View the Index
INDEX Symbols & Numbers Adafruit FT232H Breakout, 401–402 * character, 255, 263 adb (Android Debug Bridge), 360, 402 8N1 UART configuration,158 adb logcat, 367–368 802.11 protocols, 288 adb pull command, 361 802.11w, 289 AddPortMapping command, 125–126, 130 addressing layer, UPnP, 119 address search macro, 204 A address space layout randomization, 345 AAAA records, 138–139 admin credentials, Netgear D6000, 213–214 A-ASSOCIATE abort message, 96 ADV_IND PDU type, 271 A-ASSOCIATE accept message, 96 ADV_NONCONN_IND PDU type, 271 A-ASSOCIATE reject message, 96 advanced persistent threat (APT) attacks, 26 A-ASSOCIATE request message, 96 adversaries, 6 C-ECHO requests dissector, building, aes128_cmac function, 325 101–105 AES 128-bit keys, 323, 325, 326 defining structure, 112–113 AFI (Application Family Identifier),244 overview, 96 -afre argument, 135–136 parsing responses, 113–114 aftermarket security, 5 structure of, 101–102 Aircrack-ng, 289, 300–301, 402 writing contexts, 110–111 Aireplay-ng, 290 ABP (Activation by Personalization), 324, Airmon-ng, 289–290, 297–298 326–327, 330–331 Airodump-ng, 290, 301 Abstract Syntax, 111 Akamai, 118 access bits, 251–252 Akerun Smart Lock Robot app for iOS, 357 access controls, testing, 49–50 alarms, jamming wireless, 375–379 access points (APs), 287 Alfa Atheros AWUS036NHA, 402 cracking WPA Enterprise, 304–305 altering RFID tags, 255–256 cracking WPA/WPA2, 299–300 Amazon S3 buckets, 209–210 general discussion, 287–288 Amcrest IP camera, 147–152 overview, 299 amplification attacks, 94 access port, 60 analysis phase, network protocol account privileges, testing, 51 inspections, 92–93 ACK spoofing, 331 Andriesse, Dennis, 218 Activation by Personalization (ABP), 324, Android apps.
[Show full text]