Index

Symbols & Numbers

+.htr exploit (source disclosure attack), 304-305

/bin directory (Linux), 179

/dev directory (Linux), 179

/etc directory (Linux), 179

/etc/passwd file (Linux), deciphering, 182-183

/home directory (Linux), 179

/mnt directory (Linux), 180

/sbin directory (Linux), 180

/usr directory (Linux), 180

007Shell redirection tool, 238

3DES (Triple DES), 448

4GetAcct tool, Windows enumeration, 150

A

Abene, Mark (Phiber Optik), 30

access

attack stage, 532

hacking methodology (Linux), remote versus local, 190-191

access control lists. See ACLs

access phase (attacker methodology), 56-57

access points (APs)

equipment destruction attacks (DoS), 348

open, mapping, 113

rogue/unauthorized, detecting via site surveys, 347

access points spoofing ...

Get Certified Ethical Hacker Exam Prep now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.