Index
327
Lab Manual / Principles of Computer Security CompTIA Security+ and Beyond Lab Manual, Second Edition / Nestler / 174856-3 / Index
references, 158
steps, 151–156
suggested experiments, 158
Map Network Drive dialog box, 285
mapping network drives, 285
masks, subnet, 5
McAfee AntiVirus program, 182–184
MD5 hashing algorithm, 310
Media Access Control (MAC) addresses, 5
documenting, 152–153
Ettercap program output, 155–156
MITM attacks, 150
messages
creating and hiding, 160–161
decrypted, 204–205
encrypted, 203–204
hashes, 192
retrieving, 162–163
uploading, 161–162
Metasploit Framework (MSF) tool
analysis questions, 112
follow-up lab, 112
key terms quiz, 112
learning objectives, 107–108
overview, 107–108
references, 113
steps, 108–111
suggested experiments, 112
Meterpreter tool, 108–111
MITM Attack dialog box, 153
MITM attacks. See man-in-the-middle (MITM) attacks
MITRE Corporation, 103
msfconsole command, 109–110
msfupdate command, 109
multicast addresses, 26
N
name resolution. See computer name resolution
Neighbor Discovery (ND) messages, 26
Neighbor Solicitation (NS) messages, 26
NetBus Trojan
description, 142
installing and running, 304–305
netlter system, 186
netsh interface ipv6 install command, 28
netsh interface ipv6 reset command, 32
netsh interface ipv6 set address command, 30
netsh interface ipv6 show address command, 28–29
netstat utility
FTP and HTTP connections, 49, 54
gateway router addresses, 13
open ports, 50–51, 53
port connection status, 49
server connections, 51–52
network addresses, 5
network applications
e-mail protocols. See e-mail protocols
FTP. See File Transfer Protocol (FTP)
overview, 59–60
network card conguration
Linux, 12–14
Windows, 7–8
network communication analysis
analysis questions, 47
follow-up labs, 48
key terms quiz, 47–48
learning objectives, 38
overview, 36–38
references, 49
suggested experiments, 48
Windows, 39–46
network communications
certicates and SSL. See certicates and SSL
GPG. See GPG (Gnu Privacy Guard) tool
IPsec. See Internet Protocol Security (IPsec)
overview, 191–192
SCP. See Secure Copy (SCP)
SSH. See Secure Shell (SSH)
network drive mapping, 285
network layer, IPsec at, 243
network operating system hardening
antivirus applications, 180–186
rewalls, 186–190
learning objectives, 169
overview, 168–169
Windows XP. See Windows XP operating system
hardening
network shares, 285
network transports
network communication analysis. See network
communication analysis
overview, 35–36
port connection status, 49–58
New User dialog box, 177
Nmap utility
description, 86
enumerating operating systems, 92
scanning open TCP ports, 90
in Windows, 87–93
nonrepudiation, 193
normal backups, 283
Notepad for hosts le, 21–22
nslookup command, 19
computer name resolution, 23–24
DNS sessions, 45
Index.indd 327 11/10/10 12:57:29 PM