319
Index
A
Access control, 172–175
ACK packets, 80–83, 92
Acquisition, technology
advanced reporting and, 153–154
audit scheduling and, 146–148
division of responsibilities and,
144–146
identifying requirements for,
143–144
reports and, 150–153
standards and, 148–150
Active Directory, 98, 172–173, 236,
248
Active scanning technology
added functionality, 110
advantages and disadvantages,
78–79
application fingerprinting, 93–96
architecture, 160–165
audit reports, 226–227
authentication, 236–237
black box testing, 86–87
credentials testing, 97–99
deployment, 175–176
detection methods, 79–110
discovery phase, 79
fingerprinting with TCP/IP,
87–93
ICMP, 79
manipulating TCP, 79–83
performance issues, 84–85,
102–106
scanning proces ...