Stealing the Network. How to Own a Continent

Chapter 6: Return on Investment

Using hping2 and the IP ID Field to Estimate Traffic Levels
Ndos Denial of Service Tool Options
Finding Decoy Candidates with Nmap
OS Fingerprinting the Targets
Nmap Output: A More Intrusive Scan of Ginevra
An Intrusive Scan of koizumi-kantei.go.jp
IPv6 Scan against koizumi-kantei.go.jp
A Squid Proxy Is Discovered
Open Proxy Test
Obtaining the Password File from NIS

Категории