Table of Contents
Previous Section Next Section

Index

A

ACK flags, 144, 157
ACK packets, 163, 164, 170
ACK responses, 162, 170
active sniffing, 149-56
Add instruction, 84
Address Resolution Protocol (ARP), 145
ADMutate tool, 103
Adobe software, 3
AES block cipher, 179
AirSnort tool, 217
algorithmic runtime, 177-78
amplification attack, 161-62
amplification network, 161
AND eax instruction, 104
AND operator, 103, 157
Application layer, 140, 141
arbitrary memory addresses, 61-71
ARP (Address Resolution Protocol), 145
caches, 146, 149, 150, 151, 153
redirection, 150, 187, 212
reply messages, 145
request messages, 145, 146, 149
arpredirect.pl script, 154-56
arrays, 17
ASCII printable instructions, 101-2
ASCII printable polymorphic shellcode, 103-18
assembled print2 shellcode, 114-18
print2.asm, 112-14
printable_exploit.c, 109-11
print.asm, 107-9
assembler, defined, 9
asymmetric encryption, 180-85
asymptotic notation, 178
AT&T syntax, 84
attacks
amplification, 161-62
brute-force, 199-200, 214-15
DDoS, 162
denial of service (DoS), 160-62
dictionary, 197-99 fraggle, 162
man-in-the-middle (MiM), 186, 190, 196
offline brute-force, 214-15
smurf, 162
WEP, 214-27
Fluhrer, Mantin, and Shamir (FMS) attack, 217-27
IP redirection, 216-17
IV-based decryption dictionary tables, 216
keystream reuse, 215-16
offline brute-force attacks, 214-15
AWK scripting tool, 158
AWK sniffer, 157

Table of Contents
Previous Section Next Section