calls, writing multiple words with,
136-38
chaining return into libc calls,
132-33
ciphers
differing SSH protocol host fingerprints,
189-91
man-in-the-middle (MiM) attack,
186-88
command-line packet-injection tool,
151,
157
differing SSH protocol host fingerprints,
189-91
man-in-the-middle (MiM) attack,
186-88
exhaustive brute-force attacks,
199-200
Fluhrer, Mantin, and Shamir (FMS) attack,
217-27
IV-based decryption dictionary tables,
216
offline brute-force attacks,
214-15
wireless 802.11b encryption,
211-14
Cynosure bulletin board system,
14