Previous Page Next Page

Index


[A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Safety, VMM
Sandbox, Norman
Sandboxing [See CWSandbox.]
SANS Top-20 Internet Security Attack Targets for 2006
Santy worm
Scalability
     Collapsar
     motivating hybrid systems
     nepenthes 2nd 3rd
     Potemkin
     virtual honeypots
     VMware
SCM (Service Control Manager) vulnerabilities, Windows
Scoopy Doo
Scripts
     configuring Honeyd with services
     Data ChaOS Connect Back Backdoor
     UDP flooder
     web applications and
SDBot 2nd
SDL (Simple DirectMedia Layer) development libraries
Search engines, finding malicious websites
Search Worms
     applied to Santy worm
     overview of
     sequence of operations executed by
Sebek
     capturing information with
     circumventing logging by
     detecting
     disabling
     monitoring VMware-based honeypots
     overview of
Security
     connecting virtual honeypots to Internet 2nd
     high-interaction honeypots
     honeytrap
     Honeywall
     LaBrea installation
     low-interaction honeypots
     nepenthes installation
Seed, Heretrix
Segments, TCP
Semiglobal alignment algorithm, RolePlayer
Sensors, nepenthes 2nd
Sequence numbers, TCP
Service Control Manager (SCM) vulnerabilities, Windows
Service emulation, honeytrap
Services, Honeyd
     configuring 2nd
     emulating
     log files
     runtime flag
Session ID (SID), Tiny Honeypot
Session logs, Tiny Honeypot
set command, Honeyd
     droprate option
     ethernet option
     overview of
     uid option
     uptime option
setSlice ( ) vulnerability, WebViewFolderIcon Active X control
SGDT instructions
SHA-512 hash
Shadow honeypots
Shell emulation, nepenthes 2nd
Shell scripts, configuring Honeyd
Shellcode-executer extension, Python
shellcode-generic.conf, nepenthes
Shellcode parsing modules
     defined
     example of
     overview of
shutdown command, Argos
SHv5 rootkit
SID (session ID), Tiny Honeypot
SIDT instructions
Simple DirectMedia Layer (SDL) development libraries
SiteAdvisor
skas
SLDT instructions
SMTP, analyzing CWSandbox
Snapshot mechanism, of QEMU
Snort system
     HoneyC searching for malicious web servers based on
     monitoring VMware-based honeypots
snort_inline
     IPS based on
     minimizing risk of attacks on third-party systems
SOCKS proxy
Software
    malicious [See Malware.]
     monitoring VMware-based honeypots
     virtualization
SP2, Windows
Spamming
Spear phishing
Spybot 2nd
SpyBye
Spyware
     as bots
     client-side attacks installing
     studying on Internet
SquirrelMail honeypot
SSDT (System Service Dispatch Table) 2nd
Static analysis, malicious software
Static IPs
Statistics, nepenthes 2nd
stdin, Honeyd
stdout, Honeyd
Storm Worm bot
strace tool
su command, Honeywall
Submission modules 2nd
submit-*.conf, nepenthes
Subsytems, Honeyd 2nd
sudo command, Honeyd
SURFnet IDS
SUSE 9.1 case study
     evaluation of attack
     overview of
     summary of attack
     timeline of attack
     tools involved in attack
-sV flag, NMap
svchost processes
SVM (Pacifica)
Switches
Symantec
SYN flag, TCP
System call interposition
System Service Dispatch Table (SSDT) 2nd
System Service hooking
Systrace

Previous Page Next Page