O'Reilly logo

Attacking Network Protocols by James Forshaw

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

INDEX

Symbols and Numbers

\ (backlash), 47, 220

/ (forward slash), 81, 220

- (minus sign), 55

+ (plus sign), 55

7-bit integer, 3940

8-bit integer, 3839

32-bit system, 263

32-bit value, 4041

64-bit system, 263

64-bit value, 4041

8086 CPU, 114

A

A5/1 stream cipher, 159

A5/2 stream cipher, 159

ABI (application binary interface), 123124, 259260

Abstract Syntax Notation 1 (ASN.1), 5354

accept system call, 123

acknowledgment (DHCP packet), 72

acknowledgment flag (ACK), 41

active network capture, 20, 280282. See also passive network capture

add() function, 124

ADD instruction, 115

add_longs() method, 198

add_numbers() method, 197

Address Resolution Protocol (ARP), 67, 7477

addresses, 4

32-bit, 5

destination, 5

MAC, 68, 7477

source, 5

address ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required