INDEX

& symbol, 19

&& operator, 195

\ (backslash) character, 229

` (backtick) character, 203

' (single quote) character, 347

< (less-than operator), 21

<= (less-than-or-equal-to operator), 21

%s format token, 230

%x format token, 230

#$ format token, 231

0-day exploits, 365

1-day exploits, 364, 365

6LoWPAN protocol, 499

32-bit Kali Linux, 19, 503

64-bit Kali Linux, 19, 468, 469

A

AARs (after-action reports), 140, 154

abstract syntax tree (AST), 76

Access Device Statute, 10

action element, 392

activity element, 392

acts on objectives phase, 152–153

adaptive testing, 136–139

adb command, 401

add command, 31

Add-Persistence function, 335

Address Resolution Protocol (ARP), 537

address space layout randomization. See ASLR

addressing modes, 33

Get Gray Hat Hacking The Ethical Hacker's Handbook, Fifth Edition, 5th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.