Evading Firewalls
IP Address Spoofing One effective way an attacker can evade a firewall is to appear as something else, such as
Read moreIP Address Spoofing One effective way an attacker can evade a firewall is to appear as something else, such as
Read moreTo determine a type of firewall and even a brand, you can use your experience with port scanning and tools
Read moreNot all firewalls or firewall setups are created equal, so you need to be familiar with each setup and how
Read moreSignature Detection The first form of detection or recognition is based on signature; this method is also sometimes called misuse
Read moreAnother wireless technology to consider is Bluetooth, which is seen in many mobile devices in today’s marketplace. Bluetooth refers to
Read moreThe subject of wireless cards and chipsets is important. Although in many cases the chipset on the card and the
Read moreIn order to attack, you must first find a target, and though site surveys can make this easier, they cannot
Read moreSomething else you should be aware of when talking about wireless networks is the type of antenna in use. If
Read more