Skip to Main Content
Managing A Network Vulnerability Assessment
book

Managing A Network Vulnerability Assessment

by Thomas R. Peltier, Justin Peltier, John A. Blackley
July 2017
Intermediate to advanced content levelIntermediate to advanced
312 pages
8h 31m
English
Auerbach Publications
Content preview from Managing A Network Vulnerability Assessment
Technical (Bottom-Up) Methodology 127
ports that respond (see Exhibit 33). For example, TCP ports 137, 138, and 139
correspond to the Microsoft network access. While some Linux systems will
respond on these ports, it is generally the domain of only Microsoft machines.
The other way in which the tools can fingerprint the OS is through TCP
sequence prediction. Inside TCP communications, a sequence number is used
on the packets to help keep the information flow moving smoothly and in
the correct order. However, certain OSs respond to TCP communication with
an easy-to-predict TCP sequence number, and through the sequence number
increment the tools can make ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Network Vulnerability Assessment

Network Vulnerability Assessment

Sagar Rahalkar
Cybersecurity Risk Management

Cybersecurity Risk Management

Cynthia Brumfield, Brian Haugli

Publisher Resources

ISBN: 9780203503041