... rules, 22 7configuring to block users, 22 2 22 3, 22 5important files, 22 1 22 2installing, 22 2, 22 4optimizing to sense attack types, 22 3 22 4, 22 6 22 7running external commands with, 22 7 22 8troubleshooting, ... that allApplication layer data is encrypted. No passwords, usernames, or usable datawww.syngress.comChapter 7 Continued138 _linux_ AppB 6 /20 /01 9:55 AM Page 624 Hack Proofing Linux Fast Track ... encrypted, many tools exist that help hackers wage a sniffing attack to capture encrypted information.; After the packets containing the encrypted passwords are captured, hackersuse cracking applications...