keyboardspy/Keyboard%20Spy.htm l. 531. FreeMacKeylogger, from http://www.hwsuite.com/free-mac-keylogger/. 532. KeyGrabber, from http://w w w .keydem on.com . 533. KeyGhost, from http://w w w.keyghost.com . 534. Activity Monitor, from http://w w w.softactivity.com /download.asp. 535. Rem ote Desktop Spy, from http://www.global-spy-software.com /download.php. 536. SSPro, from http://www.gpsoftdev.com /download-m onitoring-software/. 537. RecoveryFix Em ployee Activity M onitor, from http://www.recoveryfix.com /download-em ployeemonitoring.html. 538. Em ployee Desktop Live View er, from http://www.nucleustechnologies.com /download-em ployeedesktop-live-viewer.php. 539. NetVizor, from http://w w w .netvizor.net/dow nload.htm . 540. Net Spy Pro, from http://www.net-m onitoring-software.com /windows/trial.htm l. 541. REFOG Em ployee M onitor, from http://www.refog.com /em ployee-com puter-m onitoring-software.htm l. 542. OsMonitor, from http://www.os-m onitor.com /download.htm . 543. LANVisor, from http://w w w.lanvisor.com /download.htm . 544. W o rk Examiner Standard, from http://w w w.workexam iner.com /dow nload.htm l. 545. Pow er Spy, from http://ematrixsoft.com/index.php. 546. eBLASTER, from http://www.spectorsoft.com /products/eBlaster_Windows/index.asp?source=nav-hseBwin. 547. !m onitor Em ployee Activity M onitor, from http://www.em ployee-m onitoring-software.ee/. 548. Em ployee Monitoring, from http://w w w .em ployeem onitoring.net/dow nload.asp. 549. OsMonitor, from http://www.os-m onitor.com /download.htm . 550. Ascendant N FM , from http://www.ascendant-security.com /download.shtm l. 551. Spylab W ebSpy, from http://w w w.spylab.org/dow nload.htm . References Page 2992 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 18. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 552. Personal Inspector, from http://www.spyarsenal.com /personal-inspector/. 553. CyberSpy, from http://w w w .cyberspysoftw are.com /dow nload.htm l. 554. AceSpy, from http://w w w.acespy.com /features.htm l. 555. EmailObserver, from http://w w w .softsecurity.com /prod_D 7_m ore.htm l. 556. Net Nanny Home Suite, from http://w w w.netnanny.com /products/netnanny_hom e_suite/detail/technical. 557. Aobo Filter for PC, from http://www.aobo-porn-filter.com /downloads. 558. CyberSieve, from http://www.softforyou.com /cs-download.php. 559. Child Control, from http://salfeld.com/download/child-control/index.html. 560. SentryPC, from http://w w w.sentrypc.com /trial.htm . 561. iProtectYou Pro, from http://www.softforyou.com /ip-index.htm l. 562. K9 W e b Protection, from http://w w w l.k9w ebprotection.com /getk9/dow nload-softw are. 563. Verity Parental Control Softw are, from http://www.nchsoftware.com /childm onitoring/index.htm l. 564. Profil Parental Filter, from http://www.profiltechnology.com /en/hom e/profil-parental-filter. 565. PC Pandora, from http://w w w.pcpandora.com /download/. 566. KidsWatch, from http://w w w.kidswatch.com /. 567. SoftActivity TS Monitor, from http://w w w.softactivity.com /downloadtsm .aspx. 568. Desktop Spy, from http://w w w.spyarsenal.com /dow nload.htm l. 569. IcyScreen, from http://www.16software.com /icyscreen/screenshots.php. 570. Spector Pro, from http://www.spectorsoft.com /products/SpectorPro_Windows/index.asp?source=navhs-ProWin. 571. PC Tattletale, from http://w w w .pctattletale.com /. 572. Computer Screen Spy Monitor, from http://w w w.m ysuperspy.com /dow nload.htm . 573. PC Screen Spy M onitor, from http://ematrixsoft.com/download.php?p=pc-screen-spy-monitor-software. 574. Kahlown Screen Spy Monitor, from http://w w w.lesoftrejion.com /. 575. Guardbay Rem ote Com puter Monitoring Softw are, from http://w w w.guardbay.com . 576. HT Em ployee Monitor, from http://w w w.hidetools.com /em ployee-m onitor.htm l. 577. Spy Em ployee Monitor, from http://www.spysw.com /em ployee-m onitor-software.htm . 578. USBSpy, from http://www.everstrike.com /usb-m onitor/. 579. USB Monitor, from http://www.hhdsoftware.com /usb-m onitor. 580. USB Grabber, from http://usbgrabber.sourceforge.net/. 581. USBTrace, from http://w w w .sysnudeus.com /usbtrace_dow nload.htm l. 582. USBD eview , from http://w w w.nirsoft.net/utils/usb_devices_view.htm l. 583. Advanced USB Port Monitor, from http://www.aggsoft.com/usb-port-monitor.htm. 584. USB M onitor Pro, from http://www.usb-monitor.com/. 585. USB Activity Monitoring Softw are, from http://www.datadoctor.org/partition-recovery/downloads.htm l. 586. Stealth iBot Com puter Spy, from http://www.brickhousesecurity.com/product/stealth+ibot+computer+spy.do. 587. KeyCarbon USB Hardware Keylogger, from http://www.spywaredirect.net/keycarbon-usb.htm l. 588. USB 2GB Keylogger, from http://diij.com/KL2-Keylogger-2GB-USB-Hardware-keelog/prod_24.html. References Page 2993 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 19. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 589. Spy Voice Recorder, from http://w w w.m ysuperspy.com /recorder.htm . 590. Sound Snooper, from http://www.sound-snooper.com /en/download.php. 591. W ebC am Recorder, from http://w ebcam recorder.com /. 592. W ebcam M agic, from http://w w w.robom agic.com /w ebcam m agic.htm . 593. M yW eb cam Broadcaster, from http://w w w.eyespyfx.com /broadcast.php. 594. I-Can-See-You, from http://w w w .internetsafetysoftw are.com . 595. Digi-Watcher, from http://www.digi-watcher.com /. 596. NET Video Spy, from http://w w w.sarbash.com /download.shtm l. 597. Eyeline Video Surveillance Softw are, from http://w w w.nchsoftware.com /surveillance/index.htm l. 598. Capturix VideoSpy, from http://www.capturix.com /default.asp?target=consum er&product=cvs. 599. W ebC am Looker, from http://felenasoft.com /webcam looker/en/. 600. SecuritySpy, from http://w w w.bensoftware.com /securityspy/download.htm l. 601. iSpy, from http://www.ispyconnect.com /download.aspx. 602. Printer Activity Monitor, from http://www.redline-software.com /eng/products/pam /. 603. Print M onitor Pro, from http://www.spyarsenal.com/printer-monitoring-software/print-monitor-pro/. 604. Accurate Printer Monitor, from http://www.aggsoft.com /printer-m onitor.htm . 605. Print Censor Professional, from http://usefuls 0 ft.c 0 m/print-cens 0 r/ # .U W P W 8 JNH LZ 4 . 606. All-Spy Print, from http://www.all-spy.com/all-spy-print.html. 607. O &K Print W atch, from http://w w w .prnw atch.com /okpw .htm l. 608. Print Job Monitor, from http://www.imonitorsoft.com/product-print-job-monitor.htm. 609. PrintTrak, from http://www.lygil.com /printtrak/printtrak.htm . 610. Printer Admin - Copier Tracking System, from http://w w w.printeradm in.com /copy-m anagem ent.htm . 611. Print Inspector, from http://www.softperfect.com /products/pinspector/. 612. Print365, from http://krawasoft.com /index.htm l. 613. M obile Spy, from http://w w w .phonespysoftw are.com /. 614. VRS Recording System, from http://www.nch.com .au/vrs/index.htm l. 615. M odem Spy, from http://w w w.m odem spy.com /en/dow nload.php. 616. M obiStealth Cell Phone Spy, from http://www.mobistealth.com/mobile-phone-spy-software. 617. SPYPhone GOLD, from http://spyera.com/products/spyphone-gold-internet. 618. SpyPhoneTap, from http://w w w.spyphonetap.com /. 619. FlexiSPY O M N I, from http://www.flexispy.com/en/flexispy-omni-spy-app-cell-phone.htm. 620. SpyBubble, from http://www.spybubble.com/cell-phone-spy.php. 621. M O BILE SPY, from http://www.m obile-spy.com /. 622. StealthGenie, from http://w w w.stealthgenie.com /. 623. CellSPYExpert, from http://www.cellspyexpert.com /. 624. SPYPhone, from http://spyera.com/products/spy-phone-basic-internet. 625. EasyGPS, from http://www.easygps.com /. 626. FlexiSPY PRO-X, from http://www.flexispy.com/spyphone-call-interceptor-gps-tracker-symbian.htm. 627. GPS TrackM aker Professional, from http://w w w.trackm aker.com /dwlpage.php. 628. M O BILE SPY, from http://www.m obile-spy.com /. References Page 2994 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 20. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 629. World-Tracker, from http://www.world-tracker.com /v4/. 630. ALL-in-ONE Spy, from http://w w w.thespyphone.com /allinone.htm l. 631. Trackstick, from http://w w w.trackstick.com /download.htm l. 632. M obiStealth Pro, from http://w w w .m obistealth.com . 633. mSpy, from http://w w w.buym spy.com /. 634. GPS Retriever, from http://w w w.m obilebugstore.com /Blackberry_gps_retriver.aspx. 635. Zemana AntiLogger, from http://www.zem ana.com /Download.aspx. 636. Anti-Keylogger, from http://www.anti-keyloggers.com/. 637. PrivacyKeyboard, from http://www.antikeylogger.eom /products/privacykeyboard/overview.htm l#download. 638. DefenseW all HIPS, from http://www.softsphere.com /program s/. 639. KeyScrambler, from http://w w w.qfxsoftw are.com /dow nload.htm . 640. 1 Hate Keyloggers, from http://dewasoft.com/privacy/i-hate-keyloggers.htm. 641. SpyShelter STOP-LOGGER, from http://www.spyshelter.com /download-spyshelter. 642. DataGuard AntiKeylogger Ultim ate, from http://www.maxsecuritylab.com/dataguard-antikeylogger/download-anti-keyloger.php. 643. PrivacyKeyboard, from http://www.privacykeyboard.com /privacy-keyboard.htm l. 644. Elite Anti Keylogger, from http://www.elite-antikeylogger.com /free-download.htm l. 645. CoDefender, from https://www.encassa.com /downloads/default.aspx. 646. PC Tools Spyw are Doctor, from http://www.pctools.com /spyware-doctor/. 647. SU PERAntiSpyw are, from http://superantispyware.com /index.htm l. 648. Spyw are Term inator 2012, from http://w w w.pcrx.com /spywareterm inator/. 649. Ad-Aware Free Antivirus+, from http://w w w .lavasoft.com /products/ad_aw are_free.php. 650. Norton Internet Security, from http://in.norton.com/downloads-trial-norton-internet-security. 651. SpyHunter, from http://w w w.enigm asoftw are.com /products/. 652. Kaspersky Internet Security 2013, from http://www.kaspersky.com/internet-security-free-trial. 653. SecureA nyw here Complete 2012, from http://www.webroot.com /En_US/consum er-productssecureanywhere-com plete.htm l. 654. MacScan, from http://m acscan.securem ac.com /. 655. Spybot - Search & Destroy, from http://www.safer-networking.org/dl/. 656. M alw arebytes Anti-M alw are PRO, from http://w w w.m alwarebytes.org/products/m alw arebytes_pro/. 657. Fu, from http://www.f-secure.com/v-descs/fu.shtml. 658. KBeast, from http://core.ipsecs.com/rootkit/kernel-rootkit/kbeast-vl/. 659. Hacker Defender HxDef Rootkit, from http://vishnuvalentino.com/hacking-tutorial/hacker-defenderhxdef-rootkit-tutorial-in-1 0 -steps-nostalgia/. 660. Stinger, from http://www.mcafee.com/us/downloads/free-tools/how-to-use-stinger.aspx. 661. UnHackM e, from http://w w w.greatis.com /unhackm e/dow nload.htm . 662. Virus Removal Tool, from http://www.sophos.com/en-us/products/free-tools/virus-removal-tool.aspx. 663. Hypersight Rootkit Detector, from http://northsecuritylabs.com /. 664. Avira Free Antivirus, from http://www.avira.com /en/avira-free-antivirus. 665. SanityCheck, from http://w w w.resplendence.com /downloads. References Page 2995 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 21. Ethical Hacking and Countermeasures References 666. 667. Exam 312-50 Certified Ethical Hacker G M ER , from http://w w w.gm er.net/. Rootkit Buster, from http://dow nloadcenter.trendm icro.com/index. php?regs=NABU&dk=result_page&dkval=drop_list&catid =6&prodid=155. 668. Rootkit Razor, from http://www.tizersecure.com /. 669. Rem oveAny, from http://www.free-anti-spy.com/en/index.php. 670. TDSSKiller, from http://support.kaspersky.com/5350?el=88446. 671. Prevx, from http://w w w.prevx.com /freescan.asp. 672. Stream Arm or, from http://securityxploded.com /stream arm or.php. 673. ADS Spy, from http://www.m erijn.nu/program s.php#adsspy. 674. ADS M anager, from http://dm itrybrant.com /adsm anager. 675. Streams, from http://technet.microsoft.com/en-us/sysinternals/bb897440.aspx. 676. AlternateStream View , from http://w w w .nirsoft.net/utils/alternate_data_stream s.htm l. 677. NTFS-Streams: ADS manipulation tool, from http://sourceforge.net/projects/ntfs-ads/. 678. Stream Explorer, from http://w w w.rekenw onder.eom /stream explorer.htm #Stream s. 679. ADS Scanner, from http://www.pointstone.com /products/ADS-Scanner/. 680. RKDetector, from http://w w w.rkdetector.com /. 681. G M ER , from http://w w w.gm er.net/. 682. HijackThis, from http://www.trendm icro.com /us/security/products/index.htm l. 683. SN O W , from http://www.darkside.com .au/snow/index.htm l. 684. QuickStego, from http://quickcrypto.com/free-steganography-software.html. 685. Hide In Picture, from http://sourceforge.net/projects/hide-in-picture/. 686. gifshuffle, from http://www.darkside.com .au/gifshuffle/index.htm l. 687. CryptaPix, from http://www.briggsoft.com /cpix.htm . 688. BM PSecrets, from http://bmpsecrets.com/. 689. OpenPuff, from http://em beddedsw .net/O penPuff_Steganography_H om e.htm l. 690. OpenStego, from http://openstego.sourceforge.net/. 691. PHP-Class Stream Steganography, from http://www.phpclasses.org/package/6027-PHP-Store-andhidden-information-in-PNG-images.html. 692. Red JPEG , from http://www.totalcm d.net/plugring/redjpeg.htm l. 693. Steganography Studio 694. Virtual Steganographic Laboratory (VSL), from http://vsl.sourceforge.net/. 695. wbStego, from http://wbstego.wbailer.com /. 696. Merge Streams, from http://w w w.ntkernel.com /w&p.php?id=23. 697. Office XML, from http://www.irongeek.com/i.php?page=security/ms-office-stego-code. 698. Data Stash, from http://w w w.skyjuicesoftware.com /software/ds_info.htm l. 699. FoxHole, from http://foxhole.sourceforge.net. 700. Xidie Security Suite, from http://w w w .stegano.ro. 701. StegParty, from http://w w w.fasterlight.com . 702. Hydan, from http://www.crazyboy.com /hydan/. References Page 2996 , from http://stegstudio.sourceforge.net/. Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 22. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 703. StegJ, from http://sourceforge.net/projects/stegj/files/. 704. StegoStick, from http://stegostick.sourceforge.net/. 705. SN O W , from http://www.darkside.com .au/snow/index.htm l. 706. OmniHide PRO, from http://om nihide.com /. 707. Our Secret, from http://w w w.securekit.net/oursecret.htm . 708. RT Steganography, from http://rtstegvideo.sourceforge.net/. 709. Masker, from http://www.softpuls.com /m asker/. 710. Max File Encryption, from http://www.softeza.com /fileencryption/. 711. M SU StegoVideo, from http://w w w.com pression.ru/video/stego_video/index_en.htm l. 712. BDV DataHider, from http://www.bdvnotepad.com /products/bdv-datahider/. 713. StegoStick, from http://stegostick.sourceforge.net/. 714. OpenPuff, from http://em beddedsw .net/O penPuff_Steganography_H om e.htm l. 715. Stegsecret, from http://stegsecret.sourceforge.net/. 716. PSM Encryptor, from http://dem o.powersoftm akers.com /psm e.zip. 717. DeepSound, from http://jpinsoft.net/DeepSound/Download.aspx. 718. Mp3stegz, from http://mp3stegz.sourceforge.net/. 719. M AXA Security Tools, from http://www.maxa-tools.com/mst.php?lang=en. 720. BitCrypt, from http://bitcrypt.moshe-szweizer.com/. 721. MP3Stego, from http://www.petitcolas.net/fabien/steganography/m p3stego/. 722. Hide4PGP, from http://www.heinz-repp.onlinehom e.de/. 723. CHAOS Universal, from http://safechaos.com/cu.htm. 724. SilentEye, from http://w w w.silenteye.org/. 725. QuickCrypto, from http://w w w.quickcrypto.com /dow nload.htm l. 726. CryptArkan, from http://www.kuskov.com /com ponent/option,com _rem ository/ltem id,30/func,fileinfo/id,l/. 727. StegoStick, from http://stegostick.sourceforge.net/. 728. Invisible Secrets 4, from http://www.invisiblesecrets.com /. 729. Folder Lock, from http://w w w .new softw ares.net/folderlock/. 730. A+ Folder Locker, from http://www.giantmatrix.com/products/aplus-folder-locker/. 731. Toolwiz BSafe, from http://www.toolwiz.com/products/toolwiz-bsafe/. 732. Hide Folders 2012, from http://fspro.net/hide-folders/. 733. GiliSoft File Lock Pro, from http://www.gilisoft.com/product-file-lock-pro.htm. 734. Universal Shield, from http://w w w.everstrike.com /shield.htm . 735. W in M e n d Folder Hidden, from http://www.winm end.com /folder-hidden/. 736. Encrypted Magic Folders , from http://www.pc-magic.c 0 m /des.htm #em f. 737. QuickCrypto, from http://w w w.quickcrypto.com /dow nload.htm l. 738. Max Folder Secure, from http://w w w.m axfoldersecure.com /. 739. Spam Mimic, from http://www.spam m im ic.com /. 740. Sams Big G Play M aker, from http://www.scram disk.clara.net/. 741. Gargoyle Investigator™ Forensic Pro, from http://w etst 0 netech.c 0 m/pr 0 duct/ 2 /d 0 w n l 0 ads. References Page 2997 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 23. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 742. XStegsecret, from http://stegsecret.sourceforge.net/. 743. Stego Suite, from http ://w w w .w etst 0 netech.c 0 m/pr 0 d u ct/l/d 0 w n l 0 ads. 744. StegAlyzerAS, from http://www.sarc-wv.com/products/stegalyzeras/. 745. StegAlyzerRTS, from http://www.sarc-wv.com/products/stegalyzerrts/. 746. StegSpy, from http://www.spy-hunter.com /stegspy. 747. Steg A lyzerSS, from http://www.sarc-wv.com/products/stegalyzerss/. 748. Steg M arkSD K , from http://www.datam ark.com .sg/downloads-sdk.htm . 749. Steganography Studio, from http://stegstudio.sourceforge.net/. 750. Virtual Steganographic Laboratory (VSL), from http://vsl.sourceforge.net/. 751. Stegdetect, from http://w w w.outguess.org/detection.php. 752. Auditpol, from http://technet.microsoft.com/en-us/library/cc755264(v=ws.l0).aspx. 753. CCIeaner, from http://w w w .piriform .com /dow nload. 754. MRU-Blaster, from http://w w w.brightfort.com /m rublaster.htm l. 755. W ipe, from http://privacyroot.com /softw are/w ww /en/wipe.php. 756. Tracks Eraser Pro, from http://w w w .acesoft.net/features.htm . 757. BleachBit, from http://bleachbit.sourceforge.net/news/bleachbit-093. 758. AbsoluteShield Internet Eraser Pro, from http://www.internet-track-eraser.com /ineteraser.php. 759. Clear M y History, from http://www.hide-my-ip.com/clearmyhistory.shtml. 760. EvidenceEraser, from http://w w w .evidenceeraser.com /. 761. W inTools.net Professional, from http://w w w .w intools.net/. 762. RealTime Cookie & Cache Cleaner (R tC 3 ), from http://www.kleinsoft.co.za/buy.htm l. 763. AdvaHist Eraser, from http://w w w.advacrypt.cjb.net/. 764. Free Internet W in d o w W asher, from h ttp ://w w w .eusing .com /W indow _W ash er/W indow _W asher.htm . M od ule 06: Trojans and Backdoors 765. Placing Backdoors through Firewalls, from http://www.cyberwarzone.com /cyberwarfare/placingbackdoors-through-firewalls. 766. A Deep Look into Netcat - The TCP/IP Swiss Arm y Knife, from http://www.linux-support.com/cms/adeep-look-into-netcat-the-tcpip-swiss-army-knife/. 767. Trojans Revealed: Hackers Center: Internet Security Archive ..., http://www.hackerscenter.com /archive/view.asp?id=24717. 768. Dancho Danchev, The Com plete W indow s Trojans Paper, from http://www.fram e4.com /content/pubs/com p_trojans.txt. 769. The corporate threat posed by email Trojans, from http://www.gfisoftware.de/whitepapers/networkprotection-against-trojans.pdf. 770. Trojan Horses, from http://www-i4.informatik.rwth-aachen.de/lufg/teaching/ss2004/dependabilitysem inar/paper/final 8 .pdf. 771. Trojans - and how to protect your network against them, from http://w w w .w indow security.com /w hitepapers/trojans_protect_your_netw ork.htm l. 772. Fausi Qattan & Fredrik Thernelius, (2004), M aster's Thesis, from http://www.dsv.su.se/research/seclab/pages/pdf-files/04-34.pdf. 773. Malicious Intrusion Techniques, http://www.telecom worx.com /Adobe/Files39087.pdf. References Page 2998 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 24. Ethical Hacking and Countermeasures References 774. Exam 312-50 Certified Ethical Hacker Increased use of Trojan Horse Programs, from http://www.niscc.gov.uk/niscc/docs/tn-2004021600080.html?lang=en. 775. Anti Trojan source - How to protect your network against trojans ..., from http://news.myinstall.com/news/45/. 776. Dancho Danchev, Trojan W h ite Paper, from http://www.anti-trojan-software-reviews.com/trojan-whitepaper-p 2 .htm. 777. 778. Trojans, from http://w w w.em ailprivacy.info/trojans. Rem ote Access Trojan FAQ and Port List Com puter Security - N etw ork ..., from http://www.infosyssec.com /infosyssec/trojanportlist.htm l. 779. W IN SN O RT.com : Intrusion Detection, from http://www.winsnort.com /m odules.php?op=m odload&nam e=FAQ&file=index&m yfaq=yes&id_cat=13. 780. Trojan Horse Com puter Infection Symptoms, from http://hacker-elim inator.com /trojansym ptom s.htm l. 781. LockDown M illennium Advanced Online Help, from http://lockdowncorp.com /m anual/TrojanlnfectionSym ptom s.htm . 782. Commodon Communications - Threats to your Security on the Internet, from http://w w w.com m odon.com /threat/threat-detect.htm . 783. Van Hauser/THC, Placing Backdoors Through Firewalls, from http://www.cgisecurity.com /lib/placing_backdoors_through_firewalls.txt. 784. Mikejc, (2004), Tech-Recipes.com - Use System File Checker to Solve Problems, from http://www.techrecipes.com /windows_tips602.htm l. 785. Exploring the Explodable, from http://www.guninski.com /browsers.htm l. 786. David W ells, (1996), W rappers, from http://w w w.objs.com /survey/wrap.htm . 787. Milly, Steve A., Stan, Ojatex, Gordon, Darius and Buzz, (2000), W ord Pad , from www.pchelp.org/security/scrap.htm. 788. Trojans F A Q http://www.windowsecurity.com /faqs/Trojans/. 789. Information on Com puter Viruses, from http://www-rohan.sdsu.edu/viruses.htm l. 790. Advanced Netw ork Configuration and Troubleshooting, from http://snow.nl/dist/xhtmlc/ch05s02.html. 791. Tom Armstrong, (2001), N etcat - The TCP/IP Swiss Arm y Knife, from http://rn.nu/program/util/netcat/netcat.html. 792. Microsoft - W indow s File, from Protection, from http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/enus/system _file_protection.m spx?m fr=true. 793. Scott W . Hotaling's, Placing Backdoors Through Firewalls, from http://masc2279.no-ip.org/gadgetstoys/internet/placing-backdoors-through-firewalls. 794. How to block ICM P tunneling?, from https://listserv.icsalabs.com/pipermail/firewall-wizards/1999July/006060.html. 795. 796. Newbie: Security, from http://www.unixgeeks.org/security/newbie/security/firewall.htm l. Phrack Magazine 0 0 . Volum e Seven, Issue Forty-Nine File 06 o f ..., from http://www.phrack.org/phrack/49/P49-06. 797. Dancho Danchev dancho, The Complete W indow s Trojans Paper, from http://www.astalavista.com /index.php?section=directory&linkid=640. 798. Declan McCullagh, (2006), Case 2:00-cr-00170-WHA-VPM, from http://www.politechbot.com /docs/feds.trojan.hacking.brief.082406.pdf. 799. TCPView, from http://technet.microsoft.com/en-us/sysinternals/bb897437.aspx. References Page 2999 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 25. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 800. CurrPorts, from http://www.nirsoft.net/utils/cports.htm l. 801. Process Monitor, from http://technet.microsoft.com/en-in/sysinternals/bb896645.aspx. 802. W h a t's Running, from http://w w w.whatsrunning.net/. 803. PrcView, from http://w w w .team cti.com . 804. W insonar, from http://w w w .few byte.com /w insonar.htm l. 805. HiddenFinder, from http://w w w .w enpoint.com /dow nload/. 806. Autoruns for W indow s, from http://technet.microsoft.com/en-us/sysinternals/bb963902.aspx. 807. KillProcess, from http://orangelam psoftware.com /products_killprocess.php. 808. Security Task Manager, from http://w w w.neuber.com /taskm anager/. 809. Yet Another (rem ote) Process Monitor, from http://yaprocm on.sourceforge.net/. 810. MONIT, from http://m m onit.com /m onit/. 811. OpM anager, from http://www.m anageengine.com /network-m onitoring/process-m onitoring.htm l. 812. j v l 6 Pow er Tools 2012, from http://www.m acecraft.com /jvl6-powertools-2012/. 813. PC Tools Registry Mechanic, from http://www.pctools.com /registry-m echanic/. 814. Reg Organizer, from http://w w w.chem table.com /organizer.htm . 815. Registry Shower, from http://w w w.registryshower.com /download.htm . 816. Comodo Cloud Scanner, from http://www.com odo.com /hom e/internet-security/cloud-scanner.php. 817. Buster Sandbox Analyzer, from http://bsa.isoftware.nl/. 818. All-Seeing Eyes, from http://w w w.fortego.com /en/ase.htm l. 819. M J Registry W atcher, from http://w w w.jac 0 bsm.c 0 m/mjs 0 ft.htm #rgw tchr. 820. Active Registry Monitor, from http://w w w.devicelock.com /arm /. 821. SpyM e Tools, from http://www.lcibrossolutions.com /spym e_tools.htm . 822. Regshot, from http://regshot.sourceforge.net/. 823. Registry Live W atch , from http://leelusoft.blogspot.in/2009/ll/registry-live-watch-10.html. 824. DriverView, from http://w w w.nirsoft.net/utils/driverview.htm l. 825. Driver Detective, from http://w w w.drivershq.com /. 826. Unknown Device Identifier, from http://www.zhangduo.com /udi.htm l. 827. DriverGuide Toolkit, from http://w w w.driverguidetoolkit.com /. 828. DriverMax, from http://www.innovative-sol.com /driverm ax/index.htm . 829. Driver Magician, from http://www.driverm agician.com /. 830. Driver Reviver, from http://www.reviversoft.com /driver-reviver/. 831. DriverScanner, from http://w w w.uniblue.com /software/driverscanner/. 832. Double Driver, from http://www.boozet.org/dd.htm . 833. M y Drivers, from http://www.zhangduo.com /driverbackup.htm l. 834. DriverEasy, from http://w w w.drivereasy.com /. 835. W indow s Service M anager (SrvM an), from http://tools.sysprogs.org/srvman/. 836. SM A R T Utility, from http://www.thewindowsclub.com/smart-a-utility-for-tweaking-windows-7-vista-xpservices. 837. Netwrix Service Monitor, from http://w w w .netw rix.com /w indow s_services_m onitoring_freew are.htm l. 838. Vista Services Optimizer, from http://www.sm artpcutilities.com /servicesoptim izer.htm l. References Page 3000 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 26. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 839. ServiW in, from http://w w w.nirsoft.net/utils/serviwin.htm l. 840. W indow s Service M anager Tray, from http://winservicem anager.codeplex.com /. 841. AnVirTask M anager, from http://w w w .anvir.com /dow nload.htm . 842. Process Hacker, from http://processhacker.sourceforge.net/downloads.php. 843. Free W indow s Service M onitor Tool, from http://www.manageengine.com/free-windows-servicemonitor/free-windows-service-monitor-index.html. 844. O verseer Netw ork M onitor, from http://www.overseer-network-m onitor.com /Download.aspx. 845. Total N etw ork M onitor, from http://www.softinventive.com /products/total-network-m onitor/. 846. Starter, from http://codestuff.tripod.com /products_starter.htm l. 847. Security AutoRun, from http://tcpmonitor.altervista.org/startup-manager/. 848. Absolute Startup manager, from http://w w w.absolutestartup.com /. 849. ActiveStartup, from http://w w w.hexilesoft.com /activestartup.htm l. 850. StartEd Lite, from http://w w w.outertech.com /en/w indows-startup. 851. Startup Inspector, from http://w w w .window sstartup.com /startupinspector.php. 852. Program Starter, from http://www.ab-tools.com /de/software/program m starter/. 853. Disable Startup, from http://w w w.disablestartup.com /. 854. StartupM onitor, from http://w w w .m lin.net/StartupM onitor.shtm l. 855. Chameleon Startup Manager, from http://www.cham eleon-m anagers.com /downloads.php. 856. Startup Booster, from http://w w w.sm artpctools.com /startup_booster/. 857. FCIV, from http://www.microsoft.com/en-us/download/details.aspx?id=11533. 858. Tripwire, from http://www.tripwire.com/it-security-software/security-configuration‫־‬management/fileintegrity-monitoring/. 859. FastSum, from http://w w w.fastsum .com /download.php. 860. W in M D 5 , from http://w w w .blisstonia.eom /softw are/W inM D5/#dow nload. 861. Advanced Checksum Verifier (ACSV), from http://w w w.irnis.net/. 862. Fsum Fronted, from http://fsum fe.sourceforge.net/. 863. Verisys, from http://www.ionx.co.uk/products/verisys. 864. AFICK (Another File Integrity Checker), from http://afick.sourceforge.net/. 865. File Integrity Monitoring, from http://www.ncircle.com/index.php?s=products_ccm _file-integritymonitoring. 866. Attribute M anager, from http://www.m iklsoft.com /attrm an/index.htm l. 867. PA File Sight, from http://www.poweradmin.com/file-sight/index3.aspx. 868. CSP File Integrity Checker, from http://w w w.tandem security.com /solution_14.php. 869. ExactFile, from http://www.exactfile.com /downloads/. 870. OSSEC, from http://www.ossec.net/?page_id= 19. 871. W indow s Defender, from http://www.microsoft.com/en-in/download/details.aspx?id=17. 872. M cAfee AntiVirus Plus, from http://home.mcafee.com/store/free-antivirus-trials. 873. Norton AntiVirus, from http://us.norton.com/downloads-trial-nortonantivirus?inid= us_hho_topnav_dow nload_detail_nav. 874. Trojan Horse Construction Kit, from http://www.pestpatrol.eom /zks/pestinfo/t/trojan_horse_construction_kit.asp. References Page 3001 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 27. Ethical Hacking and Countermeasures References 875. Exam 312-50 Certified Ethical Hacker Progenic Mail Trojan Construction Kit - PMT, from http://www.sim ovits.com /trojans/tr_data/y2630.htm l. 876. Pandora's Box, from http://greece.mrdonn.org/greekgods/pandora.html. 877. TrojanHunter, from http://w w w.trojanhunter.com /trojanhunter/. 878. Emsisoft Anti-Malware, from http://w w w.em sisoft.in/en/software/antim alw are/. 879. Anti-Trojan Shield (ATS), from http://w w w.atshield.com /?r=dow nload. 880. Spyw are Doctor, from http://www.pctools.com /spyware-doctor/download/?src=lp_sd. 881. Anti M alw are BOCIean, from http://www.com odo.com /hom e/internet-security/anti-m alware.php. 882. Anti Hacker, from http://www.hide-my-ip.com/antihacker.shtml. 883. XoftSpySE, from http://www.paretologic.com/xoftspy/se/newlp/xray/. 884. SPYW AREfighter, from http://w w w.spam fighter.com /SPYW AREfighter/. 885. Anti Trojan Elite, from http://w w w.rem ove-trojan.com /index_ate.php. 886. SU PERAntiSpyw are, from http://w w w.superantispyw are.com /index.htm l. 887. Trojan Rem over, from http://w w w.sim plysup.com /trem over/download.htm l. 888. Twister Antivirus, from http://www.filseclab.com/en-us/. M od ule 07: Viruses and W o rm s 889. Types of Virus, from http://w w w .m indpride.net/root/Extras/Viruses/virus_protection_and_rem oval_ii.htm . 890. Vulnerabilities in N etw ork Infrastructures and Prevention/Containm ent Measures, from http://proceedings.informingscience.org/lnSITE2012/lnSITE12p053-067Awodele0012.pdf. 891. Terminology, from http://www.f-secure.com/en/web/labs_global/terminology-f. 892. Virus Protection, from http://w w w .m indpride.net/root/Extras/Viruses/virus_protection_and_rem oval_iii.htm . 893. Paul Boutin, (2003), An inside view of the w orm that crashed the Internet in 15 minutes, founder from http://w w w .w ired.com /w ired/archive/ll.07/slam m er.htm l. 894. Case Study: Microsoft N etw ork Hacked by QAZ Trojan, from http://www.msnbc.com/msn/482011.asp Oct. 29, 2000. 895. M ark Russinovich, (2008), TCPView for W in d o w s v2.53, from http://www.sysinternals.com /Utilities/TcpView.htm l. 896. M ark Russinowich and Bryce Cogswell, (2008), Autoruns for w indows (v 9.32), from http://www.sysinternals.com /Utilities/Autoruns.htm l. 897. Merijn, (2005), Hijack This (System Checker) (v 1.99.1), from http://www.m ajorgeeks.com /download.php?det=3155. 898. Norman Book on Com puter Viruses, from http://download.norm an.no/m anuals/eng/BOOKON.PDF. 899. Carey Nachenberg, Understanding and Managing Polym orphic Viruses from http://w w w.sym antec.com /avcenter/reference/striker.pdf. 900. The Spread of the Sapphire/Slam m er W orm , from http://www.caida.org/publications/papers/2003/sapphire/sapphire.html. 901. Mike Gunderloy, (2003), Microsoft Certified Professional Magazine Online | N ewsletters, vol 2 # 8 , from http://mcpmag.com /newsletter/article. asp?EditorialslD=153. 902. R. A. Hettinga, (2003), Random Scanning W orm s and Sapphire/Slam m er's PRNG, from http://www.mailarchive.com /cryptography@ wasabisystems.com/msg03503.html. References Page 3002 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 28. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 903. Information on a virus on campus, http://security.uwo.ca/antivirus/infoHistory.htm l. 904. Virus History ‫ ־‬The Senior M ost Virus!!, from www.optusnet.com .au/learning/em ail/virus. 905. Computer Knowledge Virus Tutorial, from www .m pl.org.eg/doc/eBOO Ks/vtutor.pdf. 906. Dr. Alan Solomon and Robert M. Slade, 1990 - VX BBS & Little Black Book (AT&T Attack), 1991 - Tequila, 2001 - Gnuman, W inux Windows/Linux Virus, 2004 - Trojan.Xombe, Randex, Bizex, W itty, from w w w .cknow.com /vtutor/HistoryofViruses.htm l. 907. Michelangelo, DAME, & VCL, from http://library.thinkquest.org/04oct/00460/malwareHistory.html. 908. Honeypots, Honeynets, and Intrusion Detection, from http://w w w.honeypots.net/. 909. Featured Files, from http://packetstormsecurity.org/. 910. BinText, from http://www.mcafee.com/apps/free-tools/termsofuse.aspxPurh/us/downloads/freetools/bintext.aspx. 911. UPX, from http://upx.sourceforge.net/#downloadupx. 912. Process Explorer, from http://technet.microsoft.com/en-in/sysinternals/bb896653.aspx. 913. RegShot, from http://regshot.sourceforge.net/. 914. OllyDbg, from http://www.ollydbg.de/. 915. ProcDump, from http://technet.microsoft.com/en-us/sysinternals/dd996900.aspx. 916. IDA Pro, from https://www.hex-rays.com /products/ida/support/download_dem o.shtm l. 917. VirusTotal, from https://w ww .virustotal.com /en/. 918. Anubis: Analyzing Unknown Binaries, from http://anubis.iseclab.org. 919. Avast! Online Scanner, from http://onlinescan.avast.com . 920. M alw are Protection Center, from http://www.m icrosoft.com /security/portal/. 921. ThreatExpert, from http://w w w .threatexpert.com . 922. Dr. W e b Online Scanners, from http://vm s.drweb.com . 923. Metascan Online, from http://www.m etascan-online.com /. 924. Bitdefender QuickScan, from http://w w w.bitdefender.com /scanner/online/free.htm l. 925. GFI SandBox, from http://www.gfi.com/malware-analysis-tool. 926. UploadM alw are.com , from U ploadM alw are.com . 927. Fortinet, from http://www.fortiguard.com /antivirus/virus_scanner.htm l. 928. Immunet, from http://w w w.im m unet.com /free/index.htm l. 929. AVG Antivirus, from http://free.avg.com/in-en/homepage. 930. BitDefender, from http://w w w.bitdefender.com /Dow nloads/. 931. Kaspersky Anti-Virus, from http://www.kaspersky.com /trials. 932. Trend M icro Internet Security Pro, from http://apac.trendm icro.com . 933. Norton AntiVirus, from http://us.norton.com/downloads-trial-nortonantivirus?inid= us_hho_topnav_dow nload_detail_nav. 934. F-Secure Anti-Virus, from http://www.f-secure.com/en/web/home_global/anti-virus. 935. Avast Pro Antivirus, from http://www.avast.com /pro-antivirus. 936. M cAfee AntiVirus Plus 2013, from http://home.mcafee.com/store/free-antivirus-trials. 937. ESET Sm art Security 6 , from http://www.eset.eom /download/hom e/detail/fam ily/5/. 938. Total Defense Internet Security Suite, from http://www.totaldefense.com /shop/total-defense-internetsecurity-suite.aspx. References Page 3003 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 29. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 939. W h a t's Running, from http://w w w.whatsrunning.net/. 940. W insonar, from http://w w w .few byte.com /w insonar.htm l. 941. Reg Organizer, from http://w w w.chem table.com /organizer.htm . 942. W indow s Service M anager (SrvM an), from http://tools.sysprogs.org/srvman/. 943. ServiW in, from http://w w w.nirsoft.net/utils/serviwin.htm l. 944. Starter, from http://codestuff.tripod.com /products_starter.htm l. 945. Security AutoRun, from http://tcpmonitor.altervista.org/startup-manager/. 946. FCIV, from http://www.microsoft.com/en-us/download/details.aspx?id=11533. M od ule 08: Sniffing 947. W h a t is Sniffer and how to detect sniffing in com puter network, from http://www.aboutonlinetips.com/sniffer-types-and-protecting-against-sniffing/. 948. Anatom y of an ARP Poisoning Attack, from http://www.unitedsystemsok.com/anatomy-of-an-arppoisoning-attack. 949. 950. W h a t is AR P?, from http://w w w.antiarp.com /english_94.htm l. Modeling and Analysis of W ireless LAN Traffic, from http://www.dm clab.hanyang.ac.kr/files/publication/journals/international/200911_08.pdf. 951. Dynamic ARP Inspection (DAI), from http://daxm.net/ccienotes/20100131/dynamic-arp-inspection-dai. 952. O verview of Layer 2 Switched Networks and Communication, from http://www.sakunsharma.in/2011/07/overview-layer-2-switched-networks-communication/. 953. Application Protocol IPv 6 , from http://www.ciscoexpo.ru/dub/sites/default/files/sem inar_attachm ents/ipv 6 .pdf. 954. 955. Dynamic Host Configuration Protocol, from http://www.ietf.org/rfc/rfc2131.txt. Understanding,Preventing,Defending Against Layer 2 Attacks, from http://www.sanog.org/resources/sanogl5/sanogl5-yusuf-l2-security.pdf. 956. A N ew Schem e to Check ARP Spoofing: Prevention of MAN-IN-THE-MIDDLE Attack, from http://www.ijcsit.com/docs/Volume%202/vol2issue4/ijcsit2011020420.pdf. 957. LAYER 2 ATTACKS & MITIGATION TECHNIQUES, from http://www.sanog.org/resources/sanog7/yusuf-L2attack-mitigation.pdf. 958. Chris M artin, W h a t is Sniffer and how to detect Sniffing in com puter network, Available from http://74.125.153.132/search?q=cache:Tu6yfsiaY3AJ:www.aboutonlinetips.com/sniffer-types-andprotecting-against-sniffing/+wire+sniffing+techniques&cd=25&hl=en&ct=clnk&gl=in&client=fi refox-a. 959. Adam Barth, Secure content sniffing for W e b browsers or How to stop papers from reviewing them selves, Available from http://www.adambarth.com/papers/2009/barth-caballero-song.pdf. 960. Undetectable sniffing on Ethernet, Available from http://www.askapache.com/security/sniffing-onethernet-undetected.htm l. 961. Suhas A Desai, (2007), Techniques for Preventing Sniffing, Packet Sniffing: Sniffing Tools Detection Prevention Methods, Available from http://e-articles.info/e/a/title/Packet-Sniffing:-Sniffing-ToolsDetection-Prevention-Methods/. 962. Suhas A Desai, (2007), Tool to Detect Sniffers, Packet Sniffing: Sniffing Tools Detection Prevention Methods, Available from http://e-articles.info/e/a/title/Packet-Sniffing:-Sniffing-Tools-DetectionPrevention-Methods/. 963. Identifying Nonessential Services and Attacks > Attacks, from http://www.informit.com/articles/article.asp?p=98121&seqNum=2. References Page 3004 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 30. Ethical Hacking and Countermeasures References 964. 965. Exam 312-50 Certified Ethical Hacker ARP cache poisoning /ARP spoofing, from http://su2.info/doc/arpspoof.php. N etw ork m anagement, network discovery, SN M P, M IB and W M I browsers, from w w w .netw orkview .com /htm l/features.htm l. 966. Address Resolution Protocol (ARP), from www.erg.abdn.ac.uk/users/gorry/course/inet-pages/arp.html. 967. Angela D. Orebaugh, (2004), Top Ten Ethereal Tips and Tricks, from http://www.onlamp.eom/pub/a/security/2004/05/13/etherealtips.html. 968. Packages, from http://packages.debian.org/. 969. N etw ork Protocol Analysis, from http://w w w .m aatec.com /. 970. The Hacker's Ethic, from http://web.textfiles.com/ezines/HWA/hwa-hn34.txt. 971. Jarom il, Dyne:ll GNU/Linux User's Guide, from http://dynebolic.org/dynebolic-man.pdf. 972. Address Resolution Protocol (arp), from www.erg.abdn.ac.uk/users/gorry/course/inet-pages/arp.html. 973. Adam Barth, Juan Caballero and Dawn Song, Secure Content Sniffing for W e b Browsers, or How to Stop Papers from Reviewing Themselves, http://www.adambarth.com/papers/2009/barth-caballerosong.pdf. 974. Alberto Ornaghi and M arco Valleri, M an in the middle attacks, http://www.blackhat.com/presentations/bh-europe-03/bh-europe-03-valleri.pdf. 975. Tom Olzak, (2006), DNS Cache Poisoning: Definition and Prevention, http://adventuresinsecurity.com /Papers/DNS_Cache_Poisoning.pdf. 976. Sean W halen, (2001), An Introduction to Arp Spoofing, http://w w w.rootsecure.net/content/dow nloads/pdf/arp_spoofing_intro.pdf. 977. Daiji Sanai, (2001), Detection of Promiscuous Nodes using ARP packets, http://w w w.securityfriday.com /prom iscuous_detection_ 0 1 .pdf. 978. N etw ork m anagement, network discovery, SN M P, M IB and W M I browsers, from w w w .netw orkview .com /htm l/w hat_s_new .htm l. 979. Source Address Spoofing, from http://www.networkcom puting.com /shared/article/showArticle.jhtm l?articleld=8702815&dassroom . 980. Keith Brown, (1999), Security Briefs, from http://www.microsoft.com/msj/0299/security/security0299.aspx. 981. Corey Nachreiner, (2005), Anatom y of an ARP Poisoning Attack, from http://www.watchguard.com /infocenter/editorial/135324.asp. 982. macof, from http://w w w .m onkey.org. 983. Yersinia, from http://w w w .yersinia.net/dow nload.htm . 984. Dhcpstarv, from http://dhcpstarv.sourceforge.net/. 985. Gobbler, from http://gobbler.sourceforge.net/. 986. Cain & Abel, from http://www.oxid.it/cain.htm l. 987. W inArpAttacker, from http://www.xfocus.org/index.html. 988. Ufasoft Snif, from http://ufasoft.com/sniffer/. 989. XArp, from http://www.chrism c.de/developm ent/xarp/index.htm l. 990. SMAC, from http://www.klcconsulting.net/sm ac/index.htm l#download. 991. Cascade Pilot, from http://www.riverbed.com/products-solutions/products/performancemanagement/network-infrastructure/High-Speed-Packet-Analysis.html. 992. Tcpdump, from http://w w w.tcpdum p.org/. 993. W inDum p, from http://w w w.winpcap.org/w indum p/default.htm . References Page 3005 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 31. Ethical Hacking and Countermeasures References Exam 312-50 Certified Ethical Hacker 994. Capsa N etw ork Analyzer, from http://w w w.colasoft.com /dow nload/products/capsa_free.php. 995. O m niPeek Netw ork Analyzer, from http://w w w.wildpackets.com /products/om nipeek_network_analyzer. 996. Observer, from http://www.networkinstrum ents.com /products/observer/index.php?tab=download. 997. Sniff-O-Matic, from http://w w w.kw akkelflap.com /sniffer.htm l. 998. JitB it Netw ork Sniffer, from http://w w w.jitbit.com /networksniffer/. 999. M SN Sniffer 2, from http://www.m snsniffer.com /download/index.htm . 1000. Ace Password Sniffer, from http://w w w.effetech.com /aps/. 1001. RSA N etW itness Investigator, from http://w w w .em c.c 0 m /security/rsa-netwitness.htm #lfreew are. 1002. Big-Mother, from http://w w w .tupsoft.com /dow nload.htm . 1003. EtherD etect Packet Sniffer, from http ://w w w .etherdetect.com /dow nload.htm . 1004. dsniff, from http://monkey.org/~dugsong/dsniff/. 1005. EffeTech HTTP Sniffer, from http://w w w .effetech.com /dow nload/. 1006. Ntop, from http://www.ntop.org/products/ntop/. 1007. Ettercap, from http://ettercap.sourceforge.net/dow nloads.htm l. 1008. SmartSniff, from http://www.nirsoft.net/utils/sm sniff.htm l. 1009. EtherApe, from http://etherape.sourceforge.net/. 1010. N etw ork Probe, from http://w w w.objectplanet.com /probe/. 1011. Snort, from http://w w w.snort.org/. 1012. Sn iffem , from http://www.sniff-em .com /download.shtm l. 1013. MaaTec N etw ork Analyzer, from http://w w w .m aatec.com /m tna/dow nload.htm l. 1014. Alchem y N etw ork Monitor, from http://w w w.m ishelpers.com /netw ork_m onitor/index.htm l. 1015. Com m View, from http://www.tam os.com /download/m ain/index.php. 1016. NetResident, from http://ww w.tam os.com /products/netresident/. 1017. AIM Sniffer, from http://www.effetech.com /aim -sniffer/index.htm . 1018. Netstumbler, from http://w w w.netstum bler.com /downloads/. 1019. IE HTTP Analyzer, from http://w w w.ieinspector.com /httpanalyzer/. 1020. MiniStum bler, from http://w w w .netstum bler.com /dow nloads. 1021. PacketM on, from http://w w w.analogx.com /contents/dow nload/Network/pm on/Freew are.htm . 1022. NADetector, from http://w w w .nsauditor.com /netw ork_m onitoring/nadetector_traffic_analyzer.htm l. 1023. Microsoft Network Monitor, from http://www.microsoft.com/en-us/download/details.aspx?id=4865. 1024. N etw orkM iner, from http://w w w .netresec.com /?page= N etw orkM iner. 1025. N etw ork Security Toolkit, from http://www.networksecuritytoolkit.org/nst/index.htm l. 1026. Ethereal, from http://w w w .ethereal.com /. 1027. KSniffer, from http://ksniffer.sourceforge.net/index.php?section=download. 1028. IPgrab, from http://ipgrab.sourceforge.net/. 1029. W ebSiteSniffer, from http://w w w.nirsoft.net/utils/w eb_site_sniffer.htm l. 1030. ICQ Sniffer, from http://w w w.etherboss.com /icq/download.htm . 1031. URL Helper, from http://w w w.urlhelper.com /index.htm . 1032. W ebCookiesSniffer, from http://w w w.nirsoft.net/utils/w eb_cookies_sniffer.htm l. References Page 3006 Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.