O'Reilly logo

Certified Ethical Hacker (CEH) Version 9 Cert Guide, Second Edition by Michael Gregg

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Index

Symbols

+.htr exploit, 315-316

Numbers

007 Shell

application layer tunneling, 222

Internet layer tunneling, 220

1G cell phones, 360-363

2G cell phones, 361

2.5G cell phones, 361

3DES (3Data Encryption Standard), symmetric encryption, 488, 491

3G cell phones, 361-362

4G cell phones, 361-362

18 USC 1028 (U.S. federal law), 361

18 USC 1029 (U.S. federal law), 361

802.11 standard and WLAN, 372

A

Abel password-extraction tool, 176

Absinthe, 345, 367

access

attacker’s process

gaining access, 50

maintaining access, 51

cloud computing, 530

ethical hacker’s process, 52

gaining, 18, 50

maintaining, 18, 51

physical access and Trojans, 209

ace locks, physical security, 452

ACK storms, 270

ACK values (active fingerprinting), 131

AckCmd, application ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required