Hacking from a network: SYN flood and TCP Sequence number prediction attacks
Số trang: 31
Loại file: pdf
Dung lượng: 680.05 KB
Lượt xem: 11
Lượt tải: 0
Xem trước 4 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
Greetings. This is the oldie, but goody section of the course. This next section is important for anumber of reasons.If you think about it, attacks occur in stages. In general the attacker has to perform reconnaissance tohone in on the target, to find the weaknesses. Then there will be an initial attack, this is oftenminimal, in the book Network Intrusion Detection we referred to this as the “grappling hook”.Finally, the attacker completes the kill. This attack shows each of these stages.This attack took 16 seconds to complete. When we were discussing automated response, we used 16seconds as a measuring rod....
Nội dung trích xuất từ tài liệu:
Hacking from a network: SYN flood and TCP Sequence number prediction attacks
Nội dung trích xuất từ tài liệu:
Hacking from a network: SYN flood and TCP Sequence number prediction attacks
Tìm kiếm theo từ khóa liên quan:
information technology curriculum computer security Hacking Theory of attack Implementation detailsTài liệu liên quan:
-
Ebook Simple computer security: Disinfect your PC – Part 1
131 trang 123 0 0 -
Ebook The Database hacker's handbook: Defending database servers – Part 1
280 trang 121 0 0 -
Ebook Simple computer security: Disinfect your PC – Part 2
226 trang 115 0 0 -
Ebook Protecting your library's digital sources: the essential guide to planning and preservation
121 trang 103 0 0 -
9 trang 62 0 0
-
Ebook Information security fundamentals: Part 2
144 trang 48 0 0 -
Ebook Security power tools: Part 2
505 trang 47 0 0 -
Ebook Security in wireless mesh networks: Part 1
357 trang 44 0 0 -
Ebook Career paths: Information technology
16 trang 44 0 0 -
Lecture Note Professional practices in information technology - Lecture No. 31: RiskManagement
5 trang 43 0 0