O'Reilly logo

Certified Ethical Hacker Exam Prep by Michael Gregg

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Index

Symbols & Numbers

+.htr exploit (source disclosure attack), 304-305

/bin directory (Linux), 179

/dev directory (Linux), 179

/etc directory (Linux), 179

/etc/passwd file (Linux), deciphering, 182-183

/home directory (Linux), 179

/mnt directory (Linux), 180

/sbin directory (Linux), 180

/usr directory (Linux), 180

007Shell redirection tool, 238

3DES (Triple DES), 448

4GetAcct tool, Windows enumeration, 150

A

Abene, Mark (Phiber Optik), 30

access

attack stage, 532

hacking methodology (Linux), remote versus local, 190-191

access control lists. See ACLs

access phase (attacker methodology), 56-57

access points (APs)

equipment destruction attacks (DoS), 348

open, mapping, 113

rogue/unauthorized, detecting via site surveys, 347

access points spoofing ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required