Stealing the Network. How to Own a Continent
Chapter 6: Return on Investment
- Using hping2 and the IP ID Field to Estimate Traffic Levels
- Ndos Denial of Service Tool Options
- Finding Decoy Candidates with Nmap
- OS Fingerprinting the Targets
- Nmap Output: A More Intrusive Scan of Ginevra
- An Intrusive Scan of koizumi-kantei.go.jp
- IPv6 Scan against koizumi-kantei.go.jp
- A Squid Proxy Is Discovered
- Open Proxy Test
- Obtaining the Password File from NIS