Skip to Main Content
Hack Proofing Your Web Applications
book

Hack Proofing Your Web Applications

by Syngress
June 2001
Intermediate to advanced content levelIntermediate to advanced
512 pages
18h 49m
English
Syngress
Content preview from Hack Proofing Your Web Applications
172 Chapter 5 • Hacking Techniques and Tools
which a breach of system security can occur in relative silence.These
attacks will typically be conducted using IP fragmentation when you
subject an IDS to a series of IP fragments it will often times cause the
IDS to lose its place and not only ignore the current packet, but addi-
tional packets as well.This style of attack will be conducted until the
intruder gives up or successful penetration of the target system occurs.
After the reconnaissance has been completed, the skilled intruder will
bide his time and carefully review the results.Through these varying snap-
shots taken of the target system, a larger ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Michael Cross
The CERT® Oracle® Secure Coding Standard for Java™

The CERT® Oracle® Secure Coding Standard for Java™

Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Troubleshooting CentOS

Troubleshooting CentOS

Jonathan Hobson

Publisher Resources

ISBN: 9781928994312