Honeypots
One of the more interesting systems you will encounter is a honeypot. A honeypot may sound like something out of
Read moreTo determine a type of firewall and even a brand, you can use your experience with port scanning and tools
Read moreNot all firewalls or firewall setups are created equal, so you need to be familiar with each setup and how
Read moreSignature Detection The first form of detection or recognition is based on signature; this method is also sometimes called misuse
Read moreAnother wireless technology to consider is Bluetooth, which is seen in many mobile devices in today’s marketplace. Bluetooth refers to
Read moreThe subject of wireless cards and chipsets is important. Although in many cases the chipset on the card and the
Read moreIn order to attack, you must first find a target, and though site surveys can make this easier, they cannot
Read moreSomething else you should be aware of when talking about wireless networks is the type of antenna in use. If
Read moreTA B L E – Common wireless terms
Read more