Index
Symbols & Numbers
+.htr exploit (source disclosure attack), 304-305
/bin directory (Linux), 179
/dev directory (Linux), 179
/etc directory (Linux), 179
/etc/passwd file (Linux), deciphering, 182-183
/home directory (Linux), 179
/mnt directory (Linux), 180
/sbin directory (Linux), 180
/usr directory (Linux), 180
007Shell redirection tool, 238
3DES (Triple DES), 448
4GetAcct tool, Windows enumeration, 150
A
Abene, Mark (Phiber Optik), 30
access
attack stage, 532
hacking methodology (Linux), remote versus local, 190-191
access control lists. See ACLs
access phase (attacker methodology), 56-57
access points (APs)
equipment destruction attacks (DoS), 348
open, mapping, 113
rogue/unauthorized, detecting via site surveys, 347
access points spoofing ...
Get Certified Ethical Hacker Exam Prep now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.