官术网_书友最值得收藏!

Summary

The topics covered in this chapter on security analysis included detecting scans and sweeps to identify targets for planned attacks, operating system fingerprinting, detecting malformed packets, and packets that are suspiciously fragmented or sent out of order, phone home traffic from malicious agents, identifying password cracking attempts, and identifying other abnormal packets and payloads.

In the next chapter, we'll review several key command-line utilities provided in a Wireshark installation, as well as a few additional packet analysis tools that can complement your toolset.

主站蜘蛛池模板: 清苑县| 巴青县| 仲巴县| 祥云县| 鹤山市| 玛纳斯县| 玉屏| 邯郸县| 洪洞县| 曲松县| 舞阳县| 富蕴县| 石渠县| 遂川县| 岫岩| 上栗县| 巴楚县| 泗水县| 和政县| 伊川县| 宜兴市| 团风县| 伽师县| 朔州市| 章丘市| 蒙自县| 永和县| 敖汉旗| 右玉县| 香港 | 行唐县| 静海县| 城固县| 江阴市| 上林县| 达州市| 青神县| 平昌县| 宜良县| 德化县| 封丘县|