Table of Contents
Previous Section Next Section

Index

W

WEP attacks, 214-27
Fluhrer, Mantin, and Shamir (FMS) attack, 217-27
IP redirection, 216-17
IV-based decryption dictionary tables, 216
keystream reuse, 215-16
offline brute-force attacks, 214-15
WEP (Wired Equivalent Privacy), 211-14
wireless 802.11b encryption, 211-14
wireless 802.11b encryption, 211-14
words, multiple, writing with single call, 136-38
Wozniak, Steve, 3
wrapper, using, 133-34
write( ) function, 87, 88
write permission, 15
writing shellcode, 84-129
ASCII printable polymorphic
shellcode, 103-18
assembled print2 shellcode, 114-18
print2.asm, 112-14
printable_exploit.c, 109-11
print.asm, 107-9
avoiding using other segments, 92-940
common assembly instructions, 84-85
dissembler, 118-29
cleared_stack.c code, 125-29
only_print.c code, 122-25
Hello, World program, 87-89
Linux system calls, 85-87
polymorphic shellcode, 102-3
printable ASCII instructions, 101-2
removing null bytes, 94-98
shell-spawning code, 90-92
using stack, 98-101

Table of Contents
Previous Section Next Section