Spoofing: Attacks on Trusted Identity
In this Appendix, we will make a slight departure from focusing on securing your network using Check Point products, and instead focus on the theories and methodologies behind spoofing attacks. To successfully secure your systems, you must understand the motives and the means of those who intend to launch a malicious attack against your network. In this Appendix Dan “Effugas” Kaminsky, worldrenowned cryptography expert and frequent speaker at the Black Hat Briefings and DEF CON, provides invaluable insight to the inner workings of a spoof attack. Look for the Syngress icon in the margin to find utilities and code samples, which are available for download from www.syngress.com/solutions.
Introduction ...
Get Checkpoint Next Generation Security Administration now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.