Index

Note: Page numbers followed by “f” and “t” refer to figures and tables, respectively.

A

Access and escalation, 132–133
Access class barring (ACB) mechanism, 121
Access control, 65, 66t
Account credentials chain attack, 49–52
credit card attack surface, 51
takeaways, 51–52
victim’s chronology, 50
Active medical devices (AMDs), 82, 83, 83, 86–87
Adoption, of wireless technology, 21–22
Advanced persistent threat (APT) activity, 28
Air gap, 135
Aircracking, 5
Airjacking, 5
Alliance for Telecommunications Industry Solutions (ATIS), 5
AM radio broadcast, 21–22, 22
American Radio Relay League, 21–22
ANSI Network on Smart and Sustainable Cities (ANSSC), 103
Anthem attack, 80–81
Anti-virus (AV) controls, 4, 27–28, 28
AppleId, 51
Assault, 133–134 ...

Get Hacking Wireless Access Points now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.