O'Reilly logo

Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, Second Edition by Tom Liston, Ed Skoudis

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Index

References followed by an “f” are to figures; references followed by a “t” are to tables.

Numbers/Symbols

802.11 family of protocols, 72, 89. See also NetStumbler; War driving

and ARP, 73

and MAC, 73

modes (independent/peer–to–peer and infrastructure/access–point), 74

popular/important members, 73–74

supported frame types, 74–75

vulnerabilities, 72–73

/etc/group file, 109

/etc/psswd file, 107–109

A

Access (maintaining), 547, 623. See also Backdoors; Trojan horse backdoor genre; Trojan horses

Access/application and operating system levels, 339, 435–437

exploits available on the Web, 339–340

sophisticated attacker techniques, 340–342

trolling (script kiddies), 339–340, 341f

Access/network level attacks, 439, 510

Access point hijacking attacks, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required