INDEX
& symbol, 19
&& operator, 195
\ (backslash) character, 229
` (backtick) character, 203
' (single quote) character, 347
< (less-than operator), 21
<= (less-than-or-equal-to operator), 21
%s format token, 230
%x format token, 230
#$ format token, 231
0-day exploits, 365
6LoWPAN protocol, 499
64-bit Kali Linux, 19, 468, 469
A
AARs (after-action reports), 140, 154
abstract syntax tree (AST), 76
Access Device Statute, 10
action element, 392
activity element, 392
acts on objectives phase, 152–153
adaptive testing, 136–139
adb command, 401
add command, 31
Add-Persistence function, 335
Address Resolution Protocol (ARP), 537
address space layout randomization. See ASLR
addressing modes, 33
Get Gray Hat Hacking The Ethical Hacker's Handbook, Fifth Edition, 5th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.