Index
References followed by an “f” are to figures; references followed by a “t” are to tables.
Numbers/Symbols
802.11 family of protocols, 72, 89. See also NetStumbler; War driving
and ARP, 73
and MAC, 73
modes (independent/peer–to–peer and infrastructure/access–point), 74
popular/important members, 73–74
supported frame types, 74–75
vulnerabilities, 72–73
/etc/group file, 109
/etc/psswd file, 107–109
A
Access (maintaining), 547, 623. See also Backdoors; Trojan horse backdoor genre; Trojan horses
Access/application and operating system levels, 339, 435–437
exploits available on the Web, 339–340
sophisticated attacker techniques, 340–342
trolling (script kiddies), 339–340, 341f
Access/network level attacks, 439, 510
Access point hijacking attacks, ...
Get Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.