Index
[
A]
[
B]
[
C]
[
D]
[
E]
[
F]
[
G]
[
H]
[
I]
[
K]
[
L]
[
M]
[
N]
[
O]
[
P]
[
Q]
[
R]
[
S]
[
T]
[
U]
[
V]
[
W]
[
X]
[
Y]
[
Z]
Safety, VMM Sandbox, NormanSandboxing
[See
CWSandbox.]
SANS Top-20 Internet Security Attack Targets for 2006 Santy wormScalability
Collapsar motivating hybrid systems nepenthes 2nd 3rd Potemkin virtual honeypots VMware SCM (Service Control Manager) vulnerabilities, Windows Scoopy DooScripts
configuring Honeyd with services Data ChaOS Connect Back Backdoor UDP flooder web applications and SDBot 2nd SDL (Simple DirectMedia Layer) development libraries Search engines, finding malicious websites Search Worms applied to Santy worm overview of sequence of operations executed bySebek
capturing information with circumventing logging by detecting disabling monitoring VMware-based honeypots overview ofSecurity
connecting virtual honeypots to Internet 2nd high-interaction honeypots honeytrap Honeywall LaBrea installation low-interaction honeypots nepenthes installation Seed, Heretrix Segments, TCP Semiglobal alignment algorithm, RolePlayer Sensors, nepenthes 2nd Sequence numbers, TCP Service Control Manager (SCM) vulnerabilities, Windows Service emulation, honeytrapServices, Honeyd
configuring 2nd emulating log files runtime flag Session ID (SID), Tiny Honeypot Session logs, Tiny Honeypotset command, Honeyd
droprate option ethernet option overview of uid option uptime option setSlice ( ) vulnerability, WebViewFolderIcon Active X control SGDT instructions SHA-512 hash Shadow honeypots Shell emulation, nepenthes 2nd Shell scripts, configuring Honeyd Shellcode-executer extension, Python shellcode-generic.conf, nepenthesShellcode parsing modules
defined example of overview of shutdown command, Argos SHv5 rootkit SID (session ID), Tiny Honeypot SIDT instructions Simple DirectMedia Layer (SDL) development libraries SiteAdvisor skas SLDT instructions SMTP, analyzing CWSandbox Snapshot mechanism, of QEMUSnort system
HoneyC searching for malicious web servers based on monitoring VMware-based honeypotssnort_inline
IPS based on minimizing risk of attacks on third-party systems SOCKS proxySoftware
malicious
[See
Malware.]
monitoring VMware-based honeypots virtualization SP2, Windows Spamming Spear phishing Spybot 2nd SpyByeSpyware
as bots client-side attacks installing studying on Internet SquirrelMail honeypot SSDT (System Service Dispatch Table) 2nd Static analysis, malicious software Static IPs Statistics, nepenthes 2nd stdin, Honeyd stdout, Honeyd Storm Worm bot strace tool su command, Honeywall Submission modules 2nd submit-*.conf, nepenthes Subsytems, Honeyd 2nd sudo command, Honeyd SURFnet IDS SUSE 9.1 case study evaluation of attack overview of summary of attack timeline of attack tools involved in attack -sV flag, NMap svchost processes SVM (Pacifica) Switches Symantec SYN flag, TCP System call interposition System Service Dispatch Table (SSDT) 2nd System Service hooking Systrace