Hacking [Electronic resources] : The Art of Exploitation

Jon Erickson

نسخه متنی -صفحه : 60/ 40
نمايش فراداده

Index

C

C programming language, 11

call instruction, 18, 85, 92

calls, writing multiple words with, 136-38

cdq instruction, 100

chaining return into libc calls, 132-33

ciphers

block ciphers, 178-79

hybrid ciphers, 185-96

differing SSH protocol host fingerprints, 189-91

fuzzy fingerprints, 192-96

man-in-the-middle (MiM) attack, 186-88

product ciphers, 178

symmetric ciphers, 178

cleanup( ) function, 74-75

Code-Red worm, 14

code segment, defined, 18

command-line packet-injection tool, 151, 157

computational security, 176

confusion concept, 174, 179

control structures, 10

cracking passwords. See password cracking

crack.pl file, 198

CRC32 checksum, 216

crypt( ) function, 196

cryptographic protocol, 214

cryptology, 173-227

algorithmic runtime, 177-78

asymmetric encryption, 180-85

hybrid ciphers, 185-96

differing SSH protocol host fingerprints, 189-91

fuzzy fingerprints, 192-96

man-in-the-middle (MiM) attack, 186-88

information theory, 174-76

password cracking, 196-211

dictionary attacks, 197-99

exhaustive brute-force attacks, 199-200

hash lookup table, 200-201

password probability matrix. See password cracking

symmetric encryption, 178-80

WEP attacks, 214-27

Fluhrer, Mantin, and Shamir (FMS) attack, 217-27

IP redirection, 216-17

IV-based decryption dictionary tables, 216

keystream reuse, 215-16

offline brute-force attacks, 214-15

wireless 802.11b encryption, 211-14

cryptosystems, 174, 176

CS checksum, 213

Cynosure bulletin board system, 14