The Strategy Behind Breaking Into & Defending Networks | Tutorial

-

List of Abbreviations

  • ACK Acknowledge
  • ARIN American Registry for Internet Numbers
  • ASCII ASCII Character Set (ASCII)
  • ASN Autonomous System Number
  • ASP Active Server Pages or Application Service Provider
  • BSDI Berkeley Software Design (BSD) Operating System Internet
  • Server Edition
  • CANVAS Immunity Security’s CANVAS Vulnerability Scanner
  • CAST Computer Aided Software Testing
  • CDE Common Desktop Environment
  • CHAM Common Hacking Attack Methods
  • CIFS Common Internet File Sharing
  • CPAN Comprehensive Perl Archive Network
  • CRC Cyclic Redundancy Check
  • CVE Common Vulnerabilities and Exposures (List)
  • CVS Concurrent Versions System Source Code Control System
  • DDoS Distributed Denial-of-Service
  • DID Direct Inward Dialing
  • DIT Directory Information Tree
  • DNS Domain Name System
  • DNSSEC Domain Name System Security
  • DoS Denial-of-Service
  • DSA Digital Signature Algorithm
  • EFS Encrypting File System (Microsoft)
  • EIGRP Enhanced Interior Gateway Routing Protocol
  • EIP Extended Instruction Pointer
  • ESMTP Extended Simple Mail Transfer (Protocol)
  • EVT Event (Microsoft)
  • FIFO First In First Out is an approach to handling queue or stack
  • requests where the oldest requests are prioritized
  • FX Handle for Felix Lindner
  • GCC GNU C Compiler
  • GCIA GIAC Certified Intrusion Analyst
  • GCIH GIAC Certified Incident Handler
  • AU0888_C00.fm Page ix Wednesday, October 1, 2003 5:41 AM
  • © 2004 by CRC Press LLC
  • THE STRATEGY BEHIND BREAKING INTO AND DEFENDING NETWORKS
  • GDB GNU Project Debugger
  • GID Group ID (Access Control Lists)
  • GINA Graphical Identification and Authentication (Dynamic Link
  • Library, Microsoft)
  • GNOME GNU Free Desktop Environment
  • GNU GNU Software Foundation
  • HIDS Host Intrusion Detection System
  • HKEY Microsoft Registry Key Designation (Hive Key)
  • HMAC Keyed Hashing Message Authentication
  • HQ Headquarters
  • HTTPS Secure Hypertext Transmission Protocol
  • HUMINT Human Intelligence
  • ICQ ICQ Protocol
  • IDS Intrusion Detection System
  • IKE Internet Key Exchange (Protocol)
  • IMDb Internet Movie Database
  • IPO Initial Public Offering
  • IPSec IP Security (Protocol)
  • IRIX Silicon Graphics IRIX Operating System (IRIX)
  • ISAKMP Internet Security Association and Key Management Protocol
  • ISS Internet Security Systems
  • IUSR Internet User (i.e., IUSR_name) is an anonymous user designation used by Microsoft’s Internet Information Server (IIS)
  • KB Kilobytes or Knowledgebase
  • KDE K Desktop Environment
  • KSL Keystroke Logger
  • LKM Loadable Kernel Modules
  • LM Lan Manager (Microsoft Authentication Service)
  • LT2P Layer 2 Tunneling Protocol
  • MIB Management Information Base
  • MSDE Microsoft Data Engine
  • MSDN Microsoft Developer Network
  • MSRPC Microsoft Remote Procedure Call
  • MUA Mail User Agent
  • MVS Multiple Virtual Storage (MVS) Operating System
  • MX Mail Exchange (Record, DNS)
  • NASL Nessus Attack Scripting Language (Nessus Security Scanner)
  • NIDS Network Intrusion Detection System
  • NMAP Network Mapper (Nmap)
  • NMS Network Management Station
  • NTFS NT File System
  • NTFS5 NT File System 5
  • NTLM NT LanMan (Authentication)
  • OU Organizational Unit
  • PCX .pcx files created with MS Paintbrush tool
  • AU0888_C00.fm Page x Wednesday, October 1, 2003 5:41 AM
  • © 2004 by CRC Press LLC
  • PHP Hypertext Preprocessor
  • PID Process Identifier
  • PUT PUT (FTP)
  • RCS Revision Control System
  • RDS Remote Data Service
  • RIP Routing Information Protocol
  • RSA RSA Security, Inc.
  • SAM Security Accounts Manager (Microsoft)
  • SANS Sysadmin, Audit, Network, Security (SANS Institute)
  • SASL Simple Authentication and Security Layer
  • SATAN Security Administrator Tool for Analyzing Networks
  • SID Security Identifier (Microsoft)
  • SIGINT Signal Intelligence
  • SMB Server Message Block (Protocol)
  • SOCKS Sockets Protocol (Firewall)
  • SRV Service Record (DNS)
  • SUID Set User ID (bit) utilized in UNIX Operating Systems to
  • impose File System Access Control Lists
  • SYN Synchronize (TCP SYN)
  • SYN-ACK Synchronize-Acknowledge (TCP SYN ACK)
  • USB Universal Serial Bus
  • VB Visual Basic
  • VM Virtual Machine
  • VMS VMS (Operating System)
  • VNC AT&T Virtual Network Computing (Software)
  • XDMCPD X Display Manager Control Protocol
  • XOR Exclusive OR

Go To Base64 & Decode:

aHR0cHM6Ly9tZWdhLm56L2ZpbGUvU1g1a0dZcFIjZEZNSWxoa2d1NUZFZjZ0OS10d2RIRUo5NWhtaHpPcDR1bXpobHljZU0zQQ==

Enjoy!

7 Likes