Index

Symbols

+.htr exploit, 315-316

Numbers

007 Shell

application layer tunneling, 222

Internet layer tunneling, 220

1G cell phones, 360-363

2G cell phones, 361

2.5G cell phones, 361

3DES (3Data Encryption Standard), symmetric encryption, 488, 491

3G cell phones, 361-362

4G cell phones, 361-362

18 USC 1028 (U.S. federal law), 361

18 USC 1029 (U.S. federal law), 361

802.11 standard and WLAN, 372

A

Abel password-extraction tool, 176

Absinthe, 345, 367

access

attacker’s process

gaining access, 50

maintaining access, 51

cloud computing, 530

ethical hacker’s process, 52

gaining, 18, 50

maintaining, 18, 51

physical access and Trojans, 209

ace locks, physical security, 452

ACK storms, 270

ACK values (active fingerprinting), 131

AckCmd, application ...

Get Certified Ethical Hacker (CEH) Version 9 Cert Guide, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.