Skip to Main Content
Vulnerability Management
book

Vulnerability Management

by Park Foreman
August 2009
Intermediate to advanced content levelIntermediate to advanced
347 pages
9h 16m
English
Auerbach Publications
Content preview from Vulnerability Management
teChnology 81
If the connection handshake is completed with an ACK packet,
an entry in a connection table is maintained on the host and/or on
a firewall. e result is a further consumption of resources until the
connection times out or is reset. For that reason, it is important to
test the behavior of a scanner and determine whether or not a TCP
reset is sent to the host and how that behavior might affect your net-
work on a large scale. If it is possible that a large amount of scan-
ning will be performed through a firewall, then test this scenario.
e setup and breakdown of connections on a firewall are two of the
more processor-intensive tasks ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Vulnerability Management, 2nd Edition

Vulnerability Management, 2nd Edition

Park Foreman

Publisher Resources

ISBN: 9781439801512