Index

References followed by an “f” are to figures; references followed by a “t” are to tables.

Numbers/Symbols

802.11 family of protocols, 72, 89. See also NetStumbler; War driving

and ARP, 73

and MAC, 73

modes (independent/peer–to–peer and infrastructure/access–point), 74

popular/important members, 73–74

supported frame types, 74–75

vulnerabilities, 72–73

/etc/group file, 109

/etc/psswd file, 107–109

A

Access (maintaining), 547, 623. See also Backdoors; Trojan horse backdoor genre; Trojan horses

Access/application and operating system levels, 339, 435–437

exploits available on the Web, 339–340

sophisticated attacker techniques, 340–342

trolling (script kiddies), 339–340, 341f

Access/network level attacks, 439, 510

Access point hijacking attacks, ...

Get Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.