官术网_书友最值得收藏!

Summary

The topics covered in this chapter on security analysis included detecting scans and sweeps to identify targets for planned attacks, operating system fingerprinting, detecting malformed packets, and packets that are suspiciously fragmented or sent out of order, phone home traffic from malicious agents, identifying password cracking attempts, and identifying other abnormal packets and payloads.

In the next chapter, we'll review several key command-line utilities provided in a Wireshark installation, as well as a few additional packet analysis tools that can complement your toolset.

主站蜘蛛池模板: 崇礼县| 惠安县| 休宁县| 香港| 攀枝花市| 乌鲁木齐县| 忻城县| 五寨县| 汶上县| 泾川县| 溧阳市| 资兴市| 高清| 滦平县| 昌平区| 大连市| 天全县| 金沙县| 萨嘎县| 石泉县| 上高县| 连江县| 赤壁市| 海南省| 瑞金市| 乐清市| 潢川县| 胶南市| 方山县| 玛纳斯县| 定襄县| 丹江口市| 东明县| 长治市| 大英县| 正宁县| 长顺县| 庐江县| 新宾| 红原县| 泰顺县|