Footnotes

Chapter 1

1 SMTP is the standard protocol for mail transmission over the Internet.

2 Botnets can be used to carry out a plethora of malicious activities; they are discussed in greater detail in Chapter 7.

3 A more detailed exposition on pharming can be found in the text edited by Jakobsson and Myers [202].

4 A rootkit is a component that uses various stealthing techniques to mask its presence on a machine. Rootkits are discussed in greater detail in Chapter 8.

5 Informally, the attack surface of a system refers to the different mechanisms by which an attacker can attack (and potentially compromise or damage) the system.

6 http://insecure.org/nmap

Chapter 2

* Parts of this chapter appeared in [424] and parts have been adapted from

Get Crimeware now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.