June 2011
Intermediate to advanced
280 pages
7h 56m
English
Entire books could be written on breaking down packet captures in security-related scenarios, analyzing common attacks, and responding to IDS alerts. In this chapter we’ve examined some common scanning and enumeration types, a common MITM attack, and two examples of how a system might be exploited and what might happen once it is has been owned.
Read now
Unlock full access