Skip to Main Content
Vulnerability Management
book

Vulnerability Management

by Park Foreman
August 2009
Intermediate to advanced content levelIntermediate to advanced
347 pages
9h 16m
English
Auerbach Publications
Content preview from Vulnerability Management
teChnology 91
implementations set the value. When the scanner sees such value sent
when the time-stamp option was never used, the choice in operating
systems is narrowed considerably.
Another phenomenon to measure is the incrementing of the time
stamp. By first determining the RTT between the scanner and the
target, you then know how much time should elapse between TCP
segments. e remote OS will increment the time stamp on each seg-
ment by a certain value. e way in which the target increments the
value can reveal the type of OS.
For example, we know that OS XYZ increments the time stamp by
one for every 500 ms of uptime. e average RTT bet ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Vulnerability Management, 2nd Edition

Vulnerability Management, 2nd Edition

Park Foreman

Publisher Resources

ISBN: 9781439801512